Security

This question bank verified by Studydeets
All Questions
Filter by:
Question 1
Free
Multiple Choice

In the Office of Personnel Management's case, the security breach made many people vulnerable to this.

Choose correct answer/s
A

Loss of personal property

B

Inaccurate personal data

C

Identity theft

D

Loss of access to personal data

E

Credit card fees

Check answer
Question 2
Free
Multiple Choice

When the Office of Personnel Management was hacked, all of the following are true except:

Choose correct answer/s
A

The hackers gained access to the building to steal the records

B

It took the Office of Personnel Management many months to detect the break-in

C

The hackers likely exploited a stolen password

D

The hackers did not need to escape in the blue turbocharged vehicle

E

None of the above (indicating that all are true)

Check answer
Question 3
Free
Multiple Choice

Many organizations and even consumers use this to control access to a network like the Internet, allowing only authorized traffic to pass.

Choose correct answer/s
A

Encryption

B

VPN

C

Firewall

D

Anonymizing tools

E

Filtering

Check answer
Question 4
Free
Multiple Choice

If you receive an email that says it is from Sam Johnson, your boss, with an odd EXE file as an attachment, it could be dangerous for all of the following reasons except:

Choose correct answer/s
A

It could be dangerous because the email might not really be from Sam.

B

It could be dangerous because the email might be from Sam's computer without his or her knowledge.

C

It could be dangerous even if it was sent knowingly because Sam didn't know a virus might be attached.

D

It could be dangerous because Sam gave someone his password once a long time ago

E

None of the above (indicating that all are true).

Check answer
Question 5
Free
Multiple Choice

It is estimated that ___ % of all firms have been breached:

Choose correct answer/s
A

5% or less

B

10% to 20%

C

40% to 60%

D

70% to 90%

E

Over 95%

Check answer
Question 6
Multiple Choice

Who is responsible for decisions about security strategy?

Choose correct answer/s
A
IT people
B
Shared: IT leaders and business leaders
C
Business leaders
D
Consultants
E
Team of consultants and IT people
To unlock the question
Question 7
Multiple Choice

Who is responsible for developing security education, awareness, and training programs?

Choose correct answer/s
A
IT people
B
Shared: IT leaders and business leaders
C
Business leaders
D
Consultants
E
Team of consultants and IT people
To unlock the question
Question 8
Multiple Choice

In the Anthem Blue Cross breach, where 80 million names, birthdays, social security numbers, etc., were stolen, the hackers got in by:

Choose correct answer/s
A
Breaking into the building where they were stored
B
Obtaining passwords of five or more high-level employees
C
Making phone calls to insiders posing as IT people needing to log into their accounts
D
Emailing each of the 80 million patients asking for their private information
E
Recovering patient records from a large recycling bin
To unlock the question
Question 9
Multiple Choice

___ of breaches are caused by stealing a password

Choose correct answer/s
A
A very low percentage (somewhere around 1%)
B
A low percentage (around 10%)
C
A moderate percentage (around 25%)
D
A high percentage (around 50%)
E
A very high percentage (around 80%)
To unlock the question
Question 10
Multiple Choice

The most common password of all in 2014 is:

Choose correct answer/s
A
Something complex that is hard to remember
B
None at all-they most commonly skip passwords and just press ENTER to continue
C
"password"
D
"123456"
E
"Rihanna"
To unlock the question
Question 11
Multiple Choice

An "evil twin" in the context of computer security is:

Choose correct answer/s
A
A virus-laden attachment that looks just like a sincere attachment
B
A duplicate badge that allows a nasty person entry into a data center
C
Someone who looks just like the Chief Information Officer, but steals data
D
An operating system that is not genuine
E
A counterfeit wifi connection in a hotel or coffee shop that appears to be genuine
To unlock the question
Question 12
Multiple Choice

The cost of a data breach in 2015 is estimated to be:

Choose correct answer/s
A
between $13 and $18 per record
B
between $43 and 65 per record
C
between $145 and $154 per record
D
between $100 and $1,000 per record
E
between $4,520 and $4,580 per record
To unlock the question
Question 13
Multiple Choice

On the black market, stolen data in a "kit" that contains credit card information plus social security number and medical information is worth:

Choose correct answer/s
A
between $13 and $18 per record
B
between $43 and 65 per record
C
between $145 and $154 per record
D
between $100 and $1,000 per record
E
between $4,520 and $4,580 per record
To unlock the question
Question 14
Multiple Choice

It usually takes ____ for someone in a firm to discover a security compromise in a system, after the evidence shows up in logs or alerts

Choose correct answer/s
A
Several seconds
B
Several minutes
C
Several hours
D
Several days
E
Several months
To unlock the question
Question 15
Multiple Choice

Included in the five critical elements that are used to raise security in a firm are all of the following except:

Choose correct answer/s
A
Infrastructure
B
Law enforcement
C
Policies
D
Training
E
Investments
To unlock the question
Question 16
Multiple Choice

Examples of multi-factor authentication are:

Choose correct answer/s
A
passwords and text messages
B
passwords with longer than one character
C
a human will chat with you to see who you are
D
using two badges to allow you into a building
E
none of the above
To unlock the question
Question 17
Multiple Choice

All of the following are classic signs of a phishing message except:

Choose correct answer/s
A
Your email in-box is full and you must click on a link to increase storage
B
You just won a lottery or contest, and you need to click on a link to claim your prize
C
Poor grammar or spelling in a note that purports to be from a large company
D
Goods or services are offered at an impossibly low price
E
An emailed ad oddly does not provide any active links
To unlock the question
Question 18
Multiple Choice

Spoofing is:

Choose correct answer/s
A
When someone makes fun of you for falling for a phishing scam
B
When the "from" address says the name/email address of a person different from who really sent it
C
When hackers snoop around in a system
D
When a person from IT unlocks your email account
E
When you receive a notice of an inheritance
To unlock the question
Question 19
True/False

Over time, attackers have had to increase their skills to be able to attack systems or create viruses.

Choose correct answer/s
True
False
To unlock the question
Question 20
True/False

Thanks to tightened security in operating systems, it is more difficult than ever before for hackers to break into systems, compared to the early 1990s, when people were much less often protected, less aware of risks, and more easily fooled.

Choose correct answer/s
True
False
To unlock the question