Multiple Choice
Several surprising findings were revealed in the wake of the Target breach, providing a cautionary tale for all executives and security professionals. Which of the following was not thought to have occurred during the Target security breach?
A) Target had security software, but the notification alerts from the software were ignored.
B) Target had properly installed and configured its security software, but hackers got in, anyway.
C) Credit card databases were on entirely separate systems, not connected to other parts of the firm's information system, but wireless networking allowed hackers to access anything reachable from a cell phone connection.
D) Target regularly monitored file names and matched them to file sizes and archival copies to ensure that software was not installed on their systems using the names of legitimate products, but hackers saved files with blank file names so they wouldn't be detected.
E) All of the above
Correct Answer:

Verified
Correct Answer:
Verified
Q3: The use of public wireless connections can
Q11: According to research firm Gartner, the majority
Q26: _ can be either software-based or deployed
Q28: Some of the most common guidelines issued
Q35: Almost all security breaches can be traced
Q44: Online backup services are considered a poor
Q51: One of the reasons one should be
Q56: Web sites of reputed companies can also
Q63: Which of the following statements is consistent
Q75: When using a public wireless network, using