Deck 10: Securing Information Systems

ملء الشاشة (f)
exit full mode
سؤال
Some violations of state and federal computer crime laws are punishable by fines and by not more than one year in prison.Such violations are charged as ________.

A) misdemeanors
B) felonies
C) embezzlements
D) indictments
E) larcenies
استخدم زر المسافة أو
up arrow
down arrow
لقلب البطاقة.
سؤال
Ronald downloads a movie from the Internet onto his company's computer.During this process,his system gets infected with a virus.The virus spreads rapidly in the company's network causing the server to crash.This type of virus is most likely to be ________.

A) adware
B) phishing mail
C) spam
D) a worm
E) a Trojan horse
سؤال
Computers that are located in homes,schools,and businesses are infected with viruses or worms to create armies of zombie computers to execute ________ attacks.

A) digital marketing
B) malware
C) adware
D) denial-of-service
E) product-as-service
سؤال
Identify a true statement about a vulnerability scanner.

A) It analyzes network traffic and captures unencrypted passwords.
B) It presents a view of long-term technology integration.
C) It tests targeted systems for weaknesses.
D) It presents a view of short-term technology integration.
E) It ensures high-quality leads when a search is conducted online.
سؤال
People who break into computer systems with the intention of doing damage or committing a crime are called ________.

A) bots
B) white hats
C) worms
D) cyber spies
E) crackers
سؤال
Which of the following U.S.laws amended the Computer Fraud and Abuse Act to allow investigators to easily access voice-related communications?

A) the Non-Detention Act
B) the Espionage Act
C) the Patriot Act
D) the Video Privacy Protection Act
E) the Clery Act
سؤال
Violating data belonging to banks or other financial institutions is a crime in the United States.Which of the following legislations prohibit such violations?

A) the Foreign Intelligence Surveillance Act
B) the Computer Fraud and Abuse Act
C) the Patriot Act
D) the Glass-Steagall Act
E) the Electronic Communications Privacy Act
سؤال
Employees steal time on company computers to do personal business.This is an example of ________.

A) unauthorized access
B) hacking
C) vandalism
D) cyberstalking
E) functional inconvenience
سؤال
Which of the following terms refers to junk newsgroup postings used for the purpose of advertising for some product or service?

A) spam
B) adware
C) cookie
D) bot herder
E) Web filter
سؤال
The Computer Fraud and Abuse Act of 1986 prohibits ________.

A) accessing company intranet and confidential information from public computers
B) stealing or compromising data about national defense, foreign relations, atomic energy, or other restricted information
C) the use of external devices to provide access and information to companies' confidential information
D) signing contracts with consultants outside the United States to process information
E) access to companies' extranets when outsourcing work to clients overseas
سؤال
While adding information to the employee information database,Neil's computer crashed,and the entire database was erased.Which of the following types of viruses caused Neil's computer to crash?

A) spyware
B) worms
C) adware
D) logic bombs
E) encryption
سؤال
________ refers to any software that covertly gathers information about a user through an Internet connection without the user's knowledge.

A) Spyware
B) Spam
C) Web filter
D) Cookie
E) Bot herder
سؤال
________ targeted at networks is designed to spread by itself without the need for an infected host file to be shared.

A) Adware
B) Spyware
C) A worm
D) Spam
E) A logic bomb
سؤال
WikiLeaks is a famous not-for-profit whistleblower Web site.MasterCard and Visa stopped payments to WikiLeaks after a series of leaks by the site.An anonymous group attacked the Web sites of both MasterCard and Visa reacting to this.These Web vandals,who tried to protect WikiLeaks,are called ________.

A) hacktivists
B) bots
C) ethical hackers
D) patriot hackers
E) cyber soldiers
سؤال
The individuals who are knowledgeable enough to gain access to computer systems without authorization are referred to as ________.

A) hackers
B) bots
C) online predators
D) worms
E) power users
سؤال
Identify a true statement about a packet sniffer.

A) It is used to analyze network traffic.
B) It is used to test targeted systems for weaknesses.
C) It is used to break passwords using a brute-force approach.
D) It is used to capture encrypted passwords.
E) It is used to redirect web pages to different sites if any link fails.
سؤال
Which of the following is one of the main federal laws against computer crimes in the United States?

A) Satellite Act of 1962
B) Trade Expansions Act of 1962
C) United States Information and Educational Exchange Act
D) Central Intelligence Agency Act
E) Electronic Communications Privacy Act of 1986
سؤال
Computer criminals who attempt to break into systems or deface Web sites to promote political or ideological goals are called ________.

A) hacktivists
B) crackers
C) social promoters
D) internet activists
E) online predators
سؤال
When Shelly downloaded an arcade game from an unknown Internet Web site,an unauthorized connection unknown to Shelly was established with her computer.The arcade game is most likely to be ________.

A) spyware
B) a worm
C) adware
D) a Trojan horse
E) encryption
سؤال
Which of the following is the most accurate definition of a computer crime?

A) the act of using a computer to commit an illegal act
B) the act of using someone's computer to browse the Internet
C) the act of using someone's computer to check e-mail
D) the act of stealing a computer and related hardware
E) the act of providing personal information to Web sites when shopping
سؤال
A(n)________ typically consists of a distorted image displaying a combination of letters and/or numbers that a user has to input into a form before submitting it.

A) American Standard Code for Information Interchange (ASCII)
B) Comprehensive TeX Archive Network (CTAN)
C) Entity-Relationship Diagram (ERD)
D) Completely Automated Public Turing Test to Tell Computers and Humans Apart (CAPTCHA)
E) Organization for the Advancement of Structured Information Standards (OASIS)
سؤال
The act of cybercriminals to gain information on a victim by monitoring online activities,accessing databases,and making false accusations are forms of ________.

A) bot herding
B) cyberstalking
C) spam filtering
D) viral marketing
E) spear phishing
سؤال
When using Yahoo Messenger,Roger gets an unsolicited advertisement from a company.The advertisement contains a link to connect to the merchant's Web site.Which of the following is the most suitable way of describing this type of advertisement?

A) adware
B) cookie
C) Internet hoax
D) spam
E) cyber squatting
سؤال
Logic bombs are variations of a worm that can reproduce themselves to disrupt the normal functioning of a computer.
سؤال
________ are false messages circulated online about new viruses,earthquakes,kids in trouble,cancer causes,or any other topic of public interest.

A) Internet hoaxes
B) Honeypots
C) Cookies
D) Logic bombs
E) Malware
سؤال
Robert receives an e-mail which says that he has won an online lottery worth $50 billion.Robert has his doubts as he does not remember buying a lottery ticket.He finds out that it is a spam e-mail intended to obtain his bank account details and credit card number.Which of the following is evident here?

A) a logic bomb
B) hacktivism
C) phishing
D) tunneling
E) a worm
سؤال
Which of the following can be referred for a patent?

A) material inventions
B) software
C) music by an existing band
D) literature
E) art
سؤال
The term shoulder surfing refers to looking over one's shoulder while the person is keying in access information.
سؤال
________ refers to offering stolen proprietary software for free over the Internet.

A) Bot herding
B) Warez peddling
C) Spam filtering
D) Viral marketing
E) Spear phishing
سؤال
Fyroff consultants,a leading software consulting firm in the United States,decides to launch an Enterprise Resource Planning (ERP)solution.The company chooses the brand name FyroffEnterprise for the new solution.However,when the company attempts to register the domain name,it finds that a small unknown firm is already registered under the same domain name.The small firm is now attempting to sell the domain name to Fyroff.Which of the following terms refers to this practice of buying a domain name only to sell it for big bucks?

A) cybersquatting
B) logic bombing
C) cyberbullying
D) bot herding
E) cyberstalking
سؤال
________ is an attempt to trick financial account and credit card holders into giving away their authentication information,usually by sending spam messages to literally millions of e-mail accounts.

A) Phishing
B) Cyber tunneling
C) Viral marketing
D) Logic bombing
E) Hacking
سؤال
The term social engineering refers to misrepresenting oneself to trick others into revealing information.
سؤال
Which of the following is the most accurate definition of a botnet?

A) a fraudulent e-mail attack that targets a specific person or organization by personalizing the message
B) spider software used by a search algorithm to crawl various Web sites to return a query
C) a small text file passed to a Web browser on a user's computer by a Web server
D) a common platform used by search engines to index the contents of a Web site
E) destructive software robots working together on a collection of zombie computers via the Internet
سؤال
________ is a more sophisticated fraudulent e-mail attack that targets a specific person or organization by personalizing the message in order to make the message appear as if it is from a trusted source.

A) Spear phishing
B) Cyber tunneling
C) Viral marketing
D) Logic bombing
E) Hacking
سؤال
________ is the dubious practice of registering a domain name and then trying to sell the name for big bucks to the person,company,or organization most likely to want it.

A) Cybersquatting
B) Bot herding
C) Spear phishing
D) Logic bombing
E) Hacktivism
سؤال
________ refers to the use of a computer to communicate obscene,vulgar,or threatening content that causes a reasonable person to endure distress.

A) Cyberharassment
B) Viral marketing
C) Hacktivism
D) Bot herding
E) Spam filtering
سؤال
________ contains spyware that collects information about a person's Web surfing behavior in order to customize Web site banner advertisements.

A) Adware
B) Malware
C) Firmware
D) A cookie
E) A honeypot
سؤال
Which of the following examples can be considered as a violation for a copyright?

A) Apple's multitouch technology
B) music by an existing band
C) Amazon's one-click buying
D) mobile phones
E) tablets
سؤال
A ________ is a small text file passed to a Web browser on a user's computer by a Web server.

A) cookie
B) botnet
C) honeypot
D) worm
E) virus
سؤال
________ is the stealing of another person's Social Security number,credit card number,and other personal information for the purpose of using the victim's credit rating to borrow money,buy merchandise,and otherwise run up debts that are never repaid.

A) Logic bombing
B) Battery
C) Spear phishing
D) Bot herding
E) Identity theft
سؤال
The term dumpster diving refers to the task of modifying the operating system to remove manufacturer or carrier restrictions in order to run applications other than those from the official store.
سؤال
Spam filters are used to reduce the amount of spam processed by central e-mail servers.
سؤال
________ is the use of computer and networking technologies by individuals and organized groups against persons or property to intimidate or coerce governments.

A) Cyberterrorism
B) Cybersquatting
C) Cyberforensics
D) Cyberstalking
E) Cyberbullying
سؤال
________ by terrorists refers to the use of the vast amount of information available on the Internet regarding virtually any topic for planning,recruitment,and numerous other endeavors.

A) Data mining
B) Information dissemination
C) Location monitoring
D) Information sharing
E) Cybersquatting
سؤال
Making false accusations that damage the reputation of the victim on blogs,Web sites,chat rooms,or e-commerce sites is a form of cyberstalking.
سؤال
________ refers to an organized attempt by a country's military to disrupt or destroy the information and communication systems of another country.

A) Cyberwar
B) Internet hoaxing
C) Cybersquatting
D) Web vandalism
E) Logic bombing
سؤال
Patents generally refer to creations of the mind such as music,literature,or software.
سؤال
Cyberwar refers to an organized attempt by a country's military to disrupt or destroy the information and communication systems of another country.
سؤال
Briefly explain cyberwar and cyberterrorism.
سؤال
Briefly explain the concept of computer crime.
سؤال
A mass cyber attack occurred in a country when it took severe actions against a group of citizens who protested against the country's religious policies.The attack involved a denial-of-service in which selected sites were bombarded with traffic to force them offline.This is an example of ________.

A) cyberterrorism
B) logic bombing
C) cyberforensics
D) cyberbullying
E) cybersquatting
سؤال
What is unauthorized access? Provide a few examples for unauthorized access.
سؤال
Briefly explain cyberstalking and cybersquatting.
سؤال
Spyware is electronic junk mail or junk newsgroup postings usually posted for the purpose of advertising some product and/or service.
سؤال
Patriot hackers are independent citizens or supporters of a country that perpetrate attacks on perceived or real enemies.
سؤال
What are cookies? Do they pose a threat to users?
سؤال
Ransomware is a type of adware.
سؤال
Information dissemination refers to the use of Web sites to provide information for recruiting new members as well as utilizing more interactive Internet technologies.
سؤال
Compare and contrast computer viruses and a Trojan horse.
سؤال
Independent citizens or supporters of a country that perpetrate attacks on perceived or real enemies are called ________.

A) patriot hackers
B) bot herders
C) online predators
D) hacktivists
E) ethical hackers
سؤال
An organization takes active countermeasures to protect its systems,such as installing firewalls.This approach is known as ________.

A) risk reduction
B) risk acceptance
C) risk rescheduling
D) risk transference
E) risk elimination
سؤال
Which of the following is a valid observation about encryption?

A) Encrypted messages cannot be deciphered without the decoding key.
B) Encryption is used for data enhancement rather than data protection.
C) Encryption is performed only after messages enter the network.
D) The encryption approach is not dependent on the type of data transmission.
E) Encryption implementation is expensive and needs authentication from a relevant authority.
سؤال
With ________,employees may be identified by fingerprints,retinal patterns in the eye,facial features,or other bodily characteristics before being granted access to use a computer or to enter a facility.

A) CAPTCHAs
B) biometrics
C) passwords
D) ECHELONs
E) smart cards
سؤال
Albitrex Systems is an Asian software consulting firm that develops solutions for companies in the United States and Europe.The company is heavily dependent on the Internet for transporting data.It wants to ensure that only authorized users access the data and that the data is not intercepted and compromised.Which of the following would be most helpful to the company in achieving this goal?

A) spam filtering
B) hot back up
C) tunneling
D) open transmitting
E) cloud storage
سؤال
Ciscon Telecom is a mobile operator in the European Union.The company provides personalized services to its customers,and its databases contain valuable information about the customers.The loss of customer information that is used to decide services would be extremely harmful to the organization.Which of the following strategies adopted by Ciscon is an example of risk transference?

A) The company insures any possible data loss for a large sum.
B) The company forms a special team of top executives to monitor and correct the information policies.
C) It installs a corporate firewall to protect unauthorized access to information.
D) It enforces a strict employee data policy and prohibits employees from unauthorized access.
E) The company decides to absorb any damages that might occur.
سؤال
Which of the following terms refers to a computer,data,or network site that is designed to be enticing to crackers so as to detect,deflect,or counteract illegal activity?

A) honeypot
B) firewall
C) bot herder
D) botnet
E) zombie computer
سؤال
In ________,an attacker accesses the network,intercepts data from it,and even uses network services and/or sends attack instructions to it without having to enter the home,office,or organization that owns the network.

A) drive-by hacking
B) hacktivism
C) viral marketing
D) cybersquatting
E) denial-of-service
سؤال
Some data centers rent server space to multiple customers and provide necessary infrastructure in terms of power,backups,connectivity,and security.Such data centers are called ________.

A) collocation facilities
B) hot backup sites
C) virtual private networks
D) offshore networks
E) control centers
سؤال
________ is the use of formal investigative techniques to evaluate digital information for judicial review.

A) Computer forensics
B) Flaming
C) Hacktivism
D) Certificate authority
E) Encryption
سؤال
Information systems ________ is done to obtain an understanding of the threats to the confidentiality,integrity,and availability of data and systems.

A) risk assessment
B) quality testing
C) requirements analysis
D) security modeling
E) data processing
سؤال
Glassico Publishing is a leading media company in France.The company handles sensitive information and often finds it susceptible to information threats.As a countermeasure,the company installs strong firewalls and protective software.These steps are a part of ________.

A) risk acceptance
B) risk reduction
C) risk mitigation
D) risk transference
E) risk rescheduling
سؤال
________ refers to precautions taken to keep all aspects of information systems safe from destruction,manipulation,or unauthorized use or access.

A) Information systems security
B) Information systems resource
C) Information systems planning
D) Information systems audit
E) Information systems distribution
سؤال
The science of encryption is called ________.

A) cryptanalysis
B) cryptology
C) cryptography
D) cryptowall
E) cryptarithm
سؤال
Which of the following is a part of a computer system designed to detect intrusion and to prevent unauthorized access to or from a private network?

A) firewall
B) cookie
C) botnet
D) honeypot
E) spam filter
سؤال
An organization builds a fully equipped backup facility,having everything from office chairs to a one-to-one replication of the most current data.This facility is called a ________.

A) buying center
B) firewall
C) hot backup site
D) botnet
E) collocation facility
سؤال
When a company uses a fingerprint recognition system instead of access cards,it helps the company prevent unauthorized physical access.Which of the following technologies is used for authentication here?

A) biometrics
B) passwords
C) smart cards
D) access-control software
E) encryption
سؤال
A(n)________ is a network connection that is constructed dynamically within an existing network in order to connect users or nodes.

A) virtual private network
B) ambient network
C) cognitive network
D) collaborative service network
E) artificial network
سؤال
A ________ is nothing more than an empty warehouse with all necessary connections for power and communication but nothing else.

A) cold backup site
B) buying center
C) botnet
D) firewall
E) collocation facility
سؤال
An organization does not implement countermeasures against information threats; instead it simply absorbs the damages that occur.This approach is called ________.

A) risk acceptance
B) risk reduction
C) risk mitigation
D) risk transference
E) risk rescheduling
سؤال
Implementing encryption on a large scale,such as on a busy Web site,requires a third party,called a(n)________.

A) certificate authority
B) virtual private network
C) arbitrative authority
D) artificial network
E) buying center
فتح الحزمة
قم بالتسجيل لفتح البطاقات في هذه المجموعة!
Unlock Deck
Unlock Deck
1/103
auto play flashcards
العب
simple tutorial
ملء الشاشة (f)
exit full mode
Deck 10: Securing Information Systems
1
Some violations of state and federal computer crime laws are punishable by fines and by not more than one year in prison.Such violations are charged as ________.

A) misdemeanors
B) felonies
C) embezzlements
D) indictments
E) larcenies
A
2
Ronald downloads a movie from the Internet onto his company's computer.During this process,his system gets infected with a virus.The virus spreads rapidly in the company's network causing the server to crash.This type of virus is most likely to be ________.

A) adware
B) phishing mail
C) spam
D) a worm
E) a Trojan horse
D
3
Computers that are located in homes,schools,and businesses are infected with viruses or worms to create armies of zombie computers to execute ________ attacks.

A) digital marketing
B) malware
C) adware
D) denial-of-service
E) product-as-service
D
4
Identify a true statement about a vulnerability scanner.

A) It analyzes network traffic and captures unencrypted passwords.
B) It presents a view of long-term technology integration.
C) It tests targeted systems for weaknesses.
D) It presents a view of short-term technology integration.
E) It ensures high-quality leads when a search is conducted online.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 103 في هذه المجموعة.
فتح الحزمة
k this deck
5
People who break into computer systems with the intention of doing damage or committing a crime are called ________.

A) bots
B) white hats
C) worms
D) cyber spies
E) crackers
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 103 في هذه المجموعة.
فتح الحزمة
k this deck
6
Which of the following U.S.laws amended the Computer Fraud and Abuse Act to allow investigators to easily access voice-related communications?

A) the Non-Detention Act
B) the Espionage Act
C) the Patriot Act
D) the Video Privacy Protection Act
E) the Clery Act
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 103 في هذه المجموعة.
فتح الحزمة
k this deck
7
Violating data belonging to banks or other financial institutions is a crime in the United States.Which of the following legislations prohibit such violations?

A) the Foreign Intelligence Surveillance Act
B) the Computer Fraud and Abuse Act
C) the Patriot Act
D) the Glass-Steagall Act
E) the Electronic Communications Privacy Act
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 103 في هذه المجموعة.
فتح الحزمة
k this deck
8
Employees steal time on company computers to do personal business.This is an example of ________.

A) unauthorized access
B) hacking
C) vandalism
D) cyberstalking
E) functional inconvenience
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 103 في هذه المجموعة.
فتح الحزمة
k this deck
9
Which of the following terms refers to junk newsgroup postings used for the purpose of advertising for some product or service?

A) spam
B) adware
C) cookie
D) bot herder
E) Web filter
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 103 في هذه المجموعة.
فتح الحزمة
k this deck
10
The Computer Fraud and Abuse Act of 1986 prohibits ________.

A) accessing company intranet and confidential information from public computers
B) stealing or compromising data about national defense, foreign relations, atomic energy, or other restricted information
C) the use of external devices to provide access and information to companies' confidential information
D) signing contracts with consultants outside the United States to process information
E) access to companies' extranets when outsourcing work to clients overseas
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 103 في هذه المجموعة.
فتح الحزمة
k this deck
11
While adding information to the employee information database,Neil's computer crashed,and the entire database was erased.Which of the following types of viruses caused Neil's computer to crash?

A) spyware
B) worms
C) adware
D) logic bombs
E) encryption
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 103 في هذه المجموعة.
فتح الحزمة
k this deck
12
________ refers to any software that covertly gathers information about a user through an Internet connection without the user's knowledge.

A) Spyware
B) Spam
C) Web filter
D) Cookie
E) Bot herder
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 103 في هذه المجموعة.
فتح الحزمة
k this deck
13
________ targeted at networks is designed to spread by itself without the need for an infected host file to be shared.

A) Adware
B) Spyware
C) A worm
D) Spam
E) A logic bomb
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 103 في هذه المجموعة.
فتح الحزمة
k this deck
14
WikiLeaks is a famous not-for-profit whistleblower Web site.MasterCard and Visa stopped payments to WikiLeaks after a series of leaks by the site.An anonymous group attacked the Web sites of both MasterCard and Visa reacting to this.These Web vandals,who tried to protect WikiLeaks,are called ________.

A) hacktivists
B) bots
C) ethical hackers
D) patriot hackers
E) cyber soldiers
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 103 في هذه المجموعة.
فتح الحزمة
k this deck
15
The individuals who are knowledgeable enough to gain access to computer systems without authorization are referred to as ________.

A) hackers
B) bots
C) online predators
D) worms
E) power users
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 103 في هذه المجموعة.
فتح الحزمة
k this deck
16
Identify a true statement about a packet sniffer.

A) It is used to analyze network traffic.
B) It is used to test targeted systems for weaknesses.
C) It is used to break passwords using a brute-force approach.
D) It is used to capture encrypted passwords.
E) It is used to redirect web pages to different sites if any link fails.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 103 في هذه المجموعة.
فتح الحزمة
k this deck
17
Which of the following is one of the main federal laws against computer crimes in the United States?

A) Satellite Act of 1962
B) Trade Expansions Act of 1962
C) United States Information and Educational Exchange Act
D) Central Intelligence Agency Act
E) Electronic Communications Privacy Act of 1986
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 103 في هذه المجموعة.
فتح الحزمة
k this deck
18
Computer criminals who attempt to break into systems or deface Web sites to promote political or ideological goals are called ________.

A) hacktivists
B) crackers
C) social promoters
D) internet activists
E) online predators
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 103 في هذه المجموعة.
فتح الحزمة
k this deck
19
When Shelly downloaded an arcade game from an unknown Internet Web site,an unauthorized connection unknown to Shelly was established with her computer.The arcade game is most likely to be ________.

A) spyware
B) a worm
C) adware
D) a Trojan horse
E) encryption
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 103 في هذه المجموعة.
فتح الحزمة
k this deck
20
Which of the following is the most accurate definition of a computer crime?

A) the act of using a computer to commit an illegal act
B) the act of using someone's computer to browse the Internet
C) the act of using someone's computer to check e-mail
D) the act of stealing a computer and related hardware
E) the act of providing personal information to Web sites when shopping
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 103 في هذه المجموعة.
فتح الحزمة
k this deck
21
A(n)________ typically consists of a distorted image displaying a combination of letters and/or numbers that a user has to input into a form before submitting it.

A) American Standard Code for Information Interchange (ASCII)
B) Comprehensive TeX Archive Network (CTAN)
C) Entity-Relationship Diagram (ERD)
D) Completely Automated Public Turing Test to Tell Computers and Humans Apart (CAPTCHA)
E) Organization for the Advancement of Structured Information Standards (OASIS)
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 103 في هذه المجموعة.
فتح الحزمة
k this deck
22
The act of cybercriminals to gain information on a victim by monitoring online activities,accessing databases,and making false accusations are forms of ________.

A) bot herding
B) cyberstalking
C) spam filtering
D) viral marketing
E) spear phishing
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 103 في هذه المجموعة.
فتح الحزمة
k this deck
23
When using Yahoo Messenger,Roger gets an unsolicited advertisement from a company.The advertisement contains a link to connect to the merchant's Web site.Which of the following is the most suitable way of describing this type of advertisement?

A) adware
B) cookie
C) Internet hoax
D) spam
E) cyber squatting
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 103 في هذه المجموعة.
فتح الحزمة
k this deck
24
Logic bombs are variations of a worm that can reproduce themselves to disrupt the normal functioning of a computer.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 103 في هذه المجموعة.
فتح الحزمة
k this deck
25
________ are false messages circulated online about new viruses,earthquakes,kids in trouble,cancer causes,or any other topic of public interest.

A) Internet hoaxes
B) Honeypots
C) Cookies
D) Logic bombs
E) Malware
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 103 في هذه المجموعة.
فتح الحزمة
k this deck
26
Robert receives an e-mail which says that he has won an online lottery worth $50 billion.Robert has his doubts as he does not remember buying a lottery ticket.He finds out that it is a spam e-mail intended to obtain his bank account details and credit card number.Which of the following is evident here?

A) a logic bomb
B) hacktivism
C) phishing
D) tunneling
E) a worm
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 103 في هذه المجموعة.
فتح الحزمة
k this deck
27
Which of the following can be referred for a patent?

A) material inventions
B) software
C) music by an existing band
D) literature
E) art
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 103 في هذه المجموعة.
فتح الحزمة
k this deck
28
The term shoulder surfing refers to looking over one's shoulder while the person is keying in access information.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 103 في هذه المجموعة.
فتح الحزمة
k this deck
29
________ refers to offering stolen proprietary software for free over the Internet.

A) Bot herding
B) Warez peddling
C) Spam filtering
D) Viral marketing
E) Spear phishing
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 103 في هذه المجموعة.
فتح الحزمة
k this deck
30
Fyroff consultants,a leading software consulting firm in the United States,decides to launch an Enterprise Resource Planning (ERP)solution.The company chooses the brand name FyroffEnterprise for the new solution.However,when the company attempts to register the domain name,it finds that a small unknown firm is already registered under the same domain name.The small firm is now attempting to sell the domain name to Fyroff.Which of the following terms refers to this practice of buying a domain name only to sell it for big bucks?

A) cybersquatting
B) logic bombing
C) cyberbullying
D) bot herding
E) cyberstalking
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 103 في هذه المجموعة.
فتح الحزمة
k this deck
31
________ is an attempt to trick financial account and credit card holders into giving away their authentication information,usually by sending spam messages to literally millions of e-mail accounts.

A) Phishing
B) Cyber tunneling
C) Viral marketing
D) Logic bombing
E) Hacking
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 103 في هذه المجموعة.
فتح الحزمة
k this deck
32
The term social engineering refers to misrepresenting oneself to trick others into revealing information.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 103 في هذه المجموعة.
فتح الحزمة
k this deck
33
Which of the following is the most accurate definition of a botnet?

A) a fraudulent e-mail attack that targets a specific person or organization by personalizing the message
B) spider software used by a search algorithm to crawl various Web sites to return a query
C) a small text file passed to a Web browser on a user's computer by a Web server
D) a common platform used by search engines to index the contents of a Web site
E) destructive software robots working together on a collection of zombie computers via the Internet
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 103 في هذه المجموعة.
فتح الحزمة
k this deck
34
________ is a more sophisticated fraudulent e-mail attack that targets a specific person or organization by personalizing the message in order to make the message appear as if it is from a trusted source.

A) Spear phishing
B) Cyber tunneling
C) Viral marketing
D) Logic bombing
E) Hacking
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 103 في هذه المجموعة.
فتح الحزمة
k this deck
35
________ is the dubious practice of registering a domain name and then trying to sell the name for big bucks to the person,company,or organization most likely to want it.

A) Cybersquatting
B) Bot herding
C) Spear phishing
D) Logic bombing
E) Hacktivism
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 103 في هذه المجموعة.
فتح الحزمة
k this deck
36
________ refers to the use of a computer to communicate obscene,vulgar,or threatening content that causes a reasonable person to endure distress.

A) Cyberharassment
B) Viral marketing
C) Hacktivism
D) Bot herding
E) Spam filtering
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 103 في هذه المجموعة.
فتح الحزمة
k this deck
37
________ contains spyware that collects information about a person's Web surfing behavior in order to customize Web site banner advertisements.

A) Adware
B) Malware
C) Firmware
D) A cookie
E) A honeypot
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 103 في هذه المجموعة.
فتح الحزمة
k this deck
38
Which of the following examples can be considered as a violation for a copyright?

A) Apple's multitouch technology
B) music by an existing band
C) Amazon's one-click buying
D) mobile phones
E) tablets
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 103 في هذه المجموعة.
فتح الحزمة
k this deck
39
A ________ is a small text file passed to a Web browser on a user's computer by a Web server.

A) cookie
B) botnet
C) honeypot
D) worm
E) virus
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 103 في هذه المجموعة.
فتح الحزمة
k this deck
40
________ is the stealing of another person's Social Security number,credit card number,and other personal information for the purpose of using the victim's credit rating to borrow money,buy merchandise,and otherwise run up debts that are never repaid.

A) Logic bombing
B) Battery
C) Spear phishing
D) Bot herding
E) Identity theft
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 103 في هذه المجموعة.
فتح الحزمة
k this deck
41
The term dumpster diving refers to the task of modifying the operating system to remove manufacturer or carrier restrictions in order to run applications other than those from the official store.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 103 في هذه المجموعة.
فتح الحزمة
k this deck
42
Spam filters are used to reduce the amount of spam processed by central e-mail servers.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 103 في هذه المجموعة.
فتح الحزمة
k this deck
43
________ is the use of computer and networking technologies by individuals and organized groups against persons or property to intimidate or coerce governments.

A) Cyberterrorism
B) Cybersquatting
C) Cyberforensics
D) Cyberstalking
E) Cyberbullying
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 103 في هذه المجموعة.
فتح الحزمة
k this deck
44
________ by terrorists refers to the use of the vast amount of information available on the Internet regarding virtually any topic for planning,recruitment,and numerous other endeavors.

A) Data mining
B) Information dissemination
C) Location monitoring
D) Information sharing
E) Cybersquatting
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 103 في هذه المجموعة.
فتح الحزمة
k this deck
45
Making false accusations that damage the reputation of the victim on blogs,Web sites,chat rooms,or e-commerce sites is a form of cyberstalking.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 103 في هذه المجموعة.
فتح الحزمة
k this deck
46
________ refers to an organized attempt by a country's military to disrupt or destroy the information and communication systems of another country.

A) Cyberwar
B) Internet hoaxing
C) Cybersquatting
D) Web vandalism
E) Logic bombing
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 103 في هذه المجموعة.
فتح الحزمة
k this deck
47
Patents generally refer to creations of the mind such as music,literature,or software.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 103 في هذه المجموعة.
فتح الحزمة
k this deck
48
Cyberwar refers to an organized attempt by a country's military to disrupt or destroy the information and communication systems of another country.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 103 في هذه المجموعة.
فتح الحزمة
k this deck
49
Briefly explain cyberwar and cyberterrorism.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 103 في هذه المجموعة.
فتح الحزمة
k this deck
50
Briefly explain the concept of computer crime.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 103 في هذه المجموعة.
فتح الحزمة
k this deck
51
A mass cyber attack occurred in a country when it took severe actions against a group of citizens who protested against the country's religious policies.The attack involved a denial-of-service in which selected sites were bombarded with traffic to force them offline.This is an example of ________.

A) cyberterrorism
B) logic bombing
C) cyberforensics
D) cyberbullying
E) cybersquatting
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 103 في هذه المجموعة.
فتح الحزمة
k this deck
52
What is unauthorized access? Provide a few examples for unauthorized access.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 103 في هذه المجموعة.
فتح الحزمة
k this deck
53
Briefly explain cyberstalking and cybersquatting.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 103 في هذه المجموعة.
فتح الحزمة
k this deck
54
Spyware is electronic junk mail or junk newsgroup postings usually posted for the purpose of advertising some product and/or service.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 103 في هذه المجموعة.
فتح الحزمة
k this deck
55
Patriot hackers are independent citizens or supporters of a country that perpetrate attacks on perceived or real enemies.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 103 في هذه المجموعة.
فتح الحزمة
k this deck
56
What are cookies? Do they pose a threat to users?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 103 في هذه المجموعة.
فتح الحزمة
k this deck
57
Ransomware is a type of adware.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 103 في هذه المجموعة.
فتح الحزمة
k this deck
58
Information dissemination refers to the use of Web sites to provide information for recruiting new members as well as utilizing more interactive Internet technologies.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 103 في هذه المجموعة.
فتح الحزمة
k this deck
59
Compare and contrast computer viruses and a Trojan horse.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 103 في هذه المجموعة.
فتح الحزمة
k this deck
60
Independent citizens or supporters of a country that perpetrate attacks on perceived or real enemies are called ________.

A) patriot hackers
B) bot herders
C) online predators
D) hacktivists
E) ethical hackers
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 103 في هذه المجموعة.
فتح الحزمة
k this deck
61
An organization takes active countermeasures to protect its systems,such as installing firewalls.This approach is known as ________.

A) risk reduction
B) risk acceptance
C) risk rescheduling
D) risk transference
E) risk elimination
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 103 في هذه المجموعة.
فتح الحزمة
k this deck
62
Which of the following is a valid observation about encryption?

A) Encrypted messages cannot be deciphered without the decoding key.
B) Encryption is used for data enhancement rather than data protection.
C) Encryption is performed only after messages enter the network.
D) The encryption approach is not dependent on the type of data transmission.
E) Encryption implementation is expensive and needs authentication from a relevant authority.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 103 في هذه المجموعة.
فتح الحزمة
k this deck
63
With ________,employees may be identified by fingerprints,retinal patterns in the eye,facial features,or other bodily characteristics before being granted access to use a computer or to enter a facility.

A) CAPTCHAs
B) biometrics
C) passwords
D) ECHELONs
E) smart cards
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 103 في هذه المجموعة.
فتح الحزمة
k this deck
64
Albitrex Systems is an Asian software consulting firm that develops solutions for companies in the United States and Europe.The company is heavily dependent on the Internet for transporting data.It wants to ensure that only authorized users access the data and that the data is not intercepted and compromised.Which of the following would be most helpful to the company in achieving this goal?

A) spam filtering
B) hot back up
C) tunneling
D) open transmitting
E) cloud storage
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 103 في هذه المجموعة.
فتح الحزمة
k this deck
65
Ciscon Telecom is a mobile operator in the European Union.The company provides personalized services to its customers,and its databases contain valuable information about the customers.The loss of customer information that is used to decide services would be extremely harmful to the organization.Which of the following strategies adopted by Ciscon is an example of risk transference?

A) The company insures any possible data loss for a large sum.
B) The company forms a special team of top executives to monitor and correct the information policies.
C) It installs a corporate firewall to protect unauthorized access to information.
D) It enforces a strict employee data policy and prohibits employees from unauthorized access.
E) The company decides to absorb any damages that might occur.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 103 في هذه المجموعة.
فتح الحزمة
k this deck
66
Which of the following terms refers to a computer,data,or network site that is designed to be enticing to crackers so as to detect,deflect,or counteract illegal activity?

A) honeypot
B) firewall
C) bot herder
D) botnet
E) zombie computer
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 103 في هذه المجموعة.
فتح الحزمة
k this deck
67
In ________,an attacker accesses the network,intercepts data from it,and even uses network services and/or sends attack instructions to it without having to enter the home,office,or organization that owns the network.

A) drive-by hacking
B) hacktivism
C) viral marketing
D) cybersquatting
E) denial-of-service
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 103 في هذه المجموعة.
فتح الحزمة
k this deck
68
Some data centers rent server space to multiple customers and provide necessary infrastructure in terms of power,backups,connectivity,and security.Such data centers are called ________.

A) collocation facilities
B) hot backup sites
C) virtual private networks
D) offshore networks
E) control centers
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 103 في هذه المجموعة.
فتح الحزمة
k this deck
69
________ is the use of formal investigative techniques to evaluate digital information for judicial review.

A) Computer forensics
B) Flaming
C) Hacktivism
D) Certificate authority
E) Encryption
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 103 في هذه المجموعة.
فتح الحزمة
k this deck
70
Information systems ________ is done to obtain an understanding of the threats to the confidentiality,integrity,and availability of data and systems.

A) risk assessment
B) quality testing
C) requirements analysis
D) security modeling
E) data processing
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 103 في هذه المجموعة.
فتح الحزمة
k this deck
71
Glassico Publishing is a leading media company in France.The company handles sensitive information and often finds it susceptible to information threats.As a countermeasure,the company installs strong firewalls and protective software.These steps are a part of ________.

A) risk acceptance
B) risk reduction
C) risk mitigation
D) risk transference
E) risk rescheduling
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 103 في هذه المجموعة.
فتح الحزمة
k this deck
72
________ refers to precautions taken to keep all aspects of information systems safe from destruction,manipulation,or unauthorized use or access.

A) Information systems security
B) Information systems resource
C) Information systems planning
D) Information systems audit
E) Information systems distribution
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 103 في هذه المجموعة.
فتح الحزمة
k this deck
73
The science of encryption is called ________.

A) cryptanalysis
B) cryptology
C) cryptography
D) cryptowall
E) cryptarithm
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 103 في هذه المجموعة.
فتح الحزمة
k this deck
74
Which of the following is a part of a computer system designed to detect intrusion and to prevent unauthorized access to or from a private network?

A) firewall
B) cookie
C) botnet
D) honeypot
E) spam filter
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 103 في هذه المجموعة.
فتح الحزمة
k this deck
75
An organization builds a fully equipped backup facility,having everything from office chairs to a one-to-one replication of the most current data.This facility is called a ________.

A) buying center
B) firewall
C) hot backup site
D) botnet
E) collocation facility
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 103 في هذه المجموعة.
فتح الحزمة
k this deck
76
When a company uses a fingerprint recognition system instead of access cards,it helps the company prevent unauthorized physical access.Which of the following technologies is used for authentication here?

A) biometrics
B) passwords
C) smart cards
D) access-control software
E) encryption
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 103 في هذه المجموعة.
فتح الحزمة
k this deck
77
A(n)________ is a network connection that is constructed dynamically within an existing network in order to connect users or nodes.

A) virtual private network
B) ambient network
C) cognitive network
D) collaborative service network
E) artificial network
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 103 في هذه المجموعة.
فتح الحزمة
k this deck
78
A ________ is nothing more than an empty warehouse with all necessary connections for power and communication but nothing else.

A) cold backup site
B) buying center
C) botnet
D) firewall
E) collocation facility
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 103 في هذه المجموعة.
فتح الحزمة
k this deck
79
An organization does not implement countermeasures against information threats; instead it simply absorbs the damages that occur.This approach is called ________.

A) risk acceptance
B) risk reduction
C) risk mitigation
D) risk transference
E) risk rescheduling
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 103 في هذه المجموعة.
فتح الحزمة
k this deck
80
Implementing encryption on a large scale,such as on a busy Web site,requires a third party,called a(n)________.

A) certificate authority
B) virtual private network
C) arbitrative authority
D) artificial network
E) buying center
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 103 في هذه المجموعة.
فتح الحزمة
k this deck
locked card icon
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 103 في هذه المجموعة.