Deck 4: Information Security
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/169
Play
Full screen (f)
Deck 4: Information Security
1
You don't lock your computer when you go to the restroom. This is _________ and is an _________ mistake.
A) a human error; intentional
B) a human error; unintentional
C) social engineering; intentional
D) social engineering; unintentional
A) a human error; intentional
B) a human error; unintentional
C) social engineering; intentional
D) social engineering; unintentional
B
2
You lose the company's USB with your sales spreadsheets on it. This is _________ and is an _________ mistake.
A) a human error; intentional
B) a human error; unintentional
C) social engineering; intentional
D) social engineering; unintentional
A) a human error; intentional
B) a human error; unintentional
C) social engineering; intentional
D) social engineering; unintentional
B
3
You never wipe the dust off your computer. This is _________ and is an _________ mistake.
A) a human error; intentional
B) a human error; unintentional
C) social engineering; intentional
D) social engineering; unintentional
A) a human error; intentional
B) a human error; unintentional
C) social engineering; intentional
D) social engineering; unintentional
B
4
Equifax hired _______ to help after they suffered two breaches in 2017.
A) Cylance
B) Mandiant
C) Praetorian
D) Zero Trust
A) Cylance
B) Mandiant
C) Praetorian
D) Zero Trust
Unlock Deck
Unlock for access to all 169 flashcards in this deck.
Unlock Deck
k this deck
5
The 2017 Equifax data breach occurred because attackers _______.
A) exploited a vulnerability in some web application software
B) sent e-mails to consumers with links to websites with malicious software
C) used social engineering to get user IDs and passwords from employees
D) were able to access discarded equipment with sensitive information
A) exploited a vulnerability in some web application software
B) sent e-mails to consumers with links to websites with malicious software
C) used social engineering to get user IDs and passwords from employees
D) were able to access discarded equipment with sensitive information
Unlock Deck
Unlock for access to all 169 flashcards in this deck.
Unlock Deck
k this deck
6
An information resource's _________ is the possibility that the system will be harmed by a threat.
A) exposure
B) risk
C) threat
D) vulnerability
A) exposure
B) risk
C) threat
D) vulnerability
Unlock Deck
Unlock for access to all 169 flashcards in this deck.
Unlock Deck
k this deck
7
You get a new smartphone and throw your old one away without erasing all your data. This is _________ and is an _________ mistake.
A) a human error; intentional
B) a human error; unintentional
C) social engineering; intentional
D) social engineering; unintentional
A) a human error; intentional
B) a human error; unintentional
C) social engineering; intentional
D) social engineering; unintentional
Unlock Deck
Unlock for access to all 169 flashcards in this deck.
Unlock Deck
k this deck
8
The _________ of an information resource is the harm, loss, or damage that can result if a threat compromises that resource.
A) exposure
B) risk
C) threat
D) vulnerability
A) exposure
B) risk
C) threat
D) vulnerability
Unlock Deck
Unlock for access to all 169 flashcards in this deck.
Unlock Deck
k this deck
9
You open an e-mail from your friend that looks a little odd, but you figure your friend would never send you anything bad. This is _________ and is an _________ mistake.
A) a human error; intentional
B) a human error; unintentional
C) social engineering; intentional
D) social engineering; unintentional
A) a human error; intentional
B) a human error; unintentional
C) social engineering; intentional
D) social engineering; unintentional
Unlock Deck
Unlock for access to all 169 flashcards in this deck.
Unlock Deck
k this deck
10
You are a nice person, so you hold the door open for the person running in behind you. Since you needed to use your ID badge to open the door, the person running in behind you is __________; this is _________.
A) shoulder surfing; a good way to show kindness that causes no harm
B) shoulder surfing; an unintentional threat to your organization
C) tailgating; a good way to show kindness that causes no harm
D) tailgating; an unintentional threat to your organization
A) shoulder surfing; a good way to show kindness that causes no harm
B) shoulder surfing; an unintentional threat to your organization
C) tailgating; a good way to show kindness that causes no harm
D) tailgating; an unintentional threat to your organization
Unlock Deck
Unlock for access to all 169 flashcards in this deck.
Unlock Deck
k this deck
11
Which of the following does NOT contribute to the increasing vulnerability of organizational information resources?
A) Increasing skills necessary to be a computer hacker
B) International organized crime taking over cybercrime
C) Lack of management support
D) Smaller, faster, cheaper computers and storage devices
E) Today's interconnected, interdependent, wirelessly networked business environment
A) Increasing skills necessary to be a computer hacker
B) International organized crime taking over cybercrime
C) Lack of management support
D) Smaller, faster, cheaper computers and storage devices
E) Today's interconnected, interdependent, wirelessly networked business environment
Unlock Deck
Unlock for access to all 169 flashcards in this deck.
Unlock Deck
k this deck
12
You leave your laptop at your desk while you go to the restroom. This is _________ and is an _________ mistake.
A) a human error; intentional
B) a human error; unintentional
C) social engineering; intentional
D) social engineering; unintentional
A) a human error; intentional
B) a human error; unintentional
C) social engineering; intentional
D) social engineering; unintentional
Unlock Deck
Unlock for access to all 169 flashcards in this deck.
Unlock Deck
k this deck
13
A(n) _________ to an information resource is any danger to which a system may be exposed.
A) exposure
B) risk
C) threat
D) vulnerability
A) exposure
B) risk
C) threat
D) vulnerability
Unlock Deck
Unlock for access to all 169 flashcards in this deck.
Unlock Deck
k this deck
14
Which of the following does NOT contribute to the increasing vulnerability of organizational information resources?
A) Additional management support
B) Decreasing skills necessary to be a computer hacker
C) International organized crime taking over cybercrime
D) Smaller, faster, cheaper computers and storage devices
E) Today's interconnected, interdependent, wirelessly networked business environment
A) Additional management support
B) Decreasing skills necessary to be a computer hacker
C) International organized crime taking over cybercrime
D) Smaller, faster, cheaper computers and storage devices
E) Today's interconnected, interdependent, wirelessly networked business environment
Unlock Deck
Unlock for access to all 169 flashcards in this deck.
Unlock Deck
k this deck
15
_________ is an attack in which the perpetrator uses social skills to trick or manipulate legitimate employees into providing confidential company information such as passwords.
A) Espionage
B) Malware
C) Profiling
D) Social engineering
A) Espionage
B) Malware
C) Profiling
D) Social engineering
Unlock Deck
Unlock for access to all 169 flashcards in this deck.
Unlock Deck
k this deck
16
Consumers ___ put a freeze on their credit with the three credit bureaus; this is ____ for consumers.
A) can; an appealing fix
B) can; not an appealing fix
C) cannot; is a problem for
D)cannot; irrelevant
A) can; an appealing fix
B) can; not an appealing fix
C) cannot; is a problem for
D)cannot; irrelevant
Unlock Deck
Unlock for access to all 169 flashcards in this deck.
Unlock Deck
k this deck
17
Carelessness using unmanaged devices is _________ and is an _________ mistake.
A) a human error; intentional
B) a human error; unintentional
C) social engineering; intentional
D) social engineering; unintentional
A) a human error; intentional
B) a human error; unintentional
C) social engineering; intentional
D) social engineering; unintentional
Unlock Deck
Unlock for access to all 169 flashcards in this deck.
Unlock Deck
k this deck
18
A(n) _________ network is any network within your organization; a(n) _________ network is any network external to your organization.
A) trusted; trusted
B) trusted; untrusted
C) untrusted; trusted
D) untrusted; untrusted
A) trusted; trusted
B) trusted; untrusted
C) untrusted; trusted
D) untrusted; untrusted
Unlock Deck
Unlock for access to all 169 flashcards in this deck.
Unlock Deck
k this deck
19
Careless Internet surfing is _________ and is an _________ mistake.
A) a human error; intentional
B) a human error; unintentional
C) social engineering; intentional
D) social engineering; unintentional
A) a human error; intentional
B) a human error; unintentional
C) social engineering; intentional
D) social engineering; unintentional
Unlock Deck
Unlock for access to all 169 flashcards in this deck.
Unlock Deck
k this deck
20
Computer crimes typically average _________ of dollars and cause businesses _________ of dollars in damages.
A) hundreds; millions
B) hundreds; billions
C) hundreds of thousands; millions
D) hundreds of thousands; billions
A) hundreds; millions
B) hundreds; billions
C) hundreds of thousands; millions
D) hundreds of thousands; billions
Unlock Deck
Unlock for access to all 169 flashcards in this deck.
Unlock Deck
k this deck
21
A _________ is an official document that grants the holder exclusive rights on an invention or a process for a specified period of time.
A) copyright
B) patent
C) trade secret
D) trademark
A) copyright
B) patent
C) trade secret
D) trademark
Unlock Deck
Unlock for access to all 169 flashcards in this deck.
Unlock Deck
k this deck
22
If humans are careless with laptops, this is an _________ error which could cause theft of equipment or information (an _________ error) .
A) intentional; intentional
B) intentional; unintentional
C) unintentional; intentional
D) unintentional; unintentional
A) intentional; intentional
B) intentional; unintentional
C) unintentional; intentional
D) unintentional; unintentional
Unlock Deck
Unlock for access to all 169 flashcards in this deck.
Unlock Deck
k this deck
23
_________ is a remote attack requiring no user action.
A) DoS
B) A logic bomb
C) A Trojan horse
D) Virus
A) DoS
B) A logic bomb
C) A Trojan horse
D) Virus
Unlock Deck
Unlock for access to all 169 flashcards in this deck.
Unlock Deck
k this deck
24
Piracy costs businesses _________ of dollars per year.
A) hundreds
B) millions
C) billions
D) trillions
A) hundreds
B) millions
C) billions
D) trillions
Unlock Deck
Unlock for access to all 169 flashcards in this deck.
Unlock Deck
k this deck
25
_________ collects personal information about users without their consent.
A) Adware
B) Marketware
C) Spamware
D) Spyware
A) Adware
B) Marketware
C) Spamware
D) Spyware
Unlock Deck
Unlock for access to all 169 flashcards in this deck.
Unlock Deck
k this deck
26
_________ is a remote attack requiring user action.
A) DoS
B) A logic bomb
C) A Trojan horse
D) Virus
A) DoS
B) A logic bomb
C) A Trojan horse
D) Virus
Unlock Deck
Unlock for access to all 169 flashcards in this deck.
Unlock Deck
k this deck
27
Current US laws award patents for _________ years and copyright protection for _________ years.
A) 20; 20
B) 20; life+70
C) life+70; 20
D) life+70; life+70
A) 20; 20
B) 20; life+70
C) life+70; 20
D) life+70; life+70
Unlock Deck
Unlock for access to all 169 flashcards in this deck.
Unlock Deck
k this deck
28
Hackers would use a botnet to perform a _________.
A) DDoS
B) a logic bomb
C) a Trojan horse
D) virus
A) DDoS
B) a logic bomb
C) a Trojan horse
D) virus
Unlock Deck
Unlock for access to all 169 flashcards in this deck.
Unlock Deck
k this deck
29
_________ occurs when an unauthorized individual attempts to gain illegal access to organizational information.
A) Alien software
B) Espionage
C) Identity theft
D) Information extortion
A) Alien software
B) Espionage
C) Identity theft
D) Information extortion
Unlock Deck
Unlock for access to all 169 flashcards in this deck.
Unlock Deck
k this deck
30
You purchased a copy of Microsoft Office and give a copy to a friend so he/she doesn't have to buy it too. This is _________ and is _________.
A) piracy; legal
B) piracy; illegal
C) social engineering; legal
D) social engineering; illegal
A) piracy; legal
B) piracy; illegal
C) social engineering; legal
D) social engineering; illegal
Unlock Deck
Unlock for access to all 169 flashcards in this deck.
Unlock Deck
k this deck
31
_________ causes pop-up advertisements to appear on your screen.
A) Adware
B) Marketware
C) Spamware
D) Spyware
A) Adware
B) Marketware
C) Spamware
D) Spyware
Unlock Deck
Unlock for access to all 169 flashcards in this deck.
Unlock Deck
k this deck
32
A _________ is an intellectual work that is not based on public information.
A) copyright
B) patent
C) trade secret
D) trademark
A) copyright
B) patent
C) trade secret
D) trademark
Unlock Deck
Unlock for access to all 169 flashcards in this deck.
Unlock Deck
k this deck
33
_________ occur(s) when an attacker either threatens to steal, or actually steals, information from a company and then demands payment for not carrying out a particular act.
A) Alien software
B) Espionage
C) Information extortion
D) SCADA attacks
A) Alien software
B) Espionage
C) Information extortion
D) SCADA attacks
Unlock Deck
Unlock for access to all 169 flashcards in this deck.
Unlock Deck
k this deck
34
_________ is an attack by a programmer developing a system.
A) DoS
B) A phishing attack
C) A Trojan horse
D) Virus
A) DoS
B) A phishing attack
C) A Trojan horse
D) Virus
Unlock Deck
Unlock for access to all 169 flashcards in this deck.
Unlock Deck
k this deck
35
A _________ is a statutory grant that provides the creators or owners of intellectual property with ownership of the property for a designated period.
A) copyright
B) patent
C) trade secret
D) trademark
A) copyright
B) patent
C) trade secret
D) trademark
Unlock Deck
Unlock for access to all 169 flashcards in this deck.
Unlock Deck
k this deck
36
_________ is an unintentional threat.
A) Espionage
B) Identity theft
C) Social engineering
D) Software attacks
A) Espionage
B) Identity theft
C) Social engineering
D) Software attacks
Unlock Deck
Unlock for access to all 169 flashcards in this deck.
Unlock Deck
k this deck
37
_________ is a deliberate act that involves defacing an organization's website, potentially damaging the organization's image and causing its customers to lose faith.
A) Espionage
B) Sabotage
C) SCADA attacks
D) Software attacks
A) Espionage
B) Sabotage
C) SCADA attacks
D) Software attacks
Unlock Deck
Unlock for access to all 169 flashcards in this deck.
Unlock Deck
k this deck
38
Keystroke loggers and screen scrapers are examples of _________.
A) adware
B) marketware
C) spamware
D) spyware
A) adware
B) marketware
C) spamware
D) spyware
Unlock Deck
Unlock for access to all 169 flashcards in this deck.
Unlock Deck
k this deck
39
_________ is pestware that users your computer as a launch pad for unsolicited e-mail, usually advertising for products and services.
A) Adware
B) Marketware
C) Spamware
D) Spyware
A) Adware
B) Marketware
C) Spamware
D) Spyware
Unlock Deck
Unlock for access to all 169 flashcards in this deck.
Unlock Deck
k this deck
40
Intellectual property is NOT protected under _________ laws.
A) copyright
B) patent
C) privacy
D) trade secret
A) copyright
B) patent
C) privacy
D) trade secret
Unlock Deck
Unlock for access to all 169 flashcards in this deck.
Unlock Deck
k this deck
41
The entire basis of a whaling attack is to ___________.
A) appear as authentic as possible with actual logos, phone numbers, and various other details used in communications that come from fake email addresses.
B) be as ambiguous and broad as possible so that no one person is targeted; rather, a large division in a company is.
C) appeal to as many companies as possible at the same time, therefore increasing the likelihood that one will "take the bait."
D) establish a line of communication with an entry-level employee or employees first to gain trust, and then gain access to larger systems.
A) appear as authentic as possible with actual logos, phone numbers, and various other details used in communications that come from fake email addresses.
B) be as ambiguous and broad as possible so that no one person is targeted; rather, a large division in a company is.
C) appeal to as many companies as possible at the same time, therefore increasing the likelihood that one will "take the bait."
D) establish a line of communication with an entry-level employee or employees first to gain trust, and then gain access to larger systems.
Unlock Deck
Unlock for access to all 169 flashcards in this deck.
Unlock Deck
k this deck
42
Dyn is a cloud-based internet performance management company that provides DNS services for internet websites. It was attacked with _________ in 2016.
A) alien software
B) a DDoS
C) espionage
D) a SCADA attack
A) alien software
B) a DDoS
C) espionage
D) a SCADA attack
Unlock Deck
Unlock for access to all 169 flashcards in this deck.
Unlock Deck
k this deck
43
Dyn's hackers formed a botnet from _________.
A) corporate servers
B) devices incorporating the Internet of Things
C) individuals willing to become part-time hackers
D) programmers within the company
A) corporate servers
B) devices incorporating the Internet of Things
C) individuals willing to become part-time hackers
D) programmers within the company
Unlock Deck
Unlock for access to all 169 flashcards in this deck.
Unlock Deck
k this deck
44
The U.S. government considers the Sony hack _________.
A) a SCADA attack
B) cyberterrorism
C) espionage
D) identity theft
A) a SCADA attack
B) cyberterrorism
C) espionage
D) identity theft
Unlock Deck
Unlock for access to all 169 flashcards in this deck.
Unlock Deck
k this deck
45
If you accept the potential risk, continue operating with no controls, and absorb any damages that occur, you have adopted a risk _________ strategy.
A) acceptance
B) avoidance
C) limitation
D) transference
A) acceptance
B) avoidance
C) limitation
D) transference
Unlock Deck
Unlock for access to all 169 flashcards in this deck.
Unlock Deck
k this deck
46
An employee at ABC Inc. downloaded an email and opened the attachment contained within the message. Shortly afterwards all employees were blocked from accessing files on the company's servers and the criminals told ABC Inc. they would have to pay a large amount of Bitcoin to regain access to their files. ABC Inc. was a victim of ____________.
A) ransomware
B) identity theft
C) spyware
D) cyber warfare
A) ransomware
B) identity theft
C) spyware
D) cyber warfare
Unlock Deck
Unlock for access to all 169 flashcards in this deck.
Unlock Deck
k this deck
47
Jim finds out that someone accessed his bank account pretending to be him and stole thousands of dollars. This is an example of ____________.
A) sabotage
B) identity theft
C) intellectual property
D) information extortion
A) sabotage
B) identity theft
C) intellectual property
D) information extortion
Unlock Deck
Unlock for access to all 169 flashcards in this deck.
Unlock Deck
k this deck
48
________ discovered a unique cryptographic key that triggered an unlock command for Onity hotel locks; ________ used computer code to rob hotel guests around the United States.
A) Brocious; Brocious
B) Brocious; Cashatt
C) Cashatt; Brocious
D) Cashatt; Cashatt
A) Brocious; Brocious
B) Brocious; Cashatt
C) Cashatt; Brocious
D) Cashatt; Cashatt
Unlock Deck
Unlock for access to all 169 flashcards in this deck.
Unlock Deck
k this deck
49
If a hacker takes control of equipment such as power grids or nuclear power plants, this is an example of a(n) _________ attack.
A) alien software
B) espionage
C) SCADA
D) virus
A) alien software
B) espionage
C) SCADA
D) virus
Unlock Deck
Unlock for access to all 169 flashcards in this deck.
Unlock Deck
k this deck
50
Sarah received an email that claimed to be from her bank. The email asked her to provide her password. Sarah later found out that the email was not from her bank and that she had given sensitive information to someone who gained access to her accounts. This is an example of a ____________.
A) worm
B) trojan horse
C) phishing attack
D) denial of service attack
A) worm
B) trojan horse
C) phishing attack
D) denial of service attack
Unlock Deck
Unlock for access to all 169 flashcards in this deck.
Unlock Deck
k this deck
51
Which well-known company has NOT fallen victim to a whaling attack at present?
A) Snapchat
B) Yahoo!
C) Google
D) Facebook
A) Snapchat
B) Yahoo!
C) Google
D) Facebook
Unlock Deck
Unlock for access to all 169 flashcards in this deck.
Unlock Deck
k this deck
52
What is TRUE of the DarkHotel Group attacks?
A) In 2017, they were able to extract over $100 million dollars from Facebook through whaling attacks.
B) Despite utilizing a variation of the same type of attack on intellectual property for over a decade, the group continues to perpetrate cybercrimes and elude arrest.
C) They have been specifically targeting political figures since sometime around 2007 by hacking into donor lists.
D) The group is effective largely because they continually evolve their tactics.
A) In 2017, they were able to extract over $100 million dollars from Facebook through whaling attacks.
B) Despite utilizing a variation of the same type of attack on intellectual property for over a decade, the group continues to perpetrate cybercrimes and elude arrest.
C) They have been specifically targeting political figures since sometime around 2007 by hacking into donor lists.
D) The group is effective largely because they continually evolve their tactics.
Unlock Deck
Unlock for access to all 169 flashcards in this deck.
Unlock Deck
k this deck
53
The goal of whaling is to trick a(n) _______ into revealing personal or corporate data.
A) executive
B) factory worker
C) janitor
D) salesperson
A) executive
B) factory worker
C) janitor
D) salesperson
Unlock Deck
Unlock for access to all 169 flashcards in this deck.
Unlock Deck
k this deck
54
A ______ attack is a targeted attempt to steal sensitive information from a company, such as financial data or personal details about employees.
A) Phishing
B) Spear-phishing
C) Spear-whaling
D) Whaling
A) Phishing
B) Spear-phishing
C) Spear-whaling
D) Whaling
Unlock Deck
Unlock for access to all 169 flashcards in this deck.
Unlock Deck
k this deck
55
Part of the problem with the Onity lock hotel thefts is that although the problem was identified and presented at the Black Hat conference, Onity was unable to correct the issue _____________.
A) because they had not included any update mechanism for the locks.
B) because Cashatt and Brocious had already reprogrammed the locks, essentially locking Onity out of their own software.
C) because there was no way of tracking which locks were compromised.
D) because the hotels that utilized the locks had not maintained software updates.
A) because they had not included any update mechanism for the locks.
B) because Cashatt and Brocious had already reprogrammed the locks, essentially locking Onity out of their own software.
C) because there was no way of tracking which locks were compromised.
D) because the hotels that utilized the locks had not maintained software updates.
Unlock Deck
Unlock for access to all 169 flashcards in this deck.
Unlock Deck
k this deck
56
Your company hires FireEye to install security software and monitor your systems. This is an example of risk _________.
A) acceptance
B) avoidance
C) limitation
D) transference
A) acceptance
B) avoidance
C) limitation
D) transference
Unlock Deck
Unlock for access to all 169 flashcards in this deck.
Unlock Deck
k this deck
57
Spam costs US companies _________ of dollars per year.
A) hundreds
B) millions
C) billions
D) trillions
A) hundreds
B) millions
C) billions
D) trillions
Unlock Deck
Unlock for access to all 169 flashcards in this deck.
Unlock Deck
k this deck
58
If you limit your risk by implementing controls that minimize the impact of the threat, you have implemented a risk _________ strategy.
A) acceptance
B) avoidance
C) limitation
D) transference
A) acceptance
B) avoidance
C) limitation
D) transference
Unlock Deck
Unlock for access to all 169 flashcards in this deck.
Unlock Deck
k this deck
59
Your company decides not to implement security procedures because employees refuse to comply anyway. This is an example of risk _________.
A) acceptance
B) avoidance
C) limitation
D) transference
A) acceptance
B) avoidance
C) limitation
D) transference
Unlock Deck
Unlock for access to all 169 flashcards in this deck.
Unlock Deck
k this deck
60
_________ refers to malicious acts in which attackers use a target's computer systems to cause physical, real-world harm or severe disruption, often to carry out a political agenda.
A) A SCADA attack
B) Cyberterrorism
C) Espionage
D) Identity theft
A) A SCADA attack
B) Cyberterrorism
C) Espionage
D) Identity theft
Unlock Deck
Unlock for access to all 169 flashcards in this deck.
Unlock Deck
k this deck
61
_________ is the process of converting an original message into a form that cannot be read by anyone except the intended receiver.
A) Authorization
B) Blacklisting
C) Encryption
D) Firewalling
A) Authorization
B) Blacklisting
C) Encryption
D) Firewalling
Unlock Deck
Unlock for access to all 169 flashcards in this deck.
Unlock Deck
k this deck
62
_________ is a communications control.
A) A company gate
B) Encryption
C) A firewall
D) RFID
A) A company gate
B) Encryption
C) A firewall
D) RFID
Unlock Deck
Unlock for access to all 169 flashcards in this deck.
Unlock Deck
k this deck
63
A(n) _________ is a system that prevents a specific type of information from moving between untrusted networks and private networks.
A) anti-malware system
B) DMZ
C) ERP
D) firewall
A) anti-malware system
B) DMZ
C) ERP
D) firewall
Unlock Deck
Unlock for access to all 169 flashcards in this deck.
Unlock Deck
k this deck
64
If you have to speak into your phone to unlock it, this is an example of something the user _________.
A) does
B) has
C) is
D) knows
A) does
B) has
C) is
D) knows
Unlock Deck
Unlock for access to all 169 flashcards in this deck.
Unlock Deck
k this deck
65
_________ controls secure the movement of data across networks.
A) Access
B) Communications
C) Physical
D) Useful
A) Access
B) Communications
C) Physical
D) Useful
Unlock Deck
Unlock for access to all 169 flashcards in this deck.
Unlock Deck
k this deck
66
A(n) _________ is a software package that attempts to identify and eliminate viruses and worms.
A) anti-malware system
B) DMZ
C) ERP
D) firewall
A) anti-malware system
B) DMZ
C) ERP
D) firewall
Unlock Deck
Unlock for access to all 169 flashcards in this deck.
Unlock Deck
k this deck
67
_________ controls restrict unauthorized individuals from using information resources.
A) Access
B) Communications
C) Physical
D) Useful
A) Access
B) Communications
C) Physical
D) Useful
Unlock Deck
Unlock for access to all 169 flashcards in this deck.
Unlock Deck
k this deck
68
_________ is an access control.
A) A company gate
B) Encryption
C) A firewall
D) RFID
A) A company gate
B) Encryption
C) A firewall
D) RFID
Unlock Deck
Unlock for access to all 169 flashcards in this deck.
Unlock Deck
k this deck
69
Suppose your university automatically logs you off of a university computer after 15 minutes of disuse. This is an example of a(n) _________ control.
A) access
B) communication
C) physical
D) useful
A) access
B) communication
C) physical
D) useful
Unlock Deck
Unlock for access to all 169 flashcards in this deck.
Unlock Deck
k this deck
70
Biometrics is an example of something the user _________.
A) does
B) has
C) is
D) knows
A) does
B) has
C) is
D) knows
Unlock Deck
Unlock for access to all 169 flashcards in this deck.
Unlock Deck
k this deck
71
A(n) _________ is located between two firewalls.
A) anti-malware system
B) DMZ
C) ERP
D) spamware detector
A) anti-malware system
B) DMZ
C) ERP
D) spamware detector
Unlock Deck
Unlock for access to all 169 flashcards in this deck.
Unlock Deck
k this deck
72
Typing in your password to access a system is an example of something the user _________.
A) does
B) has
C) is
D) knows
A) does
B) has
C) is
D) knows
Unlock Deck
Unlock for access to all 169 flashcards in this deck.
Unlock Deck
k this deck
73
_________ is a physical control.
A) A company gate
B) Encryption
C) A firewall
D) VPN
A) A company gate
B) Encryption
C) A firewall
D) VPN
Unlock Deck
Unlock for access to all 169 flashcards in this deck.
Unlock Deck
k this deck
74
Your company decides to purchase security insurance from Travelers Insurance in case your systems get hacked and employee information is stolen. This is an example of risk _________.
A) acceptance
B) avoidance
C) limitation
D) transference
A) acceptance
B) avoidance
C) limitation
D) transference
Unlock Deck
Unlock for access to all 169 flashcards in this deck.
Unlock Deck
k this deck
75
Your student ID is an example of something the user _________.
A) does
B) has
C) is
D) knows
A) does
B) has
C) is
D) knows
Unlock Deck
Unlock for access to all 169 flashcards in this deck.
Unlock Deck
k this deck
76
_________ controls prevent unauthorized individuals from gaining access to a company's facilities.
A) Access
B) Communications
C) Physical
D) Useful
A) Access
B) Communications
C) Physical
D) Useful
Unlock Deck
Unlock for access to all 169 flashcards in this deck.
Unlock Deck
k this deck
77
If you shift your risk by using other means to compensate for the loss like purchasing insurance, you have implemented a risk _________ strategy.
A) acceptance
B) avoidance
C) limitation
D) transference
A) acceptance
B) avoidance
C) limitation
D) transference
Unlock Deck
Unlock for access to all 169 flashcards in this deck.
Unlock Deck
k this deck
78
Which of the following is NOT an advantage of VPN?
A) Cost
B) Flexibility
C) Remote access
D) Security
A) Cost
B) Flexibility
C) Remote access
D) Security
Unlock Deck
Unlock for access to all 169 flashcards in this deck.
Unlock Deck
k this deck
79
_________ is a private network that uses a public network to connect users.
A) DoS
B) ERP
C) RFID
D) VPN
A) DoS
B) ERP
C) RFID
D) VPN
Unlock Deck
Unlock for access to all 169 flashcards in this deck.
Unlock Deck
k this deck
80
In public-key encryption, the _________ key is used for locking and the _________ key is used for unlocking.
A) private; private
B) private; public
C) public; private
D) public; public
A) private; private
B) private; public
C) public; private
D) public; public
Unlock Deck
Unlock for access to all 169 flashcards in this deck.
Unlock Deck
k this deck