Filters
Question type

Study Flashcards

In the Office of Personnel Management's case, the security breach made many people vulnerable to this.


A) Loss of personal property
B) Inaccurate personal data
C) Identity theft
D) Loss of access to personal data
E) Credit card fees

F) A) and D)
G) A) and C)

Correct Answer

verifed

verified

In the Anthem Blue Cross breach, where 80 million names, birthdays, social security numbers, etc., were stolen, the hackers got in by:


A) Breaking into the building where they were stored
B) Obtaining passwords of five or more high-level employees
C) Making phone calls to insiders posing as IT people needing to log into their accounts
D) Emailing each of the 80 million patients asking for their private information
E) Recovering patient records from a large recycling bin

F) C) and D)
G) D) and E)

Correct Answer

verifed

verified

When the Office of Personnel Management was hacked, all of the following are true except:


A) The hackers gained access to the building to steal the records
B) It took the Office of Personnel Management many months to detect the break-in
C) The hackers likely exploited a stolen password
D) The hackers did not need to escape in the blue turbocharged vehicle
E) None of the above (indicating that all are true)

F) A) and B)
G) A) and C)

Correct Answer

verifed

verified

Internal threats are considered the most lethal threat. What are they, why are they so lethal and what can a company do to protect against them?

Correct Answer

verifed

verified

11ec5cbc_dc9a_75e1_b05f_93958c38d15c_TB3177_00

A hacker who buys credit card information from hackers receives a short-term guarantee in case the card is declined.

A) True
B) False

Correct Answer

verifed

verified

It is estimated that ___ % of all firms have been breached:


A) 5% or less
B) 10% to 20%
C) 40% to 60%
D) 70% to 90%
E) Over 95%

F) A) and B)
G) C) and D)

Correct Answer

verifed

verified

The cost of a data breach in 2015 is estimated to be:


A) between $13 and $18 per record
B) between $43 and 65 per record
C) between $145 and $154 per record
D) between $100 and $1,000 per record
E) between $4,520 and $4,580 per record

F) B) and C)
G) A) and E)

Correct Answer

verifed

verified

Spoofing is:


A) When someone makes fun of you for falling for a phishing scam
B) When the "from" address says the name/email address of a person different from who really sent it
C) When hackers snoop around in a system
D) When a person from IT unlocks your email account
E) When you receive a notice of an inheritance

F) C) and D)
G) A) and B)

Correct Answer

verifed

verified

In the Target breach, the HVAC systems were actually attached to the retail sales system.

A) True
B) False

Correct Answer

verifed

verified

A challenge question is when you are stopped at the gate and the guard asks who you are.

A) True
B) False

Correct Answer

verifed

verified

What are the shortcomings of passwords?

Correct Answer

Answered by ExamLex AI

Answered by ExamLex AI

Passwords, while being one of the most c...

View Answer

Many organizations and even consumers use this to control access to a network like the Internet, allowing only authorized traffic to pass.


A) Encryption
B) VPN
C) Firewall
D) Anonymizing tools
E) Filtering

F) D) and E)
G) None of the above

Correct Answer

verifed

verified

In the Target breach, the IT department was warned on or about the time the files were transferred.

A) True
B) False

Correct Answer

verifed

verified

Two factor authentication is when you use two different methods for people trying to use the system. For instance, you can use a password and a challenge question

A) True
B) False

Correct Answer

verifed

verified

True

Who is responsible for developing security education, awareness, and training programs?


A) IT people
B) Shared: IT leaders and business leaders
C) Business leaders
D) Consultants
E) Team of consultants and IT people

F) D) and E)
G) A) and C)

Correct Answer

verifed

verified

On the black market, stolen data in a "kit" that contains credit card information plus social security number and medical information is worth:


A) between $13 and $18 per record
B) between $43 and 65 per record
C) between $145 and $154 per record
D) between $100 and $1,000 per record
E) between $4,520 and $4,580 per record

F) A) and D)
G) C) and E)

Correct Answer

verifed

verified

D

___ of breaches are caused by stealing a password


A) A very low percentage (somewhere around 1%)
B) A low percentage (around 10%)
C) A moderate percentage (around 25%)
D) A high percentage (around 50%)
E) A very high percentage (around 80%)

F) A) and B)
G) B) and E)

Correct Answer

verifed

verified

Firewalls can be either in hardware or software form.

A) True
B) False

Correct Answer

verifed

verified

What is a piece of software that traps keystrokes and stores them for hackers to inspect later?

Correct Answer

verifed

verified

An "evil twin" in the context of computer security is:


A) A virus-laden attachment that looks just like a sincere attachment
B) A duplicate badge that allows a nasty person entry into a data center
C) Someone who looks just like the Chief Information Officer, but steals data
D) An operating system that is not genuine
E) A counterfeit wifi connection in a hotel or coffee shop that appears to be genuine

F) All of the above
G) None of the above

Correct Answer

verifed

verified

Showing 1 - 20 of 40

Related Exams

Show Answer