Deck 4: Basic Information Security Model

ملء الشاشة (f)
exit full mode
سؤال
Vulnerabilities are

A) Safeguards used to minimize the impact of threats
B) Capabilities, intentions and attack methods of adversaries to cause harm to assets
C) Resource or information that is to be protected
D) Weaknesses in an information system that can lead to a compromise of an asset
استخدم زر المسافة أو
up arrow
down arrow
لقلب البطاقة.
سؤال
Assets are

A) Resources or information that is to be protected
B) Safeguards used to minimize the impact of threats
C) Capabilities, intentions and attack methods of adversaries to cause harm to assets
D) Weaknesses in an information system that can lead to a compromise of an asset
سؤال
Models are useful because

A) They highlight resource or information that is to be protected
B) They highlight weaknesses in information systems that can be compromised
C) They draw attention to the essential details of a problem
D) They describe safeguards used to minimize the impact of threats
سؤال
An unrestricted uploads vulnerability refers to a situation where

A) Files are accepted as input without verifying their specifications
B) Input from other users is supplied as output to other users
C) A program puts more data into a storage location than it can hold
D) User input is used without confirming its validity
سؤال
Phishing refers to

A) Programs that propagate through the network without a user's consent
B) Unauthorized prevention of access to resources
C) Attempting to compromise a user by masquerading as a trustworthy entity in electronic communication
D) Code specifically designed to exploit a computer or data, without the user's consent
سؤال
A SQL injection vulnerability is an example of a

A) Unrestricted uploads vulnerability
B) Cross-site scripting vulnerability
C) Buffer overflow vulnerability
D) Lack of input validation vulnerability
سؤال
Zeus and Spyeye are examples of

A) Viruses
B) Vulnerabilities
C) IDEs to create new attacks
D) Systems to defend against attacks
سؤال
Controls are

A) Safeguards used to minimize the impact of threats
B) Capabilities, intentions and attack methods of adversaries to cause harm to assets
C) Resource or information that is to be protected
D) Weaknesses in an information system that can lead to a compromise of an asset
سؤال
The NVD database

A) Describes likely impacts and measures to remove vulnerabilities
B) A list of all known viruses
C) A list of all known information security firms
D) An inventory of known software vulnerabilities
سؤال
A missing authorization vulnerability refers to a situation where

A) Users are allowed access to privileged parts of a program without verification of credentials
B) Input from other users is supplied as output to other users
C) A program puts more data into a storage location than it can hold
D) User input is used without confirming its validity
سؤال
A cross-site scripting vulnerability can occur when

A) Files are accepted as input without verifying their specifications
B) Input from other users is supplied as output to other users
C) A program puts more data into a storage location than it can hold
D) User input is used without confirming its validity
سؤال
Vulnerabilities in IT systems can be eliminated through secure coding practices
سؤال
A buffer overflow vulnerability refers to a situation where

A) Files are accepted as input without verifying their specifications
B) Input from other users is supplied as output to other users
C) A program puts more data into a storage location than it can hold
D) User input is used without confirming its validity
سؤال
The CVE list is

A) A list of all likely impacts of vulnerabilities
B) A list of all known viruses
C) A list of all known information security firms
D) An inventory of known software vulnerabilities
سؤال
Relative to physical security, information security is challenging because

A) Assets are largely invisible
B) Most assets are easily duplicated
C) Both the above
D) None of the above
سؤال
Threats are

A) Safeguards used to minimize the impact of threats
B) Capabilities, intentions and attack methods of adversaries to cause harm to assets
C) Resource or information that is to be protected
D) Weaknesses in an information system that can lead to a compromise of an asset
سؤال
As reported in the chapter, recent trends in vulnerabilities and threats indicate that

A) Increasing numbers of new vulnerabilities are being discovered, and the number of attacks is also going up
B) Decreasing numbers of new vulnerabilities are being discovered, but the number of attacks is going up
C) Decreasing numbers of new vulnerabilities are being discovered, and the number of attacks is also going down
D) Increasing numbers of new vulnerabilities are being discovered, but the number of attacks is going down
سؤال
Denial of service refers to

A) Programs that propagate through the network without a user's consent
B) Unauthorized prevention of access to resources
C) Attempting to compromise a user by masquerading as a trustworthy entity in electronic communication
D) Code specifically designed to exploit a computer or data, without the user's consent
سؤال
Malware refers to

A) Programs that propagate through the network without a user's consent
B) Unauthorized prevention of access to resources
C) Attempting to compromise a user by masquerading as a trustworthy entity in electronic communication
D) Code specifically designed to exploit a computer or data, without the user's consent
سؤال
A lack of input validation vulnerability refers to a situation where

A) Files are accepted as input without verifying their specifications
B) Input from other users is supplied as output to other users
C) A program puts more data into a storage location than it can hold
D) User input is used without confirming its validity
سؤال
Zombies are

A) Software used to hide the existence of malicious software on computer systems
B) Exploits that compromise a previously unknown software vulnerability
C) Computers that perform malicious tasks at the direction of a remote controller
D) Manipulating people into performing desired actions
سؤال
Zero-day exploits are

A) Software used to hide the existence of malicious software on computer systems
B) Exploits that compromise a previously unknown software vulnerability
C) Computers that perform malicious tasks at the direction of a remote controller
D) Manipulating people into performing desired actions
سؤال
Physical controls

A) Use non-technical methods of preventing harm
B) Are the security measures built into the information system itself
C) Perform malicious tasks at the direction of a remote controller
D) Manipulate people into performing desired actions
سؤال
Rootkits are

A) Software used to hide the existence of malicious software on computer systems
B) Exploits that compromise a previously unknown software vulnerability
C) Computers that perform malicious tasks at the direction of a remote controller
D) Manipulating people into performing desired actions
سؤال
Social engineering is

A) Software used to hide the existence of malicious software on computer systems
B) Exploits that compromise a previously unknown software vulnerability
C) Computers that perform malicious tasks at the direction of a remote controller
D) Manipulating people into performing desired actions
فتح الحزمة
قم بالتسجيل لفتح البطاقات في هذه المجموعة!
Unlock Deck
Unlock Deck
1/25
auto play flashcards
العب
simple tutorial
ملء الشاشة (f)
exit full mode
Deck 4: Basic Information Security Model
1
Vulnerabilities are

A) Safeguards used to minimize the impact of threats
B) Capabilities, intentions and attack methods of adversaries to cause harm to assets
C) Resource or information that is to be protected
D) Weaknesses in an information system that can lead to a compromise of an asset
D
2
Assets are

A) Resources or information that is to be protected
B) Safeguards used to minimize the impact of threats
C) Capabilities, intentions and attack methods of adversaries to cause harm to assets
D) Weaknesses in an information system that can lead to a compromise of an asset
A
3
Models are useful because

A) They highlight resource or information that is to be protected
B) They highlight weaknesses in information systems that can be compromised
C) They draw attention to the essential details of a problem
D) They describe safeguards used to minimize the impact of threats
C
4
An unrestricted uploads vulnerability refers to a situation where

A) Files are accepted as input without verifying their specifications
B) Input from other users is supplied as output to other users
C) A program puts more data into a storage location than it can hold
D) User input is used without confirming its validity
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 25 في هذه المجموعة.
فتح الحزمة
k this deck
5
Phishing refers to

A) Programs that propagate through the network without a user's consent
B) Unauthorized prevention of access to resources
C) Attempting to compromise a user by masquerading as a trustworthy entity in electronic communication
D) Code specifically designed to exploit a computer or data, without the user's consent
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 25 في هذه المجموعة.
فتح الحزمة
k this deck
6
A SQL injection vulnerability is an example of a

A) Unrestricted uploads vulnerability
B) Cross-site scripting vulnerability
C) Buffer overflow vulnerability
D) Lack of input validation vulnerability
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 25 في هذه المجموعة.
فتح الحزمة
k this deck
7
Zeus and Spyeye are examples of

A) Viruses
B) Vulnerabilities
C) IDEs to create new attacks
D) Systems to defend against attacks
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 25 في هذه المجموعة.
فتح الحزمة
k this deck
8
Controls are

A) Safeguards used to minimize the impact of threats
B) Capabilities, intentions and attack methods of adversaries to cause harm to assets
C) Resource or information that is to be protected
D) Weaknesses in an information system that can lead to a compromise of an asset
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 25 في هذه المجموعة.
فتح الحزمة
k this deck
9
The NVD database

A) Describes likely impacts and measures to remove vulnerabilities
B) A list of all known viruses
C) A list of all known information security firms
D) An inventory of known software vulnerabilities
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 25 في هذه المجموعة.
فتح الحزمة
k this deck
10
A missing authorization vulnerability refers to a situation where

A) Users are allowed access to privileged parts of a program without verification of credentials
B) Input from other users is supplied as output to other users
C) A program puts more data into a storage location than it can hold
D) User input is used without confirming its validity
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 25 في هذه المجموعة.
فتح الحزمة
k this deck
11
A cross-site scripting vulnerability can occur when

A) Files are accepted as input without verifying their specifications
B) Input from other users is supplied as output to other users
C) A program puts more data into a storage location than it can hold
D) User input is used without confirming its validity
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 25 في هذه المجموعة.
فتح الحزمة
k this deck
12
Vulnerabilities in IT systems can be eliminated through secure coding practices
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 25 في هذه المجموعة.
فتح الحزمة
k this deck
13
A buffer overflow vulnerability refers to a situation where

A) Files are accepted as input without verifying their specifications
B) Input from other users is supplied as output to other users
C) A program puts more data into a storage location than it can hold
D) User input is used without confirming its validity
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 25 في هذه المجموعة.
فتح الحزمة
k this deck
14
The CVE list is

A) A list of all likely impacts of vulnerabilities
B) A list of all known viruses
C) A list of all known information security firms
D) An inventory of known software vulnerabilities
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 25 في هذه المجموعة.
فتح الحزمة
k this deck
15
Relative to physical security, information security is challenging because

A) Assets are largely invisible
B) Most assets are easily duplicated
C) Both the above
D) None of the above
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 25 في هذه المجموعة.
فتح الحزمة
k this deck
16
Threats are

A) Safeguards used to minimize the impact of threats
B) Capabilities, intentions and attack methods of adversaries to cause harm to assets
C) Resource or information that is to be protected
D) Weaknesses in an information system that can lead to a compromise of an asset
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 25 في هذه المجموعة.
فتح الحزمة
k this deck
17
As reported in the chapter, recent trends in vulnerabilities and threats indicate that

A) Increasing numbers of new vulnerabilities are being discovered, and the number of attacks is also going up
B) Decreasing numbers of new vulnerabilities are being discovered, but the number of attacks is going up
C) Decreasing numbers of new vulnerabilities are being discovered, and the number of attacks is also going down
D) Increasing numbers of new vulnerabilities are being discovered, but the number of attacks is going down
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 25 في هذه المجموعة.
فتح الحزمة
k this deck
18
Denial of service refers to

A) Programs that propagate through the network without a user's consent
B) Unauthorized prevention of access to resources
C) Attempting to compromise a user by masquerading as a trustworthy entity in electronic communication
D) Code specifically designed to exploit a computer or data, without the user's consent
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 25 في هذه المجموعة.
فتح الحزمة
k this deck
19
Malware refers to

A) Programs that propagate through the network without a user's consent
B) Unauthorized prevention of access to resources
C) Attempting to compromise a user by masquerading as a trustworthy entity in electronic communication
D) Code specifically designed to exploit a computer or data, without the user's consent
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 25 في هذه المجموعة.
فتح الحزمة
k this deck
20
A lack of input validation vulnerability refers to a situation where

A) Files are accepted as input without verifying their specifications
B) Input from other users is supplied as output to other users
C) A program puts more data into a storage location than it can hold
D) User input is used without confirming its validity
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 25 في هذه المجموعة.
فتح الحزمة
k this deck
21
Zombies are

A) Software used to hide the existence of malicious software on computer systems
B) Exploits that compromise a previously unknown software vulnerability
C) Computers that perform malicious tasks at the direction of a remote controller
D) Manipulating people into performing desired actions
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 25 في هذه المجموعة.
فتح الحزمة
k this deck
22
Zero-day exploits are

A) Software used to hide the existence of malicious software on computer systems
B) Exploits that compromise a previously unknown software vulnerability
C) Computers that perform malicious tasks at the direction of a remote controller
D) Manipulating people into performing desired actions
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 25 في هذه المجموعة.
فتح الحزمة
k this deck
23
Physical controls

A) Use non-technical methods of preventing harm
B) Are the security measures built into the information system itself
C) Perform malicious tasks at the direction of a remote controller
D) Manipulate people into performing desired actions
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 25 في هذه المجموعة.
فتح الحزمة
k this deck
24
Rootkits are

A) Software used to hide the existence of malicious software on computer systems
B) Exploits that compromise a previously unknown software vulnerability
C) Computers that perform malicious tasks at the direction of a remote controller
D) Manipulating people into performing desired actions
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 25 في هذه المجموعة.
فتح الحزمة
k this deck
25
Social engineering is

A) Software used to hide the existence of malicious software on computer systems
B) Exploits that compromise a previously unknown software vulnerability
C) Computers that perform malicious tasks at the direction of a remote controller
D) Manipulating people into performing desired actions
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 25 في هذه المجموعة.
فتح الحزمة
k this deck
locked card icon
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 25 في هذه المجموعة.