INSS 3340
Although the sources of cyber attacks are human actors, most cyber attacks are carried out through: Access vectors Access controls Both A&B None of the above
A
Besides the FBI , which of these other federal agencies investigates cybercrimes? A. Immigration and Customs Enforcement (ICE) B. Internal Revenue Service (IRS) C. Postal Inspection Service D. All of the above.
A D
Which of the following is not designated as a critical infrastructure sector? A. Health care and public health B. Education C. Transportation Systems D. Commercial Facilities
B
Security engineering is the technical design and construction of material barriers to block vehicles, persons and animals, and are often equipped with sensors. True False
False
The least privilege principle is an access control strongly favored by cybersecurity experts. True False
True
While sabotage is meant to cause harm and may be identified as terrorism, the two are not necessarily the same. True False
True
Buffer zone protection plans are designed to make it more difficult for illegal immigrants to enter the homeland. True False
f
Guards should never be considered as potential hazards as this could be construed as a lack of trust. True False
f
Malicious weblinks can be identified by confirming that the actual destination matches the declared destination True False
t
The federal government recognizes 16 sectors of critical U.S. infrastructure. True False
t
The primary sources of attacks on information and communications are external threats, nation-states, profit-oriented criminals and insider threats. True False
t