CH 07
CH 07
Multiple Choice
1. In the Office of Personnel Management’s case, the security breach made many people
vulnerable to this.
a) Loss of personal property
b) Inaccurate personal data
c) Identity theft
d) Loss of access to personal data
e) Credit card fees
Ans: c (Hard)
2. When the Office of Personnel Management was hacked, all of the following are true
EXCEPT:
a) The hackers gained access to the building to steal the records
b) It took the Office of Personnel Management many months to detect the break-in
c) The hackers likely exploited a stolen password
d) The hackers did not need to escape in the blue turbocharged vehicle
e) None of the above (indicating that all are true)
Ans: a (Medium)
Response: See page 148
3. Many organizations and even consumers use what to control access to a network like
the Internet, allowing only authorized traffic to pass?
a) Encryption
b) VPN
c) Firewall
d) Anonymizing tools
e) Filtering
Ans: c (Medium)
4. If you receive an email that says it is from Sam Johnson, your boss, with an odd EXE
file as an attachment, it could be dangerous for all of the following reasons EXCEPT:
a) The email might not really be from Sam.
b) The email might be from Sam’s computer without his or her knowledge.
c) It could be dangerous even if it was sent knowingly because Sam didn’t know a
virus might be attached.
d) It could be dangerous because Sam gave someone his password once a long time
ago
e) None of the above (indicating that all are true).
Ans: e (Medium)
Ans: e (Medium)
Ans: c (Medium)
Ans: b (Medium)
8. In the Anthem Blue Cross breach, where 80 million names, birthdays, social security
numbers, etc., were stolen, the hackers got in by:
a) Breaking into the building where they were stored
b) Obtaining passwords of five or more high-level employees
c) Making phone calls to insiders posing as IT people needing to log into their
accounts
d) Emailing each of the 80 million patients asking for their private information
e) Recovering patient records from a large recycling bin
Ans: b (Medium)
Ans: e (Medium)
Ans: d (Medium)
Ans: e (Medium)
Ans: c (Medium)
13. On the black market, stolen data in a “kit” that contains credit card information plus
social security number and medical information is worth:
a) between $13 and $18 per record
b) between $43 and 65 per record
c) between $148 and $408 per record
d) between $100 and $1,000 per record
e) between $4,520 and $4,580 per record
Ans: d (Medium)
14. It usually takes ____ for someone in a firm to discover a security compromise in a
system, after the evidence shows up in logs or alerts
a) Several seconds
b) Several minutes
c) Several hours
d) Several days
e) Several months
Ans: e (Medium)
15. Included in the five critical elements that are used to raise security in a firm are all of
the following EXCEPT:
a) Infrastructure
b) Law enforcement
c) Policies
d) Training
e) Investments
Ans: b (Hard)
Ans: a (Medium)
17. All of the following are classic signs of a phishing message EXCEPT:
a) Your email in-box is full and you must click on a link to increase storage
b) You just won a lottery or contest, and you need to click on a link to claim your
prize
c) Poor grammar or spelling in a note that purports to be from a large company
d) Goods or services are offered at an impossibly low price
e) An emailed ad that oddly does not provide any active links
Ans: e (Hard)
Ans: b (Medium)
19. Which of the following are the five functions of the NIST Cybersecurity Framework?
a) Identify, communicate, detect, recover, prosecute
b) Communicate, detect, engage, respond, recover
c) Protect, identify, communicate, recover, prosecute
d) Identify, protect, detect, respond, recover
e) Detect, recover, communicate, respond, engage
Ans: d (Medium)
Ans: a (Medium)
21. The concept of having multiple layers of security policies and practices is known as:
a) Cybersecurity culture
b) Multifactor authentication
c) Defense in depth
d) Biometrics
e) Zero-day threat
Ans: c (Medium)
22. All of the following are part of cybersecurity balanced scorecard EXCEPT:
a) Risk measures
b) People measures
c) Supply chain measures
d) Threat measures
e) Technology measures
Ans: d (Medium)
True/False
23. Over time, attackers have not become more sophisticated to be able to attack systems
or create viruses.
Ans: False
24. If you receive an email from your son, and the body of the email tells you to open an
attachment because it is funny, the risk is pretty close to zero because it came from
your son.
Ans: False
25. In the Target breach, the HVAC systems were actually attached to the retail sales
system.
Ans: True
26. In the Target breach, the IT department was warned on or about the time the files
were transferred.
Ans: True
27. According to the late L. Dain Gary, “You cannot make a computer secure.”
Ans: True
28. A hacker who buys credit card information from hackers receives a short-term
guarantee in case the card is declined.
Ans: True
29. The Dark Web offers “as-a-service” with the technologies and tools cybercriminals
purchasing, which can include help desk service.
Ans: True
30. The deep web is a part of the internet that includes unindexed websites offering both
legal and illegal items, such as passports, citizenship, and even murders for hire.
Ans: True
31. The Deep Web is reputed to be 400 times larger than the public web.
Ans: True
32. A challenge question is when you are stopped at the gate and the guard asks who you
are.
Ans: False
33. Two factor authentication is when you use two different methods for people trying to
use the system. For instance, you can use a password and a challenge question
Ans: True
Ans: True
35. Cyberinsurance can be one way a company manages its technology measure on the
cybersecurity balanced scorecard.
Ans: False
Short Answer
Ans: respond
38. Continuous monitoring for anomalies and unplanned events is part of the
function of the NIST CSF.
Ans: detect
Ans: spoofing
40. is a piece of software that traps keystrokes and stores them for
hackers to inspect later?
41. System updates and patches provided by system vendors is a best practice known as
.
43. Cyber culture and behavior are defined by attitudes, beliefs, and .
Ans: values
Essay
45. What security and controls should a company use to protect its computer
infrastructure? Why do managers need to be involved in the governance of security
and control measures?
46. Internal threats are considered the most lethal threat. What are they, why are they so
lethal, and what can a company do to protect against them?
49. Of the seven security policies noted in the (Figure 7.7), name and describe at least
three.
50. Explain the importance of creating a cybersecurity culture and give examples of
major symptoms of improper decisions.
51. Why is it important to measure how cybersecure we are and describe the purpose of
the cybersecurity balanced scorecard?
Matching