Filters
Question type

Study Flashcards

Explain the importance of creating a cybersecurity culture and give examples of major symptoms of improper decisions.

Correct Answer

Answered by ExamLex AI

Answered by ExamLex AI

Creating a cybersecurity culture within ...

View Answer

When the Office of Personnel Management was hacked, all of the following are true EXCEPT:


A) The hackers gained access to the building to steal the records
B) It took the Office of Personnel Management many months to detect the break-in
C) The hackers likely exploited a stolen password
D) The hackers did not need to escape in the blue turbocharged vehicle
E) None of the above (indicating that all are true)

Correct Answer

verifed

verified

The deep web is a part of the internet that includes unindexed websites offering both legal and illegal items, such as passports, citizenship, and even murders for hire.

Correct Answer

verifed

verified

It usually takes ____ for someone in a firm to discover a security compromise in a system, after the evidence shows up in logs or alerts


A) Several seconds
B) Several minutes
C) Several hours
D) Several days
E) Several months

Correct Answer

verifed

verified

In the Anthem Blue Cross breach, where 80 million names, birthdays, social security numbers, etc., were stolen, the hackers got in by:


A) Breaking into the building where they were stored
B) Obtaining passwords of five or more high-level employees
C) Making phone calls to insiders posing as IT people needing to log into their accounts
D) Emailing each of the 80 million patients asking for their private information
E) Recovering patient records from a large recycling bin

Correct Answer

verifed

verified

All of the following are classic signs of a phishing message EXCEPT:


A) Your email in-box is full and you must click on a link to increase storage
B) You just won a lottery or contest, and you need to click on a link to claim your prize
C) Poor grammar or spelling in a note that purports to be from a large company
D) Goods or services are offered at an impossibly low price
E) An emailed ad that oddly does not provide any active links

Correct Answer

verifed

verified

What is Poulsen's Law?

Correct Answer

verifed

verified

Information is secur...

View Answer

Which of the following are popular types of multifactor authentication?


A) Knowledge, ownership, biometric
B) VPN, biometric, text message
C) Encryption, ownership, WEP/WPA
D) Firewall, antispy/virus software, knowledge
E) Biometric, system logs, transmission tools

Correct Answer

verifed

verified

What is a challenge question?

Correct Answer

Answered by ExamLex AI

Answered by ExamLex AI

A challenge question, also known as a se...

View Answer

If you receive an email from your son, and the body of the email tells you to open an attachment because it is funny, the risk is pretty close to zero because it came from your son.

Correct Answer

verifed

verified

Continuous monitoring for anomalies and unplanned events is part of the____________ function of the NIST CSF.

Correct Answer

verifed

verified

Cyber culture and behavior are defined by attitudes, beliefs, and____________ .

Correct Answer

verifed

verified

Who is responsible for decisions about security strategy?


A) IT people
B) Shared: IT leaders and business leaders
C) Business leaders
D) Consultants
E) Team of consultants and IT people

Correct Answer

verifed

verified

On the black market, stolen data in a "kit" that contains credit card information plus social security number and medical information is worth:


A) between $13 and $18 per record
B) between $43 and 65 per record
C) between $148 and $408 per record
D) between $100 and $1,000 per record
E) between $4,520 and $4,580 per record

Correct Answer

verifed

verified

The Deep Web is reputed to be 400 times larger than the public web.

Correct Answer

verifed

verified

Internal threats are considered the most lethal threat. What are they, why are they so lethal, and what can a company do to protect against them?

Correct Answer

Answered by ExamLex AI

Answered by ExamLex AI

Internal threats refer to security risks...

View Answer

Cybersecurity is more about management actions than technology decisions.

Correct Answer

verifed

verified

According to the late L. Dain Gary, "You cannot make a computer secure."

Correct Answer

verifed

verified

____________is a piece of software that traps keystrokes and stores them for hackers to inspect later?

Correct Answer

verifed

verified

It is estimated that ___ % of all firms have been breached.


A) 5% or less
B) 10% to 20%
C) 40% to 60%
D) 70% to 90%
E) Over 95%

Correct Answer

verifed

verified

Showing 21 - 40 of 52

Related Exams

Show Answer