Information Systems Study Set 2

Computing

Quiz 17 :

Information Security: Barbarians at the Gateway and Just About Everywhere Else

Quiz 17 :

Information Security: Barbarians at the Gateway and Just About Everywhere Else

Question Type
search
arrow
A research scientist with a major pharmaceutical firm in New Jersey is caught passing on sensitive information, worth millions of dollars, regarding the composition and test results of his firm's latest drug to a rival company. What crime is he being held responsible for?
Free
Multiple Choice
Answer:

Answer:

B

Tags
Choose question tag
close menu
arrow
Which of the followings aspects of international law would enable a cyber-criminal operating across borders to evade prosecution?
Free
Multiple Choice
Answer:

Answer:

D

Tags
Choose question tag
close menu
arrow
A vast majority of security breaches are not preventable and happen despite the best security practices.
Free
True False
Answer:

Answer:

False

Tags
Choose question tag
close menu
arrow
What are some of the key managerial takeaways from the Target security breach?
Essay
Answer:
Tags
Choose question tag
close menu
arrow
The term _____ originally referred to a particularly skilled programmer.
Multiple Choice
Answer:
Tags
Choose question tag
close menu
arrow
An attack on the US power grid by terrorists or a foreign power is indicative of:
Multiple Choice
Answer:
Tags
Choose question tag
close menu
arrow
Which of the following statements is consistent with ground realities regarding information security?
Multiple Choice
Answer:
Tags
Choose question tag
close menu
arrow
Almost all security breaches can be traced back to technology lapses personnel or procedural factors rarely factor in.
True False
Answer:
Tags
Choose question tag
close menu
arrow
Which of these would be an example of a DDoS attack?
Multiple Choice
Answer:
Tags
Choose question tag
close menu
arrow
Which of the following is a valid statement on information security?
Multiple Choice
Answer:
Tags
Choose question tag
close menu
arrow
Organized crime networks now have their own R&D labs and are engaged in sophisticated development efforts to piece together methods to thwart current security measures.
True False
Answer:
Tags
Choose question tag
close menu
arrow
Hackers might infiltrate computer systems to enlist ware for subsequent illegal acts.
True False
Answer:
Tags
Choose question tag
close menu
arrow
A protester seeking to make a political point by leveraging technology tools, often through system infiltration, defacement, or damage is called a(n) _____.
Multiple Choice
Answer:
Tags
Choose question tag
close menu
arrow
Hordes of surreptitiously infiltrated computers, linked and controlled remotely, are known as zombie networks or:
Multiple Choice
Answer:
Tags
Choose question tag
close menu
arrow
Many U.S. technology firms believe that U.S. government surveillance techniques put them at a disadvantage relative to foreign firms because:
Multiple Choice
Answer:
Tags
Choose question tag
close menu
arrow
Cyber criminals who infiltrate systems and collect data for illegal resale are called _____.
Multiple Choice
Answer:
Tags
Choose question tag
close menu
arrow
Several surprising findings were revealed in the wake of the Target breach, providing a cautionary tale for all executives and security professionals. Which of the following was thought to have occurred during the Target security breach? a. Target had security software, but the notification alerts from the software were ignored. b. Target had properly installed and configured its security software, but hackers got in, anyway. c. Credit card databases were on entirely separate systems, not connected to other parts of the firm's information system, but wireless networking allowed hackers to access anything reachable from a cell phone connection. d. Target regularly monitored file names and matched them to file sizes and archival copies to ensure that software was not installed on their systems using the names of legitimate products, but hackers saved files with blank file names so they wouldn't be detected. e. All of the above
Short Answer
Answer:
Tags
Choose question tag
close menu
arrow
A black hat hacker looks for weaknesses in security mechanisms, with a view to help plug the holes that might be exploited by cyber-criminals.
True False
Answer:
Tags
Choose question tag
close menu
arrow
Describe some of the factors at work that enabled the Target security breach to occur.
Essay
Answer:
Tags
Choose question tag
close menu
arrow
A(n) _____ is someone who uncovers computer weaknesses and reveals them to manufacturers or system owners, without exploiting these vulnerabilities.
Multiple Choice
Answer:
Tags
Choose question tag
close menu
Showing 1 - 20 of 89