Filters
Question type

Study Flashcards

The least common but most costly is ______ insider threat.


A) malicious
B) careless
C) exploited
D) feared

E) A) and C)
F) A) and D)

Correct Answer

verifed

verified

Which of the following laws does not apply to hackers?


A) Hackers are evil people.
B) Security is not about security.
C) The greatest damages are caused by simple failures.
D) Most hackers use weak points to get access.

E) B) and C)
F) None of the above

Correct Answer

verifed

verified

Cyber terrorism attacks often take the form of ______.


A) denial-of-service attacks
B) worms
C) phishing
D) spamming

E) A) and D)
F) A) and B)

Correct Answer

verifed

verified

Hackers who are motivated by financial gains and who conduct both bad and ethical hacking are referred to as ______.


A) black hats
B) gray hats
C) white hats
D) green hats

E) A) and C)
F) B) and C)

Correct Answer

verifed

verified

Threats to cybersecurity originate from all of the following sources except ______.


A) individual
B) local
C) national
D) international

E) B) and C)
F) C) and D)

Correct Answer

verifed

verified

Using two-factor identification is recommended for protecting private information, such as using a password and a fingerprint or other physical device.

A) True
B) False

Correct Answer

verifed

verified

Identify and discuss the three main types of insider threats.

Correct Answer

verifed

verified

A strong answer will include the followi...

View Answer

The negative connotation of the word hacker could be defined as "a malicious meddler who tries to discover sensitive information by poking around. Hence password hacker, network hacker. The correct term for this sense is cracker."

A) True
B) False

Correct Answer

verifed

verified

International threats are those that originate from inside the company or organization.

A) True
B) False

Correct Answer

verifed

verified

The "bad guy" hackers are known as ______.


A) red hats
B) white hats
C) black hats
D) green hats

E) A) and B)
F) A) and C)

Correct Answer

verifed

verified

Hackers who are motivated by personal gain or a certain cause are often referred to as ______.


A) red hats
B) black hats
C) white hats
D) green hats

E) B) and D)
F) A) and C)

Correct Answer

verifed

verified

A ______ refers to persons who attempt unauthorized access to a control system device and/or network using a data communications pathway.


A) cyberthreat
B) cyberwarfare
C) cybersecurity
D) cyberattack

E) C) and D)
F) B) and C)

Correct Answer

verifed

verified

Identify and discuss the four tips for protecting private information that were provided by Edward Snowden. Can you think of any others? If so, which ones?

Correct Answer

verifed

verified

A strong answer will include the followi...

View Answer

According to national surveys, ______ are the second greatest threat to a company's cybersecurity, only trumped by hackers.


A) foreign governments
B) spies
C) insiders
D) hacktivists

E) A) and C)
F) B) and C)

Correct Answer

verifed

verified

The use of computer networks and technologies as a means for conducting attacks that target critical national infrastructures or governmental assets has a psychological, social, political, or religious motive, causes harm to individuals or groups, or physically damages infrastructures is referred to as ______.


A) cyberwarfare
B) cyberbullying
C) cyberterrorism
D) cyberespionage

E) C) and D)
F) A) and D)

Correct Answer

verifed

verified

Which of the following was NOT identified as one of the main forms of international threats?


A) nation-states hacking or spying on trade and other secret information
B) advanced hackers aiming at large corporations
C) hacking or spying on city and local governments
D) terrorists looking to identify and exploit vulnerabilities in our infrastructures

E) A) and B)
F) A) and C)

Correct Answer

verifed

verified

Edward Snowden, an American computer professional, provided all of the following tips for keeping data private except ______.


A) decrypt your phone calls and text messages
B) encrypt your hard drive
C) use a password manager
D) use two-factor identification

E) C) and D)
F) B) and C)

Correct Answer

verifed

verified

National threats originate from individuals inside the United States, aiming to attack local or national governments and infrastructures.

A) True
B) False

Correct Answer

verifed

verified

All of the following are examples of social engineering except ______.


A) vishing
B) phishing
C) spam
D) impersonation

E) All of the above
F) C) and D)

Correct Answer

verifed

verified

Which of the following is NOT considered a main type of insider threat?


A) malicious
B) exploited
C) careless
D) feared

E) C) and D)
F) B) and D)

Correct Answer

verifed

verified

Showing 21 - 40 of 40

Related Exams

Show Answer