Geschreven door studenten die geslaagd zijn Direct beschikbaar na je betaling Online lezen of als PDF Verkeerd document? Gratis ruilen 4,6 TrustPilot
logo-home
Tentamen (uitwerkingen)

ISM 3004 EXAM 4 QUESTIONS AND VERIFIED ACCURATE ANSWERS

Beoordeling
-
Verkocht
-
Pagina's
18
Cijfer
A+
Geüpload op
29-04-2026
Geschreven in
2025/2026

ISM 3004 EXAM 4 QUESTIONS AND VERIFIED ACCURATE ANSWERS

Instelling
ISM 3004
Vak
ISM 3004

Voorbeeld van de inhoud

ISM 3004 EXAM 4 QUESTIONS AND VERIFIED
ACCURATE ANSWERS


Three reasons to secure data - Answers - 1. It's the most valuable asset.
2. Privacy Regulations.
3. Systems can be hijacked.

What are digital identities and why protect them? - Answers - Log-in credentials such as
usernames and passwords. To protect your identity.

What is a zero day exploit? - Answers - Everyday vulnerability becomes known to the
world, because bad guys are using it to break into other people's systems.
A hole in the software that is unknown to the vendor. This security hole is then exploited
by hackers before the vendor becomes aware and hurries to fix it.

According to the PWC report, what is the annual growth rate for security incidents? -
Answers - 66%

Reading: Biggest hack in history. How did hackers get in ? - Answers - An employee
opened a bad email.

Reading: Biggest Hack in History. What damage was suffered? - Answers - In a matter
of hours, 35,000 computers were partially wiped or totally destroyed.
Without a way to pay them, gasoline tank trucks seeking refills had to be turned away.
Saudi Aramco's ability to supply 10% of the world's oil was suddenly at risk.
Employees had to use typewriters since they could not use the computer to prevent the
virus from spreading further.

What does it mean for something to be vulnerable? - Answers - Susceptible to attack or
harm.

What are the broad categories of IT vulnerability? - Answers - Physical
Technological
Human

Percentage of laptops lost over their service life? - Answers - 7%

Stolen Veteran's Affairs laptop incident: What data was exposed, what was the impact?
- Answers - One laptop stolen!
Exposure: name, SSN, birth date for 26.5 million people.
Lawsuit settlement: 20 Mil
Individual impact: ID theft

,Percentage of smartphones lost EACH YEAR? - Answers - 5%

About _____% of lost smartphones had sensitive data? - Answers - 60%

Were the lost smartphone protected? - Answers - NO

As a rule of thumb, each data record lost costs a company about $_____? - Answers -
$200

_____% of companies surveyed suffered loss of sensitive/confidential information from
lost flash drives? - Answers - 70%

What is Shoulder Surfing? - Answers - Acquiring sensitive information just by looking
over somebody's shoulder.

How do attackers use shoulder surfing? - Answers - Stealing confidential data.
Stealing mobile devices.

A company's dumpster can be a "_________________________" to cybercriminals. -
Answers - Gold Mine of Information

What kinds of information might be in a company's 'dumpster'? - Answers - Pre-attack
research

What kinds of things actually contain the desired information from dumpster diving? -
Answers - Phone Lists, Print outs, and media

How would the cyber-criminal use the information from the dumpster dive? - Answers -
SELL IT

What risk must be considered when disposing of obsolete equipment? - Answers -
Computers and copy machines at risk due to their hard drives.

As one example, why was one healthcare company over $1 million? - Answers -
Improper photocopy equipment disposal.

What is a bug? - Answers - A programming flaw or oversight that can be exploited.

Is it reasonable to expect that large software systems would be truly and totally bug-
free? Why? - Answers - NO. There are millions of lines of codes that could contain
bugs.

What can an attacker do with a bug? - Answers - Run undesired programs.
Unauthorized data access.
Gain full control.

, What are the three user password vulnerabilities? - Answers - Sticky Notes: writing the
passwords down.
Guessable: people who know you.
Lack on complexity: too simple.

What are the root causes of problems with user passwords? - Answers - Easily
remembered.
Resistant to change.

Why are default password a potential security problem? - Answers - Weak.
Easily guessable.
Doesn't change network identifier.

Organizations spend most of their IT security dollars protecting
_________________________. - Answers - castle walls. These are corporate sites.

Mobile devices are largely unprotected because they spend much time
________________________. - Answers - Outside the castle walls.

2 examples of mobile/BYOD technical risks are: - Answers - Direct data flow.
Mobile Sync.

Explain the problem with Direct Data Flow with Gartner research data. - Answers - 25%
of all corporate data traffic can go directly from the mobile device to corporate provider.
Huge amount of data flowing around the world without protection.

Explain the problem with Mobile Sync with Gartner research data. - Answers - 40% of
enterprise contact information will have leaked into Facebook such as customer
information.

What is Social Engineering? - Answers - Process where outsiders exploit naive insiders;
tricking.

How is social engineering done? - Answers - Take baby steps.
Research your victim.
Ask for help: plausible requests to the right people mentioning the right names.

How does CERT define the term Insider? - Answers - Current or former employee,
contractor, or other partner that has or had authorized access and intentionally misused
that access against the organization.

Are insiders a serious threat? - Answers - Yes, because 70% of incidents involve
insiders.

Reading: Beautiful Social Engineering Attack. What did the chemical engineer do that
enabled the hacker to find him? - Answers - Posted information on social media.

Geschreven voor

Instelling
ISM 3004
Vak
ISM 3004

Documentinformatie

Geüpload op
29 april 2026
Aantal pagina's
18
Geschreven in
2025/2026
Type
Tentamen (uitwerkingen)
Bevat
Vragen en antwoorden

Onderwerpen

$15.49
Krijg toegang tot het volledige document:

Verkeerd document? Gratis ruilen Binnen 14 dagen na aankoop en voor het downloaden kun je een ander document kiezen. Je kunt het bedrag gewoon opnieuw besteden.
Geschreven door studenten die geslaagd zijn
Direct beschikbaar na je betaling
Online lezen of als PDF


Ook beschikbaar in voordeelbundel

Maak kennis met de verkoper

Seller avatar
De reputatie van een verkoper is gebaseerd op het aantal documenten dat iemand tegen betaling verkocht heeft en de beoordelingen die voor die items ontvangen zijn. Er zijn drie niveau’s te onderscheiden: brons, zilver en goud. Hoe beter de reputatie, hoe meer de kwaliteit van zijn of haar werk te vertrouwen is.
GEEKA YALA UNIVERSITY
Volgen Je moet ingelogd zijn om studenten of vakken te kunnen volgen
Verkocht
2109
Lid sinds
4 jaar
Aantal volgers
1446
Documenten
54144
Laatst verkocht
1 dag geleden

3.8

358 beoordelingen

5
177
4
61
3
48
2
17
1
55

Recent door jou bekeken

Waarom studenten kiezen voor Stuvia

Gemaakt door medestudenten, geverifieerd door reviews

Kwaliteit die je kunt vertrouwen: geschreven door studenten die slaagden en beoordeeld door anderen die dit document gebruikten.

Niet tevreden? Kies een ander document

Geen zorgen! Je kunt voor hetzelfde geld direct een ander document kiezen dat beter past bij wat je zoekt.

Betaal zoals je wilt, start meteen met leren

Geen abonnement, geen verplichtingen. Betaal zoals je gewend bent via iDeal of creditcard en download je PDF-document meteen.

Student with book image

“Gekocht, gedownload en geslaagd. Zo makkelijk kan het dus zijn.”

Alisha Student

Bezig met je bronvermelding?

Maak nauwkeurige citaten in APA, MLA en Harvard met onze gratis bronnengenerator.

Bezig met je bronvermelding?

Veelgestelde vragen