Services
Discover
Homeschooling
Ask a Question
Log in
Sign up
Filters
Done
Question type:
Essay
Multiple Choice
Short Answer
True False
Matching
Topic
Computing
Study Set
Information Systems Study Set 2
Quiz 17: Information Security: Barbarians at the Gateway and Just About Everywhere Else
Path 4
Access For Free
Share
All types
Filters
Study Flashcards
Practice Exam
Learn
Question 21
True/False
One of the reasons one should be careful about clicking on any URL in an e-mail is that hackers can easily embed a redirection in e-mail links, reroutiing a user to an alternate online destination.
Question 22
Short Answer
_____, probably the most notorious known act of cyberwarfare effort to date (one expert called it "the most sophisticated worm ever created"), is suspected to have been launched by either U.S. or Israeli intelligence (or both), and it infiltrated Iranian nuclear facilities and reprogrammed the industrial control software operating hundreds of uranium-enriching centrifuges.
Question 23
Essay
The topic of U.S. government surveilance continues to be hotly debated, with strong opinions in favor of surveilance programs, as well as vocal protestations of government overreach. Briefly give the argument for and against U.S. government surveilance practices.
Question 24
True/False
Social networking sites such as Facebook and LinkedIn form valuable sources of vital information that can be used to craft a scam by con artists.
Question 25
Essay
What are botnets and how are criminals using this technology?
Question 26
True/False
The information systems of several firms have been compromised by insiders that can include contract employees, cleaning staff, and temporary staffers.
Question 27
Short Answer
Former CIA employee and NSA contractor, ____________ is seen by many as either a whistle-blowing hero or a traitorous villain. This person gathered sensitive digital documents from U.S., British, and Australian agencies, and leaked them to the press, exposing the extent of government surveillance efforts.
Question 28
True/False
Web sites of reputed companies can also be sources of malware.
Question 29
True/False
It's bad when a firm's e-mail and password file is stolen however the impact is minimized because user passwords set up for one system cannot be used on others.
Question 30
Short Answer
_____ refers to a term that either means breaking into a computer system or a particularly clever solution.
Question 31
Short Answer
The virtual shutdown of websites by way of overloading them with seemingly legitimate requests sent simultaneously from thousands of machines is termed as _____ attacks.