IST 309 Chapter 4
______ is a communications control.
A firewall
Auditing ___________ the computer means verifying processing by checking for known outputs using specific inputs.
Around
Ukraine's protection of their SCADA systems is ______ than in the US but was vulnerable because of its use of ______.
Better; VPN
Piracy costs businesses _______ of dollars per year.
Billions
Ransomware is typically disseminated through ___________.
Botnets
The US government considers the Sony hack _______.
Cyberterrorism
_____ refers to malicious acts in which attackers use a target's computer systems to cause physical, real-world harm or severe disruption, often to carry out a political agenda.
Cyberterrorism
A(n) ______________ is located between two firewalls.
DMZ
It is always safe to open e-mails and click on links from your friends.
False
There is nothing we can do to prevent ransomware...we just have to pay the fee if it hits us.
False
Computer crimes typically average _________ of dollars and cause businesses _______ of dollars in damages.
Hundreds of thousands; billions
Which of the following is FALSE of the US Office of Personnel Management breach?
Major agencies are required to have security changes in place immediately.
______ controls prevent unauthorized individuals from gaining access to a company's facilities.
Physical
__________ is an unintentional threat.
Social engineering
Blacklisting allows everything to run unless it is on the list.
True
People tend to violate security procedures because the procedures are inconvenient.
True
People, devices, software, and websites can be blacklisted and white listed.
True
You are a nice person, so you hold the door open for the person running in behind you. Since you needed to use your ID badge to open the door, the person running in behind you is tailgating.
True