Services
Discover
Homeschooling
Ask a Question
Log in
Sign up
Filters
Done
Question type:
Essay
Multiple Choice
Short Answer
True False
Matching
Topic
Business
Study Set
Harnessing Technology
Quiz 17: Information Security: Barbarians at the Gateway and Just About Everywhere Else
Path 4
Access For Free
Share
All types
Filters
Study Flashcards
Question 1
Multiple Choice
A protester seeking to make a political point by leveraging technology tools, often through system infiltration, defacement, or damage is called a(n) _____.
Question 2
Multiple Choice
Hordes of surreptitiously infiltrated computers, linked and controlled remotely, are known as zombie networks or:
Question 3
Essay
Describe some of the factors at work that enabled the Target security breach to occur.
Question 4
Multiple Choice
Many U.S. technology firms believe that U.S. government surveillance techniques put them at a disadvantage relative to foreign firms because:
Question 5
Multiple Choice
A research scientist with a major pharmaceutical firm in New Jersey is caught passing on sensitive information, worth millions of dollars, regarding the composition and test results of his firm's latest drug to a rival company. What crime is he being held responsible for?
Question 6
Multiple Choice
The term _____ originally referred to a particularly skilled programmer.
Question 7
True/False
Almost all security breaches can be traced back to technology lapses; personnel or procedural factors rarely factor in.
Question 8
Multiple Choice
Which of the following is a valid statement on information security?
Question 9
True/False
A black hat hacker looks for weaknesses in security mechanisms, with a view to help plug the holes that might be exploited by cyber-criminals.
Question 10
Multiple Choice
An attack on the US power grid by terrorists or a foreign power is indicative of:
Question 11
True/False
A vast majority of security breaches are not preventable and happen despite the best security practices.
Question 12
True/False
Hackers might infiltrate computer systems to enlist hardware for subsequent illegal acts.
Question 13
Essay
What are some of the key managerial takeaways from the Target security breach?
Question 14
Multiple Choice
Several surprising findings were revealed in the wake of the Target breach, providing a cautionary tale for all executives and security professionals. Which of the following was not thought to have occurred during the Target security breach?
Question 15
True/False
Organized crime networks now have their own R&D labs and are engaged in sophisticated development efforts to piece together methods to thwart current security measures.