Filters
Question type

Multiple administrators jointly controlling key systems are an unnecessary burden that adds to the complexity of managing security in an organization.

Correct Answer

verifed

verified

False

What type of tool enforces access privileges and helps verify that systems are not being accessed by the unauthorized, or in suspicious ways?


A) Audit trails
B) Intrusion detection tools
C) Access control tools
D) User-tracking tools
E) Network watching tools

Correct Answer

verifed

verified

The term ISO 27000 refers to a series of standards representing the set of best practices for implementing, maintaining and improving organizational security.

Correct Answer

verifed

verified

A black hat hacker looks for weaknesses in security mechanisms, with a view to help plug the holes that might be exploited by cyber-criminals.

Correct Answer

verifed

verified

False

Information security policies would be ineffective without _____ and _____.


A) audit; enforcement
B) accountability; flexibility
C) compliance; subjectivity
D) protocols; the backing of ISO
E) rigidity; adaptability

Correct Answer

verifed

verified

Computer systems are often infected with malware by means of exploits that sneak in masquerading as something they are not. These exploits are called:


A) rootkits.
B) trojans.
C) viruses.
D) worms.
E) honeypots.

Correct Answer

verifed

verified

Conforming to industry-standard guidelines and frameworks for organizational security ensures continued immunity from attacks on an organization's information.

Correct Answer

verifed

verified

_____ are highly restrictive programs that permit communication only with approved entities and/or in an approved manner.

Correct Answer

verifed

verified

A(n) _____ is someone who uncovers computer weaknesses and reveals them to manufacturers or system owners, without exploiting these vulnerabilities.


A) hacktivist
B) data harvester
C) corporate spy
D) white hat hacker
E) ethical cyber criminal

Correct Answer

verifed

verified

Which of the following statements holds true for the term spoof?


A) It refers to a con executed using technology, typically targeted at acquiring sensitive information or tricking someone into installing malicious software.
B) It refers to e-mail transmissions and packets that have been altered to seem as if they came from another source.
C) It refers to scrambling data using a code or formula, known as a cipher, such that it is hidden from those who do not have the unlocking key.
D) It refers to a seemingly tempting, but bogus target meant to draw hacking attempts.
E) It refers to highly restrictive programs that permit communication only with approved entities and/or in an approved manner.

Correct Answer

verifed

verified

B

Which of the following are considered sources of information that can potentially be used by social engineers?


A) LinkedIn
B) Corproate directories
C) Social media posts
D) Contests or surveys
E) All of the above

Correct Answer

verifed

verified

The virtual shutdown of websites by way of overloading them with seemingly legitimate requests sent simultaneously from thousands of machines is termed as _____ attacks.

Correct Answer

verifed

verified

distribute...

View Answer

URL-shortening services such as bit.ly limit the impact of phishing posts since the shortened URL will clearly reveal the destination arrived at when clicked on.

Correct Answer

verifed

verified

Because of Moore's Law, widely-used encryption programs currently employed by banks and ecommerce sites are now easily penetrated by brute-force attacks that can be employed by hackers using just a handful of simple desktop computers.

Correct Answer

verifed

verified

A bank customer receives a message, ostensibly from the bank's Web site, asking her to provide her login information. Assuming the message is intended to defraud the customer, what type of infiltration technique is being used here?


A) Spyware
B) Malware
C) Social engineering
D) Phishing
E) Virus infections

Correct Answer

verifed

verified

Briefly explain the steps one should take to ensure that their highest priority accounts are not compromised easily by hackers.

Correct Answer

verifed

verified

A user must make it ...

View Answer

A team working on organizational security should include representatives from general counsel, audit, public relations, and human resources, in addition to those from specialized security and broader technology and infrastructure functions.

Correct Answer

verifed

verified

Organized crime networks now have their own R&D labs and are engaged in sophisticated development efforts to piece together methods to thwart current security measures.

Correct Answer

verifed

verified

One of the major problems with the Heartbleed bug in OpenSSL software is that:


A) the software was embedded in many hardware products that could not be easily patched with automatic software updates.
B) any password typed into a CAPTCHA could be monitored by a Van Eck device.
C) social engineers could exploit the bug through SQL injection.
D) all social media profile data was exposed, giving hackers access to the potential answers many firms ask as part of password security questions.
E) it eliminated the ability to expose a URL's desitination by hoving the cursor over an address.

Correct Answer

verifed

verified

Public wireless networks are often vulnerable to monitoring and attack. The use of _______ software can limit threats by encrypting network transmissions over a network.

Correct Answer

verifed

verified

VPN or vir...

View Answer

Showing 1 - 20 of 89

Related Exams

Show Answer