Chapter 7 Flashcards

1
Q

Antivirus/Antispyware

A

Antivirus/Antispyware: A software that scans incoming data and evaluates the periodic state of the whole system
to detect threats of secret software that can either destroy data or inform a server of destructive software activity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Biometrics

A

Biometrics: An access tool that scans a body characteristic, such as fi ngerprint, voice, iris, or head or hand
geometry.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Black Hat Hacker

A

Black hat hackers: The hackers who break into an organization’s Web sites or systems for their own gain or to
wreak havoc on a firm.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Challenge Question

A

Challenge question: The access tool to a computer account that prompts a user with a follow‐up question such as
“Model of first car?”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Cross-site scripting

A

Cross‐site‐scripting (XSS): The security breach involving booby traps that appear to lead users to their goal, but
in reality lead to a fraudulent site that requires a log‐in.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Deep Web

A

Deep Web: A large part of the Web that includes unindexed Web sites that are accessible only by a browser named
“Tor,” which guarantees anonymity and provides access to sites offering both legal and illegal items and services.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Encryption

A

Encryption: The translation of data into a code or a form that can be read only by the intended receiver. Data are
encrypted using a key or alphanumeric code and can be decrypted only by using the same key or code.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Evil Twin Connection

A

Evil twin connection: A bogus WiFi connection that appears to be genuine but is actually a counterfeit connection
that is set up to deceive people into providing information unwittingly

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Firewall

A

Firewall: A security measure that blocks undesirable requests for entrance into a Web site and keeps those on the
“inside” from reaching outside.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Grey Hat Hacker

A

Grey hat hackers: The hackers who test organizational systems without any authorization and notify the IT staff
when they find a weakness.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Key Logger

A

Key logger: A type of surveillance device that hackers use to track keystrokes either through hardware (an unseen
thumb drive on a public computer) or software (i.e., a compromised Web site).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Mobile Device Management

A

Mobile device management: A type of security policy that focuses on bring your own device (BYOD) and is
related to permitted products and required connection methods.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Multifactor Authentication

A

Multifactor authentication: The use of two or more authorization methods to gain access to a computer system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Phishing Attack

A

Phishing attack: A type of security breach in which a person receives a convincing e‐mail calling for a response
to a phony urgent situation or opportunity, with a link pretending to be a step towards performing the response.
Often the sender is an imposter and the response actually can lead to theft of identity information, account passwords, or monetary funds.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Security Education and Awareness (SETA)

A

Security education/training/awareness (SETA): The training to make business users aware of security policies
and practices and to build a security‐conscious culture

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Social Media Management

A

Social media management: A type of security policy that provides rules about what can be disclosed on social
media, such as who can Tweet and how employees can identify themselves

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Spoofing

A

Spoofing: A security breach in which a hacker counterfeits an Internet address.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Token

A

Token: A small electronic device that generates a new supplementary passkey at frequent intervals.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Weak Password

A

Weak password: A password such as “123456” that is easy to guess.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

White Hat Hacker

A

White hat hackers: The hackers who break into a firm’s systems to uncover weaknesses.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Zero-day Threat

A

A zero-day threat (also sometimes called a zero-hour threat) is one that hasn’t been seen before and doesn’t match any known malware signatures. This makes it impossible to detect by traditional signature-matching solutions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q
  1. In the Office of Personnel Management’s case, the security breach made many people vulnerable to this.
    a) Loss of personal property
    b) Inaccurate personal data
    c) Identity theft
    d) Loss of access to personal data
    e) Credit card fees
A

Identity Theft

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q
  1. When the Office of Personnel Management was hacked, all of the following are true except:
    a) The hackers gained access to the building to steal the records
    b) It took the Office of Personnel Management many months to detect the break-in
    c) The hackers likely exploited a stolen password
    d) The hackers did not need to escape in the blue turbocharged vehicle
    e) None of the above (indicating that all are true)
A

a) The hackers gained access to the building to steal the records

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q
  1. Many organizations and even consumers use this to control access to a network like the Internet, allowing only authorized traffic to pass.
    a) Encryption
    b) VPN
    c) Firewall
    d) Anonymizing tools
    e) Filtering
A

c) Firewall

25
4. If you receive an email that says it is from Sam Johnson, your boss, with an odd EXE file as an attachment, it could be dangerous for all of the following reasons except: a) It could be dangerous because the email might not really be from Sam. b) It could be dangerous because the email might be from Sam’s computer without his or her knowledge. c) It could be dangerous even if it was sent knowingly because Sam didn’t know a virus might be attached. d) It could be dangerous because Sam gave someone his password once a long time ago e) None of the above (indicating that all are true).
e) None of the above (indicating that all are true).
26
5. It is estimated that ___ % of all firms have been breached: a) 5% or less b) 10% to 20% c) 40% to 60% d) 70% to 90% e) Over 95%
e) Over 95%
27
6. Who is responsible for decisions about security strategy? a) IT people b) Shared: IT leaders and business leaders c) Business leaders d) Consultants e) Team of consultants and IT people
c) Business leaders
28
7. Who is responsible for developing security education, awareness, and training programs? a) IT people b) Shared: IT leaders and business leaders c) Business leaders d) Consultants e) Team of consultants and IT people
b) Shared: IT leaders and business leaders
29
8. In the Anthem Blue Cross breach, where 80 million names, birthdays, social security numbers, etc., were stolen, the hackers got in by: a) Breaking into the building where they were stored b) Obtaining passwords of five or more high-level employees c) Making phone calls to insiders posing as IT people needing to log into their accounts d) Emailing each of the 80 million patients asking for their private information e) Recovering patient records from a large recycling bin
b) Obtaining passwords of five or more high-level employees
30
9. ___ of breaches are caused by stealing a password a) A very low percentage (somewhere around 1%) b) A low percentage (around 10%) c) A moderate percentage (around 25%) d) A high percentage (around 50%) e) A very high percentage (around 80%)
e) A very high percentage (around 80%)
31
10. The most common password of all in 2014 is: a) Something complex that is hard to remember b) None at all—they most commonly skip passwords and just press ENTER to continue c) “password” d) “123456” e) “Rihanna”
d) “123456”
32
11. An “evil twin” in the context of computer security is: a) A virus-laden attachment that looks just like a sincere attachment b) A duplicate badge that allows a nasty person entry into a data center c) Someone who looks just like the Chief Information Officer, but steals data d) An operating system that is not genuine e) A counterfeit wifi connection in a hotel or coffee shop that appears to be genuine
e) A counterfeit wifi connection in a hotel or coffee shop that appears to be genuine
33
12. The cost of a data breach in 2015 is estimated to be: a) between $13 and $18 per record b) between $43 and 65 per record c) between $145 and $154 per record d) between $100 and $1,000 per record e) between $4,520 and $4,580 per record
c) between $145 and $154 per record
34
12. On the black market, stolen data in a “kit” that contains credit card information plus social security number and medical information is worth: a) between $13 and $18 per record b) between $43 and 65 per record c) between $145 and $154 per record d) between $100 and $1,000 per record e) between $4,520 and $4,580 per record
d) between $100 and $1,000 per record
35
13. It usually takes ____ for someone in a firm to discover a security compromise in a system, after the evidence shows up in logs or alerts a) Several seconds b) Several minutes c) Several hours d) Several days e) Several months
e) Several months
36
14. Included in the five critical elements that are used to raise security in a firm are all of the following except: a) Infrastructure b) Law enforcement c) Policies d) Training e) Investments
b) Law enforcement
37
15. Examples of multi-factor authentication are: a) passwords and text messages b) passwords with longer than one character c) a human will chat with you to see who you are d) using two badges to allow you into a building e) none of the above
a) passwords and text messages
38
16. All of the following are classic signs of a phishing message except: a) Your email in-box is full and you must click on a link to increase storage b) You just won a lottery or contest, and you need to click on a link to claim your prize c) Poor grammar or spelling in a note that purports to be from a large company d) Goods or services are offered at an impossibly low price e) An emailed ad oddly does not provide any active links
e) An emailed ad oddly does not provide any active links
39
17. Spoofing is: a) When someone makes fun of you for falling for a phishing scam b) When the “from” address says the name/email address of a person different from who really sent it c) When hackers snoop around in a system d) When a person from IT unlocks your email account e) When you receive a notice of an inheritance
b) When the “from” address says the name/email address of a person different from who really sent it
40
True/False | 18. Over time, attackers have had to increase their skills to be able to attack systems or create viruses.
Ans: False
41
T/F 19. Thanks to tightened security in operating systems, it is more difficult than ever before for hackers to break into systems, compared to the early 1990s, when people were much less often protected, less aware of risks, and more easily fooled.
Ans: False
42
20. If you receive an email from your son, and the body of the email tells you to open an attachment because it is funny, the risk is pretty close to zero because it came from your son. T/F
False
43
21. In the Target breach, the HVAC systems were actually attached to the retail sales system.
True
44
22. In the Target breach, the IT department was warned on or about the time the files were transferred. T/F
True
45
23. According to the late L. Dain Gary, “You cannot make a computer secure.” T/F
True
46
24. A hacker who buys credit card information from hackers receives a short-term guarantee in case the card is declined.
True
47
25. You can purchase stolen credit cards on the “deep web” using a browser called “Tor.” T/F
True
48
26. The deep web is a part of the internet that includes unindexed websites offering both legal and illegal items, such as passports, citizenship, and even murders for hire. T/F
True
49
27. The Deep Web is reputed to be 400 times larger than the public web. (T/F)
True
50
28. A challenge question is when you are stopped at the gate and the guard asks who you are. T/F
False
51
29. Two factor authentication is when you use two different methods for people trying to use the system. For instance, you can use a password and a challenge question T/F
True
52
30. Firewalls can be either in hardware or software form. T/F
True
53
31. This is a situation in which the thief counterfeits a different person’s address
Ans: spoofing
54
32. What is a piece of software that traps keystrokes and stores them for hackers to inspect later?
Ans: Key logger
55
33. What is Poulson’s Law?
Ans: Information is secure when it costs more to get to it than it is worth.
56
Hardware system security and control
Firewalls used to control access to a network | Encryption techniques to protect the content of transmitted messages
57
Network and software security control
Server software to protect Web sites | Security information management schemes to protect against unauthorized access to computers and the network
58
Broadcast medium security and controls
Filtering software that keeps “black listed” sites from displaying