Deck 7: Industrial Espionage in Cyberspace

ملء الشاشة (f)
exit full mode
سؤال
Crafting email and websites to specifically target certain victims is called dive bombing.
استخدم زر المسافة أو
up arrow
down arrow
لقلب البطاقة.
سؤال
VI (value of information)= C (cost to produce)+ ___________.

A)MU (markup)
B)GM (gross margin)
C)VG (value gained)
D)VL (value lost)
سؤال
A key logger can be hardware-based of software-based.
سؤال
Funcrypt is a free tool that can be used to encrypt drives,folders,or partitions.
سؤال
Which of the following is NOT an example of industrial espionage?

A)Details on a competitor's new project
B)A list of a competitor's clients
C)Denial-of-service attack
D)None of the above
سؤال
Data stored in computer systems has a high value because there is a great deal of time and effort that goes into creating an analyzing it and ________________.

A)Data often has intrinsic value.
B)Data is an asset that appreciates.
C)Data lasts forever.
D)None of the above.
سؤال
Hiding a message in images is an example of stenography.
سؤال
Sending a forged email asking for sensitive data is an example of steganography.
سؤال
Cookies and key loggers are examples of ____________.

A)Viruses
B)Worms
C)Spyware
D)None of the above
سؤال
The chief executive officer of Oracle defends his practice to hire private investigators to sift through the garbage of which competitor?

A)Red Hat
B)McAfee
C)Norton
D)Microsoft
سؤال
Microsoft Windows includes BitLocker in some editions,so entire hard drives can be encrypted.
سؤال
The Patriot Act was the first U.S.law to criminalize theft of commercial trade secrets.
سؤال
The company involved in an attack by Oleg Zezev from Kazahkstan,in which Zezev accessed computer data and copied personal information for purposes of blackmail was ______.

A)General Motors
B)Interactive Television Technologies,Inc.
C)Bloomberg,Inc.
D)None of the above
سؤال
______________ is the use of spying techniques to find out key information that is of economic value.

A)Industrial espionage
B)Scanning
C)Electronic monitoring
D)None of the above
سؤال
For security reasons,when an employee leaves a company,you should conduct a(n)________ interview.

A)Security
B)Exit
C)Employment
D)Scanning
سؤال
The process to list assets that you believe support your organization is called ________.

A)Business planning
B)Asset identification
C)Making a balance sheet
D)Organizational charting
سؤال
Industrial espionage is the use of spying techniques to find out key information that is of economic value.
سؤال
The company whose chief executive officer was indicted for copyright infringement of allegedly stealing technology from D-Link,which was one of its own customers,was _________.

A)General Motors
B)Interactive Television Technologies,Inc.
C)Bloomberg,Inc.
D)None of the above
سؤال
VI (value of information)= C (cost to produce)+ VG (value gained).
سؤال
Employees with access to any sensitive information should be asked to sign nondisclosure agreements.
سؤال
Quick Stego and Invisible Secrets are two software tools that can be used for __________.

A)Port scanning
B)Steganography
C)Key logging
D)None of the above
سؤال
Sending an email that claims to come from a different sender,and asking for sensitive data is an example of ___________.

A)Phishing
B)Key logging
C)Social engineering
D)None of the above
سؤال
The single greatest security risk to any organization is _________.

A)A disgruntled employee
B)Lack of a disaster recovery plan
C)Lack of antivirus software
D)Out-of-date software
سؤال
Giving personnel access to only data that they absolutely need to perform their jobs is referred to as _________.

A)Least privileges
B)Job rotation
C)Business continuation planning
D)None of the above
سؤال
The most obvious use of ________________involves talking to a targeted employee and getting him to reveal sensitive data.

A)Phishing
B)Key logging
C)Social engineering
D)None of the above
فتح الحزمة
قم بالتسجيل لفتح البطاقات في هذه المجموعة!
Unlock Deck
Unlock Deck
1/25
auto play flashcards
العب
simple tutorial
ملء الشاشة (f)
exit full mode
Deck 7: Industrial Espionage in Cyberspace
1
Crafting email and websites to specifically target certain victims is called dive bombing.
False
2
VI (value of information)= C (cost to produce)+ ___________.

A)MU (markup)
B)GM (gross margin)
C)VG (value gained)
D)VL (value lost)
C
3
A key logger can be hardware-based of software-based.
True
4
Funcrypt is a free tool that can be used to encrypt drives,folders,or partitions.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 25 في هذه المجموعة.
فتح الحزمة
k this deck
5
Which of the following is NOT an example of industrial espionage?

A)Details on a competitor's new project
B)A list of a competitor's clients
C)Denial-of-service attack
D)None of the above
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 25 في هذه المجموعة.
فتح الحزمة
k this deck
6
Data stored in computer systems has a high value because there is a great deal of time and effort that goes into creating an analyzing it and ________________.

A)Data often has intrinsic value.
B)Data is an asset that appreciates.
C)Data lasts forever.
D)None of the above.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 25 في هذه المجموعة.
فتح الحزمة
k this deck
7
Hiding a message in images is an example of stenography.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 25 في هذه المجموعة.
فتح الحزمة
k this deck
8
Sending a forged email asking for sensitive data is an example of steganography.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 25 في هذه المجموعة.
فتح الحزمة
k this deck
9
Cookies and key loggers are examples of ____________.

A)Viruses
B)Worms
C)Spyware
D)None of the above
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 25 في هذه المجموعة.
فتح الحزمة
k this deck
10
The chief executive officer of Oracle defends his practice to hire private investigators to sift through the garbage of which competitor?

A)Red Hat
B)McAfee
C)Norton
D)Microsoft
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 25 في هذه المجموعة.
فتح الحزمة
k this deck
11
Microsoft Windows includes BitLocker in some editions,so entire hard drives can be encrypted.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 25 في هذه المجموعة.
فتح الحزمة
k this deck
12
The Patriot Act was the first U.S.law to criminalize theft of commercial trade secrets.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 25 في هذه المجموعة.
فتح الحزمة
k this deck
13
The company involved in an attack by Oleg Zezev from Kazahkstan,in which Zezev accessed computer data and copied personal information for purposes of blackmail was ______.

A)General Motors
B)Interactive Television Technologies,Inc.
C)Bloomberg,Inc.
D)None of the above
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 25 في هذه المجموعة.
فتح الحزمة
k this deck
14
______________ is the use of spying techniques to find out key information that is of economic value.

A)Industrial espionage
B)Scanning
C)Electronic monitoring
D)None of the above
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 25 في هذه المجموعة.
فتح الحزمة
k this deck
15
For security reasons,when an employee leaves a company,you should conduct a(n)________ interview.

A)Security
B)Exit
C)Employment
D)Scanning
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 25 في هذه المجموعة.
فتح الحزمة
k this deck
16
The process to list assets that you believe support your organization is called ________.

A)Business planning
B)Asset identification
C)Making a balance sheet
D)Organizational charting
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 25 في هذه المجموعة.
فتح الحزمة
k this deck
17
Industrial espionage is the use of spying techniques to find out key information that is of economic value.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 25 في هذه المجموعة.
فتح الحزمة
k this deck
18
The company whose chief executive officer was indicted for copyright infringement of allegedly stealing technology from D-Link,which was one of its own customers,was _________.

A)General Motors
B)Interactive Television Technologies,Inc.
C)Bloomberg,Inc.
D)None of the above
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 25 في هذه المجموعة.
فتح الحزمة
k this deck
19
VI (value of information)= C (cost to produce)+ VG (value gained).
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 25 في هذه المجموعة.
فتح الحزمة
k this deck
20
Employees with access to any sensitive information should be asked to sign nondisclosure agreements.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 25 في هذه المجموعة.
فتح الحزمة
k this deck
21
Quick Stego and Invisible Secrets are two software tools that can be used for __________.

A)Port scanning
B)Steganography
C)Key logging
D)None of the above
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 25 في هذه المجموعة.
فتح الحزمة
k this deck
22
Sending an email that claims to come from a different sender,and asking for sensitive data is an example of ___________.

A)Phishing
B)Key logging
C)Social engineering
D)None of the above
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 25 في هذه المجموعة.
فتح الحزمة
k this deck
23
The single greatest security risk to any organization is _________.

A)A disgruntled employee
B)Lack of a disaster recovery plan
C)Lack of antivirus software
D)Out-of-date software
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 25 في هذه المجموعة.
فتح الحزمة
k this deck
24
Giving personnel access to only data that they absolutely need to perform their jobs is referred to as _________.

A)Least privileges
B)Job rotation
C)Business continuation planning
D)None of the above
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 25 في هذه المجموعة.
فتح الحزمة
k this deck
25
The most obvious use of ________________involves talking to a targeted employee and getting him to reveal sensitive data.

A)Phishing
B)Key logging
C)Social engineering
D)None of the above
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 25 في هذه المجموعة.
فتح الحزمة
k this deck
locked card icon
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 25 في هذه المجموعة.