Deck 11: Information Technology It Security
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/30
Play
Full screen (f)
Deck 11: Information Technology It Security
1
Specific threats to security of proprietary information include all of the following except
A)employees.
B)discarded information-in most states, garbage in Dumpsters can be legally searched.
C)secured telecommunication.
D)acoustical surveillance.
A)employees.
B)discarded information-in most states, garbage in Dumpsters can be legally searched.
C)secured telecommunication.
D)acoustical surveillance.
C
2
Telecommunication security information is typically communicated by all of the following except
A)wirelines.
B)microwave links.
C)satellite systems.
D)pipelines.
A)wirelines.
B)microwave links.
C)satellite systems.
D)pipelines.
D
3
Reaction is the time the computer reactions to any perceived or real attacks on the system.
False
4
Security measures for computer systems include all of the following except
A)logical controls.
B)physical access controls.
C)administrative controls.
D)protecting against water.
A)logical controls.
B)physical access controls.
C)administrative controls.
D)protecting against water.
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
5
Malicious software or malware is one of the many threats to a computer system.
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
6
The cost of computer crime annually is
A)thousands of dollars.
B)hundreds of thousands of dollars.
C)millions of dollars.
D)hundreds of millions of dollars.
A)thousands of dollars.
B)hundreds of thousands of dollars.
C)millions of dollars.
D)hundreds of millions of dollars.
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
7
Security measures for computer systems include all of the following except
A)illogical controls.
B)physical access controls.
C)administrative controls.
D)protecting against fire.
A)illogical controls.
B)physical access controls.
C)administrative controls.
D)protecting against fire.
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
8
Factors to consider in investigating computer crime include all of the following except
A)investigator's knowledge and whether outside expertise is required.
B)likelihood of victim or an employee being involved.
C)the ease of detecting such crimes.
D)none of the above
A)investigator's knowledge and whether outside expertise is required.
B)likelihood of victim or an employee being involved.
C)the ease of detecting such crimes.
D)none of the above
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
9
"A property right in an original work of authorship (including literary, musical, dramatic, choreographic, pictorial, graphic, sculptural and architectural work; motion pictures and other audiovisual works; and sound recordings) fixed in any tangible medium of expression, giving the holder exclusive right to reproduce, adapt, distribute, perform and display the work" Is a definition of:
A)A patent
B)A copyright
C)A trade secret
D)A movie production contract
A)A patent
B)A copyright
C)A trade secret
D)A movie production contract
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
10
Telecommunication security includes information communicated by
A)voice.
B)fax.
C)computer.
D)all of the above
A)voice.
B)fax.
C)computer.
D)all of the above
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
11
Convergence, integration, unification, holistic security are all buzz words for twenty-first century security.
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
12
Detection monitors the amount of time a person takes to respond to the attacks the countermeasures defend against.
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
13
The greatest security threats to computer centers include all of the following except
A)theft by fraud or embezzlement.
B)hackers.
C)sabotage.
D)cold.
A)theft by fraud or embezzlement.
B)hackers.
C)sabotage.
D)cold.
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
14
Employee threats to security of proprietary information include
A)nondisclosure agreements.
B)noncompete agreements.
C)secrecy agreements.
D)all of the above
A)nondisclosure agreements.
B)noncompete agreements.
C)secrecy agreements.
D)all of the above
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
15
A Trojan horse installs malicious software on a computer.
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
16
Only the United States government can keep trade secrets through the use of spyware.
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
17
IP video surveillance systems are the most effective way to control a network.
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
18
IT projects commonly fail because the IT manager has made the security protocols too difficult for the average user, in other words, the system is not user friendly.
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
19
A patent and a copyright are different names for the same thing.
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
20
Protection provides countermeasures to defend against attacks on assets being secured.
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
21
Protection provides ___________________ to defend against attacks on assets being secured.
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
22
Computer crimes cost __________________________ of dollars annually.
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
23
The recordings are ___________ and sold on the black market and loaded onto the _____________ resulting in millions of illegal downloads.
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
24
Legal departments can use the ________ in determining the validity of-or defending against-lawsuits and _______________ filed by customers.
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
25
Too often, __________ or __________ information is __________ in trash cans and then collected in plastic bags and put into a dumpster.
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
26
Digital Rights Management (DRM) is __________ technology used by digital copyright owners.
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
27
___________________________ are usually requested of high-level executives, research-and-development personnel and other employees who have access to sensitive information.
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
28
Common equipment that can pose security threats includes ______, _______ and _________.
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
29
Almost all organizations handle some form of __________information about their employees, management, relationships, customers or others.
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
30
One of the best defenses against "bot" threats is to __________ and ____________ software on a computer.
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck