Which of the following is true of wireless network security?
A. Wireless packet analyzers, such as AirSnort and WEPcrack, are readily available tools for protecting wireless networks.
B. Sensitive data that are WEP-encrypted and that are transmitted between two wireless devices are at risk of being intercepted and disclosed.
C. Wireless access points (WAPs) behind a firewall prevent access into a network.
D. Wireless networks are as difficult to protect as wireline ones.
___________ such as Yahoo! and MSN are gateways to general information on the Internet.
A. Corporate portals
B. Commercial portals
C. Mobile portals
D. Vertical portals
In general, which of the following is true about the transmission of confidential and personal information between an RFID reader and a back-end database protect?
A. Those transmissions are sent over secure networks to keep the information secure.
B. Information sent via those transmissions is protected using encryption.
C. RFID tags do not yet contain confidential or personal information.
D. Firewalls are used to protect information in transit.
Company executives are worried about proprietary information “walking out the door” on employees’ iPods, PDAs, or USB drives. Which of the following would be the most effective and viable solution to protect against this type of data loss/theft?
A. Ban the use of those devices altogether.
B. Do random spot checks of those devices.
C. Run software on machines that tracks and manages what is being passed across to any USB drive.
D. Notify all employees via email of the risk of data loss due to those devices.
What was the cause of the Department of Veterans Affairs’ data theft?
A. outdated anti-virus protection
B. lack of firewalls and intrusion detection
C. disgruntled employee
D. failure to enforce policies