Filters
Question type

Fingerprint readers, retina scanners, voice and face recognition technologies are all part of _____.

Correct Answer

verifed

verified

Challenge questions offered by Web sites to automate password distribution and resets are formidable in protecting the privacy of email accounts.

Correct Answer

verifed

verified

What is the key takeaway from the Heartland breach?


A) Even widely-used open source software is vulnerable.
B) Compliance does not equal security and firms that have passed multiple compliance audits may still remain vulnerable.
C) SSL public-key encrpytion can be hacked.
D) GitHub is a horrible place to store widely-used code.
E) Firms that fail to employ ISO 27000 will remain vulnerable.

Correct Answer

verifed

verified

Regularly updated software lowers a system's vulnerable attack surface.

Correct Answer

verifed

verified

When using a public wireless network, using VPN software is not advisable as it can reveal your communications to any network eavesdroppers.

Correct Answer

verifed

verified

Two-factor authentication is favored for most security situations since it's considered to be fast and conveient for customres.

Correct Answer

verifed

verified

In security circles the phrase "compliance" refers to:


A) legal or professionally binding steps that an organization must take.
B) security audit practices used by the tech divisions of Big Four accounting firms.
C) a firm's installing software to fulfill government surveillance requirements.
D) the U.S. government legislation requiring organizations to share security breaches with law enforcement and industry trade organizations.
E) only deploying open source software that is downloaded from approved GitHub locations.

Correct Answer

verifed

verified

A(n) _____ is someone who uncovers computer weaknesses and reveals them to manufacturers or system owners, without exploiting these vulnerabilities.


A) hacktivist
B) data harvester
C) corporate spy
D) white hat hacker
E) ethical cyber criminal

Correct Answer

verifed

verified

Multiple administrators jointly controlling key systems are an unnecessary burden that adds to the complexity of managing security in an organization.

Correct Answer

verifed

verified

The term _____ originally referred to a particularly skilled programmer.


A) data harvester
B) cracke
C) hacker
D) black hat
E) hacktivist

Correct Answer

verifed

verified

A system that monitors network use for potential hacking attempts and takes preventative action to block, isolate, or identify attempted infiltration, and raise further alarms to warn security personnel is known as a(n) :


A) firewall system.
B) whitelist.
C) intrusion detection system.
D) honeypot system.
E) patching system.

Correct Answer

verifed

verified

Which of the following statements holds true for the term spoof?


A) It refers to a con executed using technology, typically targeted at acquiring sensitive information or tricking someone into installing malicious software.
B) It refers to e-mail transmissions and packets that have been altered to seem as if they came from another source.
C) It refers to scrambling data using a code or formula, known as a cipher, such that it is hidden from those who do not have the unlocking key.
D) It refers to a seemingly tempting, but bogus target meant to draw hacking attempts.
E) It refers to highly restrictive programs that permit communication only with approved entities and/or in an approved manner.

Correct Answer

verifed

verified

Web sites of reputed companies can also be sources of malware.

Correct Answer

verifed

verified

The e-mail password of a senior employee in an organization was compromised by someone observing this user as the employee accessed his account. This is most likely a case of:


A) keylogging.
B) shoulder surfing.
C) dumpster diving.
D) screen capture.
E) spyware.

Correct Answer

verifed

verified

_____________ refers to malware that encrypts a user's files (perhaps threatening to delete them), with demands that a user pay to regain control of their data and/or device.

Correct Answer

verifed

verified

Information security policies would be ineffective without _____ and _____.


A) audit; enforcement
B) accountability; flexibility
C) compliance; subjectivity
D) protocols; the backing of ISO
E) rigidity; adaptability

Correct Answer

verifed

verified

Conforming to industry-standard guidelines and frameworks for organizational security ensures continued immunity from attacks on an organization's information.

Correct Answer

verifed

verified

_____ are scrambled character images used to thwart things like automated account setup or ticket buying.

Correct Answer

verifed

verified

Some of the most common guidelines issued by Web sites when designing a secure password include:


A) The password should be at least eight characters long and include at least one number and other nonalphabet character.
B) The password should be short and straightforward.
C) The password should include names of family members or pets, so as to be easily remembered.
D) Choose a hard-to-guess password, then re-use this hardened password across websites. This minimize instances of calling systems professionals for a password reset, hence eliminating an additional potential vulnerability.
E) The password should be the same as your name so as to trick the hacker.

Correct Answer

verifed

verified

What are the steps to be taken with respect to firm employees in order to ensure organizational security?

Correct Answer

verifed

verified

Employees need to know a firm's policies...

View Answer

Showing 61 - 80 of 87

Related Exams

Show Answer