Deck 17: Information Security: Barbarians at the Gateway and Just About Everywhere Else

ملء الشاشة (f)
exit full mode
سؤال
A protester seeking to make a political point by leveraging technology tools, often through system infiltration, defacement, or damage is called a(n) _____.

A) activist
B) cyber agitator
C) hacktivist
D) ethical hacker
E) cybersquatter
استخدم زر المسافة أو
up arrow
down arrow
لقلب البطاقة.
سؤال
Hordes of surreptitiously infiltrated computers, linked and controlled remotely, are known as zombie networks or:

A) honeypots.
B) zombots.
C) botnets.
D) blacklists.
E) megabots.
سؤال
Describe some of the factors at work that enabled the Target security breach to occur.
سؤال
Many U.S. technology firms believe that U.S. government surveillance techniques put them at a disadvantage relative to foreign firms because:

A) some customers have begun seeking alternative products and services untarnished by the perception of having (complicity or unwittingly) provided private information to authorities.
B) the cost to include government surveillance technology inside their products is expensive and lowers profits compared to rivals.
C) the government-required installations of software, such as Stuxnet, that U.S. tech firms must comply with inevitably take up valuable storage space, adding cost to industrial and commercial products.
D) the cost to house government workers on-site is a burden private corporations should not have to shoulder.
E) firms in foreign governments are directly contracted to perform surveillance, and are compensated for their efforts with perks and tax breaks, while U.S. firms receive no such compensation.
سؤال
A research scientist with a major pharmaceutical firm in New Jersey is caught passing on sensitive information, worth millions of dollars, regarding the composition and test results of his firm's latest drug to a rival company. What crime is he being held responsible for?

A) Cyber-fraud
B) Corporate espionage
C) Carrying out technology disruptions
D) Extortion
E) Illegal funds transfer
سؤال
The term _____ originally referred to a particularly skilled programmer.

A) data harvester
B) cracke
C) hacker
D) black hat
E) hacktivist
سؤال
Almost all security breaches can be traced back to technology lapses; personnel or procedural factors rarely factor in.
سؤال
Which of the following is a valid statement on information security?

A) Security breaches cannot be prevented despite the adoption of the best security policies.
B) Technology lapses are solely responsible for almost all security breaches.
C) Information security is everybody's responsibility.
D) Greater expenditure on security products is the only way to contain security breaches.
E) A reactive, rather than proactive, approach is better suited for dealing with security breaches.
سؤال
A black hat hacker looks for weaknesses in security mechanisms, with a view to help plug the holes that might be exploited by cyber-criminals.
سؤال
An attack on the US power grid by terrorists or a foreign power is indicative of:

A) DDoS attacks.
B) espionage.
C) cyberwarfare.
D) extortion.
E) phishing.
سؤال
A vast majority of security breaches are not preventable and happen despite the best security practices.
سؤال
Hackers might infiltrate computer systems to enlist hardware for subsequent illegal acts.
سؤال
What are some of the key managerial takeaways from the Target security breach?
سؤال
Several surprising findings were revealed in the wake of the Target breach, providing a cautionary tale for all executives and security professionals. Which of the following was not thought to have occurred during the Target security breach?

A) Target had security software, but the notification alerts from the software were ignored.
B) Target had properly installed and configured its security software, but hackers got in, anyway.
C) Credit card databases were on entirely separate systems, not connected to other parts of the firm's information system, but wireless networking allowed hackers to access anything reachable from a cell phone connection.
D) Target regularly monitored file names and matched them to file sizes and archival copies to ensure that software was not installed on their systems using the names of legitimate products, but hackers saved files with blank file names so they wouldn't be detected.
E) All of the above
سؤال
Organized crime networks now have their own R&D labs and are engaged in sophisticated development efforts to piece together methods to thwart current security measures.
سؤال
Which of the following statements is consistent with ground realities regarding information security?

A) Cyber-crime is not yet considered a serious enough threat to warrant the attention of law-enforcement agencies.
B) Law-enforcement agencies are well-resourced to fight cyber-crimes effectively.
C) Governments usually outmatch private industry in terms of retaining top talent with incentives and generous pay.
D) Law-enforcement agencies struggle to hire, train, and retain staff capable of keeping pace with today's cyber-criminals.
E) Cyber-crime is not rewarding in terms of financial gain.
سؤال
Cyber criminals who infiltrate systems and collect data for illegal resale are called _____.

A) cash-out fraudsters
B) data harvesters
C) corporate spies
D) ethical hackers
E) information hoarders
سؤال
Which of these would be an example of a DDoS attack?

A) An extortion attempt where hackers threaten to reveal names and social security information stolen from medical records databases
B) Overloading a popular social networking site with inbound messages in order to shut down access to the site
C) Launching a targeted phishing campaign on a department of defense or other surveilance network.
D) Stealing proprietary data directly from mobile phones using a distributed network of difficult-to-trace online services.
E) Launching tough-to-track click-fraud efforts
سؤال
Which of the followings aspects of international law would enable a cyber-criminal operating across borders to evade prosecution?

A) Lack of technology to identify the origin of a security attack
B) Non-recognition of commission of a security-related crime
C) Unwillingness of developed countries to share technical know-how with lesser-developed countries
D) Non-existent extradition agreements between two countries
E) Technological incompatibility between the two countries
سؤال
A(n) _____ is someone who uncovers computer weaknesses and reveals them to manufacturers or system owners, without exploiting these vulnerabilities.

A) hacktivist
B) data harvester
C) corporate spy
D) white hat hacker
E) ethical cyber criminal
سؤال
The topic of U.S. government surveilance continues to be hotly debated, with strong opinions in favor of surveilance programs, as well as vocal protestations of government overreach. Briefly give the argument for and against U.S. government surveilance practices.
سؤال
The information systems of several firms have been compromised by insiders that can include contract employees, cleaning staff, and temporary staffers.
سؤال
The virtual shutdown of websites by way of overloading them with seemingly legitimate requests sent simultaneously from thousands of machines is termed as _____ attacks.
سؤال
Two-factor authentication is favored for most security situations since it's considered to be fast and conveient for customres.
سؤال
It's bad when a firm's e-mail and password file is stolen; however the impact is minimized because user passwords set up for one system cannot be used on others.
سؤال
What are botnets and how are criminals using this technology?
سؤال
_____, probably the most notorious known act of cyberwarfare effort to date (one expert called it "the most sophisticated worm ever created"), is suspected to have been launched by either U.S. or Israeli intelligence (or both), and it infiltrated Iranian nuclear facilities and reprogrammed the industrial control software operating hundreds of uranium-enriching centrifuges.
سؤال
URL-shortening services such as bit.ly limit the impact of phishing posts since the shortened URL will clearly reveal the destination arrived at when clicked on.
سؤال
Dumpster diving refers to physically trawling through trash to mine any valuable data or insights that can be stolen or used in a security attack.
سؤال
Challenge questions offered by Web sites to automate password distribution and resets are formidable in protecting the privacy of email accounts.
سؤال
Web sites of reputed companies can also be sources of malware.
سؤال
Former CIA employee and NSA contractor, ____________ is seen by many as either a whistle-blowing hero or a traitorous villain. This person gathered sensitive digital documents from U.S., British, and Australian agencies, and leaked them to the press, exposing the extent of government surveillance efforts.
سؤال
One of the reasons one should be careful about clicking on any URL in an e-mail is that hackers can easily embed a redirection in e-mail links, reroutiing a user to an alternate online destination.
سؤال
According to research firm Gartner, the majority of loss-causing security incidents involve the handiwork of international cyber-criminal gangs.
سؤال
Worms require an executable (a running program) to spread, attaching to other executables.
سؤال
Social networking sites such as Facebook and LinkedIn form valuable sources of vital information that can be used to craft a scam by con artists.
سؤال
In public-key encryption systems, the functions of the public and private keys are interchangeable.
سؤال
Because of Moore's Law, widely-used encryption programs currently employed by banks and ecommerce sites are now easily penetrated by brute-force attacks that can be employed by hackers using just a handful of simple desktop computers.
سؤال
Spear phishing attacks specifically target a given organization or group of users.
سؤال
_____ refers to a term that either means breaking into a computer system or a particularly clever solution.
سؤال
Attacks that are so new that they have not been clearly identified, and so have not made it into security screening systems are called _____.

A) novel attacks
B) first mover attacks
C) non-precedent breaches
D) zero-day exploits
E) brute force attacks
سؤال
The e-mail password of a senior employee in an organization was compromised by someone observing this user as the employee accessed his account. This is most likely a case of:

A) keylogging.
B) shoulder surfing.
C) dumpster diving.
D) screen capture.
E) spyware.
سؤال
The phrase __________________ refers to security schemes that automatically send one-time use representations of a credit card that can be received and processed by banking and transaction firms at the time of payment. They are in use in ApplePay and Android Wallet.
سؤال
Technologies that measure and analyze human body characteristics for identification or authentication are known as _____.

A) overlamination processes
B) biometrics
C) smart tags
D) bio-embedded systems
E) holographs
سؤال
Attacks that exhaust all possible password combinations in order to break into an account are called _____ attacks.

A) strong arm
B) permuted
C) brute-force
D) zero-day
E) infinity
سؤال
_____ can be either software-based or deployed via hardware, such as a recording "dongle" that is plugged in between a keyboard and a PC.

A) Shadow-keyboards
B) Bootloggers
C) KitRoots
D) Keyloggers
E) Adwares
سؤال
Which of the following statements holds true for the term spoof?

A) It refers to a con executed using technology, typically targeted at acquiring sensitive information or tricking someone into installing malicious software.
B) It refers to e-mail transmissions and packets that have been altered to seem as if they came from another source.
C) It refers to scrambling data using a code or formula, known as a cipher, such that it is hidden from those who do not have the unlocking key.
D) It refers to a seemingly tempting, but bogus target meant to draw hacking attempts.
E) It refers to highly restrictive programs that permit communication only with approved entities and/or in an approved manner.
سؤال
One of the major problems with the Heartbleed bug in OpenSSL software is that:

A) the software was embedded in many hardware products that could not be easily patched with automatic software updates.
B) any password typed into a CAPTCHA could be monitored by a Van Eck device.
C) social engineers could exploit the bug through SQL injection.
D) all social media profile data was exposed, giving hackers access to the potential answers many firms ask as part of password security questions.
E) it eliminated the ability to expose a URL's desitination by hoving the cursor over an address.
سؤال
Describe briefly a few of the physical threats posed by hackers to information security with examples for each.
سؤال
Sifting through trash in an effort to uncover valuable data or insights that can be stolen or used to launch a security attack is known as:

A) trash recovery.
B) junk exploring.
C) dumpster diving.
D) scrap sifting.
E) data sieving.
سؤال
Some of the most common guidelines issued by Web sites when designing a secure password include:

A) The password should be at least eight characters long and include at least one number and other nonalphabet character.
B) The password should be short and straightforward.
C) The password should include names of family members or pets, so as to be easily remembered.
D) Choose a hard-to-guess password, then re-use this hardened password across websites. This minimize instances of calling systems professionals for a password reset, hence eliminating an additional potential vulnerability.
E) The password should be the same as your name so as to trick the hacker.
سؤال
Which of the following statements holds true for the term encryption?

A) It refers to a con executed using technology, typically targeted at acquiring sensitive information or tricking someone into installing malicious software.
B) It refers to e-mail transmissions and packets that have been altered to seem as if they came from another source.
C) It refers to scrambling data using a code or formula, known as a cipher, such that it is hidden from those who do not have the unlocking key.
D) It refers to a seemingly tempting, but bogus target meant to draw hacking attempts.
E) It refers to highly restrictive programs that permit communication only with approved entities and/or in an approved manner.
سؤال
The phrase ______________ refers to security where identity is proven by presenting more than one item for proof of credentials. Multiple factors often include a password and some other identifier such as a unique code sent via e-mail or mobile phone text, a biometric reading (e.g. fingerprint or iris scan), a swipe or tap card, or other form if identification
سؤال
Computer systems are often infected with malware by means of exploits that sneak in masquerading as something they are not. These exploits are called:

A) rootkits.
B) trojans.
C) viruses.
D) worms.
E) honeypots.
سؤال
Briefly explain the steps one should take to ensure that their highest priority accounts are not compromised easily by hackers.
سؤال
A bank customer receives a message, ostensibly from the bank's Web site, asking her to provide her login information. Assuming the message is intended to defraud the customer, what type of infiltration technique is being used here?

A) Spyware
B) Malware
C) Social engineering
D) Phishing
E) Virus infections
سؤال
Which of the following are considered sources of information that can potentially be used by social engineers?

A) LinkedIn
B) Corproate directories
C) Social media posts
D) Contests or surveys
E) All of the above
سؤال
The use of public wireless connections can increase a user's vulnerability to monitoring and compromise. ____________ software can be used to encrypt transmissions over public networks, making it more difficult for a user's PC to be penetrated.

A) DDos
B) Rootkit
C) Keylogging
D) CAPTCHa
E) VPN
سؤال
Which of the following types of infiltration techniques does one open up to by posting sensitive personal information and details about one's workplace on social networking sites?

A) Phishing
B) Social engineering
C) Password theft
D) Virus infections
E) Physical threats
سؤال
Viruses are programs that infect other software or files and require:

A) a large file size to spread.
B) the computer to be shutdown to spread.
C) Windows as an operating system to spread.
D) a disk based operating system to spread.
E) an executable program to spread.
سؤال
Updates that plug existing holes in a software are called:

A) patches.
B) compliance.
C) maculations.
D) keys.
E) dongles.
سؤال
The term ISO 27000 refers to a series of standards representing the set of best practices for implementing, maintaining and improving organizational security.
سؤال
Fingerprint readers, retina scanners, voice and face recognition technologies are all part of _____.
سؤال
_____________ refers to malware that encrypts a user's files (perhaps threatening to delete them), with demands that a user pay to regain control of their data and/or device.
سؤال
One of the reasons organizations delay patches to plug holes in their security applications is:

A) the rising cost of labor.
B) lack of information on effectiveness of patches.
C) the fear that the new technology contains a change that will cause problems down the road.
D) redundancy of patches within a short span of time.
E) bureaucratic inefficiency.
سؤال
_____ refers to a trusted third party that provides authentication services in public key encryption schemes.
سؤال
Hardware failure is the least likely of threats to one's data.
سؤال
Multiple administrators jointly controlling key systems are an unnecessary burden that adds to the complexity of managing security in an organization.
سؤال
Information security policies would be ineffective without _____ and _____.

A) audit; enforcement
B) accountability; flexibility
C) compliance; subjectivity
D) protocols; the backing of ISO
E) rigidity; adaptability
سؤال
Conforming to industry-standard guidelines and frameworks for organizational security ensures continued immunity from attacks on an organization's information.
سؤال
When using a public wireless network, using VPN software is not advisable as it can reveal your communications to any network eavesdroppers.
سؤال
Online backup services are considered a poor choice for end-users, since this only increases the liklihood that an individual's data will be hacked.
سؤال
_____ refers to confidence scams executed through technology.
سؤال
_____ are scrambled character images used to thwart things like automated account setup or ticket buying.
سؤال
Regularly updated software lowers a system's vulnerable attack surface.
سؤال
A team working on organizational security should include representatives from general counsel, audit, public relations, and human resources, in addition to those from specialized security and broader technology and infrastructure functions.
سؤال
Public wireless networks are often vulnerable to monitoring and attack. The use of _______ software can limit threats by encrypting network transmissions over a network.
سؤال
Con games that trick employees into revealing information or performing other tasks that compromise a firm are known as _____ in security circles.
سؤال
In security circles the phrase "compliance" refers to:

A) legal or professionally binding steps that an organization must take.
B) security audit practices used by the tech divisions of Big Four accounting firms.
C) a firm's installing software to fulfill government surveillance requirements.
D) the U.S. government legislation requiring organizations to share security breaches with law enforcement and industry trade organizations.
E) only deploying open source software that is downloaded from approved GitHub locations.
سؤال
The _____ technique zeros in on a sloppy programming practice where software developers don't validate user input.
فتح الحزمة
قم بالتسجيل لفتح البطاقات في هذه المجموعة!
Unlock Deck
Unlock Deck
1/89
auto play flashcards
العب
simple tutorial
ملء الشاشة (f)
exit full mode
Deck 17: Information Security: Barbarians at the Gateway and Just About Everywhere Else
1
A protester seeking to make a political point by leveraging technology tools, often through system infiltration, defacement, or damage is called a(n) _____.

A) activist
B) cyber agitator
C) hacktivist
D) ethical hacker
E) cybersquatter
C
2
Hordes of surreptitiously infiltrated computers, linked and controlled remotely, are known as zombie networks or:

A) honeypots.
B) zombots.
C) botnets.
D) blacklists.
E) megabots.
C
3
Describe some of the factors at work that enabled the Target security breach to occur.
Security software notification went off shortly after unauthorized software began collecting data inside Target's network, but Target ignored the warning. While the area where credit card transactions are processed is supposed to be walled off from other areas of the Target network, hackers found holes and eventually nestled their code in a sweet spot for grabbing customer data, disguising the code with the label "BladeLogic" the name of a legitimate data center management product. The firm's security software has an option to automatically delete malware as it's detected but Target's security team had turned that function off.
4
Many U.S. technology firms believe that U.S. government surveillance techniques put them at a disadvantage relative to foreign firms because:

A) some customers have begun seeking alternative products and services untarnished by the perception of having (complicity or unwittingly) provided private information to authorities.
B) the cost to include government surveillance technology inside their products is expensive and lowers profits compared to rivals.
C) the government-required installations of software, such as Stuxnet, that U.S. tech firms must comply with inevitably take up valuable storage space, adding cost to industrial and commercial products.
D) the cost to house government workers on-site is a burden private corporations should not have to shoulder.
E) firms in foreign governments are directly contracted to perform surveillance, and are compensated for their efforts with perks and tax breaks, while U.S. firms receive no such compensation.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 89 في هذه المجموعة.
فتح الحزمة
k this deck
5
A research scientist with a major pharmaceutical firm in New Jersey is caught passing on sensitive information, worth millions of dollars, regarding the composition and test results of his firm's latest drug to a rival company. What crime is he being held responsible for?

A) Cyber-fraud
B) Corporate espionage
C) Carrying out technology disruptions
D) Extortion
E) Illegal funds transfer
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 89 في هذه المجموعة.
فتح الحزمة
k this deck
6
The term _____ originally referred to a particularly skilled programmer.

A) data harvester
B) cracke
C) hacker
D) black hat
E) hacktivist
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 89 في هذه المجموعة.
فتح الحزمة
k this deck
7
Almost all security breaches can be traced back to technology lapses; personnel or procedural factors rarely factor in.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 89 في هذه المجموعة.
فتح الحزمة
k this deck
8
Which of the following is a valid statement on information security?

A) Security breaches cannot be prevented despite the adoption of the best security policies.
B) Technology lapses are solely responsible for almost all security breaches.
C) Information security is everybody's responsibility.
D) Greater expenditure on security products is the only way to contain security breaches.
E) A reactive, rather than proactive, approach is better suited for dealing with security breaches.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 89 في هذه المجموعة.
فتح الحزمة
k this deck
9
A black hat hacker looks for weaknesses in security mechanisms, with a view to help plug the holes that might be exploited by cyber-criminals.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 89 في هذه المجموعة.
فتح الحزمة
k this deck
10
An attack on the US power grid by terrorists or a foreign power is indicative of:

A) DDoS attacks.
B) espionage.
C) cyberwarfare.
D) extortion.
E) phishing.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 89 في هذه المجموعة.
فتح الحزمة
k this deck
11
A vast majority of security breaches are not preventable and happen despite the best security practices.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 89 في هذه المجموعة.
فتح الحزمة
k this deck
12
Hackers might infiltrate computer systems to enlist hardware for subsequent illegal acts.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 89 في هذه المجموعة.
فتح الحزمة
k this deck
13
What are some of the key managerial takeaways from the Target security breach?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 89 في هذه المجموعة.
فتح الحزمة
k this deck
14
Several surprising findings were revealed in the wake of the Target breach, providing a cautionary tale for all executives and security professionals. Which of the following was not thought to have occurred during the Target security breach?

A) Target had security software, but the notification alerts from the software were ignored.
B) Target had properly installed and configured its security software, but hackers got in, anyway.
C) Credit card databases were on entirely separate systems, not connected to other parts of the firm's information system, but wireless networking allowed hackers to access anything reachable from a cell phone connection.
D) Target regularly monitored file names and matched them to file sizes and archival copies to ensure that software was not installed on their systems using the names of legitimate products, but hackers saved files with blank file names so they wouldn't be detected.
E) All of the above
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 89 في هذه المجموعة.
فتح الحزمة
k this deck
15
Organized crime networks now have their own R&D labs and are engaged in sophisticated development efforts to piece together methods to thwart current security measures.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 89 في هذه المجموعة.
فتح الحزمة
k this deck
16
Which of the following statements is consistent with ground realities regarding information security?

A) Cyber-crime is not yet considered a serious enough threat to warrant the attention of law-enforcement agencies.
B) Law-enforcement agencies are well-resourced to fight cyber-crimes effectively.
C) Governments usually outmatch private industry in terms of retaining top talent with incentives and generous pay.
D) Law-enforcement agencies struggle to hire, train, and retain staff capable of keeping pace with today's cyber-criminals.
E) Cyber-crime is not rewarding in terms of financial gain.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 89 في هذه المجموعة.
فتح الحزمة
k this deck
17
Cyber criminals who infiltrate systems and collect data for illegal resale are called _____.

A) cash-out fraudsters
B) data harvesters
C) corporate spies
D) ethical hackers
E) information hoarders
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 89 في هذه المجموعة.
فتح الحزمة
k this deck
18
Which of these would be an example of a DDoS attack?

A) An extortion attempt where hackers threaten to reveal names and social security information stolen from medical records databases
B) Overloading a popular social networking site with inbound messages in order to shut down access to the site
C) Launching a targeted phishing campaign on a department of defense or other surveilance network.
D) Stealing proprietary data directly from mobile phones using a distributed network of difficult-to-trace online services.
E) Launching tough-to-track click-fraud efforts
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 89 في هذه المجموعة.
فتح الحزمة
k this deck
19
Which of the followings aspects of international law would enable a cyber-criminal operating across borders to evade prosecution?

A) Lack of technology to identify the origin of a security attack
B) Non-recognition of commission of a security-related crime
C) Unwillingness of developed countries to share technical know-how with lesser-developed countries
D) Non-existent extradition agreements between two countries
E) Technological incompatibility between the two countries
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 89 في هذه المجموعة.
فتح الحزمة
k this deck
20
A(n) _____ is someone who uncovers computer weaknesses and reveals them to manufacturers or system owners, without exploiting these vulnerabilities.

A) hacktivist
B) data harvester
C) corporate spy
D) white hat hacker
E) ethical cyber criminal
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 89 في هذه المجموعة.
فتح الحزمة
k this deck
21
The topic of U.S. government surveilance continues to be hotly debated, with strong opinions in favor of surveilance programs, as well as vocal protestations of government overreach. Briefly give the argument for and against U.S. government surveilance practices.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 89 في هذه المجموعة.
فتح الحزمة
k this deck
22
The information systems of several firms have been compromised by insiders that can include contract employees, cleaning staff, and temporary staffers.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 89 في هذه المجموعة.
فتح الحزمة
k this deck
23
The virtual shutdown of websites by way of overloading them with seemingly legitimate requests sent simultaneously from thousands of machines is termed as _____ attacks.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 89 في هذه المجموعة.
فتح الحزمة
k this deck
24
Two-factor authentication is favored for most security situations since it's considered to be fast and conveient for customres.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 89 في هذه المجموعة.
فتح الحزمة
k this deck
25
It's bad when a firm's e-mail and password file is stolen; however the impact is minimized because user passwords set up for one system cannot be used on others.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 89 في هذه المجموعة.
فتح الحزمة
k this deck
26
What are botnets and how are criminals using this technology?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 89 في هذه المجموعة.
فتح الحزمة
k this deck
27
_____, probably the most notorious known act of cyberwarfare effort to date (one expert called it "the most sophisticated worm ever created"), is suspected to have been launched by either U.S. or Israeli intelligence (or both), and it infiltrated Iranian nuclear facilities and reprogrammed the industrial control software operating hundreds of uranium-enriching centrifuges.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 89 في هذه المجموعة.
فتح الحزمة
k this deck
28
URL-shortening services such as bit.ly limit the impact of phishing posts since the shortened URL will clearly reveal the destination arrived at when clicked on.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 89 في هذه المجموعة.
فتح الحزمة
k this deck
29
Dumpster diving refers to physically trawling through trash to mine any valuable data or insights that can be stolen or used in a security attack.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 89 في هذه المجموعة.
فتح الحزمة
k this deck
30
Challenge questions offered by Web sites to automate password distribution and resets are formidable in protecting the privacy of email accounts.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 89 في هذه المجموعة.
فتح الحزمة
k this deck
31
Web sites of reputed companies can also be sources of malware.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 89 في هذه المجموعة.
فتح الحزمة
k this deck
32
Former CIA employee and NSA contractor, ____________ is seen by many as either a whistle-blowing hero or a traitorous villain. This person gathered sensitive digital documents from U.S., British, and Australian agencies, and leaked them to the press, exposing the extent of government surveillance efforts.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 89 في هذه المجموعة.
فتح الحزمة
k this deck
33
One of the reasons one should be careful about clicking on any URL in an e-mail is that hackers can easily embed a redirection in e-mail links, reroutiing a user to an alternate online destination.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 89 في هذه المجموعة.
فتح الحزمة
k this deck
34
According to research firm Gartner, the majority of loss-causing security incidents involve the handiwork of international cyber-criminal gangs.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 89 في هذه المجموعة.
فتح الحزمة
k this deck
35
Worms require an executable (a running program) to spread, attaching to other executables.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 89 في هذه المجموعة.
فتح الحزمة
k this deck
36
Social networking sites such as Facebook and LinkedIn form valuable sources of vital information that can be used to craft a scam by con artists.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 89 في هذه المجموعة.
فتح الحزمة
k this deck
37
In public-key encryption systems, the functions of the public and private keys are interchangeable.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 89 في هذه المجموعة.
فتح الحزمة
k this deck
38
Because of Moore's Law, widely-used encryption programs currently employed by banks and ecommerce sites are now easily penetrated by brute-force attacks that can be employed by hackers using just a handful of simple desktop computers.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 89 في هذه المجموعة.
فتح الحزمة
k this deck
39
Spear phishing attacks specifically target a given organization or group of users.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 89 في هذه المجموعة.
فتح الحزمة
k this deck
40
_____ refers to a term that either means breaking into a computer system or a particularly clever solution.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 89 في هذه المجموعة.
فتح الحزمة
k this deck
41
Attacks that are so new that they have not been clearly identified, and so have not made it into security screening systems are called _____.

A) novel attacks
B) first mover attacks
C) non-precedent breaches
D) zero-day exploits
E) brute force attacks
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 89 في هذه المجموعة.
فتح الحزمة
k this deck
42
The e-mail password of a senior employee in an organization was compromised by someone observing this user as the employee accessed his account. This is most likely a case of:

A) keylogging.
B) shoulder surfing.
C) dumpster diving.
D) screen capture.
E) spyware.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 89 في هذه المجموعة.
فتح الحزمة
k this deck
43
The phrase __________________ refers to security schemes that automatically send one-time use representations of a credit card that can be received and processed by banking and transaction firms at the time of payment. They are in use in ApplePay and Android Wallet.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 89 في هذه المجموعة.
فتح الحزمة
k this deck
44
Technologies that measure and analyze human body characteristics for identification or authentication are known as _____.

A) overlamination processes
B) biometrics
C) smart tags
D) bio-embedded systems
E) holographs
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 89 في هذه المجموعة.
فتح الحزمة
k this deck
45
Attacks that exhaust all possible password combinations in order to break into an account are called _____ attacks.

A) strong arm
B) permuted
C) brute-force
D) zero-day
E) infinity
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 89 في هذه المجموعة.
فتح الحزمة
k this deck
46
_____ can be either software-based or deployed via hardware, such as a recording "dongle" that is plugged in between a keyboard and a PC.

A) Shadow-keyboards
B) Bootloggers
C) KitRoots
D) Keyloggers
E) Adwares
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 89 في هذه المجموعة.
فتح الحزمة
k this deck
47
Which of the following statements holds true for the term spoof?

A) It refers to a con executed using technology, typically targeted at acquiring sensitive information or tricking someone into installing malicious software.
B) It refers to e-mail transmissions and packets that have been altered to seem as if they came from another source.
C) It refers to scrambling data using a code or formula, known as a cipher, such that it is hidden from those who do not have the unlocking key.
D) It refers to a seemingly tempting, but bogus target meant to draw hacking attempts.
E) It refers to highly restrictive programs that permit communication only with approved entities and/or in an approved manner.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 89 في هذه المجموعة.
فتح الحزمة
k this deck
48
One of the major problems with the Heartbleed bug in OpenSSL software is that:

A) the software was embedded in many hardware products that could not be easily patched with automatic software updates.
B) any password typed into a CAPTCHA could be monitored by a Van Eck device.
C) social engineers could exploit the bug through SQL injection.
D) all social media profile data was exposed, giving hackers access to the potential answers many firms ask as part of password security questions.
E) it eliminated the ability to expose a URL's desitination by hoving the cursor over an address.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 89 في هذه المجموعة.
فتح الحزمة
k this deck
49
Describe briefly a few of the physical threats posed by hackers to information security with examples for each.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 89 في هذه المجموعة.
فتح الحزمة
k this deck
50
Sifting through trash in an effort to uncover valuable data or insights that can be stolen or used to launch a security attack is known as:

A) trash recovery.
B) junk exploring.
C) dumpster diving.
D) scrap sifting.
E) data sieving.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 89 في هذه المجموعة.
فتح الحزمة
k this deck
51
Some of the most common guidelines issued by Web sites when designing a secure password include:

A) The password should be at least eight characters long and include at least one number and other nonalphabet character.
B) The password should be short and straightforward.
C) The password should include names of family members or pets, so as to be easily remembered.
D) Choose a hard-to-guess password, then re-use this hardened password across websites. This minimize instances of calling systems professionals for a password reset, hence eliminating an additional potential vulnerability.
E) The password should be the same as your name so as to trick the hacker.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 89 في هذه المجموعة.
فتح الحزمة
k this deck
52
Which of the following statements holds true for the term encryption?

A) It refers to a con executed using technology, typically targeted at acquiring sensitive information or tricking someone into installing malicious software.
B) It refers to e-mail transmissions and packets that have been altered to seem as if they came from another source.
C) It refers to scrambling data using a code or formula, known as a cipher, such that it is hidden from those who do not have the unlocking key.
D) It refers to a seemingly tempting, but bogus target meant to draw hacking attempts.
E) It refers to highly restrictive programs that permit communication only with approved entities and/or in an approved manner.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 89 في هذه المجموعة.
فتح الحزمة
k this deck
53
The phrase ______________ refers to security where identity is proven by presenting more than one item for proof of credentials. Multiple factors often include a password and some other identifier such as a unique code sent via e-mail or mobile phone text, a biometric reading (e.g. fingerprint or iris scan), a swipe or tap card, or other form if identification
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 89 في هذه المجموعة.
فتح الحزمة
k this deck
54
Computer systems are often infected with malware by means of exploits that sneak in masquerading as something they are not. These exploits are called:

A) rootkits.
B) trojans.
C) viruses.
D) worms.
E) honeypots.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 89 في هذه المجموعة.
فتح الحزمة
k this deck
55
Briefly explain the steps one should take to ensure that their highest priority accounts are not compromised easily by hackers.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 89 في هذه المجموعة.
فتح الحزمة
k this deck
56
A bank customer receives a message, ostensibly from the bank's Web site, asking her to provide her login information. Assuming the message is intended to defraud the customer, what type of infiltration technique is being used here?

A) Spyware
B) Malware
C) Social engineering
D) Phishing
E) Virus infections
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 89 في هذه المجموعة.
فتح الحزمة
k this deck
57
Which of the following are considered sources of information that can potentially be used by social engineers?

A) LinkedIn
B) Corproate directories
C) Social media posts
D) Contests or surveys
E) All of the above
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 89 في هذه المجموعة.
فتح الحزمة
k this deck
58
The use of public wireless connections can increase a user's vulnerability to monitoring and compromise. ____________ software can be used to encrypt transmissions over public networks, making it more difficult for a user's PC to be penetrated.

A) DDos
B) Rootkit
C) Keylogging
D) CAPTCHa
E) VPN
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 89 في هذه المجموعة.
فتح الحزمة
k this deck
59
Which of the following types of infiltration techniques does one open up to by posting sensitive personal information and details about one's workplace on social networking sites?

A) Phishing
B) Social engineering
C) Password theft
D) Virus infections
E) Physical threats
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 89 في هذه المجموعة.
فتح الحزمة
k this deck
60
Viruses are programs that infect other software or files and require:

A) a large file size to spread.
B) the computer to be shutdown to spread.
C) Windows as an operating system to spread.
D) a disk based operating system to spread.
E) an executable program to spread.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 89 في هذه المجموعة.
فتح الحزمة
k this deck
61
Updates that plug existing holes in a software are called:

A) patches.
B) compliance.
C) maculations.
D) keys.
E) dongles.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 89 في هذه المجموعة.
فتح الحزمة
k this deck
62
The term ISO 27000 refers to a series of standards representing the set of best practices for implementing, maintaining and improving organizational security.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 89 في هذه المجموعة.
فتح الحزمة
k this deck
63
Fingerprint readers, retina scanners, voice and face recognition technologies are all part of _____.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 89 في هذه المجموعة.
فتح الحزمة
k this deck
64
_____________ refers to malware that encrypts a user's files (perhaps threatening to delete them), with demands that a user pay to regain control of their data and/or device.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 89 في هذه المجموعة.
فتح الحزمة
k this deck
65
One of the reasons organizations delay patches to plug holes in their security applications is:

A) the rising cost of labor.
B) lack of information on effectiveness of patches.
C) the fear that the new technology contains a change that will cause problems down the road.
D) redundancy of patches within a short span of time.
E) bureaucratic inefficiency.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 89 في هذه المجموعة.
فتح الحزمة
k this deck
66
_____ refers to a trusted third party that provides authentication services in public key encryption schemes.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 89 في هذه المجموعة.
فتح الحزمة
k this deck
67
Hardware failure is the least likely of threats to one's data.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 89 في هذه المجموعة.
فتح الحزمة
k this deck
68
Multiple administrators jointly controlling key systems are an unnecessary burden that adds to the complexity of managing security in an organization.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 89 في هذه المجموعة.
فتح الحزمة
k this deck
69
Information security policies would be ineffective without _____ and _____.

A) audit; enforcement
B) accountability; flexibility
C) compliance; subjectivity
D) protocols; the backing of ISO
E) rigidity; adaptability
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 89 في هذه المجموعة.
فتح الحزمة
k this deck
70
Conforming to industry-standard guidelines and frameworks for organizational security ensures continued immunity from attacks on an organization's information.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 89 في هذه المجموعة.
فتح الحزمة
k this deck
71
When using a public wireless network, using VPN software is not advisable as it can reveal your communications to any network eavesdroppers.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 89 في هذه المجموعة.
فتح الحزمة
k this deck
72
Online backup services are considered a poor choice for end-users, since this only increases the liklihood that an individual's data will be hacked.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 89 في هذه المجموعة.
فتح الحزمة
k this deck
73
_____ refers to confidence scams executed through technology.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 89 في هذه المجموعة.
فتح الحزمة
k this deck
74
_____ are scrambled character images used to thwart things like automated account setup or ticket buying.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 89 في هذه المجموعة.
فتح الحزمة
k this deck
75
Regularly updated software lowers a system's vulnerable attack surface.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 89 في هذه المجموعة.
فتح الحزمة
k this deck
76
A team working on organizational security should include representatives from general counsel, audit, public relations, and human resources, in addition to those from specialized security and broader technology and infrastructure functions.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 89 في هذه المجموعة.
فتح الحزمة
k this deck
77
Public wireless networks are often vulnerable to monitoring and attack. The use of _______ software can limit threats by encrypting network transmissions over a network.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 89 في هذه المجموعة.
فتح الحزمة
k this deck
78
Con games that trick employees into revealing information or performing other tasks that compromise a firm are known as _____ in security circles.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 89 في هذه المجموعة.
فتح الحزمة
k this deck
79
In security circles the phrase "compliance" refers to:

A) legal or professionally binding steps that an organization must take.
B) security audit practices used by the tech divisions of Big Four accounting firms.
C) a firm's installing software to fulfill government surveillance requirements.
D) the U.S. government legislation requiring organizations to share security breaches with law enforcement and industry trade organizations.
E) only deploying open source software that is downloaded from approved GitHub locations.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 89 في هذه المجموعة.
فتح الحزمة
k this deck
80
The _____ technique zeros in on a sloppy programming practice where software developers don't validate user input.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 89 في هذه المجموعة.
فتح الحزمة
k this deck
locked card icon
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 89 في هذه المجموعة.