Deck 10: Securing Information Systems
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/103
Play
Full screen (f)
Deck 10: Securing Information Systems
1
Some violations of state and federal computer crime laws are punishable by fines and by not more than one year in prison.Such violations are charged as ________.
A) misdemeanors
B) felonies
C) embezzlements
D) indictments
E) larcenies
A) misdemeanors
B) felonies
C) embezzlements
D) indictments
E) larcenies
A
2
Ronald downloads a movie from the Internet onto his company's computer.During this process,his system gets infected with a virus.The virus spreads rapidly in the company's network causing the server to crash.This type of virus is most likely to be ________.
A) adware
B) phishing mail
C) spam
D) a worm
E) a Trojan horse
A) adware
B) phishing mail
C) spam
D) a worm
E) a Trojan horse
D
3
Computers that are located in homes,schools,and businesses are infected with viruses or worms to create armies of zombie computers to execute ________ attacks.
A) digital marketing
B) malware
C) adware
D) denial-of-service
E) product-as-service
A) digital marketing
B) malware
C) adware
D) denial-of-service
E) product-as-service
D
4
Identify a true statement about a vulnerability scanner.
A) It analyzes network traffic and captures unencrypted passwords.
B) It presents a view of long-term technology integration.
C) It tests targeted systems for weaknesses.
D) It presents a view of short-term technology integration.
E) It ensures high-quality leads when a search is conducted online.
A) It analyzes network traffic and captures unencrypted passwords.
B) It presents a view of long-term technology integration.
C) It tests targeted systems for weaknesses.
D) It presents a view of short-term technology integration.
E) It ensures high-quality leads when a search is conducted online.
Unlock Deck
Unlock for access to all 103 flashcards in this deck.
Unlock Deck
k this deck
5
People who break into computer systems with the intention of doing damage or committing a crime are called ________.
A) bots
B) white hats
C) worms
D) cyber spies
E) crackers
A) bots
B) white hats
C) worms
D) cyber spies
E) crackers
Unlock Deck
Unlock for access to all 103 flashcards in this deck.
Unlock Deck
k this deck
6
Which of the following U.S.laws amended the Computer Fraud and Abuse Act to allow investigators to easily access voice-related communications?
A) the Non-Detention Act
B) the Espionage Act
C) the Patriot Act
D) the Video Privacy Protection Act
E) the Clery Act
A) the Non-Detention Act
B) the Espionage Act
C) the Patriot Act
D) the Video Privacy Protection Act
E) the Clery Act
Unlock Deck
Unlock for access to all 103 flashcards in this deck.
Unlock Deck
k this deck
7
Violating data belonging to banks or other financial institutions is a crime in the United States.Which of the following legislations prohibit such violations?
A) the Foreign Intelligence Surveillance Act
B) the Computer Fraud and Abuse Act
C) the Patriot Act
D) the Glass-Steagall Act
E) the Electronic Communications Privacy Act
A) the Foreign Intelligence Surveillance Act
B) the Computer Fraud and Abuse Act
C) the Patriot Act
D) the Glass-Steagall Act
E) the Electronic Communications Privacy Act
Unlock Deck
Unlock for access to all 103 flashcards in this deck.
Unlock Deck
k this deck
8
Employees steal time on company computers to do personal business.This is an example of ________.
A) unauthorized access
B) hacking
C) vandalism
D) cyberstalking
E) functional inconvenience
A) unauthorized access
B) hacking
C) vandalism
D) cyberstalking
E) functional inconvenience
Unlock Deck
Unlock for access to all 103 flashcards in this deck.
Unlock Deck
k this deck
9
Which of the following terms refers to junk newsgroup postings used for the purpose of advertising for some product or service?
A) spam
B) adware
C) cookie
D) bot herder
E) Web filter
A) spam
B) adware
C) cookie
D) bot herder
E) Web filter
Unlock Deck
Unlock for access to all 103 flashcards in this deck.
Unlock Deck
k this deck
10
The Computer Fraud and Abuse Act of 1986 prohibits ________.
A) accessing company intranet and confidential information from public computers
B) stealing or compromising data about national defense, foreign relations, atomic energy, or other restricted information
C) the use of external devices to provide access and information to companies' confidential information
D) signing contracts with consultants outside the United States to process information
E) access to companies' extranets when outsourcing work to clients overseas
A) accessing company intranet and confidential information from public computers
B) stealing or compromising data about national defense, foreign relations, atomic energy, or other restricted information
C) the use of external devices to provide access and information to companies' confidential information
D) signing contracts with consultants outside the United States to process information
E) access to companies' extranets when outsourcing work to clients overseas
Unlock Deck
Unlock for access to all 103 flashcards in this deck.
Unlock Deck
k this deck
11
While adding information to the employee information database,Neil's computer crashed,and the entire database was erased.Which of the following types of viruses caused Neil's computer to crash?
A) spyware
B) worms
C) adware
D) logic bombs
E) encryption
A) spyware
B) worms
C) adware
D) logic bombs
E) encryption
Unlock Deck
Unlock for access to all 103 flashcards in this deck.
Unlock Deck
k this deck
12
________ refers to any software that covertly gathers information about a user through an Internet connection without the user's knowledge.
A) Spyware
B) Spam
C) Web filter
D) Cookie
E) Bot herder
A) Spyware
B) Spam
C) Web filter
D) Cookie
E) Bot herder
Unlock Deck
Unlock for access to all 103 flashcards in this deck.
Unlock Deck
k this deck
13
________ targeted at networks is designed to spread by itself without the need for an infected host file to be shared.
A) Adware
B) Spyware
C) A worm
D) Spam
E) A logic bomb
A) Adware
B) Spyware
C) A worm
D) Spam
E) A logic bomb
Unlock Deck
Unlock for access to all 103 flashcards in this deck.
Unlock Deck
k this deck
14
WikiLeaks is a famous not-for-profit whistleblower Web site.MasterCard and Visa stopped payments to WikiLeaks after a series of leaks by the site.An anonymous group attacked the Web sites of both MasterCard and Visa reacting to this.These Web vandals,who tried to protect WikiLeaks,are called ________.
A) hacktivists
B) bots
C) ethical hackers
D) patriot hackers
E) cyber soldiers
A) hacktivists
B) bots
C) ethical hackers
D) patriot hackers
E) cyber soldiers
Unlock Deck
Unlock for access to all 103 flashcards in this deck.
Unlock Deck
k this deck
15
The individuals who are knowledgeable enough to gain access to computer systems without authorization are referred to as ________.
A) hackers
B) bots
C) online predators
D) worms
E) power users
A) hackers
B) bots
C) online predators
D) worms
E) power users
Unlock Deck
Unlock for access to all 103 flashcards in this deck.
Unlock Deck
k this deck
16
Identify a true statement about a packet sniffer.
A) It is used to analyze network traffic.
B) It is used to test targeted systems for weaknesses.
C) It is used to break passwords using a brute-force approach.
D) It is used to capture encrypted passwords.
E) It is used to redirect web pages to different sites if any link fails.
A) It is used to analyze network traffic.
B) It is used to test targeted systems for weaknesses.
C) It is used to break passwords using a brute-force approach.
D) It is used to capture encrypted passwords.
E) It is used to redirect web pages to different sites if any link fails.
Unlock Deck
Unlock for access to all 103 flashcards in this deck.
Unlock Deck
k this deck
17
Which of the following is one of the main federal laws against computer crimes in the United States?
A) Satellite Act of 1962
B) Trade Expansions Act of 1962
C) United States Information and Educational Exchange Act
D) Central Intelligence Agency Act
E) Electronic Communications Privacy Act of 1986
A) Satellite Act of 1962
B) Trade Expansions Act of 1962
C) United States Information and Educational Exchange Act
D) Central Intelligence Agency Act
E) Electronic Communications Privacy Act of 1986
Unlock Deck
Unlock for access to all 103 flashcards in this deck.
Unlock Deck
k this deck
18
Computer criminals who attempt to break into systems or deface Web sites to promote political or ideological goals are called ________.
A) hacktivists
B) crackers
C) social promoters
D) internet activists
E) online predators
A) hacktivists
B) crackers
C) social promoters
D) internet activists
E) online predators
Unlock Deck
Unlock for access to all 103 flashcards in this deck.
Unlock Deck
k this deck
19
When Shelly downloaded an arcade game from an unknown Internet Web site,an unauthorized connection unknown to Shelly was established with her computer.The arcade game is most likely to be ________.
A) spyware
B) a worm
C) adware
D) a Trojan horse
E) encryption
A) spyware
B) a worm
C) adware
D) a Trojan horse
E) encryption
Unlock Deck
Unlock for access to all 103 flashcards in this deck.
Unlock Deck
k this deck
20
Which of the following is the most accurate definition of a computer crime?
A) the act of using a computer to commit an illegal act
B) the act of using someone's computer to browse the Internet
C) the act of using someone's computer to check e-mail
D) the act of stealing a computer and related hardware
E) the act of providing personal information to Web sites when shopping
A) the act of using a computer to commit an illegal act
B) the act of using someone's computer to browse the Internet
C) the act of using someone's computer to check e-mail
D) the act of stealing a computer and related hardware
E) the act of providing personal information to Web sites when shopping
Unlock Deck
Unlock for access to all 103 flashcards in this deck.
Unlock Deck
k this deck
21
A(n)________ typically consists of a distorted image displaying a combination of letters and/or numbers that a user has to input into a form before submitting it.
A) American Standard Code for Information Interchange (ASCII)
B) Comprehensive TeX Archive Network (CTAN)
C) Entity-Relationship Diagram (ERD)
D) Completely Automated Public Turing Test to Tell Computers and Humans Apart (CAPTCHA)
E) Organization for the Advancement of Structured Information Standards (OASIS)
A) American Standard Code for Information Interchange (ASCII)
B) Comprehensive TeX Archive Network (CTAN)
C) Entity-Relationship Diagram (ERD)
D) Completely Automated Public Turing Test to Tell Computers and Humans Apart (CAPTCHA)
E) Organization for the Advancement of Structured Information Standards (OASIS)
Unlock Deck
Unlock for access to all 103 flashcards in this deck.
Unlock Deck
k this deck
22
The act of cybercriminals to gain information on a victim by monitoring online activities,accessing databases,and making false accusations are forms of ________.
A) bot herding
B) cyberstalking
C) spam filtering
D) viral marketing
E) spear phishing
A) bot herding
B) cyberstalking
C) spam filtering
D) viral marketing
E) spear phishing
Unlock Deck
Unlock for access to all 103 flashcards in this deck.
Unlock Deck
k this deck
23
When using Yahoo Messenger,Roger gets an unsolicited advertisement from a company.The advertisement contains a link to connect to the merchant's Web site.Which of the following is the most suitable way of describing this type of advertisement?
A) adware
B) cookie
C) Internet hoax
D) spam
E) cyber squatting
A) adware
B) cookie
C) Internet hoax
D) spam
E) cyber squatting
Unlock Deck
Unlock for access to all 103 flashcards in this deck.
Unlock Deck
k this deck
24
Logic bombs are variations of a worm that can reproduce themselves to disrupt the normal functioning of a computer.
Unlock Deck
Unlock for access to all 103 flashcards in this deck.
Unlock Deck
k this deck
25
________ are false messages circulated online about new viruses,earthquakes,kids in trouble,cancer causes,or any other topic of public interest.
A) Internet hoaxes
B) Honeypots
C) Cookies
D) Logic bombs
E) Malware
A) Internet hoaxes
B) Honeypots
C) Cookies
D) Logic bombs
E) Malware
Unlock Deck
Unlock for access to all 103 flashcards in this deck.
Unlock Deck
k this deck
26
Robert receives an e-mail which says that he has won an online lottery worth $50 billion.Robert has his doubts as he does not remember buying a lottery ticket.He finds out that it is a spam e-mail intended to obtain his bank account details and credit card number.Which of the following is evident here?
A) a logic bomb
B) hacktivism
C) phishing
D) tunneling
E) a worm
A) a logic bomb
B) hacktivism
C) phishing
D) tunneling
E) a worm
Unlock Deck
Unlock for access to all 103 flashcards in this deck.
Unlock Deck
k this deck
27
Which of the following can be referred for a patent?
A) material inventions
B) software
C) music by an existing band
D) literature
E) art
A) material inventions
B) software
C) music by an existing band
D) literature
E) art
Unlock Deck
Unlock for access to all 103 flashcards in this deck.
Unlock Deck
k this deck
28
The term shoulder surfing refers to looking over one's shoulder while the person is keying in access information.
Unlock Deck
Unlock for access to all 103 flashcards in this deck.
Unlock Deck
k this deck
29
________ refers to offering stolen proprietary software for free over the Internet.
A) Bot herding
B) Warez peddling
C) Spam filtering
D) Viral marketing
E) Spear phishing
A) Bot herding
B) Warez peddling
C) Spam filtering
D) Viral marketing
E) Spear phishing
Unlock Deck
Unlock for access to all 103 flashcards in this deck.
Unlock Deck
k this deck
30
Fyroff consultants,a leading software consulting firm in the United States,decides to launch an Enterprise Resource Planning (ERP)solution.The company chooses the brand name FyroffEnterprise for the new solution.However,when the company attempts to register the domain name,it finds that a small unknown firm is already registered under the same domain name.The small firm is now attempting to sell the domain name to Fyroff.Which of the following terms refers to this practice of buying a domain name only to sell it for big bucks?
A) cybersquatting
B) logic bombing
C) cyberbullying
D) bot herding
E) cyberstalking
A) cybersquatting
B) logic bombing
C) cyberbullying
D) bot herding
E) cyberstalking
Unlock Deck
Unlock for access to all 103 flashcards in this deck.
Unlock Deck
k this deck
31
________ is an attempt to trick financial account and credit card holders into giving away their authentication information,usually by sending spam messages to literally millions of e-mail accounts.
A) Phishing
B) Cyber tunneling
C) Viral marketing
D) Logic bombing
E) Hacking
A) Phishing
B) Cyber tunneling
C) Viral marketing
D) Logic bombing
E) Hacking
Unlock Deck
Unlock for access to all 103 flashcards in this deck.
Unlock Deck
k this deck
32
The term social engineering refers to misrepresenting oneself to trick others into revealing information.
Unlock Deck
Unlock for access to all 103 flashcards in this deck.
Unlock Deck
k this deck
33
Which of the following is the most accurate definition of a botnet?
A) a fraudulent e-mail attack that targets a specific person or organization by personalizing the message
B) spider software used by a search algorithm to crawl various Web sites to return a query
C) a small text file passed to a Web browser on a user's computer by a Web server
D) a common platform used by search engines to index the contents of a Web site
E) destructive software robots working together on a collection of zombie computers via the Internet
A) a fraudulent e-mail attack that targets a specific person or organization by personalizing the message
B) spider software used by a search algorithm to crawl various Web sites to return a query
C) a small text file passed to a Web browser on a user's computer by a Web server
D) a common platform used by search engines to index the contents of a Web site
E) destructive software robots working together on a collection of zombie computers via the Internet
Unlock Deck
Unlock for access to all 103 flashcards in this deck.
Unlock Deck
k this deck
34
________ is a more sophisticated fraudulent e-mail attack that targets a specific person or organization by personalizing the message in order to make the message appear as if it is from a trusted source.
A) Spear phishing
B) Cyber tunneling
C) Viral marketing
D) Logic bombing
E) Hacking
A) Spear phishing
B) Cyber tunneling
C) Viral marketing
D) Logic bombing
E) Hacking
Unlock Deck
Unlock for access to all 103 flashcards in this deck.
Unlock Deck
k this deck
35
________ is the dubious practice of registering a domain name and then trying to sell the name for big bucks to the person,company,or organization most likely to want it.
A) Cybersquatting
B) Bot herding
C) Spear phishing
D) Logic bombing
E) Hacktivism
A) Cybersquatting
B) Bot herding
C) Spear phishing
D) Logic bombing
E) Hacktivism
Unlock Deck
Unlock for access to all 103 flashcards in this deck.
Unlock Deck
k this deck
36
________ refers to the use of a computer to communicate obscene,vulgar,or threatening content that causes a reasonable person to endure distress.
A) Cyberharassment
B) Viral marketing
C) Hacktivism
D) Bot herding
E) Spam filtering
A) Cyberharassment
B) Viral marketing
C) Hacktivism
D) Bot herding
E) Spam filtering
Unlock Deck
Unlock for access to all 103 flashcards in this deck.
Unlock Deck
k this deck
37
________ contains spyware that collects information about a person's Web surfing behavior in order to customize Web site banner advertisements.
A) Adware
B) Malware
C) Firmware
D) A cookie
E) A honeypot
A) Adware
B) Malware
C) Firmware
D) A cookie
E) A honeypot
Unlock Deck
Unlock for access to all 103 flashcards in this deck.
Unlock Deck
k this deck
38
Which of the following examples can be considered as a violation for a copyright?
A) Apple's multitouch technology
B) music by an existing band
C) Amazon's one-click buying
D) mobile phones
E) tablets
A) Apple's multitouch technology
B) music by an existing band
C) Amazon's one-click buying
D) mobile phones
E) tablets
Unlock Deck
Unlock for access to all 103 flashcards in this deck.
Unlock Deck
k this deck
39
A ________ is a small text file passed to a Web browser on a user's computer by a Web server.
A) cookie
B) botnet
C) honeypot
D) worm
E) virus
A) cookie
B) botnet
C) honeypot
D) worm
E) virus
Unlock Deck
Unlock for access to all 103 flashcards in this deck.
Unlock Deck
k this deck
40
________ is the stealing of another person's Social Security number,credit card number,and other personal information for the purpose of using the victim's credit rating to borrow money,buy merchandise,and otherwise run up debts that are never repaid.
A) Logic bombing
B) Battery
C) Spear phishing
D) Bot herding
E) Identity theft
A) Logic bombing
B) Battery
C) Spear phishing
D) Bot herding
E) Identity theft
Unlock Deck
Unlock for access to all 103 flashcards in this deck.
Unlock Deck
k this deck
41
The term dumpster diving refers to the task of modifying the operating system to remove manufacturer or carrier restrictions in order to run applications other than those from the official store.
Unlock Deck
Unlock for access to all 103 flashcards in this deck.
Unlock Deck
k this deck
42
Spam filters are used to reduce the amount of spam processed by central e-mail servers.
Unlock Deck
Unlock for access to all 103 flashcards in this deck.
Unlock Deck
k this deck
43
________ is the use of computer and networking technologies by individuals and organized groups against persons or property to intimidate or coerce governments.
A) Cyberterrorism
B) Cybersquatting
C) Cyberforensics
D) Cyberstalking
E) Cyberbullying
A) Cyberterrorism
B) Cybersquatting
C) Cyberforensics
D) Cyberstalking
E) Cyberbullying
Unlock Deck
Unlock for access to all 103 flashcards in this deck.
Unlock Deck
k this deck
44
________ by terrorists refers to the use of the vast amount of information available on the Internet regarding virtually any topic for planning,recruitment,and numerous other endeavors.
A) Data mining
B) Information dissemination
C) Location monitoring
D) Information sharing
E) Cybersquatting
A) Data mining
B) Information dissemination
C) Location monitoring
D) Information sharing
E) Cybersquatting
Unlock Deck
Unlock for access to all 103 flashcards in this deck.
Unlock Deck
k this deck
45
Making false accusations that damage the reputation of the victim on blogs,Web sites,chat rooms,or e-commerce sites is a form of cyberstalking.
Unlock Deck
Unlock for access to all 103 flashcards in this deck.
Unlock Deck
k this deck
46
________ refers to an organized attempt by a country's military to disrupt or destroy the information and communication systems of another country.
A) Cyberwar
B) Internet hoaxing
C) Cybersquatting
D) Web vandalism
E) Logic bombing
A) Cyberwar
B) Internet hoaxing
C) Cybersquatting
D) Web vandalism
E) Logic bombing
Unlock Deck
Unlock for access to all 103 flashcards in this deck.
Unlock Deck
k this deck
47
Patents generally refer to creations of the mind such as music,literature,or software.
Unlock Deck
Unlock for access to all 103 flashcards in this deck.
Unlock Deck
k this deck
48
Cyberwar refers to an organized attempt by a country's military to disrupt or destroy the information and communication systems of another country.
Unlock Deck
Unlock for access to all 103 flashcards in this deck.
Unlock Deck
k this deck
49
Briefly explain cyberwar and cyberterrorism.
Unlock Deck
Unlock for access to all 103 flashcards in this deck.
Unlock Deck
k this deck
50
Briefly explain the concept of computer crime.
Unlock Deck
Unlock for access to all 103 flashcards in this deck.
Unlock Deck
k this deck
51
A mass cyber attack occurred in a country when it took severe actions against a group of citizens who protested against the country's religious policies.The attack involved a denial-of-service in which selected sites were bombarded with traffic to force them offline.This is an example of ________.
A) cyberterrorism
B) logic bombing
C) cyberforensics
D) cyberbullying
E) cybersquatting
A) cyberterrorism
B) logic bombing
C) cyberforensics
D) cyberbullying
E) cybersquatting
Unlock Deck
Unlock for access to all 103 flashcards in this deck.
Unlock Deck
k this deck
52
What is unauthorized access? Provide a few examples for unauthorized access.
Unlock Deck
Unlock for access to all 103 flashcards in this deck.
Unlock Deck
k this deck
53
Briefly explain cyberstalking and cybersquatting.
Unlock Deck
Unlock for access to all 103 flashcards in this deck.
Unlock Deck
k this deck
54
Spyware is electronic junk mail or junk newsgroup postings usually posted for the purpose of advertising some product and/or service.
Unlock Deck
Unlock for access to all 103 flashcards in this deck.
Unlock Deck
k this deck
55
Patriot hackers are independent citizens or supporters of a country that perpetrate attacks on perceived or real enemies.
Unlock Deck
Unlock for access to all 103 flashcards in this deck.
Unlock Deck
k this deck
56
What are cookies? Do they pose a threat to users?
Unlock Deck
Unlock for access to all 103 flashcards in this deck.
Unlock Deck
k this deck
57
Ransomware is a type of adware.
Unlock Deck
Unlock for access to all 103 flashcards in this deck.
Unlock Deck
k this deck
58
Information dissemination refers to the use of Web sites to provide information for recruiting new members as well as utilizing more interactive Internet technologies.
Unlock Deck
Unlock for access to all 103 flashcards in this deck.
Unlock Deck
k this deck
59
Compare and contrast computer viruses and a Trojan horse.
Unlock Deck
Unlock for access to all 103 flashcards in this deck.
Unlock Deck
k this deck
60
Independent citizens or supporters of a country that perpetrate attacks on perceived or real enemies are called ________.
A) patriot hackers
B) bot herders
C) online predators
D) hacktivists
E) ethical hackers
A) patriot hackers
B) bot herders
C) online predators
D) hacktivists
E) ethical hackers
Unlock Deck
Unlock for access to all 103 flashcards in this deck.
Unlock Deck
k this deck
61
An organization takes active countermeasures to protect its systems,such as installing firewalls.This approach is known as ________.
A) risk reduction
B) risk acceptance
C) risk rescheduling
D) risk transference
E) risk elimination
A) risk reduction
B) risk acceptance
C) risk rescheduling
D) risk transference
E) risk elimination
Unlock Deck
Unlock for access to all 103 flashcards in this deck.
Unlock Deck
k this deck
62
Which of the following is a valid observation about encryption?
A) Encrypted messages cannot be deciphered without the decoding key.
B) Encryption is used for data enhancement rather than data protection.
C) Encryption is performed only after messages enter the network.
D) The encryption approach is not dependent on the type of data transmission.
E) Encryption implementation is expensive and needs authentication from a relevant authority.
A) Encrypted messages cannot be deciphered without the decoding key.
B) Encryption is used for data enhancement rather than data protection.
C) Encryption is performed only after messages enter the network.
D) The encryption approach is not dependent on the type of data transmission.
E) Encryption implementation is expensive and needs authentication from a relevant authority.
Unlock Deck
Unlock for access to all 103 flashcards in this deck.
Unlock Deck
k this deck
63
With ________,employees may be identified by fingerprints,retinal patterns in the eye,facial features,or other bodily characteristics before being granted access to use a computer or to enter a facility.
A) CAPTCHAs
B) biometrics
C) passwords
D) ECHELONs
E) smart cards
A) CAPTCHAs
B) biometrics
C) passwords
D) ECHELONs
E) smart cards
Unlock Deck
Unlock for access to all 103 flashcards in this deck.
Unlock Deck
k this deck
64
Albitrex Systems is an Asian software consulting firm that develops solutions for companies in the United States and Europe.The company is heavily dependent on the Internet for transporting data.It wants to ensure that only authorized users access the data and that the data is not intercepted and compromised.Which of the following would be most helpful to the company in achieving this goal?
A) spam filtering
B) hot back up
C) tunneling
D) open transmitting
E) cloud storage
A) spam filtering
B) hot back up
C) tunneling
D) open transmitting
E) cloud storage
Unlock Deck
Unlock for access to all 103 flashcards in this deck.
Unlock Deck
k this deck
65
Ciscon Telecom is a mobile operator in the European Union.The company provides personalized services to its customers,and its databases contain valuable information about the customers.The loss of customer information that is used to decide services would be extremely harmful to the organization.Which of the following strategies adopted by Ciscon is an example of risk transference?
A) The company insures any possible data loss for a large sum.
B) The company forms a special team of top executives to monitor and correct the information policies.
C) It installs a corporate firewall to protect unauthorized access to information.
D) It enforces a strict employee data policy and prohibits employees from unauthorized access.
E) The company decides to absorb any damages that might occur.
A) The company insures any possible data loss for a large sum.
B) The company forms a special team of top executives to monitor and correct the information policies.
C) It installs a corporate firewall to protect unauthorized access to information.
D) It enforces a strict employee data policy and prohibits employees from unauthorized access.
E) The company decides to absorb any damages that might occur.
Unlock Deck
Unlock for access to all 103 flashcards in this deck.
Unlock Deck
k this deck
66
Which of the following terms refers to a computer,data,or network site that is designed to be enticing to crackers so as to detect,deflect,or counteract illegal activity?
A) honeypot
B) firewall
C) bot herder
D) botnet
E) zombie computer
A) honeypot
B) firewall
C) bot herder
D) botnet
E) zombie computer
Unlock Deck
Unlock for access to all 103 flashcards in this deck.
Unlock Deck
k this deck
67
In ________,an attacker accesses the network,intercepts data from it,and even uses network services and/or sends attack instructions to it without having to enter the home,office,or organization that owns the network.
A) drive-by hacking
B) hacktivism
C) viral marketing
D) cybersquatting
E) denial-of-service
A) drive-by hacking
B) hacktivism
C) viral marketing
D) cybersquatting
E) denial-of-service
Unlock Deck
Unlock for access to all 103 flashcards in this deck.
Unlock Deck
k this deck
68
Some data centers rent server space to multiple customers and provide necessary infrastructure in terms of power,backups,connectivity,and security.Such data centers are called ________.
A) collocation facilities
B) hot backup sites
C) virtual private networks
D) offshore networks
E) control centers
A) collocation facilities
B) hot backup sites
C) virtual private networks
D) offshore networks
E) control centers
Unlock Deck
Unlock for access to all 103 flashcards in this deck.
Unlock Deck
k this deck
69
________ is the use of formal investigative techniques to evaluate digital information for judicial review.
A) Computer forensics
B) Flaming
C) Hacktivism
D) Certificate authority
E) Encryption
A) Computer forensics
B) Flaming
C) Hacktivism
D) Certificate authority
E) Encryption
Unlock Deck
Unlock for access to all 103 flashcards in this deck.
Unlock Deck
k this deck
70
Information systems ________ is done to obtain an understanding of the threats to the confidentiality,integrity,and availability of data and systems.
A) risk assessment
B) quality testing
C) requirements analysis
D) security modeling
E) data processing
A) risk assessment
B) quality testing
C) requirements analysis
D) security modeling
E) data processing
Unlock Deck
Unlock for access to all 103 flashcards in this deck.
Unlock Deck
k this deck
71
Glassico Publishing is a leading media company in France.The company handles sensitive information and often finds it susceptible to information threats.As a countermeasure,the company installs strong firewalls and protective software.These steps are a part of ________.
A) risk acceptance
B) risk reduction
C) risk mitigation
D) risk transference
E) risk rescheduling
A) risk acceptance
B) risk reduction
C) risk mitigation
D) risk transference
E) risk rescheduling
Unlock Deck
Unlock for access to all 103 flashcards in this deck.
Unlock Deck
k this deck
72
________ refers to precautions taken to keep all aspects of information systems safe from destruction,manipulation,or unauthorized use or access.
A) Information systems security
B) Information systems resource
C) Information systems planning
D) Information systems audit
E) Information systems distribution
A) Information systems security
B) Information systems resource
C) Information systems planning
D) Information systems audit
E) Information systems distribution
Unlock Deck
Unlock for access to all 103 flashcards in this deck.
Unlock Deck
k this deck
73
The science of encryption is called ________.
A) cryptanalysis
B) cryptology
C) cryptography
D) cryptowall
E) cryptarithm
A) cryptanalysis
B) cryptology
C) cryptography
D) cryptowall
E) cryptarithm
Unlock Deck
Unlock for access to all 103 flashcards in this deck.
Unlock Deck
k this deck
74
Which of the following is a part of a computer system designed to detect intrusion and to prevent unauthorized access to or from a private network?
A) firewall
B) cookie
C) botnet
D) honeypot
E) spam filter
A) firewall
B) cookie
C) botnet
D) honeypot
E) spam filter
Unlock Deck
Unlock for access to all 103 flashcards in this deck.
Unlock Deck
k this deck
75
An organization builds a fully equipped backup facility,having everything from office chairs to a one-to-one replication of the most current data.This facility is called a ________.
A) buying center
B) firewall
C) hot backup site
D) botnet
E) collocation facility
A) buying center
B) firewall
C) hot backup site
D) botnet
E) collocation facility
Unlock Deck
Unlock for access to all 103 flashcards in this deck.
Unlock Deck
k this deck
76
When a company uses a fingerprint recognition system instead of access cards,it helps the company prevent unauthorized physical access.Which of the following technologies is used for authentication here?
A) biometrics
B) passwords
C) smart cards
D) access-control software
E) encryption
A) biometrics
B) passwords
C) smart cards
D) access-control software
E) encryption
Unlock Deck
Unlock for access to all 103 flashcards in this deck.
Unlock Deck
k this deck
77
A(n)________ is a network connection that is constructed dynamically within an existing network in order to connect users or nodes.
A) virtual private network
B) ambient network
C) cognitive network
D) collaborative service network
E) artificial network
A) virtual private network
B) ambient network
C) cognitive network
D) collaborative service network
E) artificial network
Unlock Deck
Unlock for access to all 103 flashcards in this deck.
Unlock Deck
k this deck
78
A ________ is nothing more than an empty warehouse with all necessary connections for power and communication but nothing else.
A) cold backup site
B) buying center
C) botnet
D) firewall
E) collocation facility
A) cold backup site
B) buying center
C) botnet
D) firewall
E) collocation facility
Unlock Deck
Unlock for access to all 103 flashcards in this deck.
Unlock Deck
k this deck
79
An organization does not implement countermeasures against information threats; instead it simply absorbs the damages that occur.This approach is called ________.
A) risk acceptance
B) risk reduction
C) risk mitigation
D) risk transference
E) risk rescheduling
A) risk acceptance
B) risk reduction
C) risk mitigation
D) risk transference
E) risk rescheduling
Unlock Deck
Unlock for access to all 103 flashcards in this deck.
Unlock Deck
k this deck
80
Implementing encryption on a large scale,such as on a busy Web site,requires a third party,called a(n)________.
A) certificate authority
B) virtual private network
C) arbitrative authority
D) artificial network
E) buying center
A) certificate authority
B) virtual private network
C) arbitrative authority
D) artificial network
E) buying center
Unlock Deck
Unlock for access to all 103 flashcards in this deck.
Unlock Deck
k this deck