Deck 12: Information Security Management
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/93
Play
Full screen (f)
Deck 12: Information Security Management
1
During which of the following computer crimes does a password cracker try every possible combination of characters?
A) DOS attack
B) brute force attack
C) pretexting
D) sniffing
A) DOS attack
B) brute force attack
C) pretexting
D) sniffing
B
2
Which of the following is a technical safeguard against security threats?
A) passwords
B) backup and recovery
C) compliance
D) identification and authorization
A) passwords
B) backup and recovery
C) compliance
D) identification and authorization
D
3
Which of the following types of security loss is WikiLeaks an example of?
A) unauthorized data disclosure
B) incorrect data modification
C) faulty service
D) denial of service
A) unauthorized data disclosure
B) incorrect data modification
C) faulty service
D) denial of service
A
4
A(n)________ is a computer program that senses when another computer is attempting to scan a disk or access a computer.
A) intrusion detection system
B) account administration system
C) business intelligence system
D) malware definition
A) intrusion detection system
B) account administration system
C) business intelligence system
D) malware definition
Unlock Deck
Unlock for access to all 93 flashcards in this deck.
Unlock Deck
k this deck
5
Which of the following is considered a personal security safeguard?
A) create backup of cookies and temporary files
B) send no valuable data via email or IM
C) use a single valid password for all accounts
D) conduct transactions using http rather than https
A) create backup of cookies and temporary files
B) send no valuable data via email or IM
C) use a single valid password for all accounts
D) conduct transactions using http rather than https
Unlock Deck
Unlock for access to all 93 flashcards in this deck.
Unlock Deck
k this deck
6
Which of the following is a synonym for phishing?
A) drive-by sniffing
B) email spoofing
C) IP spoofing
D) system hacking
A) drive-by sniffing
B) email spoofing
C) IP spoofing
D) system hacking
Unlock Deck
Unlock for access to all 93 flashcards in this deck.
Unlock Deck
k this deck
7
________ occurs when computer criminals invade a computer system and replace legitimate programs with their own unauthorized ones.
A) Usurpation
B) Encryption
C) Spoofing
D) Sniffing
A) Usurpation
B) Encryption
C) Spoofing
D) Sniffing
Unlock Deck
Unlock for access to all 93 flashcards in this deck.
Unlock Deck
k this deck
8
Mark receives an email from his bank asking him to update and verify his credit card details.He replies to the mail with all the requested details.Mark later learns that the mail was not actually sent by his bank and that the information he had shared has been misused.Mark is a victim of ________.
A) hacking
B) sniffing
C) data mining
D) phishing
A) hacking
B) sniffing
C) data mining
D) phishing
Unlock Deck
Unlock for access to all 93 flashcards in this deck.
Unlock Deck
k this deck
9
________ is a technique for intercepting computer communications.
A) Spoofing
B) Hacking
C) Pretexting
D) Sniffing
A) Spoofing
B) Hacking
C) Pretexting
D) Sniffing
Unlock Deck
Unlock for access to all 93 flashcards in this deck.
Unlock Deck
k this deck
10
A person calls the Stark residence and pretends to represent a credit card company.He asks Mrs.Stark to confirm her credit card number.This is an example of ________.
A) hacking
B) data mining
C) pretexting
D) sniffing
A) hacking
B) data mining
C) pretexting
D) sniffing
Unlock Deck
Unlock for access to all 93 flashcards in this deck.
Unlock Deck
k this deck
11
________ are small files that browsers store on users' computers when they visit Web sites.
A) Cookies
B) Viral hooks
C) Mashups
D) Keys
A) Cookies
B) Viral hooks
C) Mashups
D) Keys
Unlock Deck
Unlock for access to all 93 flashcards in this deck.
Unlock Deck
k this deck
12
________ take computers with wireless connections through an area and search for unprotected wireless networks.
A) Drive-by sniffers
B) Key punchers
C) Hackers
D) Phishers
A) Drive-by sniffers
B) Key punchers
C) Hackers
D) Phishers
Unlock Deck
Unlock for access to all 93 flashcards in this deck.
Unlock Deck
k this deck
13
Which of the following is a data safeguard against security threats?
A) application design
B) dissemination of information
C) physical security
D) malware protection
A) application design
B) dissemination of information
C) physical security
D) malware protection
Unlock Deck
Unlock for access to all 93 flashcards in this deck.
Unlock Deck
k this deck
14
Which of the following statements is true of the financial losses due to computer security threats?
A) All studies on costs of computer crimes are based on unobtrusive research.
B) There are several set standards for tallying computer crime costs and financial losses.
C) The financial losses faced by companies due to human error are enormous.
D) Damages caused by natural disasters are minimal when compared to the damages due to human errors.
A) All studies on costs of computer crimes are based on unobtrusive research.
B) There are several set standards for tallying computer crime costs and financial losses.
C) The financial losses faced by companies due to human error are enormous.
D) Damages caused by natural disasters are minimal when compared to the damages due to human errors.
Unlock Deck
Unlock for access to all 93 flashcards in this deck.
Unlock Deck
k this deck
15
A(n)________ is a measure that individuals or organizations take to block a threat from obtaining an asset.
A) Hadoop
B) safeguard
C) information silo
D) third-party cookie
A) Hadoop
B) safeguard
C) information silo
D) third-party cookie
Unlock Deck
Unlock for access to all 93 flashcards in this deck.
Unlock Deck
k this deck
16
Breaking into computers,servers,or networks to steal proprietary and confidential data is referred to as ________.
A) usurpation
B) spoofing
C) hacking
D) sniffing
A) usurpation
B) spoofing
C) hacking
D) sniffing
Unlock Deck
Unlock for access to all 93 flashcards in this deck.
Unlock Deck
k this deck
17
Which of the following is a human safeguard against security threats?
A) backup and recovery
B) firewalls
C) physical security
D) procedure design
A) backup and recovery
B) firewalls
C) physical security
D) procedure design
Unlock Deck
Unlock for access to all 93 flashcards in this deck.
Unlock Deck
k this deck
18
A ________ pretends to be a legitimate company and sends emails requesting confidential data.
A) hacker
B) phisher
C) drive-by sniffer
D) key puncher
A) hacker
B) phisher
C) drive-by sniffer
D) key puncher
Unlock Deck
Unlock for access to all 93 flashcards in this deck.
Unlock Deck
k this deck
19
Which of the following occurs when millions of bogus service requests flood a Web server and prevent it from servicing legitimate requests?
A) spoofing
B) hacking
C) usurpation
D) DOS attack
A) spoofing
B) hacking
C) usurpation
D) DOS attack
Unlock Deck
Unlock for access to all 93 flashcards in this deck.
Unlock Deck
k this deck
20
A(n)________ is a sophisticated,possibly long-running,computer hack that is perpetrated by large,well-funded organizations like governments.
A) Advanced Persistent Threat (APT)
B) Advanced Volatile Threat (AVT)
C) local area network denial (LAND)
D) denial of service (DOS)
A) Advanced Persistent Threat (APT)
B) Advanced Volatile Threat (AVT)
C) local area network denial (LAND)
D) denial of service (DOS)
Unlock Deck
Unlock for access to all 93 flashcards in this deck.
Unlock Deck
k this deck
21
Backup and physical security are ________ against computer security threats.
A) technical safeguards
B) data safeguards
C) human safeguards
D) procedural safeguards
A) technical safeguards
B) data safeguards
C) human safeguards
D) procedural safeguards
Unlock Deck
Unlock for access to all 93 flashcards in this deck.
Unlock Deck
k this deck
22
________ is the process of transforming clear text into coded,unintelligible text for secure storage or communication.
A) Usurpation
B) Authentication
C) Standardization
D) Encryption
A) Usurpation
B) Authentication
C) Standardization
D) Encryption
Unlock Deck
Unlock for access to all 93 flashcards in this deck.
Unlock Deck
k this deck
23
A ________ has a microchip that is loaded with identifying data.
A) payment card
B) biometric passport
C) smart card
D) flashcard
A) payment card
B) biometric passport
C) smart card
D) flashcard
Unlock Deck
Unlock for access to all 93 flashcards in this deck.
Unlock Deck
k this deck
24
A(n)________ sits outside an organizational network and is the first device that Internet traffic encounters.
A) internal firewall
B) perimeter firewall
C) packet-filtering firewall
D) application firewall
A) internal firewall
B) perimeter firewall
C) packet-filtering firewall
D) application firewall
Unlock Deck
Unlock for access to all 93 flashcards in this deck.
Unlock Deck
k this deck
25
The procedure of entrusting a party with a copy of an encryption key that can be used in case the actual key is lost or destroyed is called ________.
A) key escrow
B) asymmetric encryption
C) symmetric encryption
D) biometric authentication
A) key escrow
B) asymmetric encryption
C) symmetric encryption
D) biometric authentication
Unlock Deck
Unlock for access to all 93 flashcards in this deck.
Unlock Deck
k this deck
26
A password ________ a user.
A) authenticates
B) identifies
C) conceals
D) encrypts
A) authenticates
B) identifies
C) conceals
D) encrypts
Unlock Deck
Unlock for access to all 93 flashcards in this deck.
Unlock Deck
k this deck
27
________ includes viruses,worms,Trojan horses,spyware,and adware.
A) Malware
B) Metadata
C) Shareware
D) Firewall
A) Malware
B) Metadata
C) Shareware
D) Firewall
Unlock Deck
Unlock for access to all 93 flashcards in this deck.
Unlock Deck
k this deck
28
A user name ________ a user.
A) authenticates
B) identifies
C) conceals
D) encrypts
A) authenticates
B) identifies
C) conceals
D) encrypts
Unlock Deck
Unlock for access to all 93 flashcards in this deck.
Unlock Deck
k this deck
29
With HTTPS,data are encrypted using the Secure Socket Layer (SSL)protocol,which is also known as ________.
A) File Transfer Protocol (FTP)
B) Simple Mail Transfer Protocol (SMTP)
C) Secure Shell (SSH)
D) Transport Layer Security (TLS)
A) File Transfer Protocol (FTP)
B) Simple Mail Transfer Protocol (SMTP)
C) Secure Shell (SSH)
D) Transport Layer Security (TLS)
Unlock Deck
Unlock for access to all 93 flashcards in this deck.
Unlock Deck
k this deck
30
________ determine whether to pass each part of a message by examining its source address,destination addresses,and other such data.
A) Perimeter firewalls
B) Internal firewalls
C) Packet-filtering firewalls
D) Application firewalls
A) Perimeter firewalls
B) Internal firewalls
C) Packet-filtering firewalls
D) Application firewalls
Unlock Deck
Unlock for access to all 93 flashcards in this deck.
Unlock Deck
k this deck
31
Adware and spyware are similar to each other in that they both ________.
A) masquerade as useful programs
B) are specifically programmed to spread
C) are installed without a user's permission
D) are used to replicate programs
A) masquerade as useful programs
B) are specifically programmed to spread
C) are installed without a user's permission
D) are used to replicate programs
Unlock Deck
Unlock for access to all 93 flashcards in this deck.
Unlock Deck
k this deck
32
With HTTPS,data are encrypted using a protocol called the ________.
A) Secure Shell (SSH)
B) Secure Socket Layer (SSL)
C) File Transfer Protocol (FTP)
D) Post Office Protocol (POP)
A) Secure Shell (SSH)
B) Secure Socket Layer (SSL)
C) File Transfer Protocol (FTP)
D) Post Office Protocol (POP)
Unlock Deck
Unlock for access to all 93 flashcards in this deck.
Unlock Deck
k this deck
33
Which of the following uses an individual's personal physical characteristics such as fingerprints,facial features,and retinal scans for verification purposes?
A) flashcards
B) smart cards
C) biometric authentication
D) symmetric encryption
A) flashcards
B) smart cards
C) biometric authentication
D) symmetric encryption
Unlock Deck
Unlock for access to all 93 flashcards in this deck.
Unlock Deck
k this deck
34
Which of the following refers to viruses that masquerade as useful programs?
A) adware
B) Trojan horses
C) spyware
D) payloads
A) adware
B) Trojan horses
C) spyware
D) payloads
Unlock Deck
Unlock for access to all 93 flashcards in this deck.
Unlock Deck
k this deck
35
Users of smart cards are required to enter a ________ to be authenticated.
A) personal identification number
B) password
C) biometric detail
D) key
A) personal identification number
B) password
C) biometric detail
D) key
Unlock Deck
Unlock for access to all 93 flashcards in this deck.
Unlock Deck
k this deck
36
Which of the following statements is true about position sensitivity?
A) Position sensitivity is a type of data safeguard.
B) Documenting position sensitivity enables security personnel to prioritize their activities.
C) Documentation of position sensitivity is carried out only for highly sensitive jobs.
D) Documentation of position sensitivity is carried out only for new employees.
A) Position sensitivity is a type of data safeguard.
B) Documenting position sensitivity enables security personnel to prioritize their activities.
C) Documentation of position sensitivity is carried out only for highly sensitive jobs.
D) Documentation of position sensitivity is carried out only for new employees.
Unlock Deck
Unlock for access to all 93 flashcards in this deck.
Unlock Deck
k this deck
37
The most secure communications over the Internet use a protocol called ________.
A) SMTP
B) SFTP
C) HTTPS
D) HTTP
A) SMTP
B) SFTP
C) HTTPS
D) HTTP
Unlock Deck
Unlock for access to all 93 flashcards in this deck.
Unlock Deck
k this deck
38
Which of the following statements is true of symmetric encryption?
A) With symmetric encryption, the same key is used for both encoding and decoding.
B) Asymmetric encryption is simpler and much faster than symmetric encryption.
C) With symmetric encryption, encoding and decoding are performed by two different keys.
D) Public key/private key is a special version of symmetric encryption used on the Internet.
A) With symmetric encryption, the same key is used for both encoding and decoding.
B) Asymmetric encryption is simpler and much faster than symmetric encryption.
C) With symmetric encryption, encoding and decoding are performed by two different keys.
D) Public key/private key is a special version of symmetric encryption used on the Internet.
Unlock Deck
Unlock for access to all 93 flashcards in this deck.
Unlock Deck
k this deck
39
Which of the following is an example of a data safeguard against security threats?
A) application design
B) backup and recovery
C) accountability
D) procedure design
A) application design
B) backup and recovery
C) accountability
D) procedure design
Unlock Deck
Unlock for access to all 93 flashcards in this deck.
Unlock Deck
k this deck
40
Organizations should protect sensitive data by storing it in ________ form.
A) digital
B) standardized
C) encrypted
D) structured
A) digital
B) standardized
C) encrypted
D) structured
Unlock Deck
Unlock for access to all 93 flashcards in this deck.
Unlock Deck
k this deck
41
Studies on the cost of computer crimes are mostly based on surveys.
Unlock Deck
Unlock for access to all 93 flashcards in this deck.
Unlock Deck
k this deck
42
Typically,a help-desk information system has answers to questions that only a true user would know.Which of the following statements is true of this information?
A) It allows help-desk representatives to create new passwords for users.
B) It reduces the strength of the security system.
C) It protects the anonymity of a user.
D) It helps authenticate a user.
A) It allows help-desk representatives to create new passwords for users.
B) It reduces the strength of the security system.
C) It protects the anonymity of a user.
D) It helps authenticate a user.
Unlock Deck
Unlock for access to all 93 flashcards in this deck.
Unlock Deck
k this deck
43
Damages caused by natural disasters are minimal when compared to the damages due to human errors.
Unlock Deck
Unlock for access to all 93 flashcards in this deck.
Unlock Deck
k this deck
44
The enforcement of security procedures and policies consists of three interdependent factors: ________.
A) centralized reporting, preparation, and practice
B) account administration, systems procedures, and security monitoring
C) separation of duties, provision of least privilege, and position sensitivity
D) responsibility, accountability, and compliance
A) centralized reporting, preparation, and practice
B) account administration, systems procedures, and security monitoring
C) separation of duties, provision of least privilege, and position sensitivity
D) responsibility, accountability, and compliance
Unlock Deck
Unlock for access to all 93 flashcards in this deck.
Unlock Deck
k this deck
45
A(n)________ includes how employees should react to security problems,whom they should contact,the reports they should make,and steps they can take to reduce further loss.
A) application design
B) procedure design
C) contingency plan
D) incident-response plan
A) application design
B) procedure design
C) contingency plan
D) incident-response plan
Unlock Deck
Unlock for access to all 93 flashcards in this deck.
Unlock Deck
k this deck
46
In terms of password management,when an account is created,users should ________.
A) create two passwords and switch back and forth between the two
B) immediately change the password they are given to a password of their own
C) maintain the same password they are given for all future authentication purposes
D) ensure that they do not change their passwords frequently, thereby reducing the risk of password loss
A) create two passwords and switch back and forth between the two
B) immediately change the password they are given to a password of their own
C) maintain the same password they are given for all future authentication purposes
D) ensure that they do not change their passwords frequently, thereby reducing the risk of password loss
Unlock Deck
Unlock for access to all 93 flashcards in this deck.
Unlock Deck
k this deck
47
Malware protection is an example of a technical safeguard.
Unlock Deck
Unlock for access to all 93 flashcards in this deck.
Unlock Deck
k this deck
48
Incorrectly increasing a customer's discount is an example of incorrect data modification.
Unlock Deck
Unlock for access to all 93 flashcards in this deck.
Unlock Deck
k this deck
49
A threat is a person or an organization that seeks to obtain or alter data illegally,without the owner's permission or knowledge.
Unlock Deck
Unlock for access to all 93 flashcards in this deck.
Unlock Deck
k this deck
50
Email spoofing is a synonym for phishing.
Unlock Deck
Unlock for access to all 93 flashcards in this deck.
Unlock Deck
k this deck
51
Drive-by phishers take computers with wireless connections through an area and search for unprotected wireless networks.
Unlock Deck
Unlock for access to all 93 flashcards in this deck.
Unlock Deck
k this deck
52
A person should preferably use the same password for different sites so as to avoid confusion.
Unlock Deck
Unlock for access to all 93 flashcards in this deck.
Unlock Deck
k this deck
53
An Advanced Persistent Threat (APT)is a sophisticated computer hack that is perpetrated by large,well-funded organizations like governments.
Unlock Deck
Unlock for access to all 93 flashcards in this deck.
Unlock Deck
k this deck
54
Activity log analyses constitute an important ________ function.
A) account administration
B) security monitoring
C) password management
D) data administration
A) account administration
B) security monitoring
C) password management
D) data administration
Unlock Deck
Unlock for access to all 93 flashcards in this deck.
Unlock Deck
k this deck
55
Spoofing is a technique for intercepting computer communications.
Unlock Deck
Unlock for access to all 93 flashcards in this deck.
Unlock Deck
k this deck
56
In a brute force attack,a password cracker tries every possible combination of characters.
Unlock Deck
Unlock for access to all 93 flashcards in this deck.
Unlock Deck
k this deck
57
While making online purchases,a person should buy only from vendors who support https.
Unlock Deck
Unlock for access to all 93 flashcards in this deck.
Unlock Deck
k this deck
58
Financial institutions must invest heavily in security safeguards because they are obvious targets for theft.
Unlock Deck
Unlock for access to all 93 flashcards in this deck.
Unlock Deck
k this deck
59
Pretexting occurs when someone deceives by pretending to be someone else.
Unlock Deck
Unlock for access to all 93 flashcards in this deck.
Unlock Deck
k this deck
60
Risk management is a critical security function of an organization's senior management.
Unlock Deck
Unlock for access to all 93 flashcards in this deck.
Unlock Deck
k this deck
61
Packet-filtering firewalls sit outside an organizational network.
Unlock Deck
Unlock for access to all 93 flashcards in this deck.
Unlock Deck
k this deck
62
The most secure communications over the Internet use a protocol called HTTP.
Unlock Deck
Unlock for access to all 93 flashcards in this deck.
Unlock Deck
k this deck
63
The existence of accounts that are no longer necessary do not pose any security threats.
Unlock Deck
Unlock for access to all 93 flashcards in this deck.
Unlock Deck
k this deck
64
Malware definitions are patterns that exist in malware code.
Unlock Deck
Unlock for access to all 93 flashcards in this deck.
Unlock Deck
k this deck
65
Technical safeguards include encryption and the usage of passwords.
Unlock Deck
Unlock for access to all 93 flashcards in this deck.
Unlock Deck
k this deck
66
Technical safeguards involve both software and hardware components of an information system.
Unlock Deck
Unlock for access to all 93 flashcards in this deck.
Unlock Deck
k this deck
67
Viruses,worms,and Trojan horses are types of firewalls.
Unlock Deck
Unlock for access to all 93 flashcards in this deck.
Unlock Deck
k this deck
68
With asymmetric encryption,two different keys are used for encoding and decoding a message.
Unlock Deck
Unlock for access to all 93 flashcards in this deck.
Unlock Deck
k this deck
69
The creation of backup copies of database contents ensures the protection of the database.
Unlock Deck
Unlock for access to all 93 flashcards in this deck.
Unlock Deck
k this deck
70
The creation of a backup copy of all database content of an organization is a technical safeguard.
Unlock Deck
Unlock for access to all 93 flashcards in this deck.
Unlock Deck
k this deck
71
Packet-filtering firewalls examine each part of a message and determine whether to let that part pass.
Unlock Deck
Unlock for access to all 93 flashcards in this deck.
Unlock Deck
k this deck
72
A user name authenticates a user,and a password identifies that user.
Unlock Deck
Unlock for access to all 93 flashcards in this deck.
Unlock Deck
k this deck
73
Perimeter firewalls are the simplest type of firewall.
Unlock Deck
Unlock for access to all 93 flashcards in this deck.
Unlock Deck
k this deck
74
A criticism of biometric authentication is that it provides weak authentication.
Unlock Deck
Unlock for access to all 93 flashcards in this deck.
Unlock Deck
k this deck
75
The loss of encryption keys by employees is referred to as key escrow.
Unlock Deck
Unlock for access to all 93 flashcards in this deck.
Unlock Deck
k this deck
76
Spyware programs are installed on a user's computer without the user's knowledge.
Unlock Deck
Unlock for access to all 93 flashcards in this deck.
Unlock Deck
k this deck
77
Typically,a help-desk information system has answers to questions that only the true or actual user of an account or system would know.
Unlock Deck
Unlock for access to all 93 flashcards in this deck.
Unlock Deck
k this deck
78
Smart cards are convenient to use because they don't require a PIN number for authentication.
Unlock Deck
Unlock for access to all 93 flashcards in this deck.
Unlock Deck
k this deck
79
A virus is a computer program that replicates itself.
Unlock Deck
Unlock for access to all 93 flashcards in this deck.
Unlock Deck
k this deck
80
In an organization,the security sensitivity for each position should be documented.
Unlock Deck
Unlock for access to all 93 flashcards in this deck.
Unlock Deck
k this deck