Deck 4: Information Security and Controls

Full screen (f)
exit full mode
Question
Zero-day attacks use deceptive e-mails to acquire sensitive personal information.
Use Space or
up arrow
down arrow
to flip the card.
Question
Organizations use authentication to establish privileges to systems operations.
Question
Voice recognition is an example of "something a user does" authentication.
Question
In most cases, cookies track your path through websites and are therefore invasions of your privacy.
Question
Risk analysis involves determining whether security programs are working.
Question
The goal of risk management is to reduce risk to acceptable levels.
Question
The higher the level of an employee in organization, the greater the threat that he or she poses to the organization.
Question
Public-key encryption uses two different keys, one public and one private.
Question
Cyberterrorism and cyberwarfare can attack supervisory control and data acquisition (SCADA)systems to cause widespread physical damage.
Question
The security of each computer on the Internet is independent of the security of all other computers on the Internet.
Question
The computing skills necessary to be a hacker are decreasing.
Question
Supervisory control and data acquisition (SCADA)systems require human data input.
Question
Organizations utilize layers of controls because they face so many diverse threats to information security.
Question
IT security is the responsibility of everyone in the organization.
Question
Software can be copyrighted.
Question
Trojan horses are software programs that hide in other computer programs and reveal their designed behaviour only when they are activated.
Question
A password refers to "something the user is."
Question
Cyberterrorism is usually carried out by nations.
Question
Human errors cause more than half of the security-related problems in many organizations.
Question
Dumpster diving is always illegal because it involves trespassing on private property.
Question
Social engineers often impersonate legitimate employees.
Question
Which of the following factors is not increasing the threats to information security?

A)Smaller computing devices
B)Downstream liability
C)The Internet
D)Limited storage capacity on portable devices
E)Due diligence
Question
Authentication and authorization are synonyms.
Question
The main purpose for the attack on Sony Pictures Entertainment on November 24, 2014, was to stop the release of the movie The Interview.
Question
Backup plans are not always necessary.
Question
An information system's _______ is the possibility that the system will be harmed by a threat.

A)vulnerability
B)risk
C)control
D)danger
E)compromise
Question
The Heartbleed bug is an encryption security flaw in the ___________ software package that was an _____________ mistake by the software developer.

A)Microsoft; intended
B)Microsoft; unintended
C)OpenSSL; intended
D)OpenSSL; unintended
Question
A ______ is any danger to which an information resource may be exposed.

A)vulnerability
B)risk
C)control
D)threat
E)compromise
Question
A URL that begins with "https" rather than "http" indicates that the site transmits using an extra layer of security called transport layer security.
Question
Which of the following is not a consequence of poor information security practices?

A)Stolen information
B)Stolen identities
C)Financial loss
D)Loss of service
E)All of the above are consequences of poor information security practices.
Question
A VPN is a network within the organization.
Question
The area located between two firewalls within an organization is called the demilitarized zone.
Question
You start a dog-walking service, and you store your client's records on your smart phone. You don't need to worry about information security.
Question
Unintentional threats to information systems include all of the following except:

A)Malicious software
B)Tailgating
C)Power outage
D)Lack of user experience
E)Tornados
Question
Employees in which functional areas of the organization pose particularly grave threats to information security?

A)Human resources, finance
B)Human resources, information systems
C)Finance, marketing
D)Operations management, management information systems
E)Finance, management information systems
Question
The most overlooked people in information security are:

A)consultants and temporary hires.
B)secretaries and consultants.
C)contract labourers and executive assistants.
D)janitors and guards.
E)executives and executive secretaries.
Question
SCADA attacks like Stuxnet are an act of cyberwarfare.
Question
Rank the following in terms of dollar value of the crime, from highest to lowest.

A)Robbery - white-collar crime - cybercrime
B)White-collar crime - extortion - robbery
C)Cybercrime - white-collar crime - robbery
D)Cybercrime - robbery - white-collar crime
E)White-collar crime - burglary - robbery
Question
The computing skills necessary to be a hacker are decreasing for which of the following reasons?

A)More information systems and computer science departments are teaching courses on hacking so that their graduates can recognize attacks on information assets.
B)Computer attack programs, called scripts, are available for download from the Internet.
C)International organized crime is training hackers.
D)Cybercrime is much more lucrative than regular white-collar crime.
E)Almost anyone can buy or access a computer today.
Question
Cookies in your web browser are not tracked by businesses.
Question
_____ are software programs that hide in other computer programs and reveal their designed behaviour only when they are activated.

A)Viruses
B)Worms
C)Trojan horses
D)Back doors
E)Logic bombs
Question
A pharmaceutical company's research and development plan for a new class of drugs would be best described as which of the following?

A)Copyrighted material
B)Patented material
C)A trade secret
D)A knowledge base
E)Public property
Question
A _____ is intellectual work that is known only to a company and is not based on public information.

A)copyright
B)patent
C)trade secret
D)knowledge base
E)private property
Question
A _____ is a document that grants the holder exclusive rights on an invention for 20 years.

A)copyright
B)patent
C)trade secret
D)knowledge base
E)private property notice
Question
A _____ attack uses deception to fraudulently acquire sensitive personal information by masquerading as an official e-mail.

A)Virus
B)Denial-of-service
C)Distributed denial-of-service
D)Phishing
E)Brute force dictionary
Question
The term _____ refers to clandestine software that is installed on your PC through duplicitous channels but is not particularly malicious.

A)alien software
B)virus
C)worm
D)back door
E)logic bomb
Question
The cost of a stolen laptop includes all of the following except:

A)Loss of intellectual property
B)Loss of data
C)Backup costs
D)Loss of productivity
E)Replacement cost
Question
In _____, the organization takes concrete actions against risks.

A)risk management
B)risk analysis
C)risk mitigation
D)risk acceptance
E)risk transference
Question
_____ are segments of computer code that attach to existing computer programs and perform malicious acts.

A)Viruses
B)Worms
C)Trojan horses
D)Back doors
E)Logic bombs
Question
_____ involves building an inappropriate trust relationship with employees for the purpose of gaining sensitive information or unauthorized access privileges.

A)Tailgating
B)Hacking
C)Spoofing
D)Social engineering
E)Spamming
Question
Which of the following statements is false?

A)Credit card companies usually block stolen credit cards rather than prosecute.
B)People tend to shortcut security procedures because the procedures are inconvenient.
C)It is easy to assess the value of a hypothetical attack.
D)The online commerce industry isn't willing to install safeguards on credit card transactions.
E)The cost of preventing computer crimes can be very high.
Question
_____ are segments of computer code embedded within an organization's existing computer programs that activate and perform a destructive action at a certain time or date.

A)Viruses
B)Worms
C)Trojan horses
D)Back doors
E)Logic bombs
Question
_____ is the process in which an organization assesses the value of each asset being protected, estimates the probability that it will be compromised, and compares the probable costs of an attack with the costs of protecting the asset.

A)Risk management
B)Risk analysis
C)Risk mitigation
D)Risk acceptance
E)Risk transference
Question
Which of the following is/are designed to use your computer as a launch pad for sending unsolicited e-mail to other computers?

A)Spyware
B)Spamware
C)Adware
D)Viruses
E)Worms
Question
Which of the following is not a strategy for mitigating the risk of threats against information?

A)Continue operating with no controls and absorb any damages that occur.
B)Transfer the risk by purchasing insurance.
C)Implement controls that minimize the impact of the threat.
D)Install controls that block the risk.
E)All of the above are strategies for mitigating risk.
Question
In a _____ attack, a coordinated stream of requests is launched against a target system from many compromised computers at the same time.

A)phishing
B)virus
C)worm
D)back door
E)distributed denial-of-service
Question
Cybercriminals can obtain the information they need in order to assume another person's identity by:

A)infiltrating an organization that stores large amounts of personal information.
B)phishing.
C)hacking into a corporate database.
D)stealing mail.
E)All of the above are strategies to obtain information to assume another person's identity.
Question
An organization's e-mail policy has the least impact on which of the following software attacks?

A)Virus
B)Worm
C)Phishing
D)Denial-of-service attack
E)Spear phishing
Question
When companies attempt to counter _____ by requiring users to accurately select characters in turn from a series of boxes, attackers respond by using _____.

A)keyloggers; screen scrapers
B)screen scrapers; uninstallers
C)keyloggers; spam
D)screen scrapers; keyloggers
E)spam; keyloggers
Question
Dumpster diving is:

A)always illegal because it is considered trespassing.
B)never illegal because it is not considered trespassing.
C)typically committed for the purpose of identity theft.
D)always illegal because individuals own the material in the dumpster.
E)always legal because the dumpster is not owned by private citizens.
Question
Biometrics are an example of:

A)something the user is.
B)something the user wants.
C)something the user has.
D)something the user knows.
E)something the user does.
Question
You receive an e-mail from your bank informing you that they are updating their records and need your password. Which of the following statements is true?

A)The message could be an industrial espionage attack.
B)The message could be a phishing attack.
C)The message could be a denial-of-service attack.
D)The message could be a back-door attack.
E)The message could be a Trojan horse attack.
Question
Which of the following is not a characteristic of strong passwords?

A)They are difficult to guess.
B)They contain special characters.
C)They are not a recognizable word.
D)They are not a recognizable string of numbers
E)They tend to be short so they are easy to remember.
Question
According to the "Catching a Hacker" case, ____________ is one of the most sophisticated and destructive malicious software programs ever developed.

A)the Heartbleed bug
B)FireEye
C)Shodan
D)SpyEye
Question
Access controls involve _______ before _______.

A)biometrics, signature recognition
B)authentication, authorization
C)iris scanning, voice recognition
D)strong passwords, biometrics
E)authorization, authentication
Question
Bob is using public key encryption to send a message to Ted. Bob encrypts the message with Ted's _____ key, and Ted decrypts the message using his _____ key.

A)public, public
B)public, private
C)private, private
D)private, public
E)None of these
Question
Which of the following statements concerning firewalls is not true?

A)Firewalls prevent unauthorized Internet users from accessing private networks.
B)Firewalls examine every message that enters or leaves an organization's network.
C)Firewalls filter network traffic according to categories of activities that are likely to cause problems.
D)Firewalls filter messages the same way as anti-malware systems do.
E)Firewalls are sometimes located inside an organization's private network.
Question
Your company's headquarters was just hit head-on by a hurricane, and the building has lost power. The company sends you to their hot site to minimize downtime from the disaster. Which of the following statements is true?

A)The site will not have any servers.
B)The site will not have any workstations, so you need to bring your laptop.
C)The site is probably in the next town.
D)The site should be an almost exact replica of the IT configuration at headquarters.
E)The site will not have up-to-date data.
Question
In a process called _____, a company allows nothing to run unless it is approved, whereas in a process called _____, the company allows everything to run unless it is not approved.

A)whitelisting, blacklisting
B)whitelisting, encryption
C)encryption, whitelisting
D)encryption, blacklisting
E)blacklisting, whitelisting
Question
Voice and signature recognition are examples of:

A)something the user is.
B)something the user wants.
C)something the user has.
D)something the user knows.
E)something the user does.
Question
Organizations use hot sites, warm sites, and cold sites to insure business continuity. Which of the following statements is not true?

A)A cold site has no equipment.
B)A warm site has no user workstations.
C)A hot site needs to be located close to the organization's offices.
D)A hot site duplicates all of the organization's resources.
E)A warm site does not include actual applications.
Question
Which of the following is not an example of a weak password?

A)IloveIT
B)08141990
C)9AmGt/*
D)Rainer
E)InformationSecurity
Question
Passwords and passphrases are examples of:

A)something the user is.
B)something the user wants.
C)something the user has.
D)something the user knows.
E)something the user does.
Question
You start a new job, and the first thing your new company wants you to do is create a user ID and a password. Which of the following would be a strong password?

A)The name of the company
B)Your last name
C)Your birthdate
D)Your initials (capitalized)and the number of the floor you are on
E)The name of the company spelled backward
Question
Shodan is used for _________.

A)creating a backdoor
B)SCADA attacks
C)spreading viruses
D)phishing
Question
_____ controls are concerned with user identification, and they restrict unauthorized individuals from using information resources.

A)Access
B)Physical
C)Data security
D)Administrative
E)Input
Question
In _____, the organization purchases insurance as a means to compensate for any loss.

A)risk management
B)risk analysis
C)risk mitigation
D)risk acceptance
E)risk transference
Question
Which of the following statements concerning the difficulties in protecting information resources is not correct?

A)Computing resources are typically decentralized.
B)Computer crimes often remain undetected for a long period of time.
C)Rapid technological changes ensure that controls are effective for years.
D)Employees typically do not follow security procedures when the procedures are inconvenient.
E)Computer networks can be located outside the organization.
Question
Shodan's primary purpose is ___________.

A)to be a hacker website
B)to be a service that searches the Internet for devices connected to the Internet
C)to be a website that shows which devices are vulnerable to hackers
D)to help users search for other people who use similar devices
Question
Discuss the possible consequences of a terrorist attack on a supervisory control and data acquisition (SCADA)system.
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/129
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 4: Information Security and Controls
1
Zero-day attacks use deceptive e-mails to acquire sensitive personal information.
False
2
Organizations use authentication to establish privileges to systems operations.
True
3
Voice recognition is an example of "something a user does" authentication.
True
4
In most cases, cookies track your path through websites and are therefore invasions of your privacy.
Unlock Deck
Unlock for access to all 129 flashcards in this deck.
Unlock Deck
k this deck
5
Risk analysis involves determining whether security programs are working.
Unlock Deck
Unlock for access to all 129 flashcards in this deck.
Unlock Deck
k this deck
6
The goal of risk management is to reduce risk to acceptable levels.
Unlock Deck
Unlock for access to all 129 flashcards in this deck.
Unlock Deck
k this deck
7
The higher the level of an employee in organization, the greater the threat that he or she poses to the organization.
Unlock Deck
Unlock for access to all 129 flashcards in this deck.
Unlock Deck
k this deck
8
Public-key encryption uses two different keys, one public and one private.
Unlock Deck
Unlock for access to all 129 flashcards in this deck.
Unlock Deck
k this deck
9
Cyberterrorism and cyberwarfare can attack supervisory control and data acquisition (SCADA)systems to cause widespread physical damage.
Unlock Deck
Unlock for access to all 129 flashcards in this deck.
Unlock Deck
k this deck
10
The security of each computer on the Internet is independent of the security of all other computers on the Internet.
Unlock Deck
Unlock for access to all 129 flashcards in this deck.
Unlock Deck
k this deck
11
The computing skills necessary to be a hacker are decreasing.
Unlock Deck
Unlock for access to all 129 flashcards in this deck.
Unlock Deck
k this deck
12
Supervisory control and data acquisition (SCADA)systems require human data input.
Unlock Deck
Unlock for access to all 129 flashcards in this deck.
Unlock Deck
k this deck
13
Organizations utilize layers of controls because they face so many diverse threats to information security.
Unlock Deck
Unlock for access to all 129 flashcards in this deck.
Unlock Deck
k this deck
14
IT security is the responsibility of everyone in the organization.
Unlock Deck
Unlock for access to all 129 flashcards in this deck.
Unlock Deck
k this deck
15
Software can be copyrighted.
Unlock Deck
Unlock for access to all 129 flashcards in this deck.
Unlock Deck
k this deck
16
Trojan horses are software programs that hide in other computer programs and reveal their designed behaviour only when they are activated.
Unlock Deck
Unlock for access to all 129 flashcards in this deck.
Unlock Deck
k this deck
17
A password refers to "something the user is."
Unlock Deck
Unlock for access to all 129 flashcards in this deck.
Unlock Deck
k this deck
18
Cyberterrorism is usually carried out by nations.
Unlock Deck
Unlock for access to all 129 flashcards in this deck.
Unlock Deck
k this deck
19
Human errors cause more than half of the security-related problems in many organizations.
Unlock Deck
Unlock for access to all 129 flashcards in this deck.
Unlock Deck
k this deck
20
Dumpster diving is always illegal because it involves trespassing on private property.
Unlock Deck
Unlock for access to all 129 flashcards in this deck.
Unlock Deck
k this deck
21
Social engineers often impersonate legitimate employees.
Unlock Deck
Unlock for access to all 129 flashcards in this deck.
Unlock Deck
k this deck
22
Which of the following factors is not increasing the threats to information security?

A)Smaller computing devices
B)Downstream liability
C)The Internet
D)Limited storage capacity on portable devices
E)Due diligence
Unlock Deck
Unlock for access to all 129 flashcards in this deck.
Unlock Deck
k this deck
23
Authentication and authorization are synonyms.
Unlock Deck
Unlock for access to all 129 flashcards in this deck.
Unlock Deck
k this deck
24
The main purpose for the attack on Sony Pictures Entertainment on November 24, 2014, was to stop the release of the movie The Interview.
Unlock Deck
Unlock for access to all 129 flashcards in this deck.
Unlock Deck
k this deck
25
Backup plans are not always necessary.
Unlock Deck
Unlock for access to all 129 flashcards in this deck.
Unlock Deck
k this deck
26
An information system's _______ is the possibility that the system will be harmed by a threat.

A)vulnerability
B)risk
C)control
D)danger
E)compromise
Unlock Deck
Unlock for access to all 129 flashcards in this deck.
Unlock Deck
k this deck
27
The Heartbleed bug is an encryption security flaw in the ___________ software package that was an _____________ mistake by the software developer.

A)Microsoft; intended
B)Microsoft; unintended
C)OpenSSL; intended
D)OpenSSL; unintended
Unlock Deck
Unlock for access to all 129 flashcards in this deck.
Unlock Deck
k this deck
28
A ______ is any danger to which an information resource may be exposed.

A)vulnerability
B)risk
C)control
D)threat
E)compromise
Unlock Deck
Unlock for access to all 129 flashcards in this deck.
Unlock Deck
k this deck
29
A URL that begins with "https" rather than "http" indicates that the site transmits using an extra layer of security called transport layer security.
Unlock Deck
Unlock for access to all 129 flashcards in this deck.
Unlock Deck
k this deck
30
Which of the following is not a consequence of poor information security practices?

A)Stolen information
B)Stolen identities
C)Financial loss
D)Loss of service
E)All of the above are consequences of poor information security practices.
Unlock Deck
Unlock for access to all 129 flashcards in this deck.
Unlock Deck
k this deck
31
A VPN is a network within the organization.
Unlock Deck
Unlock for access to all 129 flashcards in this deck.
Unlock Deck
k this deck
32
The area located between two firewalls within an organization is called the demilitarized zone.
Unlock Deck
Unlock for access to all 129 flashcards in this deck.
Unlock Deck
k this deck
33
You start a dog-walking service, and you store your client's records on your smart phone. You don't need to worry about information security.
Unlock Deck
Unlock for access to all 129 flashcards in this deck.
Unlock Deck
k this deck
34
Unintentional threats to information systems include all of the following except:

A)Malicious software
B)Tailgating
C)Power outage
D)Lack of user experience
E)Tornados
Unlock Deck
Unlock for access to all 129 flashcards in this deck.
Unlock Deck
k this deck
35
Employees in which functional areas of the organization pose particularly grave threats to information security?

A)Human resources, finance
B)Human resources, information systems
C)Finance, marketing
D)Operations management, management information systems
E)Finance, management information systems
Unlock Deck
Unlock for access to all 129 flashcards in this deck.
Unlock Deck
k this deck
36
The most overlooked people in information security are:

A)consultants and temporary hires.
B)secretaries and consultants.
C)contract labourers and executive assistants.
D)janitors and guards.
E)executives and executive secretaries.
Unlock Deck
Unlock for access to all 129 flashcards in this deck.
Unlock Deck
k this deck
37
SCADA attacks like Stuxnet are an act of cyberwarfare.
Unlock Deck
Unlock for access to all 129 flashcards in this deck.
Unlock Deck
k this deck
38
Rank the following in terms of dollar value of the crime, from highest to lowest.

A)Robbery - white-collar crime - cybercrime
B)White-collar crime - extortion - robbery
C)Cybercrime - white-collar crime - robbery
D)Cybercrime - robbery - white-collar crime
E)White-collar crime - burglary - robbery
Unlock Deck
Unlock for access to all 129 flashcards in this deck.
Unlock Deck
k this deck
39
The computing skills necessary to be a hacker are decreasing for which of the following reasons?

A)More information systems and computer science departments are teaching courses on hacking so that their graduates can recognize attacks on information assets.
B)Computer attack programs, called scripts, are available for download from the Internet.
C)International organized crime is training hackers.
D)Cybercrime is much more lucrative than regular white-collar crime.
E)Almost anyone can buy or access a computer today.
Unlock Deck
Unlock for access to all 129 flashcards in this deck.
Unlock Deck
k this deck
40
Cookies in your web browser are not tracked by businesses.
Unlock Deck
Unlock for access to all 129 flashcards in this deck.
Unlock Deck
k this deck
41
_____ are software programs that hide in other computer programs and reveal their designed behaviour only when they are activated.

A)Viruses
B)Worms
C)Trojan horses
D)Back doors
E)Logic bombs
Unlock Deck
Unlock for access to all 129 flashcards in this deck.
Unlock Deck
k this deck
42
A pharmaceutical company's research and development plan for a new class of drugs would be best described as which of the following?

A)Copyrighted material
B)Patented material
C)A trade secret
D)A knowledge base
E)Public property
Unlock Deck
Unlock for access to all 129 flashcards in this deck.
Unlock Deck
k this deck
43
A _____ is intellectual work that is known only to a company and is not based on public information.

A)copyright
B)patent
C)trade secret
D)knowledge base
E)private property
Unlock Deck
Unlock for access to all 129 flashcards in this deck.
Unlock Deck
k this deck
44
A _____ is a document that grants the holder exclusive rights on an invention for 20 years.

A)copyright
B)patent
C)trade secret
D)knowledge base
E)private property notice
Unlock Deck
Unlock for access to all 129 flashcards in this deck.
Unlock Deck
k this deck
45
A _____ attack uses deception to fraudulently acquire sensitive personal information by masquerading as an official e-mail.

A)Virus
B)Denial-of-service
C)Distributed denial-of-service
D)Phishing
E)Brute force dictionary
Unlock Deck
Unlock for access to all 129 flashcards in this deck.
Unlock Deck
k this deck
46
The term _____ refers to clandestine software that is installed on your PC through duplicitous channels but is not particularly malicious.

A)alien software
B)virus
C)worm
D)back door
E)logic bomb
Unlock Deck
Unlock for access to all 129 flashcards in this deck.
Unlock Deck
k this deck
47
The cost of a stolen laptop includes all of the following except:

A)Loss of intellectual property
B)Loss of data
C)Backup costs
D)Loss of productivity
E)Replacement cost
Unlock Deck
Unlock for access to all 129 flashcards in this deck.
Unlock Deck
k this deck
48
In _____, the organization takes concrete actions against risks.

A)risk management
B)risk analysis
C)risk mitigation
D)risk acceptance
E)risk transference
Unlock Deck
Unlock for access to all 129 flashcards in this deck.
Unlock Deck
k this deck
49
_____ are segments of computer code that attach to existing computer programs and perform malicious acts.

A)Viruses
B)Worms
C)Trojan horses
D)Back doors
E)Logic bombs
Unlock Deck
Unlock for access to all 129 flashcards in this deck.
Unlock Deck
k this deck
50
_____ involves building an inappropriate trust relationship with employees for the purpose of gaining sensitive information or unauthorized access privileges.

A)Tailgating
B)Hacking
C)Spoofing
D)Social engineering
E)Spamming
Unlock Deck
Unlock for access to all 129 flashcards in this deck.
Unlock Deck
k this deck
51
Which of the following statements is false?

A)Credit card companies usually block stolen credit cards rather than prosecute.
B)People tend to shortcut security procedures because the procedures are inconvenient.
C)It is easy to assess the value of a hypothetical attack.
D)The online commerce industry isn't willing to install safeguards on credit card transactions.
E)The cost of preventing computer crimes can be very high.
Unlock Deck
Unlock for access to all 129 flashcards in this deck.
Unlock Deck
k this deck
52
_____ are segments of computer code embedded within an organization's existing computer programs that activate and perform a destructive action at a certain time or date.

A)Viruses
B)Worms
C)Trojan horses
D)Back doors
E)Logic bombs
Unlock Deck
Unlock for access to all 129 flashcards in this deck.
Unlock Deck
k this deck
53
_____ is the process in which an organization assesses the value of each asset being protected, estimates the probability that it will be compromised, and compares the probable costs of an attack with the costs of protecting the asset.

A)Risk management
B)Risk analysis
C)Risk mitigation
D)Risk acceptance
E)Risk transference
Unlock Deck
Unlock for access to all 129 flashcards in this deck.
Unlock Deck
k this deck
54
Which of the following is/are designed to use your computer as a launch pad for sending unsolicited e-mail to other computers?

A)Spyware
B)Spamware
C)Adware
D)Viruses
E)Worms
Unlock Deck
Unlock for access to all 129 flashcards in this deck.
Unlock Deck
k this deck
55
Which of the following is not a strategy for mitigating the risk of threats against information?

A)Continue operating with no controls and absorb any damages that occur.
B)Transfer the risk by purchasing insurance.
C)Implement controls that minimize the impact of the threat.
D)Install controls that block the risk.
E)All of the above are strategies for mitigating risk.
Unlock Deck
Unlock for access to all 129 flashcards in this deck.
Unlock Deck
k this deck
56
In a _____ attack, a coordinated stream of requests is launched against a target system from many compromised computers at the same time.

A)phishing
B)virus
C)worm
D)back door
E)distributed denial-of-service
Unlock Deck
Unlock for access to all 129 flashcards in this deck.
Unlock Deck
k this deck
57
Cybercriminals can obtain the information they need in order to assume another person's identity by:

A)infiltrating an organization that stores large amounts of personal information.
B)phishing.
C)hacking into a corporate database.
D)stealing mail.
E)All of the above are strategies to obtain information to assume another person's identity.
Unlock Deck
Unlock for access to all 129 flashcards in this deck.
Unlock Deck
k this deck
58
An organization's e-mail policy has the least impact on which of the following software attacks?

A)Virus
B)Worm
C)Phishing
D)Denial-of-service attack
E)Spear phishing
Unlock Deck
Unlock for access to all 129 flashcards in this deck.
Unlock Deck
k this deck
59
When companies attempt to counter _____ by requiring users to accurately select characters in turn from a series of boxes, attackers respond by using _____.

A)keyloggers; screen scrapers
B)screen scrapers; uninstallers
C)keyloggers; spam
D)screen scrapers; keyloggers
E)spam; keyloggers
Unlock Deck
Unlock for access to all 129 flashcards in this deck.
Unlock Deck
k this deck
60
Dumpster diving is:

A)always illegal because it is considered trespassing.
B)never illegal because it is not considered trespassing.
C)typically committed for the purpose of identity theft.
D)always illegal because individuals own the material in the dumpster.
E)always legal because the dumpster is not owned by private citizens.
Unlock Deck
Unlock for access to all 129 flashcards in this deck.
Unlock Deck
k this deck
61
Biometrics are an example of:

A)something the user is.
B)something the user wants.
C)something the user has.
D)something the user knows.
E)something the user does.
Unlock Deck
Unlock for access to all 129 flashcards in this deck.
Unlock Deck
k this deck
62
You receive an e-mail from your bank informing you that they are updating their records and need your password. Which of the following statements is true?

A)The message could be an industrial espionage attack.
B)The message could be a phishing attack.
C)The message could be a denial-of-service attack.
D)The message could be a back-door attack.
E)The message could be a Trojan horse attack.
Unlock Deck
Unlock for access to all 129 flashcards in this deck.
Unlock Deck
k this deck
63
Which of the following is not a characteristic of strong passwords?

A)They are difficult to guess.
B)They contain special characters.
C)They are not a recognizable word.
D)They are not a recognizable string of numbers
E)They tend to be short so they are easy to remember.
Unlock Deck
Unlock for access to all 129 flashcards in this deck.
Unlock Deck
k this deck
64
According to the "Catching a Hacker" case, ____________ is one of the most sophisticated and destructive malicious software programs ever developed.

A)the Heartbleed bug
B)FireEye
C)Shodan
D)SpyEye
Unlock Deck
Unlock for access to all 129 flashcards in this deck.
Unlock Deck
k this deck
65
Access controls involve _______ before _______.

A)biometrics, signature recognition
B)authentication, authorization
C)iris scanning, voice recognition
D)strong passwords, biometrics
E)authorization, authentication
Unlock Deck
Unlock for access to all 129 flashcards in this deck.
Unlock Deck
k this deck
66
Bob is using public key encryption to send a message to Ted. Bob encrypts the message with Ted's _____ key, and Ted decrypts the message using his _____ key.

A)public, public
B)public, private
C)private, private
D)private, public
E)None of these
Unlock Deck
Unlock for access to all 129 flashcards in this deck.
Unlock Deck
k this deck
67
Which of the following statements concerning firewalls is not true?

A)Firewalls prevent unauthorized Internet users from accessing private networks.
B)Firewalls examine every message that enters or leaves an organization's network.
C)Firewalls filter network traffic according to categories of activities that are likely to cause problems.
D)Firewalls filter messages the same way as anti-malware systems do.
E)Firewalls are sometimes located inside an organization's private network.
Unlock Deck
Unlock for access to all 129 flashcards in this deck.
Unlock Deck
k this deck
68
Your company's headquarters was just hit head-on by a hurricane, and the building has lost power. The company sends you to their hot site to minimize downtime from the disaster. Which of the following statements is true?

A)The site will not have any servers.
B)The site will not have any workstations, so you need to bring your laptop.
C)The site is probably in the next town.
D)The site should be an almost exact replica of the IT configuration at headquarters.
E)The site will not have up-to-date data.
Unlock Deck
Unlock for access to all 129 flashcards in this deck.
Unlock Deck
k this deck
69
In a process called _____, a company allows nothing to run unless it is approved, whereas in a process called _____, the company allows everything to run unless it is not approved.

A)whitelisting, blacklisting
B)whitelisting, encryption
C)encryption, whitelisting
D)encryption, blacklisting
E)blacklisting, whitelisting
Unlock Deck
Unlock for access to all 129 flashcards in this deck.
Unlock Deck
k this deck
70
Voice and signature recognition are examples of:

A)something the user is.
B)something the user wants.
C)something the user has.
D)something the user knows.
E)something the user does.
Unlock Deck
Unlock for access to all 129 flashcards in this deck.
Unlock Deck
k this deck
71
Organizations use hot sites, warm sites, and cold sites to insure business continuity. Which of the following statements is not true?

A)A cold site has no equipment.
B)A warm site has no user workstations.
C)A hot site needs to be located close to the organization's offices.
D)A hot site duplicates all of the organization's resources.
E)A warm site does not include actual applications.
Unlock Deck
Unlock for access to all 129 flashcards in this deck.
Unlock Deck
k this deck
72
Which of the following is not an example of a weak password?

A)IloveIT
B)08141990
C)9AmGt/*
D)Rainer
E)InformationSecurity
Unlock Deck
Unlock for access to all 129 flashcards in this deck.
Unlock Deck
k this deck
73
Passwords and passphrases are examples of:

A)something the user is.
B)something the user wants.
C)something the user has.
D)something the user knows.
E)something the user does.
Unlock Deck
Unlock for access to all 129 flashcards in this deck.
Unlock Deck
k this deck
74
You start a new job, and the first thing your new company wants you to do is create a user ID and a password. Which of the following would be a strong password?

A)The name of the company
B)Your last name
C)Your birthdate
D)Your initials (capitalized)and the number of the floor you are on
E)The name of the company spelled backward
Unlock Deck
Unlock for access to all 129 flashcards in this deck.
Unlock Deck
k this deck
75
Shodan is used for _________.

A)creating a backdoor
B)SCADA attacks
C)spreading viruses
D)phishing
Unlock Deck
Unlock for access to all 129 flashcards in this deck.
Unlock Deck
k this deck
76
_____ controls are concerned with user identification, and they restrict unauthorized individuals from using information resources.

A)Access
B)Physical
C)Data security
D)Administrative
E)Input
Unlock Deck
Unlock for access to all 129 flashcards in this deck.
Unlock Deck
k this deck
77
In _____, the organization purchases insurance as a means to compensate for any loss.

A)risk management
B)risk analysis
C)risk mitigation
D)risk acceptance
E)risk transference
Unlock Deck
Unlock for access to all 129 flashcards in this deck.
Unlock Deck
k this deck
78
Which of the following statements concerning the difficulties in protecting information resources is not correct?

A)Computing resources are typically decentralized.
B)Computer crimes often remain undetected for a long period of time.
C)Rapid technological changes ensure that controls are effective for years.
D)Employees typically do not follow security procedures when the procedures are inconvenient.
E)Computer networks can be located outside the organization.
Unlock Deck
Unlock for access to all 129 flashcards in this deck.
Unlock Deck
k this deck
79
Shodan's primary purpose is ___________.

A)to be a hacker website
B)to be a service that searches the Internet for devices connected to the Internet
C)to be a website that shows which devices are vulnerable to hackers
D)to help users search for other people who use similar devices
Unlock Deck
Unlock for access to all 129 flashcards in this deck.
Unlock Deck
k this deck
80
Discuss the possible consequences of a terrorist attack on a supervisory control and data acquisition (SCADA)system.
Unlock Deck
Unlock for access to all 129 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 129 flashcards in this deck.