Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) Even widely-used open source software is vulnerable.
B) Compliance does not equal security and firms that have passed multiple compliance audits may still remain vulnerable.
C) SSL public-key encrpytion can be hacked.
D) GitHub is a horrible place to store widely-used code.
E) Firms that fail to employ ISO 27000 will remain vulnerable.
Correct Answer
verified
True/False
Correct Answer
verified
True/False
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) legal or professionally binding steps that an organization must take.
B) security audit practices used by the tech divisions of Big Four accounting firms.
C) a firm's installing software to fulfill government surveillance requirements.
D) the U.S. government legislation requiring organizations to share security breaches with law enforcement and industry trade organizations.
E) only deploying open source software that is downloaded from approved GitHub locations.
Correct Answer
verified
Multiple Choice
A) hacktivist
B) data harvester
C) corporate spy
D) white hat hacker
E) ethical cyber criminal
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) data harvester
B) cracke
C) hacker
D) black hat
E) hacktivist
Correct Answer
verified
Multiple Choice
A) firewall system.
B) whitelist.
C) intrusion detection system.
D) honeypot system.
E) patching system.
Correct Answer
verified
Multiple Choice
A) It refers to a con executed using technology, typically targeted at acquiring sensitive information or tricking someone into installing malicious software.
B) It refers to e-mail transmissions and packets that have been altered to seem as if they came from another source.
C) It refers to scrambling data using a code or formula, known as a cipher, such that it is hidden from those who do not have the unlocking key.
D) It refers to a seemingly tempting, but bogus target meant to draw hacking attempts.
E) It refers to highly restrictive programs that permit communication only with approved entities and/or in an approved manner.
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) keylogging.
B) shoulder surfing.
C) dumpster diving.
D) screen capture.
E) spyware.
Correct Answer
verified
Short Answer
Correct Answer
verified
Multiple Choice
A) audit; enforcement
B) accountability; flexibility
C) compliance; subjectivity
D) protocols; the backing of ISO
E) rigidity; adaptability
Correct Answer
verified
True/False
Correct Answer
verified
Short Answer
Correct Answer
verified
Multiple Choice
A) The password should be at least eight characters long and include at least one number and other nonalphabet character.
B) The password should be short and straightforward.
C) The password should include names of family members or pets, so as to be easily remembered.
D) Choose a hard-to-guess password, then re-use this hardened password across websites. This minimize instances of calling systems professionals for a password reset, hence eliminating an additional potential vulnerability.
E) The password should be the same as your name so as to trick the hacker.
Correct Answer
verified
Essay
Correct Answer
verified
View Answer
Showing 61 - 80 of 87
Related Exams