Deck 7: Information Security

Full screen (f)
exit full mode
Question
Social engineering is an __________ threat on the part of the employee and an __________ threat on the part of the social engineer.

A) intentional; intentional
B) intentional; unintentional
C) unintentional; intentional
D) unintentional; unintentional
Use Space or
up arrow
down arrow
to flip the card.
Question
BYOD can lead to problems with which human mistake?

A) Carelessness using unmanaged devices
B) Carelessness with laptops
C) Carelessness with one's office
D) Poor password selection and use
Question
You want to be nice, so you gladly hold the door for the person behind you that is also coming into your secure office building. This is an example of __________.

A) Carelessness with one's office
B) Extortion
C) Shoulder surfing
D) Tailgating
Question
The loss from computer crimes average _________ of dollars in damages to businesses each year.

A) hundreds
B) thousands
C) millions
D) billions
Question
The Cardinals-Astros scandal started when ____________.

A) much of the Cardinal's front-office personnel left for the Astros
B) some of the information from the Cardinals' system was posted online
C) the Astros won the World Series
D) the Cardinals developed their Redbird system
Question
Your best friend sends you an unusual link with only the comment "Check this out". This is an example of which human mistake?

A) Careless internet surfing
B) Carelessness using unmanaged devices
C) Carelessness with one's office
D) Opening questionable e-mails
Question
____________ are the most frequently ignored people in information security systems.

A) Customers
B) Executives
C) Janitors
D) Suppliers
Question
The computing skills necessary to be a hacker are _______.

A) Changing frequently
B) Decreasing
C) Increasing
D) Staying the same
Question
USB keys can store terabytes of data. Of the five key factors that contribute to the increasing vulnerability of organizational information resources, this is an issue related to __________.

A) decreasing skills necessary to be a computer hacker
B) international organized crime taking over cybercrime
C) lack of management support
D) smaller, faster, cheaper computers and storage devices
E) today's interconnected, interdependent, wirelessly networked business environment
Question
CEOs often trust their CIOs to manage technology issues, so they have historically taken a "hands-off" approach to cybersecurity. Of the five key factors that contribute to the increasing vulnerability of organizational information resources, this is an issue related to __________.

A) decreasing skills necessary to be a computer hacker
B) international organized crime taking over cybercrime
C) lack of management support
D) smaller, faster, cheaper computers and storage devices
E) today's interconnected, interdependent, wirelessly networked business environment
Question
You want to be nice, so you gladly hold the door for the person behind you that is also coming into your secure office building. This is an example of __________ and you _______ do it.

A) Carelessness with one's office; should
B) Carelessness with one's office; should not
C) Tailgating; should
D) Tailgating; should not
Question
The ___________ of an information resource is the harm, loss, or damage that can result if a threat compromises that resource.

A) exposure
B) risk
C) threat
D) vulnerability
Question
Employees in _________ pose especially significant threats to information security.

A) Accounting
B) Inside sales
C) IT
D) Marketing
Question
Which industry has the highest per-record cost of a data breach?

A) Aerospace
B) Healthcare
C) Manufacturing
D) Retail
Question
Many employees bring their own devices to work (the BYOD phenomenon) to use on the company network. Of the five key factors that contribute to the increasing vulnerability of organizational information resources, this is an issue related to __________.

A) decreasing skills necessary to be a computer hacker
B) international organized crime taking over cybercrime
C) lack of management support
D) smaller, faster, cheaper computers and storage devices
E) today's interconnected, interdependent, wirelessly networked business environment
Question
An information resource's ________________ is the possibility that the system will be harmed.

A) exposure
B) risk
C) threat
D) vulnerability
Question
A(n) _____________ to an information resource is any danger to which a system may be exposed.

A) exposure
B) risk
C) threat
D) vulnerability
Question
If the charges are confirmed, the attack would represent the first known case of corporate espionage in which a professional sports team hacked the network of another team. This attack occurred in which sport?

A) MLB
B) NBA
C) NFL
D) PGA
Question
You step away from your desk for a few minutes to get some coffee. Since you figure you won't be gone long, you don't lock your computer. This is an example of which human mistake?

A) Carelessness using unmanaged devices
B) Carelessness with laptops
C) Carelessness with one's office
D) Poor password selection and use
Question
Anyone can download a script from the web to attack any information system connected to the internet. Of the five key factors that contribute to the increasing vulnerability of organizational information resources, this is an issue related to __________.

A) decreasing skills necessary to be a computer hacker
B) international organized crime taking over cybercrime
C) lack of management support
D) smaller, faster, cheaper computers and storage devices
E) today's interconnected, interdependent, wirelessly networked business environment
Question
A __________ is a statutory grant that provides the creators or owners of IP with ownership of the property for a designated period.

A) Copyright
B) Patent
C) Trade secret
D) Trademark
Question
In risk _________, you get insurance to cover any loss.

A) Acceptance
B) Limitation
C) Management
D) Transference
Question
A _________ is a remote attack needing no user action.

A) Back door
B) DOS attack
C) Logic bomb
D) Virus
Question
If a hacker changes President Obama's website to read "China is the best country in the world", this is an example of __________.

A) Espionage
B) Identity theft
C) Information extortion
D) Sabotage
Question
In risk _________, you continue operating with no controls.

A) Acceptance
B) Limitation
C) Management
D) Transference
Question
A __________ is an official document that grants the holder exclusive rights on an invention or a process for a specified period of time.

A) Copyright
B) Patent
C) Trade secret
D) Trademark
Question
Federal agents sought the assistance of ___________ hackers to capture Panin, the creator of SpyEye.

A) Black-hat
B) Blue-hat
C) Gray-hat
D) White-hat
Question
A _________ is an intellectual work, such as a business plan, that is a company secret and is not based on public information.

A) Copyright
B) Patent
C) Trade secret
D) Trademark
Question
You work at a large company that has had a security breach. To prevent this from happening again in the future, you hire a contracting company to monitor the company's network for any future attacks and to accept any financial burdens associated with an attack. This is an example of risk ______.

A) Acceptance
B) Limitation
C) Management
D) Transference
Question
_________ is an attack on monitoring systems such as electricity or water.

A) A DOS attack
B) A SCADA attack
C) Dumpster diving
D) Espionage
Question
Dumpster diving is NOT used for _________.

A) Espionage
B) Identify theft
C) Information extortion
D) Sabotage
Question
A _________ is an attack by a programmer developing a system.

A) Back door
B) DOS attack
C) Phishing attack
D) Virus
Question
A _________ is a remote attack requiring user action.

A) Back door
B) DOS attack
C) Logic bomb
D) Virus
Question
In risk ________, you implement controls to minimize the impact of a threat.

A) Acceptance
B) Limitation
C) Management
D) Transference
Question
You work for a small company. You have determined that hackers probably won't try to steal your customers' information since you don't have enough customers to make it worth it. This is an example of risk ______.

A) Acceptance
B) Limitation
C) Management
D) Transference
Question
The most effective way of dealing with ransomware is __________.

A) Back up your valuable information
B) Call the FBI to track the hacker down
C) Don't download anything off the internet
D) Make others aware of the issue on social media
Question
Panin's SpyEye is an example of _________.

A) A botnet
B) A virus
C) Ransomware
D) Spear phishing
Question
____________ blocks access to a computer system until the system owner or operators pays a sum of money.

A) Adware
B) Ransomware
C) Spamware
D) Spyware
Question
The most current form of ransomware demands payment via _________.

A) Amazon Payments
B) Bitcoin
C) Ethereum
D) Paypal
Question
You work at a large company that has had a security breach. To prevent this from happening again in the future, you hire a new staff of security professionals to install a better security system and monitor the company's network for any future attacks. This is an example of risk ______.

A) Acceptance
B) Limitation
C) Management
D) Transference
Question
If you have to speak into your phone to unlock it, this is something the user ______.

A) Does
B) Knows
C) Has
D) Is
Question
If an auditor checks inputs, outputs, and processing, this is auditing __________ the computer.

A) Around
B) Into
C) Through
D) With
Question
If your company has backup servers without the organization's current applications running on it, this is a ________ site.

A) Cold
B) Hot
C) Tepid
D) Warm
Question
__________ suffer most, if not all, of the financial damage in fraudulent transactions.

A) Customers
B) Financial institutions
C) Governments
D) Merchants
Question
__________ allows you to work from home.

A) A certificate authority
B) Encryption
C) TLS
D) VPN
Question
President Obama labeled the attack on Sony Pictures Entertainment as ________.

A) Cybersecurity
B) Cyberterrorism
C) Cybervandalism
D) Cyberwarfare
Question
If your student ID card allows you into your academic buildings, this is something the user _______.

A) Does
B) Knows
C) Has
D) Is
Question
Guards are considered a __________ control.

A) Access
B) Communication
C) Physical
D) User
Question
Asymmetric encryption uses the ________ key for locking and the _______ key for unlocking.

A) private; private
B) private; public
C) public; private
D) public; public
Question
If your company has another location that can take over for your primary location within a few minutes, this is a ________ site.

A) Cold
B) Hot
C) Tepid
D) Warm
Question
URLs that begin with https are a function of _______.

A) a certificate authority
B) TLS
C) VPN
D) whitelisting
Question
The most valuable cybersecurity control(s) for organizations is/are _________.

A) access controls
B) communications controls
C) physical controls
D) user education and training
Question
Sony Pictures Entertainment was most likely hacked by a group from ________.

A) China
B) India
C) North Korea
D) Russia
Question
If your college only allows its own website to work while you are on the college's network, they are using __________.

A) Blacklisting
B) Bluelisting
C) Graylisting
D) Whitelisting
Question
If your college allows you to access any website except hacker websites, they are using _______.

A) Blacklisting
B) Bluelisting
C) Graylisting
D) Whitelisting
Question
If your fingerprint is necessary to use your credit card, this is something the user ____.

A) Does
B) Knows
C) Has
D) Is
Question
If your company has an extra building with nothing in it, this is a ________ site.

A) Cold
B) Hot
C) Tepid
D) Warm
Question
__________ enables online retailers to accept more online transactions by analyzing customer behavior while they browse and buy online.

A) Amazon Payments
B) Google Wallet
C) Paypal
D) Trustev
Question
Which of the following is NOT one of Sony's new security policies?

A) All users must use multifactor authentication.
B) E-mails will be archived after a few weeks.
C) Sony will keep as little information as possible on its active network.
D) Sony will use blacklisting for internet use and application installation.
Question
If you have to type a password into your phone to use it, this is something the user ____.

A) Does
B) Knows
C) Has
D) Is
Question
The Cardinals hacked into the Astros' system after some of the Cardinals front-office personnel went to the Astros.
Question
Which of the following is NOT part of US CIO Tony Scott's 30-day "Cybersecurity Sprint"?

A) Dramatically accelerate the implementation of multifactor authentication, especially for privileged users
B) Immediately patch critical security vulnerabilities
C) Install up-to-date equipment and security software
D) Tighten policies and procedures for privileged users by limiting the number of user accounts
Question
___________ were NOT stolen in the US Office of Personnel Management data breach.

A) Credit card numbers
B) Fingerprints
C) Health records
D) Social security numbers
Question
An untrusted network is any network internal to your organization.
Question
People are highly susceptible to social engineering because it seems to be the polite thing to do.
Question
In the Cardinals-Astros case, the Cardinals were involved in espionage.
Question
Cyberterrorism is typically carried out by nation states while cyberwarfare is carried out by individuals or groups.
Question
You can't do anything about ransomware except pay the fee.
Question
You cannot give a copy of any type of software to a friend under patent law.
Question
After a person is authenticated, the next step is authorization.
Question
Human error is an unintentional threat.
Question
Small businesses do not have to worry about data breaches.
Question
The lower the level of employee, the greater the threat he or she poses to information security.
Question
IT security is the business of everyone in an organization.
Question
Espionage is an illegal form of competitive intelligence.
Question
A trusted network is any network within your organization.
Question
Dumpster diving is illegal in the United States.
Question
The SpyEye case illustrates how well different countries work together to capture cybercriminals.
Question
Biometrics is something the user has.
Question
Wireless is an inherently secure broadcast communications medium.
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/98
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 7: Information Security
1
Social engineering is an __________ threat on the part of the employee and an __________ threat on the part of the social engineer.

A) intentional; intentional
B) intentional; unintentional
C) unintentional; intentional
D) unintentional; unintentional
C
2
BYOD can lead to problems with which human mistake?

A) Carelessness using unmanaged devices
B) Carelessness with laptops
C) Carelessness with one's office
D) Poor password selection and use
A
3
You want to be nice, so you gladly hold the door for the person behind you that is also coming into your secure office building. This is an example of __________.

A) Carelessness with one's office
B) Extortion
C) Shoulder surfing
D) Tailgating
D
4
The loss from computer crimes average _________ of dollars in damages to businesses each year.

A) hundreds
B) thousands
C) millions
D) billions
Unlock Deck
Unlock for access to all 98 flashcards in this deck.
Unlock Deck
k this deck
5
The Cardinals-Astros scandal started when ____________.

A) much of the Cardinal's front-office personnel left for the Astros
B) some of the information from the Cardinals' system was posted online
C) the Astros won the World Series
D) the Cardinals developed their Redbird system
Unlock Deck
Unlock for access to all 98 flashcards in this deck.
Unlock Deck
k this deck
6
Your best friend sends you an unusual link with only the comment "Check this out". This is an example of which human mistake?

A) Careless internet surfing
B) Carelessness using unmanaged devices
C) Carelessness with one's office
D) Opening questionable e-mails
Unlock Deck
Unlock for access to all 98 flashcards in this deck.
Unlock Deck
k this deck
7
____________ are the most frequently ignored people in information security systems.

A) Customers
B) Executives
C) Janitors
D) Suppliers
Unlock Deck
Unlock for access to all 98 flashcards in this deck.
Unlock Deck
k this deck
8
The computing skills necessary to be a hacker are _______.

A) Changing frequently
B) Decreasing
C) Increasing
D) Staying the same
Unlock Deck
Unlock for access to all 98 flashcards in this deck.
Unlock Deck
k this deck
9
USB keys can store terabytes of data. Of the five key factors that contribute to the increasing vulnerability of organizational information resources, this is an issue related to __________.

A) decreasing skills necessary to be a computer hacker
B) international organized crime taking over cybercrime
C) lack of management support
D) smaller, faster, cheaper computers and storage devices
E) today's interconnected, interdependent, wirelessly networked business environment
Unlock Deck
Unlock for access to all 98 flashcards in this deck.
Unlock Deck
k this deck
10
CEOs often trust their CIOs to manage technology issues, so they have historically taken a "hands-off" approach to cybersecurity. Of the five key factors that contribute to the increasing vulnerability of organizational information resources, this is an issue related to __________.

A) decreasing skills necessary to be a computer hacker
B) international organized crime taking over cybercrime
C) lack of management support
D) smaller, faster, cheaper computers and storage devices
E) today's interconnected, interdependent, wirelessly networked business environment
Unlock Deck
Unlock for access to all 98 flashcards in this deck.
Unlock Deck
k this deck
11
You want to be nice, so you gladly hold the door for the person behind you that is also coming into your secure office building. This is an example of __________ and you _______ do it.

A) Carelessness with one's office; should
B) Carelessness with one's office; should not
C) Tailgating; should
D) Tailgating; should not
Unlock Deck
Unlock for access to all 98 flashcards in this deck.
Unlock Deck
k this deck
12
The ___________ of an information resource is the harm, loss, or damage that can result if a threat compromises that resource.

A) exposure
B) risk
C) threat
D) vulnerability
Unlock Deck
Unlock for access to all 98 flashcards in this deck.
Unlock Deck
k this deck
13
Employees in _________ pose especially significant threats to information security.

A) Accounting
B) Inside sales
C) IT
D) Marketing
Unlock Deck
Unlock for access to all 98 flashcards in this deck.
Unlock Deck
k this deck
14
Which industry has the highest per-record cost of a data breach?

A) Aerospace
B) Healthcare
C) Manufacturing
D) Retail
Unlock Deck
Unlock for access to all 98 flashcards in this deck.
Unlock Deck
k this deck
15
Many employees bring their own devices to work (the BYOD phenomenon) to use on the company network. Of the five key factors that contribute to the increasing vulnerability of organizational information resources, this is an issue related to __________.

A) decreasing skills necessary to be a computer hacker
B) international organized crime taking over cybercrime
C) lack of management support
D) smaller, faster, cheaper computers and storage devices
E) today's interconnected, interdependent, wirelessly networked business environment
Unlock Deck
Unlock for access to all 98 flashcards in this deck.
Unlock Deck
k this deck
16
An information resource's ________________ is the possibility that the system will be harmed.

A) exposure
B) risk
C) threat
D) vulnerability
Unlock Deck
Unlock for access to all 98 flashcards in this deck.
Unlock Deck
k this deck
17
A(n) _____________ to an information resource is any danger to which a system may be exposed.

A) exposure
B) risk
C) threat
D) vulnerability
Unlock Deck
Unlock for access to all 98 flashcards in this deck.
Unlock Deck
k this deck
18
If the charges are confirmed, the attack would represent the first known case of corporate espionage in which a professional sports team hacked the network of another team. This attack occurred in which sport?

A) MLB
B) NBA
C) NFL
D) PGA
Unlock Deck
Unlock for access to all 98 flashcards in this deck.
Unlock Deck
k this deck
19
You step away from your desk for a few minutes to get some coffee. Since you figure you won't be gone long, you don't lock your computer. This is an example of which human mistake?

A) Carelessness using unmanaged devices
B) Carelessness with laptops
C) Carelessness with one's office
D) Poor password selection and use
Unlock Deck
Unlock for access to all 98 flashcards in this deck.
Unlock Deck
k this deck
20
Anyone can download a script from the web to attack any information system connected to the internet. Of the five key factors that contribute to the increasing vulnerability of organizational information resources, this is an issue related to __________.

A) decreasing skills necessary to be a computer hacker
B) international organized crime taking over cybercrime
C) lack of management support
D) smaller, faster, cheaper computers and storage devices
E) today's interconnected, interdependent, wirelessly networked business environment
Unlock Deck
Unlock for access to all 98 flashcards in this deck.
Unlock Deck
k this deck
21
A __________ is a statutory grant that provides the creators or owners of IP with ownership of the property for a designated period.

A) Copyright
B) Patent
C) Trade secret
D) Trademark
Unlock Deck
Unlock for access to all 98 flashcards in this deck.
Unlock Deck
k this deck
22
In risk _________, you get insurance to cover any loss.

A) Acceptance
B) Limitation
C) Management
D) Transference
Unlock Deck
Unlock for access to all 98 flashcards in this deck.
Unlock Deck
k this deck
23
A _________ is a remote attack needing no user action.

A) Back door
B) DOS attack
C) Logic bomb
D) Virus
Unlock Deck
Unlock for access to all 98 flashcards in this deck.
Unlock Deck
k this deck
24
If a hacker changes President Obama's website to read "China is the best country in the world", this is an example of __________.

A) Espionage
B) Identity theft
C) Information extortion
D) Sabotage
Unlock Deck
Unlock for access to all 98 flashcards in this deck.
Unlock Deck
k this deck
25
In risk _________, you continue operating with no controls.

A) Acceptance
B) Limitation
C) Management
D) Transference
Unlock Deck
Unlock for access to all 98 flashcards in this deck.
Unlock Deck
k this deck
26
A __________ is an official document that grants the holder exclusive rights on an invention or a process for a specified period of time.

A) Copyright
B) Patent
C) Trade secret
D) Trademark
Unlock Deck
Unlock for access to all 98 flashcards in this deck.
Unlock Deck
k this deck
27
Federal agents sought the assistance of ___________ hackers to capture Panin, the creator of SpyEye.

A) Black-hat
B) Blue-hat
C) Gray-hat
D) White-hat
Unlock Deck
Unlock for access to all 98 flashcards in this deck.
Unlock Deck
k this deck
28
A _________ is an intellectual work, such as a business plan, that is a company secret and is not based on public information.

A) Copyright
B) Patent
C) Trade secret
D) Trademark
Unlock Deck
Unlock for access to all 98 flashcards in this deck.
Unlock Deck
k this deck
29
You work at a large company that has had a security breach. To prevent this from happening again in the future, you hire a contracting company to monitor the company's network for any future attacks and to accept any financial burdens associated with an attack. This is an example of risk ______.

A) Acceptance
B) Limitation
C) Management
D) Transference
Unlock Deck
Unlock for access to all 98 flashcards in this deck.
Unlock Deck
k this deck
30
_________ is an attack on monitoring systems such as electricity or water.

A) A DOS attack
B) A SCADA attack
C) Dumpster diving
D) Espionage
Unlock Deck
Unlock for access to all 98 flashcards in this deck.
Unlock Deck
k this deck
31
Dumpster diving is NOT used for _________.

A) Espionage
B) Identify theft
C) Information extortion
D) Sabotage
Unlock Deck
Unlock for access to all 98 flashcards in this deck.
Unlock Deck
k this deck
32
A _________ is an attack by a programmer developing a system.

A) Back door
B) DOS attack
C) Phishing attack
D) Virus
Unlock Deck
Unlock for access to all 98 flashcards in this deck.
Unlock Deck
k this deck
33
A _________ is a remote attack requiring user action.

A) Back door
B) DOS attack
C) Logic bomb
D) Virus
Unlock Deck
Unlock for access to all 98 flashcards in this deck.
Unlock Deck
k this deck
34
In risk ________, you implement controls to minimize the impact of a threat.

A) Acceptance
B) Limitation
C) Management
D) Transference
Unlock Deck
Unlock for access to all 98 flashcards in this deck.
Unlock Deck
k this deck
35
You work for a small company. You have determined that hackers probably won't try to steal your customers' information since you don't have enough customers to make it worth it. This is an example of risk ______.

A) Acceptance
B) Limitation
C) Management
D) Transference
Unlock Deck
Unlock for access to all 98 flashcards in this deck.
Unlock Deck
k this deck
36
The most effective way of dealing with ransomware is __________.

A) Back up your valuable information
B) Call the FBI to track the hacker down
C) Don't download anything off the internet
D) Make others aware of the issue on social media
Unlock Deck
Unlock for access to all 98 flashcards in this deck.
Unlock Deck
k this deck
37
Panin's SpyEye is an example of _________.

A) A botnet
B) A virus
C) Ransomware
D) Spear phishing
Unlock Deck
Unlock for access to all 98 flashcards in this deck.
Unlock Deck
k this deck
38
____________ blocks access to a computer system until the system owner or operators pays a sum of money.

A) Adware
B) Ransomware
C) Spamware
D) Spyware
Unlock Deck
Unlock for access to all 98 flashcards in this deck.
Unlock Deck
k this deck
39
The most current form of ransomware demands payment via _________.

A) Amazon Payments
B) Bitcoin
C) Ethereum
D) Paypal
Unlock Deck
Unlock for access to all 98 flashcards in this deck.
Unlock Deck
k this deck
40
You work at a large company that has had a security breach. To prevent this from happening again in the future, you hire a new staff of security professionals to install a better security system and monitor the company's network for any future attacks. This is an example of risk ______.

A) Acceptance
B) Limitation
C) Management
D) Transference
Unlock Deck
Unlock for access to all 98 flashcards in this deck.
Unlock Deck
k this deck
41
If you have to speak into your phone to unlock it, this is something the user ______.

A) Does
B) Knows
C) Has
D) Is
Unlock Deck
Unlock for access to all 98 flashcards in this deck.
Unlock Deck
k this deck
42
If an auditor checks inputs, outputs, and processing, this is auditing __________ the computer.

A) Around
B) Into
C) Through
D) With
Unlock Deck
Unlock for access to all 98 flashcards in this deck.
Unlock Deck
k this deck
43
If your company has backup servers without the organization's current applications running on it, this is a ________ site.

A) Cold
B) Hot
C) Tepid
D) Warm
Unlock Deck
Unlock for access to all 98 flashcards in this deck.
Unlock Deck
k this deck
44
__________ suffer most, if not all, of the financial damage in fraudulent transactions.

A) Customers
B) Financial institutions
C) Governments
D) Merchants
Unlock Deck
Unlock for access to all 98 flashcards in this deck.
Unlock Deck
k this deck
45
__________ allows you to work from home.

A) A certificate authority
B) Encryption
C) TLS
D) VPN
Unlock Deck
Unlock for access to all 98 flashcards in this deck.
Unlock Deck
k this deck
46
President Obama labeled the attack on Sony Pictures Entertainment as ________.

A) Cybersecurity
B) Cyberterrorism
C) Cybervandalism
D) Cyberwarfare
Unlock Deck
Unlock for access to all 98 flashcards in this deck.
Unlock Deck
k this deck
47
If your student ID card allows you into your academic buildings, this is something the user _______.

A) Does
B) Knows
C) Has
D) Is
Unlock Deck
Unlock for access to all 98 flashcards in this deck.
Unlock Deck
k this deck
48
Guards are considered a __________ control.

A) Access
B) Communication
C) Physical
D) User
Unlock Deck
Unlock for access to all 98 flashcards in this deck.
Unlock Deck
k this deck
49
Asymmetric encryption uses the ________ key for locking and the _______ key for unlocking.

A) private; private
B) private; public
C) public; private
D) public; public
Unlock Deck
Unlock for access to all 98 flashcards in this deck.
Unlock Deck
k this deck
50
If your company has another location that can take over for your primary location within a few minutes, this is a ________ site.

A) Cold
B) Hot
C) Tepid
D) Warm
Unlock Deck
Unlock for access to all 98 flashcards in this deck.
Unlock Deck
k this deck
51
URLs that begin with https are a function of _______.

A) a certificate authority
B) TLS
C) VPN
D) whitelisting
Unlock Deck
Unlock for access to all 98 flashcards in this deck.
Unlock Deck
k this deck
52
The most valuable cybersecurity control(s) for organizations is/are _________.

A) access controls
B) communications controls
C) physical controls
D) user education and training
Unlock Deck
Unlock for access to all 98 flashcards in this deck.
Unlock Deck
k this deck
53
Sony Pictures Entertainment was most likely hacked by a group from ________.

A) China
B) India
C) North Korea
D) Russia
Unlock Deck
Unlock for access to all 98 flashcards in this deck.
Unlock Deck
k this deck
54
If your college only allows its own website to work while you are on the college's network, they are using __________.

A) Blacklisting
B) Bluelisting
C) Graylisting
D) Whitelisting
Unlock Deck
Unlock for access to all 98 flashcards in this deck.
Unlock Deck
k this deck
55
If your college allows you to access any website except hacker websites, they are using _______.

A) Blacklisting
B) Bluelisting
C) Graylisting
D) Whitelisting
Unlock Deck
Unlock for access to all 98 flashcards in this deck.
Unlock Deck
k this deck
56
If your fingerprint is necessary to use your credit card, this is something the user ____.

A) Does
B) Knows
C) Has
D) Is
Unlock Deck
Unlock for access to all 98 flashcards in this deck.
Unlock Deck
k this deck
57
If your company has an extra building with nothing in it, this is a ________ site.

A) Cold
B) Hot
C) Tepid
D) Warm
Unlock Deck
Unlock for access to all 98 flashcards in this deck.
Unlock Deck
k this deck
58
__________ enables online retailers to accept more online transactions by analyzing customer behavior while they browse and buy online.

A) Amazon Payments
B) Google Wallet
C) Paypal
D) Trustev
Unlock Deck
Unlock for access to all 98 flashcards in this deck.
Unlock Deck
k this deck
59
Which of the following is NOT one of Sony's new security policies?

A) All users must use multifactor authentication.
B) E-mails will be archived after a few weeks.
C) Sony will keep as little information as possible on its active network.
D) Sony will use blacklisting for internet use and application installation.
Unlock Deck
Unlock for access to all 98 flashcards in this deck.
Unlock Deck
k this deck
60
If you have to type a password into your phone to use it, this is something the user ____.

A) Does
B) Knows
C) Has
D) Is
Unlock Deck
Unlock for access to all 98 flashcards in this deck.
Unlock Deck
k this deck
61
The Cardinals hacked into the Astros' system after some of the Cardinals front-office personnel went to the Astros.
Unlock Deck
Unlock for access to all 98 flashcards in this deck.
Unlock Deck
k this deck
62
Which of the following is NOT part of US CIO Tony Scott's 30-day "Cybersecurity Sprint"?

A) Dramatically accelerate the implementation of multifactor authentication, especially for privileged users
B) Immediately patch critical security vulnerabilities
C) Install up-to-date equipment and security software
D) Tighten policies and procedures for privileged users by limiting the number of user accounts
Unlock Deck
Unlock for access to all 98 flashcards in this deck.
Unlock Deck
k this deck
63
___________ were NOT stolen in the US Office of Personnel Management data breach.

A) Credit card numbers
B) Fingerprints
C) Health records
D) Social security numbers
Unlock Deck
Unlock for access to all 98 flashcards in this deck.
Unlock Deck
k this deck
64
An untrusted network is any network internal to your organization.
Unlock Deck
Unlock for access to all 98 flashcards in this deck.
Unlock Deck
k this deck
65
People are highly susceptible to social engineering because it seems to be the polite thing to do.
Unlock Deck
Unlock for access to all 98 flashcards in this deck.
Unlock Deck
k this deck
66
In the Cardinals-Astros case, the Cardinals were involved in espionage.
Unlock Deck
Unlock for access to all 98 flashcards in this deck.
Unlock Deck
k this deck
67
Cyberterrorism is typically carried out by nation states while cyberwarfare is carried out by individuals or groups.
Unlock Deck
Unlock for access to all 98 flashcards in this deck.
Unlock Deck
k this deck
68
You can't do anything about ransomware except pay the fee.
Unlock Deck
Unlock for access to all 98 flashcards in this deck.
Unlock Deck
k this deck
69
You cannot give a copy of any type of software to a friend under patent law.
Unlock Deck
Unlock for access to all 98 flashcards in this deck.
Unlock Deck
k this deck
70
After a person is authenticated, the next step is authorization.
Unlock Deck
Unlock for access to all 98 flashcards in this deck.
Unlock Deck
k this deck
71
Human error is an unintentional threat.
Unlock Deck
Unlock for access to all 98 flashcards in this deck.
Unlock Deck
k this deck
72
Small businesses do not have to worry about data breaches.
Unlock Deck
Unlock for access to all 98 flashcards in this deck.
Unlock Deck
k this deck
73
The lower the level of employee, the greater the threat he or she poses to information security.
Unlock Deck
Unlock for access to all 98 flashcards in this deck.
Unlock Deck
k this deck
74
IT security is the business of everyone in an organization.
Unlock Deck
Unlock for access to all 98 flashcards in this deck.
Unlock Deck
k this deck
75
Espionage is an illegal form of competitive intelligence.
Unlock Deck
Unlock for access to all 98 flashcards in this deck.
Unlock Deck
k this deck
76
A trusted network is any network within your organization.
Unlock Deck
Unlock for access to all 98 flashcards in this deck.
Unlock Deck
k this deck
77
Dumpster diving is illegal in the United States.
Unlock Deck
Unlock for access to all 98 flashcards in this deck.
Unlock Deck
k this deck
78
The SpyEye case illustrates how well different countries work together to capture cybercriminals.
Unlock Deck
Unlock for access to all 98 flashcards in this deck.
Unlock Deck
k this deck
79
Biometrics is something the user has.
Unlock Deck
Unlock for access to all 98 flashcards in this deck.
Unlock Deck
k this deck
80
Wireless is an inherently secure broadcast communications medium.
Unlock Deck
Unlock for access to all 98 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 98 flashcards in this deck.