Deck 12: Information Security Management
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/157
Play
Full screen (f)
Deck 12: Information Security Management
1
The GLB Act protects__________ data stored by banks.
A) Internet customer orders
B) consumer financial
C) school records
D) book orders
E) health care
A) Internet customer orders
B) consumer financial
C) school records
D) book orders
E) health care
consumer financial
2
When an employee is terminated, system administrators should receive advance notice so they can:
A) get the employees computer.
B) remove accounts and passwords.
C) plan a termination party.
D) plan for security changes.
E) fight over the person's office.
A) get the employees computer.
B) remove accounts and passwords.
C) plan a termination party.
D) plan for security changes.
E) fight over the person's office.
B
3
__________, which are the patterns that exist in malware code, should be downloaded and updated frequently.
A) Software updates
B) Malware patterns
C) Network patches
D) Malware definitions
A) Software updates
B) Malware patterns
C) Network patches
D) Malware definitions
Malware definitions
4
__________are the primary means of authentication.
A) Passwords
B) Single sign- on
C) Encrypted keys
D) Network administrators
E) Facial scans
A) Passwords
B) Single sign- on
C) Encrypted keys
D) Network administrators
E) Facial scans
Unlock Deck
Unlock for access to all 157 flashcards in this deck.
Unlock Deck
k this deck
5
Which of the following is NOT a human error or mistake?
A) hacking
B) installing an old application on top of new one
C) entering a zero for an eight in a database
D) driving a forklift through the wall of a server room
A) hacking
B) installing an old application on top of new one
C) entering a zero for an eight in a database
D) driving a forklift through the wall of a server room
Unlock Deck
Unlock for access to all 157 flashcards in this deck.
Unlock Deck
k this deck
6
A(n) __________card has a microchip on it that is loaded with identifying data.
A) ATM
B) debit
C) smart
D) credit
A) ATM
B) debit
C) smart
D) credit
Unlock Deck
Unlock for access to all 157 flashcards in this deck.
Unlock Deck
k this deck
7
From one study by AOL, it was found that only five percent of those users who had malware on their computers:
A) said they updated their antivirus software in the past week.
B) thought they didn't have a virus.
C) gave permission for the adware to be installed.
D) knew what a virus was.
A) said they updated their antivirus software in the past week.
B) thought they didn't have a virus.
C) gave permission for the adware to be installed.
D) knew what a virus was.
Unlock Deck
Unlock for access to all 157 flashcards in this deck.
Unlock Deck
k this deck
8
Since most organizations are protected by a(n) __________, it is not surprising that most viruses spread via email.
A) white- hat hacker
B) firewall
C) data dictionary
D) biometric authentication device
E) antivirus program
A) white- hat hacker
B) firewall
C) data dictionary
D) biometric authentication device
E) antivirus program
Unlock Deck
Unlock for access to all 157 flashcards in this deck.
Unlock Deck
k this deck
9
__________encryption uses the same key for both parties.
A) SSL
B) Asymmetric
C) Single- key
D) Symmetric
E) TLS
A) SSL
B) Asymmetric
C) Single- key
D) Symmetric
E) TLS
Unlock Deck
Unlock for access to all 157 flashcards in this deck.
Unlock Deck
k this deck
10
Users often resist biometric identification because they feel it is:
A) invasive.
B) too technical.
C) ineffective.
D) expensive.
E) hard to use.
A) invasive.
B) too technical.
C) ineffective.
D) expensive.
E) hard to use.
Unlock Deck
Unlock for access to all 157 flashcards in this deck.
Unlock Deck
k this deck
11
A hacker can launch a denial of service attack against a Web server by__________ it with millions of bogus service requests.
A) hacking
B) denying
C) flooding
D) programming
E) probing
A) hacking
B) denying
C) flooding
D) programming
E) probing
Unlock Deck
Unlock for access to all 157 flashcards in this deck.
Unlock Deck
k this deck
12
A ____________ is someone who pretends to be a legitimate company and sends email requesting confidential data.
A) hawker
B) spoofer
C) phisher
D) employee
E) hacker
A) hawker
B) spoofer
C) phisher
D) employee
E) hacker
Unlock Deck
Unlock for access to all 157 flashcards in this deck.
Unlock Deck
k this deck
13
One of the most important security tasks for management is ___________ management.
A) problem
B) vulnerability
C) risk
D) uncertainty
E) assessment
A) problem
B) vulnerability
C) risk
D) uncertainty
E) assessment
Unlock Deck
Unlock for access to all 157 flashcards in this deck.
Unlock Deck
k this deck
14
Management should compose a security __________in order to communicate the goals and specifications of the organization's security program.
A) report
B) policy
C) manual
D) white paper
E) memo
A) report
B) policy
C) manual
D) white paper
E) memo
Unlock Deck
Unlock for access to all 157 flashcards in this deck.
Unlock Deck
k this deck
15
__________is a protocol that uses both symmetric and asymmetric encryption.
A) OSI
B) TCP
C) SSL
D) TSL
E) CA
A) OSI
B) TCP
C) SSL
D) TSL
E) CA
Unlock Deck
Unlock for access to all 157 flashcards in this deck.
Unlock Deck
k this deck
16
__________manipulates messages mathematically to create bit strings.
A) TLS
B) Hashing
C) Digests
D) Authentication programs
E) SSL
A) TLS
B) Hashing
C) Digests
D) Authentication programs
E) SSL
Unlock Deck
Unlock for access to all 157 flashcards in this deck.
Unlock Deck
k this deck
17
__________is when someone deceives by pretending to be someone else.
A) Sniffing
B) Spoofing
C) Pretexting
D) Hacking
E) Phishing
A) Sniffing
B) Spoofing
C) Pretexting
D) Hacking
E) Phishing
Unlock Deck
Unlock for access to all 157 flashcards in this deck.
Unlock Deck
k this deck
18
About ninety percent of all viruses are spread via__________ .
A) technology
B) spreadsheets
C) email
D) AOL.
E) network worms
A) technology
B) spreadsheets
C) email
D) AOL.
E) network worms
Unlock Deck
Unlock for access to all 157 flashcards in this deck.
Unlock Deck
k this deck
19
Passwords have weaknesses because users often choose simple passwords, which__________ systems can easily guess.
A) intrusion
B) biometric
C) security
D) antivirus
E) malware
A) intrusion
B) biometric
C) security
D) antivirus
E) malware
Unlock Deck
Unlock for access to all 157 flashcards in this deck.
Unlock Deck
k this deck
20
Loss of infrastructure can be caused by:
A) terrorism.
B) Trojan horses.
C) hacking.
D) worms.
E) viruses.
A) terrorism.
B) Trojan horses.
C) hacking.
D) worms.
E) viruses.
Unlock Deck
Unlock for access to all 157 flashcards in this deck.
Unlock Deck
k this deck
21
Which of the following is a wireless security standard?
A) WPA
B) WEP
C) WPA2
D) all of the above
E) none of the above
A) WPA
B) WEP
C) WPA2
D) all of the above
E) none of the above
Unlock Deck
Unlock for access to all 157 flashcards in this deck.
Unlock Deck
k this deck
22
__________considerations should be part of the hiring process.
A) Gender
B) Age
C) Weight
D) Security
A) Gender
B) Age
C) Weight
D) Security
Unlock Deck
Unlock for access to all 157 flashcards in this deck.
Unlock Deck
k this deck
23
Which of the following is a threat to security?
A) earthquakes
B) hackers
C) employees accidentally deleting records
D) terrorism
E) all of the above
A) earthquakes
B) hackers
C) employees accidentally deleting records
D) terrorism
E) all of the above
Unlock Deck
Unlock for access to all 157 flashcards in this deck.
Unlock Deck
k this deck
24
__________safeguards involve the people and procedure components of information systems.
A) Human
B) Firewall
C) Technical
D) Malware
E) Data
A) Human
B) Firewall
C) Technical
D) Malware
E) Data
Unlock Deck
Unlock for access to all 157 flashcards in this deck.
Unlock Deck
k this deck
25
Organizations should store at least some of the backups of the database contents ___________, possibly in a remote location.
A) on site
B) in situ
C) off site
D) on hard drives
A) on site
B) in situ
C) off site
D) on hard drives
Unlock Deck
Unlock for access to all 157 flashcards in this deck.
Unlock Deck
k this deck
26
It is possible for some malware to install itself on your computer by doing nothing more than opening a(n):
A) Web page.
B) account.
C) computer.
D) file.
A) Web page.
B) account.
C) computer.
D) file.
Unlock Deck
Unlock for access to all 157 flashcards in this deck.
Unlock Deck
k this deck
27
Which of the following is not considered malicious human activity?
A) robbing a safe
B) poorly written application programs
C) terrorism
D) hacking
A) robbing a safe
B) poorly written application programs
C) terrorism
D) hacking
Unlock Deck
Unlock for access to all 157 flashcards in this deck.
Unlock Deck
k this deck
28
Technology for protecting documents is called ___________.
A) SSL
B) DRM
C) E- DRM
D) TLS
A) SSL
B) DRM
C) E- DRM
D) TLS
Unlock Deck
Unlock for access to all 157 flashcards in this deck.
Unlock Deck
k this deck
29
Users should scan their computers with anti- malware programs at least:
A) once a month.
B) daily.
C) biannually.
D) once a year.
E) once a week.
A) once a month.
B) daily.
C) biannually.
D) once a year.
E) once a week.
Unlock Deck
Unlock for access to all 157 flashcards in this deck.
Unlock Deck
k this deck
30
A common protection for wireless access is:
A) single sign- on.
B) Kerberos.
C) Sniffer.
D) VPN.
A) single sign- on.
B) Kerberos.
C) Sniffer.
D) VPN.
Unlock Deck
Unlock for access to all 157 flashcards in this deck.
Unlock Deck
k this deck
31
Some unauthorized programs are able to __________the legitimate system and substitute their own processing.
A) overwhelm
B) hack
C) usurp
D) deny
E) complement
A) overwhelm
B) hack
C) usurp
D) deny
E) complement
Unlock Deck
Unlock for access to all 157 flashcards in this deck.
Unlock Deck
k this deck
32
The purpose of a(n) ___________ is to protect databases and other organizational data.
A) data security group
B) steering committee
C) operations group
D) data safeguard
E) data warehouse
A) data security group
B) steering committee
C) operations group
D) data safeguard
E) data warehouse
Unlock Deck
Unlock for access to all 157 flashcards in this deck.
Unlock Deck
k this deck
33
Security programs have __________components.
A) five
B) eight
C) two
D) twelve
E) three
A) five
B) eight
C) two
D) twelve
E) three
Unlock Deck
Unlock for access to all 157 flashcards in this deck.
Unlock Deck
k this deck
34
When an employee notices a virus on his machine, the ___________ plan should specify what to do.
A) company
B) incident response
C) antivirus
D) technology
E) security
A) company
B) incident response
C) antivirus
D) technology
E) security
Unlock Deck
Unlock for access to all 157 flashcards in this deck.
Unlock Deck
k this deck
35
In the United States, ___________ was passed to give individuals the right to access their own health data.
A) HIPAA
B) Gramm- Leach- Biley Act
C) Gramm- Rudman Bill
D) Privacy Act of 1974
E) Sarbanes- Oxley Bill
A) HIPAA
B) Gramm- Leach- Biley Act
C) Gramm- Rudman Bill
D) Privacy Act of 1974
E) Sarbanes- Oxley Bill
Unlock Deck
Unlock for access to all 157 flashcards in this deck.
Unlock Deck
k this deck
36
Firewalls produce__________ of their activities, which include lists of all dropped packets, and attempts to gain unauthorized access.
A) lists
B) logs
C) accounts
D) programs
E) calls
A) lists
B) logs
C) accounts
D) programs
E) calls
Unlock Deck
Unlock for access to all 157 flashcards in this deck.
Unlock Deck
k this deck
37
Be sure and purchase your antispyware program from a__________ vendor, because some of the free programs in the past were actually malware programs in disguise.
A) inexpensive
B) reasonable
C) illegitimate
D) reputable
E) entrepreneurial
A) inexpensive
B) reasonable
C) illegitimate
D) reputable
E) entrepreneurial
Unlock Deck
Unlock for access to all 157 flashcards in this deck.
Unlock Deck
k this deck
38
Because they kept giving out passwords to users who claimed to have forgotten them, the ___________ were a serious security risk in the organization.
A) interns
B) developers
C) data administrators
D) executives
E) help- desks
A) interns
B) developers
C) data administrators
D) executives
E) help- desks
Unlock Deck
Unlock for access to all 157 flashcards in this deck.
Unlock Deck
k this deck
39
Organizations should protect sensitive data by storing it in__________ form.
A) standardized
B) compressed
C) digital
D) secure
E) encrypted
A) standardized
B) compressed
C) digital
D) secure
E) encrypted
Unlock Deck
Unlock for access to all 157 flashcards in this deck.
Unlock Deck
k this deck
40
In order to prioritize their activities as far as possible risk and loss to the organization, security personnel have to document the position__________ of all employees.
A) data access
B) level
C) sensitivity
D) riskiness
E) controls
A) data access
B) level
C) sensitivity
D) riskiness
E) controls
Unlock Deck
Unlock for access to all 157 flashcards in this deck.
Unlock Deck
k this deck
41
A weakness in a security system is known as a system:
A) safeguard.
B) condition.
C) vulnerability.
D) weakness.
E) problem.
A) safeguard.
B) condition.
C) vulnerability.
D) weakness.
E) problem.
Unlock Deck
Unlock for access to all 157 flashcards in this deck.
Unlock Deck
k this deck
42
A ____________ has three elements: the security program, the issue specific policy and the system specific policy.
Unlock Deck
Unlock for access to all 157 flashcards in this deck.
Unlock Deck
k this deck
43
__________is when messages are encoded by the sender and then decoded on the other end by the receiver.
Unlock Deck
Unlock for access to all 157 flashcards in this deck.
Unlock Deck
k this deck
44
__________resides in the background and observes the user's behavior, but is usually benign.
Unlock Deck
Unlock for access to all 157 flashcards in this deck.
Unlock Deck
k this deck
45
A ___________ is a remote processing center run by a commercial disaster- recovery service that provides all the equipment needed to continue operations after a disaster.
A) disaster site
B) hot site
C) cold site
D) development site
E) Web farm
A) disaster site
B) hot site
C) cold site
D) development site
E) Web farm
Unlock Deck
Unlock for access to all 157 flashcards in this deck.
Unlock Deck
k this deck
46
__________refers to things we do not know that we do not know.
A) Uncertainty
B) Problem
C) Assessment
D) Vulnerability
E) Risk
A) Uncertainty
B) Problem
C) Assessment
D) Vulnerability
E) Risk
Unlock Deck
Unlock for access to all 157 flashcards in this deck.
Unlock Deck
k this deck
47
__________use private keys to "sign" a message digest.
Unlock Deck
Unlock for access to all 157 flashcards in this deck.
Unlock Deck
k this deck
48
__________could be viruses, adware, or spyware.
Unlock Deck
Unlock for access to all 157 flashcards in this deck.
Unlock Deck
k this deck
49
__________is a technique for intercepting computer communications.
A) Pretexting
B) Sniffing
C) Phishing
D) Spoofing
E) Hacking
A) Pretexting
B) Sniffing
C) Phishing
D) Spoofing
E) Hacking
Unlock Deck
Unlock for access to all 157 flashcards in this deck.
Unlock Deck
k this deck
50
A computer ___________ is a program that infiltrates networks and generates so much artificial traffic that it virtually shuts down the network for legitimate traffic.
Unlock Deck
Unlock for access to all 157 flashcards in this deck.
Unlock Deck
k this deck
51
Drive- by sniffers simply take computers with__________ connections through an area and search for unprotected networks.
Unlock Deck
Unlock for access to all 157 flashcards in this deck.
Unlock Deck
k this deck
52
Because encryption slows processing, most messages are sent over the Internet as:
A) queries.
B) compressed data.
C) zip files.
D) plaintext.
E) code.
A) queries.
B) compressed data.
C) zip files.
D) plaintext.
E) code.
Unlock Deck
Unlock for access to all 157 flashcards in this deck.
Unlock Deck
k this deck
53
In order to intercept communications on__________ networks, drive- by sniffers simply drive or walk around with computers with wireless connections.
A) ISP
B) wireless
C) LAN
D) commercial
E) WAN
A) ISP
B) wireless
C) LAN
D) commercial
E) WAN
Unlock Deck
Unlock for access to all 157 flashcards in this deck.
Unlock Deck
k this deck
54
Computing infrastructure should be located in__________ buildings designed to house expensive and critical equipment.
A) fire- resistant
B) hot- site
C) remote
D) easily accessible
E) high- tech
A) fire- resistant
B) hot- site
C) remote
D) easily accessible
E) high- tech
Unlock Deck
Unlock for access to all 157 flashcards in this deck.
Unlock Deck
k this deck
55
A company should clearly define the security __________for each position.
A) safeguards
B) responsibilities
C) backups
D) levels
E) accounts
A) safeguards
B) responsibilities
C) backups
D) levels
E) accounts
Unlock Deck
Unlock for access to all 157 flashcards in this deck.
Unlock Deck
k this deck
56
Even with security safeguards in place, there is always going to be some __________risk.
Unlock Deck
Unlock for access to all 157 flashcards in this deck.
Unlock Deck
k this deck
57
__________consequences of security attacks are those whose financial impacts can be measured.
A) Operational
B) Intangible
C) Legal
D) Tangible
E) Financial
A) Operational
B) Intangible
C) Legal
D) Tangible
E) Financial
Unlock Deck
Unlock for access to all 157 flashcards in this deck.
Unlock Deck
k this deck
58
Fingerprints and facial features are used to provide authentication for ___________ security devices.
Unlock Deck
Unlock for access to all 157 flashcards in this deck.
Unlock Deck
k this deck
59
In addition to capturing credit card numbers, phishing schemes sometimes install__________on your computer.
Unlock Deck
Unlock for access to all 157 flashcards in this deck.
Unlock Deck
k this deck
60
Because encryption keys can be lost or destroyed, a copy of the key should stored with a trusted third party called a(n):
A) key escrow.
B) control account.
C) authentication certifier.
D) key account.
E) white- hat hacker.
A) key escrow.
B) control account.
C) authentication certifier.
D) key account.
E) white- hat hacker.
Unlock Deck
Unlock for access to all 157 flashcards in this deck.
Unlock Deck
k this deck
61
Australia has ___________ individual privacy laws than most other countries.
Unlock Deck
Unlock for access to all 157 flashcards in this deck.
Unlock Deck
k this deck
62
The first step in practicing risk management is to assess what the _ ___________ are.
Unlock Deck
Unlock for access to all 157 flashcards in this deck.
Unlock Deck
k this deck
63
___________ occurs when unauthorized programs invade a computer system and replace legitimate programs.
Unlock Deck
Unlock for access to all 157 flashcards in this deck.
Unlock Deck
k this deck
64
A __________ is an operation that spoofs legitimate companies in an attempt to illegally capture credit card or bank account numbers.
Unlock Deck
Unlock for access to all 157 flashcards in this deck.
Unlock Deck
k this deck
65
The __________publishes a handbook that suggests what management should do to address security issues.
Unlock Deck
Unlock for access to all 157 flashcards in this deck.
Unlock Deck
k this deck
66
Computer security should have the appropriate__________analysis.
Unlock Deck
Unlock for access to all 157 flashcards in this deck.
Unlock Deck
k this deck
67
Unauthorized data disclosure can occur by simple human __________when someone inadvertently releases data in violation of a policy.
Unlock Deck
Unlock for access to all 157 flashcards in this deck.
Unlock Deck
k this deck
68
Firewalls use__________ to establish rules for which packets will be allowed through the firewall.
Unlock Deck
Unlock for access to all 157 flashcards in this deck.
Unlock Deck
k this deck
69
To protect their wireless networks, large businesses with sophisticated equipment commonly use special security servers and__________ for secure data transmission.
Unlock Deck
Unlock for access to all 157 flashcards in this deck.
Unlock Deck
k this deck
70
Pop- up ads are an example of ___________.
Unlock Deck
Unlock for access to all 157 flashcards in this deck.
Unlock Deck
k this deck
71
A ___________ number must be entered when using a smart card in order to provide authentication.
Unlock Deck
Unlock for access to all 157 flashcards in this deck.
Unlock Deck
k this deck
72
When someone calls and pretends to be from a credit card company in order to check the validity of your credit card number, they are most likely engaging in __________.
Unlock Deck
Unlock for access to all 157 flashcards in this deck.
Unlock Deck
k this deck
73
A__________ is an opening or a weakness in the security system.
Unlock Deck
Unlock for access to all 157 flashcards in this deck.
Unlock Deck
k this deck
74
A __________firewall examines each packet and determines whether to let the packet pass.
Unlock Deck
Unlock for access to all 157 flashcards in this deck.
Unlock Deck
k this deck
75
__________is a technique for intercepting computer communications.
Unlock Deck
Unlock for access to all 157 flashcards in this deck.
Unlock Deck
k this deck
76
Some new operating systems offer a feature called__________, which remembers your data once you enter it the first time and authenticates you to other machines in the network.
Unlock Deck
Unlock for access to all 157 flashcards in this deck.
Unlock Deck
k this deck
77
Operating systems today have the capability to__________ you to multiple networks and servers.
Unlock Deck
Unlock for access to all 157 flashcards in this deck.
Unlock Deck
k this deck
78
An organization's security __________has three components: senior management involvement, safeguards, and a planned incident response.
Unlock Deck
Unlock for access to all 157 flashcards in this deck.
Unlock Deck
k this deck
79
By starting a computationally intense application at the wrong time, users can inadvertently shut down a network or Web server resulting in a __________.
Unlock Deck
Unlock for access to all 157 flashcards in this deck.
Unlock Deck
k this deck
80
With __________encryption, sender and receiver transmit a message using the same key.
Unlock Deck
Unlock for access to all 157 flashcards in this deck.
Unlock Deck
k this deck