Exam 1 Flashcards
The __________ has primary responsibility for the assessment, management and implementation of information security in the organization? (Single Choice)
* Board Chairperson
* CISO
* CIO
* CFO
- CISO
When projects are initiated at the highest levels of an organization and then pushed to all levels, they are said to follow which approach? (Single Choice)*
* Executive-led
* Trickle-down
* Top-down
* Bottom-up
- Top-down
The person responsible for the storage, maintenance, and protection of information is the data custodian? (Single Choice)*
* True
* False
- True
Information about a person’s history, background, and attributes that can be used to commit identify theft is called? (Single Choice)*
* Enhanced credentials
* Passwords
* Authenticity
* Personal Identifiable Information
- Personal Identifiable Information
A potential weakness in an asset or its defensive control systems is a _______? (Single Choice)*
* Vulnerability
* Threat Agent
* Exploit
* Countermeasure
- Vulnerability
The C.I.A Triad industry standard for computer security has all of the following characteristics except? (Single Choice)*
* Confidentiality
* Integrity
* Shareability
* Availability
- Shareability
Passwords should only be shared with trusted people and the IT Security Department? (Single Choice)*
* True
* False
- False
Email is the most private form of communication and it is safe to use with personal information? (Single Choice)*
* True
* False
- False
Everyone has responsibility to protect company confidential and sensitive information? (Single Choice)*
* True
* False
- True
Which of the following could be considered highly desirable trophies for corporate espionage? (Multiple Choice)*
* Customer information
* Intellectual property (IP)
* Financial results
* Elon Musk flight details
* All of the above
- All of the above
Information security performs all of the following functions for an organization except? (Single Choice)*
* Safeguards the organization’s technology assets
* Protects the organization’s ability to function
* Protects the data and information the organization collects and uses whether physical or electronic
* Provides for the broad and easy access of an organization’s intellectual property among companies in the same industry
- Provides for the broad and easy access of an organization’s intellectual property among companies in the same industry
Service level agreements (SLA) are considered optional in most cases when an organization engages a third party for cloud computing services or other outsourced services? (Single Choice)*
* True
* False
- False
Which of the following would be considered an attack and penetration tester? (Single Choice)*
* An expert hacker with bad intentions
* A packet monkey focused on denial of service mischief
* An information security professional with authorization to compromise a system seeking vulnerabilities
* A foreign national focused on industrial espionage
- An information security professional with authorization to compromise a system seeking vulnerabilities
A hacker would typically attempt to attain the following in order to gain advanced access and control over the compromised system? (Single Choice)*
* Privilege escalation
* Zombie control
* A man in the middle attack
* Identity of the CEO through social media
- Privilege escalation
The following form of social engineering attempts to direct a target to provide personal or confidential information? (Single Choice)*
* Ransomware
* Phishing
* Adware
* Worm
- Phishing
A zero-day attack makes use of malware that is not yet known by the anti-virus software companies? (Single Choice)*
* True
* False
- True
Using a known or previously installed access mechanism is known as which of the following? (Single Choice)*
* Hidden bomb
* Vector
* Back Door
* Spoof
- Back Door
A hacker will typically utilize IP spoofing to install a _________to monitor data traveling over a network? (Single Choice)*
* Packet sniffer
* Mail bomb
* Integer bug
* Denial of service attack
- Packet sniffer
Pretexting to gain confidential information is no longer considered a viable threat as the human element is considered the strongest link in the security chain? (Single Choice)*
* True
* False
- False
The following is often a main trophy for corporate espionage? (Single Choice)*
* Key products
* Names of Board members
* SEC reports
* Intellectual property (IP)
- Intellectual property (IP)