Filters
Question type

Study Flashcards

Dumpster diving refers to physically trawling through trash to mine any valuable data or insights that can be stolen or used in a security attack.

Correct Answer

verifed

verified

Updates that plug existing holes in a software are called:


A) patches.
B) adware.
C) maculations.
D) keys.
E) cracks.

Correct Answer

verifed

verified

A

Organized crime networks now have their own R&D labs and are engaged in sophisticated development efforts to piece together methods to thwart current security measures.

Correct Answer

verifed

verified

A vast majority of security breaches are not preventable and happen despite the best security practices.

Correct Answer

verifed

verified

Which of the following could be one of the ways firms lockdown personnel hardware?


A) Mandate the use of industry-standard software alone on company hardware
B) Implement frequent overhaul of hardware
C) Dispose of used hardware after annual audits
D) Regularly initiate software auditing
E) Regularly reimage the hard-drives of end user PCs

Correct Answer

verifed

verified

A bank customer receives a message, ostensibly from the bank's Web site, asking her to provide her login information. Assuming the message is intended to defraud the customer, what type of infiltration technique is being used here?


A) Spyware
B) Malware
C) Social engineering
D) Phishing
E) Virus infections

Correct Answer

verifed

verified

A domain name service is a collection of software that:


A) allots domain names to different Web sites.
B) assigns IP addresses to different systems.
C) directs the flow of traffic across the Internet.
D) maintains a registry of different IP addresses.
E) maps an Internet address to an IP address.

Correct Answer

verifed

verified

The typical Web user has 6.5 passwords, each of which is used at four sites, on average.

Correct Answer

verifed

verified

The information systems of several firms have been compromised by contract employees,cleaning staff, and temporary staffers.

Correct Answer

verifed

verified

It should be evident from the TJX example that:


A) security breaches are not as damaging to companies as other crimes are.
B) industry guidelines for information security are not suitable for everyone and should be made optional.
C) information security must be a top organizational priority.
D) skimping on liability insurance to cover for financial losses from security breaches is not advisable.
E) with a little effort and resources, it is possible to make any security system hundred percent foolproof.

Correct Answer

verifed

verified

One of the reasons organizations delay patches to plug holes in their security applications is:


A) the rising cost of labor.
B) lack of information on effectiveness of patches.
C) the fear that the new technology contains a change that will cause problems down the road.
D) redundancy of patches within a short span of time.
E) bureaucratic inefficiency.

Correct Answer

verifed

verified

Describe briefly how technology can be leveraged to offset the attempts of attackers to undermine information security.

Correct Answer

verifed

verified

Technology plays a most important role i...

View Answer

Conforming to industry-standard guidelines and frameworks for organizational security ensures continued immunity from attacks on an organization's information.

Correct Answer

verifed

verified

In public-key encryption systems, the functions of the public and private keys are interchangeable.

Correct Answer

verifed

verified

An organization's partner firms that should be regularly audited to ensure that they are compliant with security frameworks include:


A) clients.
B) technology providers and contract firms.
C) law-enforcement agencies.
D) government regulatory bodies.
E) international standards organizations.

Correct Answer

verifed

verified

Which of the following statements is consistent with ground realities regarding information security?


A) Cyber-crime is not yet considered a serious enough threat to warrant the attention of law-enforcement agencies.
B) Law-enforcement agencies are well-resourced to fight cyber-crimes effectively.
C) Governments usually outmatch private industry in terms of retaining top talent with incentives and generous pay.
D) Law-enforcement agencies employ technically inept employees who are incapable of keeping pace with today's cyber-criminals.
E) Cyber-crime is not rewarding in terms of financial gain.

Correct Answer

verifed

verified

D

Spyware is defined as a type of software that:


A) clogs up network traffic and disables networks.
B) monitors user actions or scans for files surreptitiously.
C) infects other software and decreases the network speeds.
D) serves up unwanted advertisements after being installed without user knowledge.
E) scans for loopholes in other software and releases malware payloads.

Correct Answer

verifed

verified

Regularly updated software lowers a system's vulnerable attack surface.

Correct Answer

verifed

verified

True

Technologies that measure and analyze human body characteristics for identification or authentication are known as _____.


A) overlamination processes
B) biometrics
C) smart tags
D) bio-embedded systems
E) holographs

Correct Answer

verifed

verified

Even the best implemented encryption programs have not been immune to brute-force attacks by hackers.

Correct Answer

verifed

verified

Showing 1 - 20 of 90

Related Exams

Show Answer