Deck 11: Information Technology It Security

Full screen (f)
exit full mode
Question
Specific threats to security of proprietary information include all of the following except

A)employees.
B)discarded information-in most states, garbage in Dumpsters can be legally searched.
C)secured telecommunication.
D)acoustical surveillance.
Use Space or
up arrow
down arrow
to flip the card.
Question
Telecommunication security information is typically communicated by all of the following except

A)wirelines.
B)microwave links.
C)satellite systems.
D)pipelines.
Question
Reaction is the time the computer reactions to any perceived or real attacks on the system.
Question
Security measures for computer systems include all of the following except

A)logical controls.
B)physical access controls.
C)administrative controls.
D)protecting against water.
Question
Malicious software or malware is one of the many threats to a computer system.
Question
The cost of computer crime annually is

A)thousands of dollars.
B)hundreds of thousands of dollars.
C)millions of dollars.
D)hundreds of millions of dollars.
Question
Security measures for computer systems include all of the following except

A)illogical controls.
B)physical access controls.
C)administrative controls.
D)protecting against fire.
Question
Factors to consider in investigating computer crime include all of the following except

A)investigator's knowledge and whether outside expertise is required.
B)likelihood of victim or an employee being involved.
C)the ease of detecting such crimes.
D)none of the above
Question
"A property right in an original work of authorship (including literary, musical, dramatic, choreographic, pictorial, graphic, sculptural and architectural work; motion pictures and other audiovisual works; and sound recordings) fixed in any tangible medium of expression, giving the holder exclusive right to reproduce, adapt, distribute, perform and display the work" Is a definition of:

A)A patent
B)A copyright
C)A trade secret
D)A movie production contract
Question
Telecommunication security includes information communicated by

A)voice.
B)fax.
C)computer.
D)all of the above
Question
Convergence, integration, unification, holistic security are all buzz words for twenty-first century security.
Question
Detection monitors the amount of time a person takes to respond to the attacks the countermeasures defend against.
Question
The greatest security threats to computer centers include all of the following except

A)theft by fraud or embezzlement.
B)hackers.
C)sabotage.
D)cold.
Question
Employee threats to security of proprietary information include

A)nondisclosure agreements.
B)noncompete agreements.
C)secrecy agreements.
D)all of the above
Question
A Trojan horse installs malicious software on a computer.
Question
Only the United States government can keep trade secrets through the use of spyware.
Question
IP video surveillance systems are the most effective way to control a network.
Question
IT projects commonly fail because the IT manager has made the security protocols too difficult for the average user, in other words, the system is not user friendly.
Question
A patent and a copyright are different names for the same thing.
Question
Protection provides countermeasures to defend against attacks on assets being secured.
Question
Protection provides ___________________ to defend against attacks on assets being secured.
Question
Computer crimes cost __________________________ of dollars annually.
Question
The recordings are ___________ and sold on the black market and loaded onto the _____________ resulting in millions of illegal downloads.
Question
Legal departments can use the ________ in determining the validity of-or defending against-lawsuits and _______________ filed by customers.
Question
Too often, __________ or __________ information is __________ in trash cans and then collected in plastic bags and put into a dumpster.
Question
Digital Rights Management (DRM) is __________ technology used by digital copyright owners.
Question
___________________________ are usually requested of high-level executives, research-and-development personnel and other employees who have access to sensitive information.
Question
Common equipment that can pose security threats includes ______, _______ and _________.
Question
Almost all organizations handle some form of __________information about their employees, management, relationships, customers or others.
Question
One of the best defenses against "bot" threats is to __________ and ____________ software on a computer.
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/30
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 11: Information Technology It Security
1
Specific threats to security of proprietary information include all of the following except

A)employees.
B)discarded information-in most states, garbage in Dumpsters can be legally searched.
C)secured telecommunication.
D)acoustical surveillance.
C
2
Telecommunication security information is typically communicated by all of the following except

A)wirelines.
B)microwave links.
C)satellite systems.
D)pipelines.
D
3
Reaction is the time the computer reactions to any perceived or real attacks on the system.
False
4
Security measures for computer systems include all of the following except

A)logical controls.
B)physical access controls.
C)administrative controls.
D)protecting against water.
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
5
Malicious software or malware is one of the many threats to a computer system.
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
6
The cost of computer crime annually is

A)thousands of dollars.
B)hundreds of thousands of dollars.
C)millions of dollars.
D)hundreds of millions of dollars.
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
7
Security measures for computer systems include all of the following except

A)illogical controls.
B)physical access controls.
C)administrative controls.
D)protecting against fire.
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
8
Factors to consider in investigating computer crime include all of the following except

A)investigator's knowledge and whether outside expertise is required.
B)likelihood of victim or an employee being involved.
C)the ease of detecting such crimes.
D)none of the above
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
9
"A property right in an original work of authorship (including literary, musical, dramatic, choreographic, pictorial, graphic, sculptural and architectural work; motion pictures and other audiovisual works; and sound recordings) fixed in any tangible medium of expression, giving the holder exclusive right to reproduce, adapt, distribute, perform and display the work" Is a definition of:

A)A patent
B)A copyright
C)A trade secret
D)A movie production contract
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
10
Telecommunication security includes information communicated by

A)voice.
B)fax.
C)computer.
D)all of the above
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
11
Convergence, integration, unification, holistic security are all buzz words for twenty-first century security.
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
12
Detection monitors the amount of time a person takes to respond to the attacks the countermeasures defend against.
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
13
The greatest security threats to computer centers include all of the following except

A)theft by fraud or embezzlement.
B)hackers.
C)sabotage.
D)cold.
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
14
Employee threats to security of proprietary information include

A)nondisclosure agreements.
B)noncompete agreements.
C)secrecy agreements.
D)all of the above
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
15
A Trojan horse installs malicious software on a computer.
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
16
Only the United States government can keep trade secrets through the use of spyware.
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
17
IP video surveillance systems are the most effective way to control a network.
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
18
IT projects commonly fail because the IT manager has made the security protocols too difficult for the average user, in other words, the system is not user friendly.
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
19
A patent and a copyright are different names for the same thing.
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
20
Protection provides countermeasures to defend against attacks on assets being secured.
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
21
Protection provides ___________________ to defend against attacks on assets being secured.
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
22
Computer crimes cost __________________________ of dollars annually.
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
23
The recordings are ___________ and sold on the black market and loaded onto the _____________ resulting in millions of illegal downloads.
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
24
Legal departments can use the ________ in determining the validity of-or defending against-lawsuits and _______________ filed by customers.
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
25
Too often, __________ or __________ information is __________ in trash cans and then collected in plastic bags and put into a dumpster.
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
26
Digital Rights Management (DRM) is __________ technology used by digital copyright owners.
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
27
___________________________ are usually requested of high-level executives, research-and-development personnel and other employees who have access to sensitive information.
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
28
Common equipment that can pose security threats includes ______, _______ and _________.
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
29
Almost all organizations handle some form of __________information about their employees, management, relationships, customers or others.
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
30
One of the best defenses against "bot" threats is to __________ and ____________ software on a computer.
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 30 flashcards in this deck.