Filters
Question type

Study Flashcards

A(n) _________ is a system that prevents a specific type of information from moving between untrusted networks and private networks.


A) anti-malware system
B) DMZ
C) ERP
D) firewall

Correct Answer

verifed

verified

_________ is an attack by a programmer developing a system.


A) DoS
B) A phishing attack
C) A Trojan horse
D) Virus

Correct Answer

verifed

verified

_________ is a remote attack requiring no user action.


A) DoS
B) A logic bomb
C) A Trojan horse
D) Virus

Correct Answer

verifed

verified

Keystroke loggers and screen scrapers are examples of _________.


A) adware
B) marketware
C) spamware
D) spyware

Correct Answer

verifed

verified

_______ is designed to erase information permanently, not to hold it ransom.


A) Petya
B) RobbinHood
C) SamSam
D) WannaCry

Correct Answer

verifed

verified

A _________ is an intellectual work that is not based on public information.


A) copyright
B) patent
C) trade secret
D) trademark

Correct Answer

verifed

verified

Social engineers will often pose as real employees or contractors such as exterminators or fire marshals.

Correct Answer

verifed

verified

If you accept the potential risk, continue operating with no controls, and absorb any damages that occur, you have adopted a risk _________ strategy.


A) acceptance
B) avoidance
C) limitation
D) transference

Correct Answer

verifed

verified

Carelessness using unmanaged devices is _________ and is an _________ mistake.


A) a human error; intentional
B) a human error; unintentional
C) social engineering; intentional
D) social engineering; unintentional

Correct Answer

verifed

verified

_________ occur(s) when an attacker either threatens to steal, or actually steals, information from a company and then demands payment for not carrying out a particular act.


A) Alien software
B) Espionage
C) Information extortion
D) SCADA attacks

Correct Answer

verifed

verified

Ransomware negatively affected the city of Atlanta in many ways. Which vulnerability was the main cause of the problems?


A) Today's interconnected, interdependent, wirelessly networked business environment
B) Smaller, faster, cheaper computers and storage devices
C) Decreasing skills necessary to be a computer hacker
D) International organized crime taking over cybercrime
E) Lack of management support

Correct Answer

verifed

verified

Whitelisting allows nothing to run unless it is on the whitelist.

Correct Answer

verifed

verified

___ is a process in which a company identifies the software that it will allow to run on its computers.

Correct Answer

verifed

verified

Organizations spend a great deal of time and money protecting their information resources. To figure out what needs to be protected and how they are going to protect it, they need to perform risk management. What is the goal of risk management? List and describe the three processes of risk management. How can organizations mitigate risk? Describe a company that has adopted each risk mitigation strategy.

Correct Answer

verifed

verified

goal = identify, control, and minimize t...

View Answer

Dyn is a cloud-based internet performance management company that provides virtual private networks for internet websites.

Correct Answer

verifed

verified

The 2017 Equifax data breach was more damaging to lenders than to consumers.

Correct Answer

verifed

verified

If a hacker enters a building with an official-looking ID badge. This is considered social engineering.

Correct Answer

verifed

verified

Authentication occurs after authorization.

Correct Answer

verifed

verified

What is TRUE of the DarkHotel Group attacks?


A) In 2017, they were able to extract over $100 million dollars from Facebook through whaling attacks.
B) Despite utilizing a variation of the same type of attack on intellectual property for over a decade, the group continues to perpetrate cybercrimes and elude arrest.
C) They have been specifically targeting political figures since sometime around 2007 by hacking into donor lists.
D) The group is effective largely because they continually evolve their tactics.

Correct Answer

verifed

verified

___ controls secure the movement of data across networks.

Correct Answer

verifed

verified

Showing 41 - 60 of 169

Related Exams

Show Answer