Deck 12: Information Security Management
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/115
Play
Full screen (f)
Deck 12: Information Security Management
1
Passwords have weaknesses because users often choose simple passwords,which ___________systems can easily guess.
A)security
B)antivirus
C)biometric
D)intrusion
E)malware
A)security
B)antivirus
C)biometric
D)intrusion
E)malware
intrusion
2
__________is an organization -wide function that is in charge of developing data policies and enforcing data standards.
A)Data rights administration
B)Data adminstration
C)Data safeguarding
D)Data integrity
E)Data contents protection
A)Data rights administration
B)Data adminstration
C)Data safeguarding
D)Data integrity
E)Data contents protection
Data integrity
3
Because they kept giving out passwords to users who claimed to have forgotten them, ___________were a serious security risk in the organization.
A)data administrators
B)executives
C)help desks
D)developers
E)interns
A)data administrators
B)executives
C)help desks
D)developers
E)interns
help desks
4
A company should clearly define the security__________for each position.
A)levels
B)safeguards
C)accounts
D)backups
E)responsibilities
A)levels
B)safeguards
C)accounts
D)backups
E)responsibilities
Unlock Deck
Unlock for access to all 115 flashcards in this deck.
Unlock Deck
k this deck
5
According to PIPEDA every organization needs to assign the responsibility of__________to an individual in that organization.
A)using personal information
B)maintaining personal information
C)disclosing personal information
D)keeping personal information private
E)collecting personal information
A)using personal information
B)maintaining personal information
C)disclosing personal information
D)keeping personal information private
E)collecting personal information
Unlock Deck
Unlock for access to all 115 flashcards in this deck.
Unlock Deck
k this deck
6
Users often resist biometric identification because they feel it is
A)too technical.
B)ineffective.
C)invasive.
D)hard to use.
E)expensive.
A)too technical.
B)ineffective.
C)invasive.
D)hard to use.
E)expensive.
Unlock Deck
Unlock for access to all 115 flashcards in this deck.
Unlock Deck
k this deck
7
In order to intercept communications on__________ networks,drive -by sniffers simply drive or walk around with computers with wireless connections.
A)WAN
B)wireless
C)LAN
D)commercial
E)ISP
A)WAN
B)wireless
C)LAN
D)commercial
E)ISP
Unlock Deck
Unlock for access to all 115 flashcards in this deck.
Unlock Deck
k this deck
8
PIPEDA gives individuals the right to know why an organization is__________their personal information.
A)collecting and changing
B)collecting and disclosing
C)using and disclosing
D)collecting,using and disclosing
E)changing
A)collecting and changing
B)collecting and disclosing
C)using and disclosing
D)collecting,using and disclosing
E)changing
Unlock Deck
Unlock for access to all 115 flashcards in this deck.
Unlock Deck
k this deck
9
Users should be given (the)_________ _to perform their jobs
A)user privileges
B)least possible privileges needed
C)company standard privileges
D)administrator privileges
E)most possible privileges needed
A)user privileges
B)least possible privileges needed
C)company standard privileges
D)administrator privileges
E)most possible privileges needed
Unlock Deck
Unlock for access to all 115 flashcards in this deck.
Unlock Deck
k this deck
10
A hacker can launch a denial of service attack against a web server by__________it with millions of bogus service requests.
A)probing
B)flooding
C)hacking
D)denying
E)programming
A)probing
B)flooding
C)hacking
D)denying
E)programming
Unlock Deck
Unlock for access to all 115 flashcards in this deck.
Unlock Deck
k this deck
11
Computing infrastructure should be located in__________buildings designed to house expensive and critical equipment.
A)hot -site
B)fire -resistant
C)remote
D)high -tech
E)easily accessible
A)hot -site
B)fire -resistant
C)remote
D)high -tech
E)easily accessible
Unlock Deck
Unlock for access to all 115 flashcards in this deck.
Unlock Deck
k this deck
12
A security incident reporting plan should__________all incident reports.
A)prioritize
B)centralize
C)generalize
D)standardize
E)decentralize
A)prioritize
B)centralize
C)generalize
D)standardize
E)decentralize
Unlock Deck
Unlock for access to all 115 flashcards in this deck.
Unlock Deck
k this deck
13
Enforcement consists of___________ interdependent factors.
A)3
B)6
C)4
D)2
E)5
A)3
B)6
C)4
D)2
E)5
Unlock Deck
Unlock for access to all 115 flashcards in this deck.
Unlock Deck
k this deck
14
Adware is___________than spyware.
A)more serious
B)less annoying than spyware.
C)harder to get rid of
D)more malicious
E)more benign
A)more serious
B)less annoying than spyware.
C)harder to get rid of
D)more malicious
E)more benign
Unlock Deck
Unlock for access to all 115 flashcards in this deck.
Unlock Deck
k this deck
15
It is possible for some malware to install itself on your computer by you doing nothing more than opening a(n)
A)file.
B)e -mail
C)computer.
D)account.
E)web page.
A)file.
B)e -mail
C)computer.
D)account.
E)web page.
Unlock Deck
Unlock for access to all 115 flashcards in this deck.
Unlock Deck
k this deck
16
The popularity and efficacy of search engines like Google have created a source of
A)inadvertent information disclosure.
B)pretexting.
C)sniffing.
D)entertainment.
E)phishing.
A)inadvertent information disclosure.
B)pretexting.
C)sniffing.
D)entertainment.
E)phishing.
Unlock Deck
Unlock for access to all 115 flashcards in this deck.
Unlock Deck
k this deck
17
The best way to safeguard a web site from public users is to__________ the web site against an attack.
A)defend
B)harden
C)secure
D)prepare
E)update
A)defend
B)harden
C)secure
D)prepare
E)update
Unlock Deck
Unlock for access to all 115 flashcards in this deck.
Unlock Deck
k this deck
18
__________is a technique for intercepting computer communications.
A)Sniffing
B)Hacking
C)Phishing
D)Pretexting
E)Spoofing
A)Sniffing
B)Hacking
C)Phishing
D)Pretexting
E)Spoofing
Unlock Deck
Unlock for access to all 115 flashcards in this deck.
Unlock Deck
k this deck
19
A __________is a remote processing centre run by a commercial disaster -recovery service that provides all the equipment needed to continue operations after a disaster.
A)disaster site
B)cold site
C)web farm
D)hot site
E)development site
A)disaster site
B)cold site
C)web farm
D)hot site
E)development site
Unlock Deck
Unlock for access to all 115 flashcards in this deck.
Unlock Deck
k this deck
20
Organizations should protect sensitive data by storing it in__________form.
A)standardized
B)encrypted
C)digital
D)compressed
E)secure
A)standardized
B)encrypted
C)digital
D)compressed
E)secure
Unlock Deck
Unlock for access to all 115 flashcards in this deck.
Unlock Deck
k this deck
21
Google's Street View allows you to click on streets in a Google Maps and get street view images of the location including people on the street at the time of the photograph.Google has brought street view to Canada.When Google said thy were bringing street view to Canada,privacy advocates were concerned that this program may violate PIPEDA because
A)Google has failed to gain the consent of people before collecting the images in the photographs.
B)Google places the images on a server governed by the Homeland Security Act.
C)Google does not have a mechanism to give Canadians whose images are retained in the database to correct inaccuracies.
D)A and B only
E)A and C only
A)Google has failed to gain the consent of people before collecting the images in the photographs.
B)Google places the images on a server governed by the Homeland Security Act.
C)Google does not have a mechanism to give Canadians whose images are retained in the database to correct inaccuracies.
D)A and B only
E)A and C only
Unlock Deck
Unlock for access to all 115 flashcards in this deck.
Unlock Deck
k this deck
22
The existence of___________ accounts is a serious security threat.
A)modified
B)network
C)employee
D)old
E)unused
A)modified
B)network
C)employee
D)old
E)unused
Unlock Deck
Unlock for access to all 115 flashcards in this deck.
Unlock Deck
k this deck
23
Organizations should store at least some of the backups of the database contents___________, possibly in a remote location. ,possibly
A)in situ
B)on site
C)on hard drives
D)off site
A)in situ
B)on site
C)on hard drives
D)off site
Unlock Deck
Unlock for access to all 115 flashcards in this deck.
Unlock Deck
k this deck
24
A(n)___________is someone who pretends to be a legitimate company and sends e -mail requesting confidential data.
A)phisher
B)hawker
C)employee
D)spoofer
E)hacker
A)phisher
B)hawker
C)employee
D)spoofer
E)hacker
Unlock Deck
Unlock for access to all 115 flashcards in this deck.
Unlock Deck
k this deck
25
Security policy establishment is the responsibility of
A)the IT department.
B)middle managers.
C)the CEO.
D)corporate lawyers.
E)senior management.
A)the IT department.
B)middle managers.
C)the CEO.
D)corporate lawyers.
E)senior management.
Unlock Deck
Unlock for access to all 115 flashcards in this deck.
Unlock Deck
k this deck
26
___________safeguards involve the people and procedure components of information systems.
A)Firewall
B)Data
C)Malware
D)Human
E)Technical
A)Firewall
B)Data
C)Malware
D)Human
E)Technical
Unlock Deck
Unlock for access to all 115 flashcards in this deck.
Unlock Deck
k this deck
27
In order to prioritize their activities and protect an organization from risk and loss,security personnel must document the position___________of all employees.
A)level
B)riskiness
C)data access
D)sensitivity
E)controls
A)level
B)riskiness
C)data access
D)sensitivity
E)controls
Unlock Deck
Unlock for access to all 115 flashcards in this deck.
Unlock Deck
k this deck
28
Which is not a way to avoid malware?
A)Open email attachments only from known sources.
B)Promptly install patches and service packs.
C)Update malware definitions.
D)Open emails from unknown sources.
E)Install anti -virus and antispyware programs.
A)Open email attachments only from known sources.
B)Promptly install patches and service packs.
C)Update malware definitions.
D)Open emails from unknown sources.
E)Install anti -virus and antispyware programs.
Unlock Deck
Unlock for access to all 115 flashcards in this deck.
Unlock Deck
k this deck
29
About ninety percent of all viruses are spread via
A)AOL.
B)technology.
C)spreadsheets.
D)e -mail.
E)network worms.
A)AOL.
B)technology.
C)spreadsheets.
D)e -mail.
E)network worms.
Unlock Deck
Unlock for access to all 115 flashcards in this deck.
Unlock Deck
k this deck
30
Users should scan their computers with anti -malware programs at least
A)once a week.
B)once a month.
C)biannually.
D)daily.
E)once a year.
A)once a week.
B)once a month.
C)biannually.
D)daily.
E)once a year.
Unlock Deck
Unlock for access to all 115 flashcards in this deck.
Unlock Deck
k this deck
31
PIPEDA stands for of all employees.
A)Personal Information Protection and Electronic Disclosures Act.
B)Personal Information Protection and Electronic Disclosure Actions.
C)Personal Information Protection and Effective Disclosures Act.
D)Personal Information Protection and Electronic Disclosure Act.
E)Personal Information Protection and Electronic Documents Act.
A)Personal Information Protection and Electronic Disclosures Act.
B)Personal Information Protection and Electronic Disclosure Actions.
C)Personal Information Protection and Effective Disclosures Act.
D)Personal Information Protection and Electronic Disclosure Act.
E)Personal Information Protection and Electronic Documents Act.
Unlock Deck
Unlock for access to all 115 flashcards in this deck.
Unlock Deck
k this deck
32
Some of the biggest security threats are from___________employees.
A)happy
B)self -motivated
C)disinterested
D)contrarian
E)disgruntled
A)happy
B)self -motivated
C)disinterested
D)contrarian
E)disgruntled
Unlock Deck
Unlock for access to all 115 flashcards in this deck.
Unlock Deck
k this deck
33
Because Microsoft employs hundreds of programmers from around the world in writing its operating systems,they must have careful procedures for___________what code gets in.
A)searching
B)controlling
C)describing
D)programming
E)publishing
A)searching
B)controlling
C)describing
D)programming
E)publishing
Unlock Deck
Unlock for access to all 115 flashcards in this deck.
Unlock Deck
k this deck
34
A(n)___________card has a microchip on it that is loaded with identifying data.
A)identity
B)smart
C)debit
D)ATM
E)credit
A)identity
B)smart
C)debit
D)ATM
E)credit
Unlock Deck
Unlock for access to all 115 flashcards in this deck.
Unlock Deck
k this deck
35
When an employee is terminated,system administrators should receive advance notice so they can
A)get the employees computer.
B)plan for security changes.
C)fight over the person's office.
D)remove accounts and passwords.
E)plan a termination party.
A)get the employees computer.
B)plan for security changes.
C)fight over the person's office.
D)remove accounts and passwords.
E)plan a termination party.
Unlock Deck
Unlock for access to all 115 flashcards in this deck.
Unlock Deck
k this deck
36
With information from an identity theft incident the thieve could___________ .
A)open new bank accounts in the victim's name
B)take over the victim's financial accounts
C)transfer the victim's bank balances to their own accounts
D)apply for credit cards in the victim's name
E)all of the above
A)open new bank accounts in the victim's name
B)take over the victim's financial accounts
C)transfer the victim's bank balances to their own accounts
D)apply for credit cards in the victim's name
E)all of the above
Unlock Deck
Unlock for access to all 115 flashcards in this deck.
Unlock Deck
k this deck
37
___________considerations should be part of the hiring process.
A)Weight
B)Age
C)Gender
D)Position
E)Security
A)Weight
B)Age
C)Gender
D)Position
E)Security
Unlock Deck
Unlock for access to all 115 flashcards in this deck.
Unlock Deck
k this deck
38
___________,which are the patterns that exist in malware code,should be downloaded and updated frequently.
A)Service packs
B)Software updates
C)Malware patterns
D)Network patches
E)Malware definitions
A)Service packs
B)Software updates
C)Malware patterns
D)Network patches
E)Malware definitions
Unlock Deck
Unlock for access to all 115 flashcards in this deck.
Unlock Deck
k this deck
39
Firewalls produce___________ of their activities,which include lists of all dropped packets,and attempts to gain unauthorized access.
A)lists
B)accounts
C)programs
D)calls
E)logs
A)lists
B)accounts
C)programs
D)calls
E)logs
Unlock Deck
Unlock for access to all 115 flashcards in this deck.
Unlock Deck
k this deck
40
___________are the primary means of authentication.
A)Encrypted keys
B)Network administrators
C)Facial scans
D)Single sign -on
E)Passwords
A)Encrypted keys
B)Network administrators
C)Facial scans
D)Single sign -on
E)Passwords
Unlock Deck
Unlock for access to all 115 flashcards in this deck.
Unlock Deck
k this deck
41
In addition to capturing credit card numbers,phishing schemes sometimes install ____________ on your computer.
Unlock Deck
Unlock for access to all 115 flashcards in this deck.
Unlock Deck
k this deck
42
When an incident is reported____________is (are) of the essence
A)actions
B)the response
C)speed
D)preparation
E)a systematic approach
A)actions
B)the response
C)speed
D)preparation
E)a systematic approach
Unlock Deck
Unlock for access to all 115 flashcards in this deck.
Unlock Deck
k this deck
43
The purpose of a(n)____________is to protect databases and other organizational data.
A)data safeguard
B)data warehouse
C)operations group
D)data security group
E)steering committee
A)data safeguard
B)data warehouse
C)operations group
D)data security group
E)steering committee
Unlock Deck
Unlock for access to all 115 flashcards in this deck.
Unlock Deck
k this deck
44
Be sure and purchase your antispyware program from a(n)___________programs in the past were actually malware programs in disguise.
A)entrepreneurial
B)illegitimate
C)inexpensive
D)reputable
E)reasonable
A)entrepreneurial
B)illegitimate
C)inexpensive
D)reputable
E)reasonable
Unlock Deck
Unlock for access to all 115 flashcards in this deck.
Unlock Deck
k this deck
45
When an employee notices a virus on his machine,the___________plan should specify what to do.
A)antivirus
B)technology
C)security
D)company
E)incident response
A)antivirus
B)technology
C)security
D)company
E)incident response
Unlock Deck
Unlock for access to all 115 flashcards in this deck.
Unlock Deck
k this deck
46
The sources of security problems are human error,malicious activity,and_________ .
Unlock Deck
Unlock for access to all 115 flashcards in this deck.
Unlock Deck
k this deck
47
A(n)___________is an operation or person that spoofs legitimate companies in an attempt to illegally capture credit card or bank account numbers.
Unlock Deck
Unlock for access to all 115 flashcards in this deck.
Unlock Deck
k this deck
48
____________to (for)the physical computers that run the DBMS and all devices that store database data should be carefully controlled.
A)Design plans
B)References
C)Connections
D)Access
E)Documentation
A)Design plans
B)References
C)Connections
D)Access
E)Documentation
Unlock Deck
Unlock for access to all 115 flashcards in this deck.
Unlock Deck
k this deck
49
A(n)_________has a microchip,which is loaded with authenticating data.
Unlock Deck
Unlock for access to all 115 flashcards in this deck.
Unlock Deck
k this deck
50
Encryption experts generally agree that any encryption algorithm that relies on _________is ultimately doomed.
Unlock Deck
Unlock for access to all 115 flashcards in this deck.
Unlock Deck
k this deck
51
Hardening is actually a(n)____________safeguard.
A)human
B)data
C)technical
D)security
E)accountability
A)human
B)data
C)technical
D)security
E)accountability
Unlock Deck
Unlock for access to all 115 flashcards in this deck.
Unlock Deck
k this deck
52
When someone calls and pretends to be from a credit card company in order to check the validity of your credit card number,they are most likely engaging in ____________.
Unlock Deck
Unlock for access to all 115 flashcards in this deck.
Unlock Deck
k this deck
53
_________programs can be installed on the user's computer without the user's knowledge or permission.
Unlock Deck
Unlock for access to all 115 flashcards in this deck.
Unlock Deck
k this deck
54
To protect yourself from identity theft you can
A)ask people why they need to see your identification and what they will use it for.
B)use complex passwords.
C)destroy old vehicle registration certificates.
D)carry only the identification and credit cards you need.
E)all of the above
A)ask people why they need to see your identification and what they will use it for.
B)use complex passwords.
C)destroy old vehicle registration certificates.
D)carry only the identification and credit cards you need.
E)all of the above
Unlock Deck
Unlock for access to all 115 flashcards in this deck.
Unlock Deck
k this deck
55
Some new operating systems offer a feature called _________,which remembers your data once you enter it the first time and authenticates you to other machines in the network.
Unlock Deck
Unlock for access to all 115 flashcards in this deck.
Unlock Deck
k this deck
56
Because encryption keys can be lost or destroyed,a copy of the key should stored with a trusted third party called a(n)
A)key account.
B)control account.
C)key escrow.
D)authentication certifier.
E)white -hat hacker.
A)key account.
B)control account.
C)key escrow.
D)authentication certifier.
E)white -hat hacker.
Unlock Deck
Unlock for access to all 115 flashcards in this deck.
Unlock Deck
k this deck
57
It is sometimes said that waves of important new technologies occur as
A)rolling cycles.
B)flows.
C)phases.
D)streams.
E)pairs.
A)rolling cycles.
B)flows.
C)phases.
D)streams.
E)pairs.
Unlock Deck
Unlock for access to all 115 flashcards in this deck.
Unlock Deck
k this deck
58
Operating systems today have the capability to_________users to multiple networks and servers.
Unlock Deck
Unlock for access to all 115 flashcards in this deck.
Unlock Deck
k this deck
59
Fingerprints and facial features are used to provide authentication for_________security devices.
Unlock Deck
Unlock for access to all 115 flashcards in this deck.
Unlock Deck
k this deck
60
Since most organizations are protected by a(n)___________spread via e -mail.
A)antivirus program
B)white -hat hacker
C)data dictionary
D)biometric authentication device
E)firewall
A)antivirus program
B)white -hat hacker
C)data dictionary
D)biometric authentication device
E)firewall
Unlock Deck
Unlock for access to all 115 flashcards in this deck.
Unlock Deck
k this deck
61
Drive -by sniffers simply take computers with ____________ connections through an area and search for unprotected networks.
Unlock Deck
Unlock for access to all 115 flashcards in this deck.
Unlock Deck
k this deck
62
One aspect of security programs is how an organization establishes____________ that provide checks and balances for the people in charge of sensitive data and applications.
Unlock Deck
Unlock for access to all 115 flashcards in this deck.
Unlock Deck
k this deck
63
E -mail spoofing,where a hacker uses e -mail to pretend to be someone else,is another name for___________ .
Unlock Deck
Unlock for access to all 115 flashcards in this deck.
Unlock Deck
k this deck
64
Phishing is usually initiated via a(n)___________.
Unlock Deck
Unlock for access to all 115 flashcards in this deck.
Unlock Deck
k this deck
65
Phishing is an example of unauthorized data____________ .
Unlock Deck
Unlock for access to all 115 flashcards in this deck.
Unlock Deck
k this deck
66
Encryption is one of several technical safeguards.
Unlock Deck
Unlock for access to all 115 flashcards in this deck.
Unlock Deck
k this deck
67
A computer____________ is a program that infiltrates networks and generates so much artificial traffic that it virtually shuts down the network for legitimate traffic.
Unlock Deck
Unlock for access to all 115 flashcards in this deck.
Unlock Deck
k this deck
68
A(n)_________________must be entered when using a smart card in order to provide authentication.
Unlock Deck
Unlock for access to all 115 flashcards in this deck.
Unlock Deck
k this deck
69
To protect against lost or sabotaged encryption keys,a trusted party should keep a copy of the key.
Unlock Deck
Unlock for access to all 115 flashcards in this deck.
Unlock Deck
k this deck
70
___________occurs when an intruder uses another site's IP address as if it were their own.
Unlock Deck
Unlock for access to all 115 flashcards in this deck.
Unlock Deck
k this deck
71
Pretexting is the same as_____in the world of malicious computer activities.
Unlock Deck
Unlock for access to all 115 flashcards in this deck.
Unlock Deck
k this deck
72
An organization's security____________ has three components: senior management involvement,safeguards,and a planned incident response.
Unlock Deck
Unlock for access to all 115 flashcards in this deck.
Unlock Deck
k this deck
73
Unauthorized data disclosure can occur by simple human ___________when someone inadvertently releases data in violation of a policy.
Unlock Deck
Unlock for access to all 115 flashcards in this deck.
Unlock Deck
k this deck
74
By starting a computationally intense application at the wrong time,users can inadvertently shut down a network or web server resulting in a(n)____________.
Unlock Deck
Unlock for access to all 115 flashcards in this deck.
Unlock Deck
k this deck
75
Even if a potential new hire will not have access to sensitive data and systems,they should be extensively screened for security purposes.
Unlock Deck
Unlock for access to all 115 flashcards in this deck.
Unlock Deck
k this deck
76
When a hacker floods a web server with millions of bogus service requests so that it cannot service legitimate requests,this is called a denial of service attack.
Unlock Deck
Unlock for access to all 115 flashcards in this deck.
Unlock Deck
k this deck
77
With wired networks,sniffing requires a(n)___________connection to the network.
Unlock Deck
Unlock for access to all 115 flashcards in this deck.
Unlock Deck
k this deck
78
____________is a technique for intercepting computer communications.
Unlock Deck
Unlock for access to all 115 flashcards in this deck.
Unlock Deck
k this deck
79
The best safeguard against a natural disaster is to have a safe location.
Unlock Deck
Unlock for access to all 115 flashcards in this deck.
Unlock Deck
k this deck
80
___________occurs when a person gains unauthorized access to a computer system.
Unlock Deck
Unlock for access to all 115 flashcards in this deck.
Unlock Deck
k this deck