Filters
Question type

What is Trojan.POSRAM in regard to Target's data breach?


A) Employee sabotage
B) Malware
C) A virus
D) A worm

E) C) and D)
F) A) and C)

Correct Answer

verifed

verified

Black-market website programs reward researchers for finding vulnerabilities within their computer systems.

A) True
B) False

Correct Answer

verifed

verified

The chances of an organization having a data breach over the next two years is approximately ________.


A) 10 percent
B) 20 percent
C) 42 percent
D) 28 percent

E) A) and C)
F) All of the above

Correct Answer

verifed

verified

D

Identify theft can (and does) happen to individuals, but it is not a worry or risk that corporations have.

A) True
B) False

Correct Answer

verifed

verified

What is a payload?


A) Malicious software that blocks access to a system or data until money is paid to the attacker
B) A generic name for any "evil software"
C) A piece of code executed by a virus or a worm
D) A program that gives an attacker remote control of your computer

E) A) and D)
F) B) and C)

Correct Answer

verifed

verified

Which of the following is likely the most common criminal attack on individuals?


A) Bank account theft
B) Credit card number theft
C) Spoofing
D) Spam

E) All of the above
F) None of the above

Correct Answer

verifed

verified

Sending packets with false IP source addresses is known as ________.


A) spear phishing
B) sabotage
C) IP address spoofing
D) hacking

E) B) and C)
F) All of the above

Correct Answer

verifed

verified

Penalties for hacking are significantly different if you are attempting to steal a million dollars or attempting to steal nothing of value.

A) True
B) False

Correct Answer

verifed

verified

Data breaches are rarely costly to a company.

A) True
B) False

Correct Answer

verifed

verified

Cookies are small text strings stored on your own personal computer.

A) True
B) False

Correct Answer

verifed

verified

________ are considered the most dangerous of all employees.


A) Financial professionals
B) IT security employees
C) CEOs
D) Data entry clerks

E) A) and B)
F) A) and C)

Correct Answer

verifed

verified

B

Which of the following is FALSE about rootkits?


A) Rootkits are seldom caught by ordinary antivirus programs.
B) Rootkits take over the root account of a computer.
C) Rootkits use a root account's privileges to hide themselves.
D) Rootkits are typically less of a threat than are Trojan horses.

E) C) and D)
F) B) and C)

Correct Answer

verifed

verified

Indirect costs due to data breaches are estimated to be:


A) $3.9 million per incident
B) $150 million per year
C) $10,000 per incident
D) $190,000 per year

E) None of the above
F) A) and D)

Correct Answer

verifed

verified

Which of the following countries was NOT cited by the Foreign Economic Espionage in Cyberspace as being the most capable cyber actors actively engaged in economic espionage?


A) China
B) Russia
C) Iran
D) United States

E) B) and C)
F) A) and D)

Correct Answer

verifed

verified

D

Russia, China, and Iran are quite active in cyberwar espionage.

A) True
B) False

Correct Answer

verifed

verified

A distributed denial-of-service attach is the most common type of DoS attack.

A) True
B) False

Correct Answer

verifed

verified

More than 67 percent of data breaches come from hackers trying to make money.

A) True
B) False

Correct Answer

verifed

verified

In click fraud, a criminal website owner creates a program so cookies are automatically downloaded to the computer's hard drive.

A) True
B) False

Correct Answer

verifed

verified

________ is a sophisticated computer hack usually perpetrated by a large, well-funded organization.


A) An APT
B) A black-market websites
C) A bug bounty
D) Carding

E) A) and B)
F) A) and C)

Correct Answer

verifed

verified

Which of the following companies experienced the largest data breach in history in 2016?


A) Amazon
B) Yahoo! Inc.
C) First American Corp.
D) Facebook

E) A) and B)
F) All of the above

Correct Answer

verifed

verified

Showing 1 - 20 of 69

Related Exams

Show Answer