Cybersecurity 7

0.0(0)
studied byStudied by 0 people
0.0(0)
full-widthCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/23

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

24 Terms

1
New cards

Microsoft Windows includes BitLocker in some editions, so entire hard drives can be encrypted.

True

2
New cards

Employees with access to any sensitive information should be asked to sign nondisclosure agreements.

True

3
New cards

The Patriot Act was the first U.S. law to criminalize theft of commercial trade secrets.

False

4
New cards

Crafting email and websites to specifically target certain victims is called dive bombing.

False

5
New cards

A key logger can be hardware-based of software-based.

True

6
New cards

Funcrypt is a free tool that can be used to encrypt drives, folders, or partitions.

False

7
New cards

Hiding a message in images is an example of stenography.

False

8
New cards

Sending a forged email asking for sensitive data is an example of steganography.

False

9
New cards

VI (value of information) = C (cost to produce) + VG (value gained).

True

10
New cards

Industrial espionage is the use of spying techniques to find out key information that is of economic value.

True

11
New cards

______________ is the use of spying techniques to find out key information that is of economic value.

Industrial Esponiage

12
New cards

Which of the following is NOT an example of industrial espionage?

Denial-of-service attack

13
New cards

For security reasons, when an employee leaves a company, you should conduct a(n) ________ interview.

Exit

14
New cards

VI (value of information) = C (cost to produce) + ___________.

VG (value gained)

15
New cards

Data stored in computer systems has a high value because there is a great deal of time and effort that goes into creating an analyzing it and ________________.

Data often has intrinsic value.

16
New cards

The process to list assets that you believe support your organization is called ________.

Asset identification

17
New cards

The company involved in an attack by Oleg Zezev from Kazahkstan, in which Zezev accessed computer data and copied personal information for purposes of blackmail was ______.

Bloomberg, Inc.

18
New cards

The chief executive officer of Oracle defends his practice to hire private investigators to sift through the garbage of which competitor?

Microsoft

19
New cards

Cookies and key loggers are examples of ____________.

spyware

20
New cards

the single greatest security risk to any organization is _________.

A disgruntled employee

21
New cards

The most obvious use of ________________involves talking to an employee and getting him to reveal sensitive data.

Social engineering

22
New cards

Sending an email that claims to come from a different sender, and asking for sensitive data is an example of ___________.

Social engineering

23
New cards

Quick Stego and Invisible Secrets are two software tools that can be used for __________.

Steganography

24
New cards

Giving personnel access to only data that they absolutely need to perform their jobs is referred to as _________.

Least privileges