INSS 3340

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

Although the sources of cyber attacks are human actors, most cyber attacks are carried out through: Access vectors Access controls Both A&B None of the above

A

Besides the FBI , which of these other federal agencies investigates cybercrimes? A. Immigration and Customs Enforcement (ICE) B. Internal Revenue Service (IRS) C. Postal Inspection Service D. All of the above.

A D

Which of the following is not designated as a critical infrastructure sector? A. Health care and public health B. Education C. Transportation Systems D. Commercial Facilities

B

Security engineering is the technical design and construction of material barriers to block vehicles, persons and animals, and are often equipped with sensors. True False

False

The least privilege principle is an access control strongly favored by cybersecurity experts. True False

True

While sabotage is meant to cause harm and may be identified as terrorism, the two are not necessarily the same. True False

True

Buffer zone protection plans are designed to make it more difficult for illegal immigrants to enter the homeland. True False

f

Guards should never be considered as potential hazards as this could be construed as a lack of trust. True False

f

Malicious weblinks can be identified by confirming that the actual destination matches the declared destination True False

t

The federal government recognizes 16 sectors of critical U.S. infrastructure. True False

t

The primary sources of attacks on information and communications are external threats, nation-states, profit-oriented criminals and insider threats. True False

t


Set pelajaran terkait

What is climate??? Directed reading

View Set

Gestion des opérations mid term

View Set

Ch 21, Visual and Auditory Assessment

View Set

Comptia 1101 220 (Display Devices)

View Set