Chapter 1

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

Indirect costs due to data breaches are estimated to be: $10,000 per incident $190,000 per year $3.9 million per incident $150 million per year

$3.9 million per incident

The chances of an organization having a data breach over the next two years is approximately ________. 28 percent 42 percent 10 percent 20 percent

28 percent

More than ________ records were stolen in 2018. 2.2 billion 1 million 100,000 5 billion

5 billion

When a threat succeeds in causing harm to a business, this is called a ________. All of these incident breach compromise

All of these

________ is a sophisticated computer hack usually perpetrated by a large, well-funded organization. Carding An APT A black-market websites A bug bounty

An APT

Which of the following is considered more serious than credit card number theft? Carding Bank account theft Spoofing Click fraud

Bank account theft

________ are the most common external attacker who attack to make money illegally. Hackers Script kiddies IT or security employer Career criminal

Career criminal

ICMP Echo messages are often used in ________. DDoS attacks port scanning IP address scanning spoofing

IP address scanning

Sending packets with false IP source addresses is called ________. IP address spoofing None of these. a port scanning attack a IP address scanning attack

IP address spoofing

________ are considered the most dangerous of all employees. Data entry clerks Financial professionals CEOs IT security employees

IT security employees

________ take advantage of flawed human judgment by convincing a victim to take actions that are counter to security policies. Phishing attacks Hoaxes Social engineering attacks Spear phishing attacks

Social engineering attacks

Which of the following is NOT a type of countermeasure? Preventative Detective Corrective Sustainable

Sustainable

Which of the following is typically considered the first step in protecting your company from data breaches? Locking up your data to prevent data breaches Hiring a qualified data security team Purchasing software to prevent data breaches Understanding how data breaches happen

Understanding how data breaches happen

A program that gives an attacker remote access control of your computer is known as ________. a cookie a RAT spyware a Trojan horse

a RAT

Which of the following is NOT a direct cost of a major data breach? Loss of reputation Legal fees Detection Notification costs

Loss of reputation

Credit card theft is also known as ________.

carding

Another name for safeguard is ________.

countermeasure

Stolen information is commonly used for ________. data mismanagement identity theft false claims credit card fraud

credit card fraud

A ________ happens when an unauthorized person is able to view, alter, or steal secured data.

data breach

A ________ is a small program that, after installed, downloads a larger attack program. rootkit Trojan horse downloader keystroke logger

downloader

Availability means that attackers cannot change or destroy information. false true

false

Detective countermeasures is considered one of the security goals of computer staff. false true

false

True or False: Corrective countermeasures identify when a threat is attacking.

false

True or False: The cost of computer crime is well known.

false

In a DoS attack, the botmaster is also known as a ________. handler rootkit hoax hacker

handler

If an attacker breaks into a corporate database and deletes critical files, this is an attack against the ________ security goal.

integrity

One of the long-lasting effects of the data breach to Target was ________. loss of money loss of merchandise loss of customer confidence employee dissatisfaction

loss of customer confidence

Cyberwar consists of computer-based attacks made by ________. private citizens national governments state, regional, and local governments multinational corporations

national governments

When a data breach occurs, hackers are primarily looking for ________.

personally identifiable information

You receive an e-mail that seems to come from your bank. Clicking on a link in the message takes you to a website that seems to be your bank's website. However, the website is fake. This is called ________. social engineering spear fishing a hoax phishing

phishing

Following someone through a secure door for access without using an authorized ID card or pass code is called ________. shoulder surfing piggybacking a chain of attack social engineering

piggybacking

Skilled hackers have dubbed a new type of hacker that is less sophisticated as ________. script kiddies Bug bounties DoS attackers black marketers

script kiddies

Watching someone type their password in order to learn the password is called ________. piggybacking a chain of attack shoulder surfing social engineering

shoulder surfing

Most traditional external attackers were primarily motivated by ________. stealing personal identity data the thrill of breaking in capturing thousands and thousands of credit card numbers making money through crime

the thrill of breaking in

True or False: Costs for all threats is increasing annually.

true

True or False: Preventative countermeasures keep attacks from succeeding.

true

________ are programs that attach themselves to legitimate programs. Viruses Worms Both Viruses and Worms Neither Viruses nor Worms

viruses

A(n) ________ attack attempts to make a server or network unavailable to serve legitimate users by flooding it with attack packets.

DoS

The Target data breach helped impact a shift from swipe cards to ________. EMV-compliant smart cards keystroke logger POS systems rootkits

EMV-compliant smart cards

________ is a generic term for "evil software." Spyware Malware Payloads Ransomware

Malware

Which of the following is NOT an indirect cost of a major data breach? Increased customer acquisition activities Abnormal customer turnover Notification costs Loss of reputation

Notification costs

Which of the following is FALSE about rootkits? Rootkits are typically less of a threat than are Trojan horses. Rootkits are seldom caught by ordinary antivirus programs. Rootkits use a root account's privileges to hide themselves. Rootkits take over the root account of a computer.

Rootkits are typically less of a threat than are Trojan horses.

________ is the destruction of hardware, software, or data. Sabotage Denial of service Hacking Extortion

Sabotage


संबंधित स्टडी सेट्स

Chapter 12: Family - Questions Inquisitive and Definitions

View Set

Safety and Infection Control Exam

View Set

আমার শিক্ষায় ইন্টারনেট

View Set