Chapter 7 Questions Flashcards
Spoofing is:
When the “from” address says the name/email address of a person different from who really sent it
When hackers snoop around in a system
When a person from IT unlocks your email account
When you receive a notice of an inheritance
When the “from” address says the name/email address of a person different from who really sent it
In the Target breach, the HVAC systems were actually attached to the retail sales system.
True
False
True
Many organizations and even consumers use this to control access to a network like the Internet, allowing only authorized traffic to pass.
Encryption
VPN
Firewall
Anonymizing tools
Filtering
Firewall
In the Office of Personnel Management’s case, the security breach made many people vulnerable to this.
Loss of personal property
Inaccurate personal data
Identity theft
Loss of access to personal data
Credit card fees
Identity Theft
All of the following are classic signs of a phishing message except:
Your email in-box is full and you must click on a link to increase storage
You just won a lottery or contest, and you need to click on a link to claim your prize
Poor grammar or spelling in a note that purports to be from a large company
Goods or services are offered at an impossibly low price
An emailed ad oddly does not provide any active links
An emailed ad oddly does not provide any active links
According to the late L. Dain Gary, “You cannot make a computer secure.”
True
False
True
You can purchase stolen credit cards on the “deep web” using a browser called “Tor.”
True
False
True
Firewalls can be either in hardware or software form.
True
False
True
Thanks to tightened security in operating systems, it is more difficult than ever before for hackers to break into systems, compared to the early 1990s, when people were much less often protected, less aware of risks, and more easily fooled.
True
False
False
On the black market, stolen data in a “kit” that contains credit card information plus social security number and medical information is worth:
between $13 and $18 per record
between $43 and 65 per record
between $145 and $154 per record
between $100 and $1,000 per record
between $4,520 and $4,580 per record
between $100 and $1,000 per record
Over time, attackers have had to increase their skills to be able to attack systems or create viruses.
True
False
False
The deep web is a part of the internet that includes unindexed websites offering both legal and illegal items, such as passports, citizenship, and even murders for hire.
True
False
True
Examples of multi-factor authentication are:
passwords and text messages
passwords with longer than one character
a human will chat with you to see who you are
using two badges to allow you into a building
none of the above
passwords and text messages
A challenge question is when you are stopped at the gate and the guard asks who you are.
True
False
False
In the Target breach, the IT department was warned on or about the time the files were transferred.
True
False
True