Deck 12: Ethical, privacy, and Security Issues

ملء الشاشة (f)
exit full mode
سؤال
Most security experts recommend giving out specific information about a compromise in public forums,such as news reports,conferences,professional meetings,and online discussion groups.
استخدم زر المسافة أو
up arrow
down arrow
لقلب البطاقة.
سؤال
A virus is a piece of programming code,usually disguised as something innocuous that causes some unexpected and usually undesirable event.
سؤال
Nearly everyone would agree that it is acceptable to tell a lie to protect someone's feelings or to keep a friend from getting into trouble.
سؤال
The ethics officer tries to establish an environment that encourages ethical decision making.
سؤال
Making ethical decisions in the area of information technology is really no different than in other areas,although the specific issues may be different.
سؤال
More than 90 percent of major U.S.firms find it necessary to record and review employee communications and activities on the job,including e-mail,Web surfing,and phone usage.
سؤال
The security of any system or network is always about technology.
سؤال
Most firewalls are configured to allow e-mail and benign-looking attachments to reach their intended recipient.
سؤال
In a nonprofit corporation,the board reports to shareholders,customers,employees,suppliers,and the community.
سؤال
The board of directors is responsible for the careful and responsible management of an organization.
سؤال
The presence of a corporate ethics officer has become increasingly common.
سؤال
The IPS sits directly in front of the firewall and examines all the traffic passing through it.
سؤال
Viruses differ from worms in that they can propagate over a network without human intervention,sending copies of themselves to other computers by e-mail or Internet Relay Chat (IRC).
سؤال
Doing what is ethical is always easy in any situation.
سؤال
An organization should be prepared for the worst-a successful attack that defeats all or some of a system's defenses and damages data and information systems.
سؤال
Significant improvements in security can require years and do not come easy.
سؤال
The overwhelming majority of successful computer attacks are made possible by taking advantage of little-known vulnerabilities.
سؤال
Although private-sector employees can seek legal protection against an invasive employer under various state statutes,the degree of protection varies widely by state.
سؤال
Employees are increasingly evaluated on their demonstration of qualities and characteristics that are highlighted in the corporate code of ethics.
سؤال
Often a corporation will down play ethics policies following a major scandal within the organization.
سؤال
Discussing security attacks through public trials and the associated publicity not only has enormous potential costs in public relations,but no real monetary costs.
سؤال
A(n)____ defines an organization's security requirements as well as the controls and sanctions needed to meet those requirements.

A) information policy
B) security policy
C) computer policy
D) acceptable use policy
سؤال
The ____ Amendment of the Constitution protects citizens from unreasonable searches by the government and is often used to protect the privacy of government employees.

A) First
B) Fourth
C) Seventh
D) Tenth
سؤال
The concept of ____ recognizes that managers must use their judgment to ensure that the cost of control does not exceed the system's benefits or the risks involved.

A) reasonable assurance
B) reasonable acts
C) common acts
D) common assurance
سؤال
Ethical behavior conforms to ____.

A) legal guidelines
B) family rules
C) generally accepted social norms
D) company norms
سؤال
The ____ is a senior-level manager who provides vision and direction in the area of business conduct.

A) corporate ethics officer
B) chief executive officer
C) chief privacy officer
D) chief ethics officer
سؤال
A ____ stands guard between your organization's internal network and the Internet,and limits network access based on the organization's access policy.

A) router
B) choke device
C) concentrator
D) firewall
سؤال
In a for-profit corporation,the ____ primary objective is to oversee the organization's business activities and management for the benefit of all stakeholders,including shareholders,customers,employees,suppliers,and the community.

A) chief executive officer's
B) board of directors'
C) chief financial officer's
D) chief privacy officer's
سؤال
The code of ____ defines five widely accepted core principles concerning fair information practices of privacy protection.

A) Fairness Practices
B) Information Practices
C) Fairness of Information Practices
D) Fair Information Practices
سؤال
An essential part of follow-up is to determine how the organization's security was compromised so that it does not happen again.
سؤال
Antivirus software scans for a specific sequence of bytes,known as a(n)____.

A) virus part
B) virus signature
C) database
D) executable signature
سؤال
Expert crackers can conceal their identity and tracking them down can take a long time as well as a tremendous amount of corporate resources.
سؤال
It is crucial that antivirus software be updated continually with the latest virus detection information,called ____.

A) pattern databases
B) virus definitions
C) virus signatures
D) database patterns
سؤال
A ____ is an organization's review of potential threats to its computers and networks along with an analysis of the probability that these will occur and prevent the organization from meeting key business objectives.

A) risk tool
B) penetration test
C) network assessment
D) risk assessment
سؤال
Even if a company decides that the negative publicity risk from a security breach is worth it and goes after the perpetrator,documents containing proprietary information that must be provided to the court could cause even greater security threats in the future.
سؤال
All parties working on the problem need to be kept informed and up-to-date,even if it means using systems connected to the compromised system.
سؤال
____ refers to criminal activity in which a computer or a computer network is used as a tool to commit a crime or is the target of criminal activity.

A) Ecrime
B) Virtual crime
C) Cybercrime
D) Network crime
سؤال
A(n)____ works by using the Internet to relay communications,but maintains privacy through security procedures and tunneling protocols,which encrypt data at the sending end and decrypt it at the receiving end.

A) virtual network
B) encrypted public network
C) virtual private network
D) virtual public network
سؤال
Organizations need to define carefully employee ____ and to separate key responsibilities properly,so that a single person is not responsible for accomplishing a task that has high security implications.

A) privileges
B) authorizations
C) roles
D) authentications
سؤال
____ work to prevent an attack by blocking viruses,malformed packets,and other threats from getting into the company network.

A) Intrusion prevention systems
B) Firewalls
C) Concentrators
D) Routers
سؤال
The experience from an incident should be used to update and revise the ____ plan.

A) network plan
B) security incident response
C) security alert plan
D) network response plan
سؤال
A(n)____________________ test entails assigning individuals to try to break through the measures and identify vulnerabilities that still need to be addressed.
سؤال
___________________ software should be installed on each user's personal computer to scan a computer's memory and disk drives regularly for viruses.
سؤال
Creating a ____ of each compromised system on write-only media for later study,and as evidence,can be very useful.

A) forensic disk image
B) network trace
C) response plan
D) network image
سؤال
The ___________________ should provide guidance to help an organization recognize and deal with ethical issues,provide mechanisms for reporting unethical conduct,and foster a culture of honesty and accountability.
سؤال
____ captures valuable evidence for a future prosecution and provides data to help during the incident eradication and follow-up phases.

A) The response plan
B) Documentation
C) A system build plan
D) Network trace
سؤال
The _________________________ role includes "integrating their organization's ethics and values initiatives,compliance activities,and business conduct practices into the decision-making processes at all levels of the organization."
سؤال
Organizations should implement ____ to catch intruders in the act.

A) detection systems
B) deflection systems
C) prevention systems
D) monitored systems
سؤال
When dealing with customer data,strong measures are required to avoid customer ___________________ problems.
سؤال
In most corporations,the ___________________ is responsible for monitoring network security Web sites frequently and downloading updated antivirus software as needed.
سؤال
A ____ models normal behavior of a system and its users from reference information collected by various means.

A) behavior-based intrusion detection system
B) signature-based intrusion detection system
C) pattern-based intrusion detection system
D) role-based intrusion detection system
سؤال
All ____ should be created with enough frequency to enable a full and quick restoration of data if an attack destroys the original.

A) images
B) restorations
C) servers
D) backups
سؤال
___________________ is a broad class of cybercrime that involves the use of computer hardware,software,or networks to misrepresent facts for the purpose of causing someone to do or refrain from doing something that causes loss.
سؤال
The key to security is to implement a(n)____________________ security solution to make computer break-ins so difficult that an attacker eventually gives up.
سؤال
A(n)____ should be developed well in advance of any incident and be approved by both the organization's legal department and senior management.

A) response network
B) communication plan
C) alerting plan
D) response plan
سؤال
____________________ is a set of beliefs about right and wrong behavior.
سؤال
The ____ should define clearly the process for deciding if an attack is dangerous enough to warrant shutting down or disconnecting critical systems from the network.

A) response network
B) risk assessment
C) response plan
D) security policy
سؤال
In a security incident,the primary goal must be ____.

A) to attempt to monitor or catch an intruder
B) inflict damage to the intruder
C) to regain control and limit damage
D) to place the system back in service
سؤال
A thorough ____ should test system safeguards to ensure that they are operating as intended.

A) risk assessment
B) policy audit
C) penetration test
D) security audit
سؤال
A completed ____________________ identifies the most dangerous threats to a company and helps focus security efforts on the areas of highest payoff.
سؤال
Creating a detailed ____________________ of all events also will document the incident for later prosecution.
سؤال
Why is it important to conduct periodic IT security audits?
سؤال
A well-developed ____________________ helps keep an incident under technical and emotional control.
سؤال
List three specific responsibilities of an ethics officer.
سؤال
Because security incident documentation may become court evidence,an organization should establish a set of document handling procedures using the ____________________ department as a resource.
سؤال
A(n)_____________________ should be conducted after an incident to determine exactly what happened and to evaluate how the organization responded.
سؤال
List four tasks that are critical to establishing an effective data privacy program.
سؤال
A(n)______________________________ is software and/or hardware that monitors system and network resources and activities,and notifies network security personnel when it identifies possible intrusions from outside the organization or misuse from within the organization.
سؤال
List three potential costs of a security breach.
سؤال
Define corporate ethics and explain the primary function of a corporate ethics policy.
فتح الحزمة
قم بالتسجيل لفتح البطاقات في هذه المجموعة!
Unlock Deck
Unlock Deck
1/70
auto play flashcards
العب
simple tutorial
ملء الشاشة (f)
exit full mode
Deck 12: Ethical, privacy, and Security Issues
1
Most security experts recommend giving out specific information about a compromise in public forums,such as news reports,conferences,professional meetings,and online discussion groups.
False
2
A virus is a piece of programming code,usually disguised as something innocuous that causes some unexpected and usually undesirable event.
True
3
Nearly everyone would agree that it is acceptable to tell a lie to protect someone's feelings or to keep a friend from getting into trouble.
False
4
The ethics officer tries to establish an environment that encourages ethical decision making.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 70 في هذه المجموعة.
فتح الحزمة
k this deck
5
Making ethical decisions in the area of information technology is really no different than in other areas,although the specific issues may be different.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 70 في هذه المجموعة.
فتح الحزمة
k this deck
6
More than 90 percent of major U.S.firms find it necessary to record and review employee communications and activities on the job,including e-mail,Web surfing,and phone usage.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 70 في هذه المجموعة.
فتح الحزمة
k this deck
7
The security of any system or network is always about technology.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 70 في هذه المجموعة.
فتح الحزمة
k this deck
8
Most firewalls are configured to allow e-mail and benign-looking attachments to reach their intended recipient.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 70 في هذه المجموعة.
فتح الحزمة
k this deck
9
In a nonprofit corporation,the board reports to shareholders,customers,employees,suppliers,and the community.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 70 في هذه المجموعة.
فتح الحزمة
k this deck
10
The board of directors is responsible for the careful and responsible management of an organization.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 70 في هذه المجموعة.
فتح الحزمة
k this deck
11
The presence of a corporate ethics officer has become increasingly common.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 70 في هذه المجموعة.
فتح الحزمة
k this deck
12
The IPS sits directly in front of the firewall and examines all the traffic passing through it.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 70 في هذه المجموعة.
فتح الحزمة
k this deck
13
Viruses differ from worms in that they can propagate over a network without human intervention,sending copies of themselves to other computers by e-mail or Internet Relay Chat (IRC).
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 70 في هذه المجموعة.
فتح الحزمة
k this deck
14
Doing what is ethical is always easy in any situation.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 70 في هذه المجموعة.
فتح الحزمة
k this deck
15
An organization should be prepared for the worst-a successful attack that defeats all or some of a system's defenses and damages data and information systems.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 70 في هذه المجموعة.
فتح الحزمة
k this deck
16
Significant improvements in security can require years and do not come easy.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 70 في هذه المجموعة.
فتح الحزمة
k this deck
17
The overwhelming majority of successful computer attacks are made possible by taking advantage of little-known vulnerabilities.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 70 في هذه المجموعة.
فتح الحزمة
k this deck
18
Although private-sector employees can seek legal protection against an invasive employer under various state statutes,the degree of protection varies widely by state.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 70 في هذه المجموعة.
فتح الحزمة
k this deck
19
Employees are increasingly evaluated on their demonstration of qualities and characteristics that are highlighted in the corporate code of ethics.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 70 في هذه المجموعة.
فتح الحزمة
k this deck
20
Often a corporation will down play ethics policies following a major scandal within the organization.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 70 في هذه المجموعة.
فتح الحزمة
k this deck
21
Discussing security attacks through public trials and the associated publicity not only has enormous potential costs in public relations,but no real monetary costs.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 70 في هذه المجموعة.
فتح الحزمة
k this deck
22
A(n)____ defines an organization's security requirements as well as the controls and sanctions needed to meet those requirements.

A) information policy
B) security policy
C) computer policy
D) acceptable use policy
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 70 في هذه المجموعة.
فتح الحزمة
k this deck
23
The ____ Amendment of the Constitution protects citizens from unreasonable searches by the government and is often used to protect the privacy of government employees.

A) First
B) Fourth
C) Seventh
D) Tenth
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 70 في هذه المجموعة.
فتح الحزمة
k this deck
24
The concept of ____ recognizes that managers must use their judgment to ensure that the cost of control does not exceed the system's benefits or the risks involved.

A) reasonable assurance
B) reasonable acts
C) common acts
D) common assurance
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 70 في هذه المجموعة.
فتح الحزمة
k this deck
25
Ethical behavior conforms to ____.

A) legal guidelines
B) family rules
C) generally accepted social norms
D) company norms
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 70 في هذه المجموعة.
فتح الحزمة
k this deck
26
The ____ is a senior-level manager who provides vision and direction in the area of business conduct.

A) corporate ethics officer
B) chief executive officer
C) chief privacy officer
D) chief ethics officer
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 70 في هذه المجموعة.
فتح الحزمة
k this deck
27
A ____ stands guard between your organization's internal network and the Internet,and limits network access based on the organization's access policy.

A) router
B) choke device
C) concentrator
D) firewall
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 70 في هذه المجموعة.
فتح الحزمة
k this deck
28
In a for-profit corporation,the ____ primary objective is to oversee the organization's business activities and management for the benefit of all stakeholders,including shareholders,customers,employees,suppliers,and the community.

A) chief executive officer's
B) board of directors'
C) chief financial officer's
D) chief privacy officer's
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 70 في هذه المجموعة.
فتح الحزمة
k this deck
29
The code of ____ defines five widely accepted core principles concerning fair information practices of privacy protection.

A) Fairness Practices
B) Information Practices
C) Fairness of Information Practices
D) Fair Information Practices
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 70 في هذه المجموعة.
فتح الحزمة
k this deck
30
An essential part of follow-up is to determine how the organization's security was compromised so that it does not happen again.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 70 في هذه المجموعة.
فتح الحزمة
k this deck
31
Antivirus software scans for a specific sequence of bytes,known as a(n)____.

A) virus part
B) virus signature
C) database
D) executable signature
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 70 في هذه المجموعة.
فتح الحزمة
k this deck
32
Expert crackers can conceal their identity and tracking them down can take a long time as well as a tremendous amount of corporate resources.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 70 في هذه المجموعة.
فتح الحزمة
k this deck
33
It is crucial that antivirus software be updated continually with the latest virus detection information,called ____.

A) pattern databases
B) virus definitions
C) virus signatures
D) database patterns
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 70 في هذه المجموعة.
فتح الحزمة
k this deck
34
A ____ is an organization's review of potential threats to its computers and networks along with an analysis of the probability that these will occur and prevent the organization from meeting key business objectives.

A) risk tool
B) penetration test
C) network assessment
D) risk assessment
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 70 في هذه المجموعة.
فتح الحزمة
k this deck
35
Even if a company decides that the negative publicity risk from a security breach is worth it and goes after the perpetrator,documents containing proprietary information that must be provided to the court could cause even greater security threats in the future.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 70 في هذه المجموعة.
فتح الحزمة
k this deck
36
All parties working on the problem need to be kept informed and up-to-date,even if it means using systems connected to the compromised system.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 70 في هذه المجموعة.
فتح الحزمة
k this deck
37
____ refers to criminal activity in which a computer or a computer network is used as a tool to commit a crime or is the target of criminal activity.

A) Ecrime
B) Virtual crime
C) Cybercrime
D) Network crime
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 70 في هذه المجموعة.
فتح الحزمة
k this deck
38
A(n)____ works by using the Internet to relay communications,but maintains privacy through security procedures and tunneling protocols,which encrypt data at the sending end and decrypt it at the receiving end.

A) virtual network
B) encrypted public network
C) virtual private network
D) virtual public network
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 70 في هذه المجموعة.
فتح الحزمة
k this deck
39
Organizations need to define carefully employee ____ and to separate key responsibilities properly,so that a single person is not responsible for accomplishing a task that has high security implications.

A) privileges
B) authorizations
C) roles
D) authentications
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 70 في هذه المجموعة.
فتح الحزمة
k this deck
40
____ work to prevent an attack by blocking viruses,malformed packets,and other threats from getting into the company network.

A) Intrusion prevention systems
B) Firewalls
C) Concentrators
D) Routers
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 70 في هذه المجموعة.
فتح الحزمة
k this deck
41
The experience from an incident should be used to update and revise the ____ plan.

A) network plan
B) security incident response
C) security alert plan
D) network response plan
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 70 في هذه المجموعة.
فتح الحزمة
k this deck
42
A(n)____________________ test entails assigning individuals to try to break through the measures and identify vulnerabilities that still need to be addressed.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 70 في هذه المجموعة.
فتح الحزمة
k this deck
43
___________________ software should be installed on each user's personal computer to scan a computer's memory and disk drives regularly for viruses.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 70 في هذه المجموعة.
فتح الحزمة
k this deck
44
Creating a ____ of each compromised system on write-only media for later study,and as evidence,can be very useful.

A) forensic disk image
B) network trace
C) response plan
D) network image
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 70 في هذه المجموعة.
فتح الحزمة
k this deck
45
The ___________________ should provide guidance to help an organization recognize and deal with ethical issues,provide mechanisms for reporting unethical conduct,and foster a culture of honesty and accountability.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 70 في هذه المجموعة.
فتح الحزمة
k this deck
46
____ captures valuable evidence for a future prosecution and provides data to help during the incident eradication and follow-up phases.

A) The response plan
B) Documentation
C) A system build plan
D) Network trace
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 70 في هذه المجموعة.
فتح الحزمة
k this deck
47
The _________________________ role includes "integrating their organization's ethics and values initiatives,compliance activities,and business conduct practices into the decision-making processes at all levels of the organization."
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 70 في هذه المجموعة.
فتح الحزمة
k this deck
48
Organizations should implement ____ to catch intruders in the act.

A) detection systems
B) deflection systems
C) prevention systems
D) monitored systems
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 70 في هذه المجموعة.
فتح الحزمة
k this deck
49
When dealing with customer data,strong measures are required to avoid customer ___________________ problems.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 70 في هذه المجموعة.
فتح الحزمة
k this deck
50
In most corporations,the ___________________ is responsible for monitoring network security Web sites frequently and downloading updated antivirus software as needed.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 70 في هذه المجموعة.
فتح الحزمة
k this deck
51
A ____ models normal behavior of a system and its users from reference information collected by various means.

A) behavior-based intrusion detection system
B) signature-based intrusion detection system
C) pattern-based intrusion detection system
D) role-based intrusion detection system
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 70 في هذه المجموعة.
فتح الحزمة
k this deck
52
All ____ should be created with enough frequency to enable a full and quick restoration of data if an attack destroys the original.

A) images
B) restorations
C) servers
D) backups
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 70 في هذه المجموعة.
فتح الحزمة
k this deck
53
___________________ is a broad class of cybercrime that involves the use of computer hardware,software,or networks to misrepresent facts for the purpose of causing someone to do or refrain from doing something that causes loss.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 70 في هذه المجموعة.
فتح الحزمة
k this deck
54
The key to security is to implement a(n)____________________ security solution to make computer break-ins so difficult that an attacker eventually gives up.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 70 في هذه المجموعة.
فتح الحزمة
k this deck
55
A(n)____ should be developed well in advance of any incident and be approved by both the organization's legal department and senior management.

A) response network
B) communication plan
C) alerting plan
D) response plan
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 70 في هذه المجموعة.
فتح الحزمة
k this deck
56
____________________ is a set of beliefs about right and wrong behavior.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 70 في هذه المجموعة.
فتح الحزمة
k this deck
57
The ____ should define clearly the process for deciding if an attack is dangerous enough to warrant shutting down or disconnecting critical systems from the network.

A) response network
B) risk assessment
C) response plan
D) security policy
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 70 في هذه المجموعة.
فتح الحزمة
k this deck
58
In a security incident,the primary goal must be ____.

A) to attempt to monitor or catch an intruder
B) inflict damage to the intruder
C) to regain control and limit damage
D) to place the system back in service
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 70 في هذه المجموعة.
فتح الحزمة
k this deck
59
A thorough ____ should test system safeguards to ensure that they are operating as intended.

A) risk assessment
B) policy audit
C) penetration test
D) security audit
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 70 في هذه المجموعة.
فتح الحزمة
k this deck
60
A completed ____________________ identifies the most dangerous threats to a company and helps focus security efforts on the areas of highest payoff.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 70 في هذه المجموعة.
فتح الحزمة
k this deck
61
Creating a detailed ____________________ of all events also will document the incident for later prosecution.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 70 في هذه المجموعة.
فتح الحزمة
k this deck
62
Why is it important to conduct periodic IT security audits?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 70 في هذه المجموعة.
فتح الحزمة
k this deck
63
A well-developed ____________________ helps keep an incident under technical and emotional control.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 70 في هذه المجموعة.
فتح الحزمة
k this deck
64
List three specific responsibilities of an ethics officer.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 70 في هذه المجموعة.
فتح الحزمة
k this deck
65
Because security incident documentation may become court evidence,an organization should establish a set of document handling procedures using the ____________________ department as a resource.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 70 في هذه المجموعة.
فتح الحزمة
k this deck
66
A(n)_____________________ should be conducted after an incident to determine exactly what happened and to evaluate how the organization responded.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 70 في هذه المجموعة.
فتح الحزمة
k this deck
67
List four tasks that are critical to establishing an effective data privacy program.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 70 في هذه المجموعة.
فتح الحزمة
k this deck
68
A(n)______________________________ is software and/or hardware that monitors system and network resources and activities,and notifies network security personnel when it identifies possible intrusions from outside the organization or misuse from within the organization.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 70 في هذه المجموعة.
فتح الحزمة
k this deck
69
List three potential costs of a security breach.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 70 في هذه المجموعة.
فتح الحزمة
k this deck
70
Define corporate ethics and explain the primary function of a corporate ethics policy.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 70 في هذه المجموعة.
فتح الحزمة
k this deck
locked card icon
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 70 في هذه المجموعة.