Filters
Question type

Study Flashcards

Janitors are no threat to information security since they have no access to company systems.

Correct Answer

verifed

verified

_________ is any danger to which a system may be exposed.


A) Exposure
B) Information security
C) Threat
D) Security

Correct Answer

verifed

verified

_____________________ is an attack in which the perpetrator uses social skills to trick or manipulate legitimate employees into providing confidential company information such as passwords.


A) Dumpster diving
B) Shoulder surfing
C) Social engineering
D) Tailgating

Correct Answer

verifed

verified

Social engineering is a(n) ___________ threat on the part of the employee and a(n) _________ threat on the part of the social engineer.


A) deliberate; unintentional
B) deliberate; deliberate
C) unintentional; deliberate
D) unintentional; unintentional

Correct Answer

verifed

verified

A ___________ is an attack by a programmer developing a system.


A) back door
B) denial-of-service attack
C) phishing attack
D) virus

Correct Answer

verifed

verified

A

A ___________ is a remote attack requiring user action.


A) back door
B) denial-of-service attack
C) logic bomb
D) phishing attack

Correct Answer

verifed

verified

Blacklisting is when everything can run except what is on the list.

Correct Answer

verifed

verified

True

Wireless is an untrusted network.

Correct Answer

verifed

verified

Biometrics is something the user _______.


A) Does
B) Has
C) Is
D) Knows

Correct Answer

verifed

verified

________________ is software that causes pop-up advertisements to appear on your screen.

Correct Answer

verifed

verified

Tracking down cybercriminals is the most difficult and only real challenge authorities face.

Correct Answer

verifed

verified

According to the "Catching a Hacker" case, ____________ is one of the most sophisticated and destructive malicious software programs ever developed.


A) the Heartbleed bug
B) FireEye
C) Shodan
D) SpyEye

Correct Answer

verifed

verified

Biometrics is an authentication tool.

Correct Answer

verifed

verified

The main problem with multifactor authentication is _____________.


A) it's a single point of failure
B) it's too hard to do
C) it will invade our privacy
D) there are no problems with multifactor authentication

Correct Answer

verifed

verified

Shodan's primary purpose is ___________.


A) a hacker website
B) a service that searches the internet for devices connected to the internet
C) a website that shows which devices are vulnerable to hackers
D) to help users search for other people who use similar devices

Correct Answer

verifed

verified

The Shodan case illustrates ___________.


A) how vulnerable all devices are, even if they aren't connected to the internet
B) strong passwords aren't necessary on home devices since most hackers don't care about such a small target
C) that hackers and security researchers use the same sites to identify vulnerabilities
D) the government is doing nothing to protect our privacy

Correct Answer

verifed

verified

You decide to use the password "1234" on your computer because you figure nobody cares enough about your information to steal it. This is a risk __________ strategy.


A) acceptance
B) analysis
C) limitation
D) transference

Correct Answer

verifed

verified

Whitelisting is when nothing can run unless it is on the list.

Correct Answer

verifed

verified

Which country is currently in a dispute with the US over bilateral hacking?


A) Australia
B) China
C) India
D) United Kingdom

Correct Answer

verifed

verified

___________ is threatening to steal or actually stealing information from a company and then demanding payment to not use or release that information.


A) Competitive intelligence
B) Espionage
C) Information extortion
D) Intellectual property

Correct Answer

verifed

verified

C

Showing 1 - 20 of 75

Related Exams

Show Answer