1/23
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced |
|---|
No study sessions yet.
Microsoft Windows includes BitLocker in some editions, so entire hard drives can be encrypted.
True
Employees with access to any sensitive information should be asked to sign nondisclosure agreements.
True
The Patriot Act was the first U.S. law to criminalize theft of commercial trade secrets.
False
Crafting email and websites to specifically target certain victims is called dive bombing.
False
A key logger can be hardware-based of software-based.
True
Funcrypt is a free tool that can be used to encrypt drives, folders, or partitions.
False
Hiding a message in images is an example of stenography.
False
Sending a forged email asking for sensitive data is an example of steganography.
False
VI (value of information) = C (cost to produce) + VG (value gained).
True
Industrial espionage is the use of spying techniques to find out key information that is of economic value.
True
______________ is the use of spying techniques to find out key information that is of economic value.
Industrial Esponiage
Which of the following is NOT an example of industrial espionage?
Denial-of-service attack
For security reasons, when an employee leaves a company, you should conduct a(n) ________ interview.
Exit
VI (value of information) = C (cost to produce) + ___________.
VG (value gained)
Data stored in computer systems has a high value because there is a great deal of time and effort that goes into creating an analyzing it and ________________.
Data often has intrinsic value.
The process to list assets that you believe support your organization is called ________.
Asset identification
The company involved in an attack by Oleg Zezev from Kazahkstan, in which Zezev accessed computer data and copied personal information for purposes of blackmail was ______.
Bloomberg, Inc.
The chief executive officer of Oracle defends his practice to hire private investigators to sift through the garbage of which competitor?
Microsoft
Cookies and key loggers are examples of ____________.
spyware
the single greatest security risk to any organization is _________.
A disgruntled employee
The most obvious use of ________________involves talking to an employee and getting him to reveal sensitive data.
Social engineering
Sending an email that claims to come from a different sender, and asking for sensitive data is an example of ___________.
Social engineering
Quick Stego and Invisible Secrets are two software tools that can be used for __________.
Steganography
Giving personnel access to only data that they absolutely need to perform their jobs is referred to as _________.
Least privileges