In the Office of Personnel Management's case, the security breach made many people vulnerable to this.
Choose correct answer/s
Loss of personal property
Inaccurate personal data
Identity theft
Loss of access to personal data
Credit card fees
Check answer
Question 2
Free
Multiple Choice
When the Office of Personnel Management was hacked, all of the following are true except:
Choose correct answer/s
The hackers gained access to the building to steal the records
It took the Office of Personnel Management many months to detect the break-in
The hackers likely exploited a stolen password
The hackers did not need to escape in the blue turbocharged vehicle
None of the above (indicating that all are true)
Check answer
Question 3
Free
Multiple Choice
Many organizations and even consumers use this to control access to a network like the Internet, allowing only authorized traffic to pass.
Choose correct answer/s
Encryption
VPN
Firewall
Anonymizing tools
Filtering
Check answer
Question 4
Free
Multiple Choice
If you receive an email that says it is from Sam Johnson, your boss, with an odd EXE file as an attachment, it could be dangerous for all of the following reasons except:
Choose correct answer/s
It could be dangerous because the email might not really be from Sam.
It could be dangerous because the email might be from Sam's computer without his or her knowledge.
It could be dangerous even if it was sent knowingly because Sam didn't know a virus might be attached.
It could be dangerous because Sam gave someone his password once a long time ago
None of the above (indicating that all are true).
Check answer
Question 5
Free
Multiple Choice
It is estimated that ___ % of all firms have been breached:
Choose correct answer/s
5% or less
10% to 20%
40% to 60%
70% to 90%
Over 95%
Check answer
Question 6
Multiple Choice
Who is responsible for decisions about security strategy?
Choose correct answer/s
IT people
Shared: IT leaders and business leaders
Business leaders
Consultants
Team of consultants and IT people
To unlock the question
Question 7
Multiple Choice
Who is responsible for developing security education, awareness, and training programs?
Choose correct answer/s
IT people
Shared: IT leaders and business leaders
Business leaders
Consultants
Team of consultants and IT people
To unlock the question
Question 8
Multiple Choice
In the Anthem Blue Cross breach, where 80 million names, birthdays, social security numbers, etc., were stolen, the hackers got in by:
Choose correct answer/s
Breaking into the building where they were stored
Obtaining passwords of five or more high-level employees
Making phone calls to insiders posing as IT people needing to log into their accounts
Emailing each of the 80 million patients asking for their private information
Recovering patient records from a large recycling bin
To unlock the question
Question 9
Multiple Choice
___ of breaches are caused by stealing a password
Choose correct answer/s
A very low percentage (somewhere around 1%)
A low percentage (around 10%)
A moderate percentage (around 25%)
A high percentage (around 50%)
A very high percentage (around 80%)
To unlock the question
Question 10
Multiple Choice
The most common password of all in 2014 is:
Choose correct answer/s
Something complex that is hard to remember
None at all-they most commonly skip passwords and just press ENTER to continue
"password"
"123456"
"Rihanna"
To unlock the question
Question 11
Multiple Choice
An "evil twin" in the context of computer security is:
Choose correct answer/s
A virus-laden attachment that looks just like a sincere attachment
A duplicate badge that allows a nasty person entry into a data center
Someone who looks just like the Chief Information Officer, but steals data
An operating system that is not genuine
A counterfeit wifi connection in a hotel or coffee shop that appears to be genuine
To unlock the question
Question 12
Multiple Choice
The cost of a data breach in 2015 is estimated to be:
Choose correct answer/s
between $13 and $18 per record
between $43 and 65 per record
between $145 and $154 per record
between $100 and $1,000 per record
between $4,520 and $4,580 per record
To unlock the question
Question 13
Multiple Choice
On the black market, stolen data in a "kit" that contains credit card information plus social security number and medical information is worth:
Choose correct answer/s
between $13 and $18 per record
between $43 and 65 per record
between $145 and $154 per record
between $100 and $1,000 per record
between $4,520 and $4,580 per record
To unlock the question
Question 14
Multiple Choice
It usually takes ____ for someone in a firm to discover a security compromise in a system, after the evidence shows up in logs or alerts
Choose correct answer/s
Several seconds
Several minutes
Several hours
Several days
Several months
To unlock the question
Question 15
Multiple Choice
Included in the five critical elements that are used to raise security in a firm are all of the following except:
Choose correct answer/s
Infrastructure
Law enforcement
Policies
Training
Investments
To unlock the question
Question 16
Multiple Choice
Examples of multi-factor authentication are:
Choose correct answer/s
passwords and text messages
passwords with longer than one character
a human will chat with you to see who you are
using two badges to allow you into a building
none of the above
To unlock the question
Question 17
Multiple Choice
All of the following are classic signs of a phishing message except:
Choose correct answer/s
Your email in-box is full and you must click on a link to increase storage
You just won a lottery or contest, and you need to click on a link to claim your prize
Poor grammar or spelling in a note that purports to be from a large company
Goods or services are offered at an impossibly low price
An emailed ad oddly does not provide any active links
To unlock the question
Question 18
Multiple Choice
Spoofing is:
Choose correct answer/s
When someone makes fun of you for falling for a phishing scam
When the "from" address says the name/email address of a person different from who really sent it
When hackers snoop around in a system
When a person from IT unlocks your email account
When you receive a notice of an inheritance
To unlock the question
Question 19
True/False
Over time, attackers have had to increase their skills to be able to attack systems or create viruses.
Choose correct answer/s
True
False
To unlock the question
Question 20
True/False
Thanks to tightened security in operating systems, it is more difficult than ever before for hackers to break into systems, compared to the early 1990s, when people were much less often protected, less aware of risks, and more easily fooled.