Deck 12: Managing Information Security and Privacy
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/88
Play
Full screen (f)
Deck 12: Managing Information Security and Privacy
1
When a hacker floods a web server with millions of bogus service requests so that it cannot service legitimate requests,this is called a denial of service attack.
True
2
Despite warnings,users have a tendency to write their passwords on sticky notes next to the computer.
True
3
Denial of service always occurs because of malicious attacks on the system.
False
4
Smart cards are convenient and easy to use since they don't require any PIN numbers for authentication.
Unlock Deck
Unlock for access to all 88 flashcards in this deck.
Unlock Deck
k this deck
5
Drive-by sniffers take computers with wireless connections through an area and search for unprotected wireless networks.
Unlock Deck
Unlock for access to all 88 flashcards in this deck.
Unlock Deck
k this deck
6
Malware protection is an example of a technical safeguard.
Unlock Deck
Unlock for access to all 88 flashcards in this deck.
Unlock Deck
k this deck
7
Phishing is when someone sends an e-mail pretending to be a legitimate company and asking for confidential data,such as account numbers.
Unlock Deck
Unlock for access to all 88 flashcards in this deck.
Unlock Deck
k this deck
8
Care must be taken when terminating employees because they may take harmful and malicious actions.
Unlock Deck
Unlock for access to all 88 flashcards in this deck.
Unlock Deck
k this deck
9
Malware is used in denial of service attacks.
Unlock Deck
Unlock for access to all 88 flashcards in this deck.
Unlock Deck
k this deck
10
Biometric authentication has been around for some time,and because of weaknesses is not likely to see much usage in the future.
Unlock Deck
Unlock for access to all 88 flashcards in this deck.
Unlock Deck
k this deck
11
Spoofing is a technique for intercepting computer communications.
Unlock Deck
Unlock for access to all 88 flashcards in this deck.
Unlock Deck
k this deck
12
Data safeguards are designed to protect computer networks.
Unlock Deck
Unlock for access to all 88 flashcards in this deck.
Unlock Deck
k this deck
13
A retinal scan would be considered a biometric authentication technique.
Unlock Deck
Unlock for access to all 88 flashcards in this deck.
Unlock Deck
k this deck
14
Technical safeguards involve the hardware and software components of an information system.
Unlock Deck
Unlock for access to all 88 flashcards in this deck.
Unlock Deck
k this deck
15
People who intentionally gain unauthorized access to computer systems are called hackers.
Unlock Deck
Unlock for access to all 88 flashcards in this deck.
Unlock Deck
k this deck
16
Any action,device,procedure,technique,or other measure that reduces a system's vulnerability to a threat is a safeguard.
Unlock Deck
Unlock for access to all 88 flashcards in this deck.
Unlock Deck
k this deck
17
To protect against lost or sabotaged encryption keys,a trusted party should keep a copy of the key.
Unlock Deck
Unlock for access to all 88 flashcards in this deck.
Unlock Deck
k this deck
18
Even if a potential new hire will not have access to sensitive data and systems,they should be extensively screened for security purposes.
Unlock Deck
Unlock for access to all 88 flashcards in this deck.
Unlock Deck
k this deck
19
Encryption is one of several technical safeguards.
Unlock Deck
Unlock for access to all 88 flashcards in this deck.
Unlock Deck
k this deck
20
Most anti-malware programs check e-mail attachments for malware code.
Unlock Deck
Unlock for access to all 88 flashcards in this deck.
Unlock Deck
k this deck
21
Organizations should protect sensitive data by storing it in ________ form.
A) compressed
B) secure
C) digital
D) encrypted
E) standardized
A) compressed
B) secure
C) digital
D) encrypted
E) standardized
Unlock Deck
Unlock for access to all 88 flashcards in this deck.
Unlock Deck
k this deck
22
Bloggers have not yet had much of an impact on the main stream media.
Unlock Deck
Unlock for access to all 88 flashcards in this deck.
Unlock Deck
k this deck
23
Users should scan their computers with anti-malware programs at least
A) once a year.
B) biannually.
C) once a week.
D) daily.
E) once a month.
A) once a year.
B) biannually.
C) once a week.
D) daily.
E) once a month.
Unlock Deck
Unlock for access to all 88 flashcards in this deck.
Unlock Deck
k this deck
24
Backup and recovery,passwords,and encryption are human safeguards.
Unlock Deck
Unlock for access to all 88 flashcards in this deck.
Unlock Deck
k this deck
25
Following a disaster,hot sites provide office space,but customers themselves must come and provide and install the equipment needed to continue operations.
Unlock Deck
Unlock for access to all 88 flashcards in this deck.
Unlock Deck
k this deck
26
Be sure and purchase your antispyware program from a(n)________ vendor,because some free programs in the past were actually malware programs in disguise.
A) reasonable
B) reputable
C) entrepreneurial
D) inexpensive
E) illegitimate
A) reasonable
B) reputable
C) entrepreneurial
D) inexpensive
E) illegitimate
Unlock Deck
Unlock for access to all 88 flashcards in this deck.
Unlock Deck
k this deck
27
About ninety percent of all viruses are spread via
A) spreadsheets.
B) AOL.
C) technology.
D) network worms.
E) email.
A) spreadsheets.
B) AOL.
C) technology.
D) network worms.
E) email.
Unlock Deck
Unlock for access to all 88 flashcards in this deck.
Unlock Deck
k this deck
28
It is possible for some malware to install itself on your computer by you doing nothing more than opening a(n)
A) web page.
B) file.
C) e-mail
D) computer.
E) account.
A) web page.
B) file.
C) e-mail
D) computer.
E) account.
Unlock Deck
Unlock for access to all 88 flashcards in this deck.
Unlock Deck
k this deck
29
Because encryption keys can be lost or destroyed,a copy of the key should be stored with a trusted third party called a(n)
A) key account.
B) white-hat hacker.
C) key escrow.
D) authentication certifier.
E) control account.
A) key account.
B) white-hat hacker.
C) key escrow.
D) authentication certifier.
E) control account.
Unlock Deck
Unlock for access to all 88 flashcards in this deck.
Unlock Deck
k this deck
30
________ safeguards involve the people and procedure components of information systems.
A) Human
B) Data
C) Technical
D) Malware
E) Firewall
A) Human
B) Data
C) Technical
D) Malware
E) Firewall
Unlock Deck
Unlock for access to all 88 flashcards in this deck.
Unlock Deck
k this deck
31
Organizations should store at least some of the _______________ of the database contents off the premises,possibly in a remote location.
A) backups
B) company information
C) malware definitions
D) smaller parts
A) backups
B) company information
C) malware definitions
D) smaller parts
Unlock Deck
Unlock for access to all 88 flashcards in this deck.
Unlock Deck
k this deck
32
________,which are the patterns that exist in malware code,should be downloaded and updated frequently.
A) Software updates
B) Service packs
C) Malware patterns
D) Network patches
E) Malware definitions
A) Software updates
B) Service packs
C) Malware patterns
D) Network patches
E) Malware definitions
Unlock Deck
Unlock for access to all 88 flashcards in this deck.
Unlock Deck
k this deck
33
Hardened web sites use special versions of the operating systems and functions that are not required by the application.
Unlock Deck
Unlock for access to all 88 flashcards in this deck.
Unlock Deck
k this deck
34
Viruses and worms don't spread very quickly so it is not essential to move cautiously when one is discovered by someone in your organization.
Unlock Deck
Unlock for access to all 88 flashcards in this deck.
Unlock Deck
k this deck
35
The purpose of a(n)________ is to protect databases and other organizational data.
A) data warehouse
B) data security group
C) operations group
D) data safeguard
E) steering committee
A) data warehouse
B) data security group
C) operations group
D) data safeguard
E) steering committee
Unlock Deck
Unlock for access to all 88 flashcards in this deck.
Unlock Deck
k this deck
36
The best safeguard against a natural disaster is to have a safe location.
Unlock Deck
Unlock for access to all 88 flashcards in this deck.
Unlock Deck
k this deck
37
Help desks have not been the source of many security problems in the past.
Unlock Deck
Unlock for access to all 88 flashcards in this deck.
Unlock Deck
k this deck
38
Since most organizations are protected by a(n)________,it is not surprising that most viruses spread via e-mail.
A) data dictionary
B) antivirus program
C) biometric authentication device
D) firewall
E) white-hat hacker
A) data dictionary
B) antivirus program
C) biometric authentication device
D) firewall
E) white-hat hacker
Unlock Deck
Unlock for access to all 88 flashcards in this deck.
Unlock Deck
k this deck
39
________ to (for)the physical computers that run the DBMS and all devices that store database data should be carefully controlled.
A) References
B) Access
C) Design plans
D) Connections
E) Documentation
A) References
B) Access
C) Design plans
D) Connections
E) Documentation
Unlock Deck
Unlock for access to all 88 flashcards in this deck.
Unlock Deck
k this deck
40
If you ever receive notification that your password has been reset when you did not request a reset,immediately contact your IS department.
Unlock Deck
Unlock for access to all 88 flashcards in this deck.
Unlock Deck
k this deck
41
A(n)________ card has a microchip on it that is loaded with identifying data.
A) smart
B) debit
C) credit
D) ATM
E) identity
A) smart
B) debit
C) credit
D) ATM
E) identity
Unlock Deck
Unlock for access to all 88 flashcards in this deck.
Unlock Deck
k this deck
42
________ considerations should be part of the hiring process.
A) Weight
B) Position
C) Gender
D) Age
E) Security
A) Weight
B) Position
C) Gender
D) Age
E) Security
Unlock Deck
Unlock for access to all 88 flashcards in this deck.
Unlock Deck
k this deck
43
A ________ is a remote processing centre run by a commercial disaster-recovery service that provides all the equipment needed to continue operations after a disaster.
A) web farm
B) development site
C) cold site
D) hot site
E) server farm
A) web farm
B) development site
C) cold site
D) hot site
E) server farm
Unlock Deck
Unlock for access to all 88 flashcards in this deck.
Unlock Deck
k this deck
44
In order to prioritize their activities and protect an organization from possible risk and loss,security personnel must document the position ________ of all employees.
A) riskiness
B) data access
C) controls
D) level
E) sensitivity
A) riskiness
B) data access
C) controls
D) level
E) sensitivity
Unlock Deck
Unlock for access to all 88 flashcards in this deck.
Unlock Deck
k this deck
45
In order to intercept communications on ________ networks,drive-by sniffers simply drive or walk around with computers with wireless connections.
A) commercial
B) LAN
C) wireless
D) ISP
E) WAN
A) commercial
B) LAN
C) wireless
D) ISP
E) WAN
Unlock Deck
Unlock for access to all 88 flashcards in this deck.
Unlock Deck
k this deck
46
________________ is one of the fastest-growing crimes in Canada because it is relatively easy to do.
A) phishing
B) Hacking
C) Spoofing
D) PIPEDA
E) Identity theft
A) phishing
B) Hacking
C) Spoofing
D) PIPEDA
E) Identity theft
Unlock Deck
Unlock for access to all 88 flashcards in this deck.
Unlock Deck
k this deck
47
Because they kept giving out passwords to users who claimed to have forgotten them,________ were a serious security risk in the organization.
A) interns
B) help desks
C) data administrators
D) executives
E) developers
A) interns
B) help desks
C) data administrators
D) executives
E) developers
Unlock Deck
Unlock for access to all 88 flashcards in this deck.
Unlock Deck
k this deck
48
Firewalls produce ________ of their activities,which include lists of all dropped packets,and attempts to gain unauthorized access.
A) programs
B) logs
C) graphics
D) calls
E) accounts
A) programs
B) logs
C) graphics
D) calls
E) accounts
Unlock Deck
Unlock for access to all 88 flashcards in this deck.
Unlock Deck
k this deck
49
Some of the biggest security threats are from ________ employees.
A) disinterested
B) disgruntled
C) self-motivated
D) happy
E) contrarian
A) disinterested
B) disgruntled
C) self-motivated
D) happy
E) contrarian
Unlock Deck
Unlock for access to all 88 flashcards in this deck.
Unlock Deck
k this deck
50
A company should clearly define the security ________ for each position.
A) accounts
B) levels
C) responsibilities
D) backups
E) safeguards
A) accounts
B) levels
C) responsibilities
D) backups
E) safeguards
Unlock Deck
Unlock for access to all 88 flashcards in this deck.
Unlock Deck
k this deck
51
The existence of ________ user accounts is a serious security threat.
A) unused
B) network
C) meta
D) employee
E) modified
A) unused
B) network
C) meta
D) employee
E) modified
Unlock Deck
Unlock for access to all 88 flashcards in this deck.
Unlock Deck
k this deck
52
A(n)________ is someone who pretends to be a legitimate company and sends e-mail requesting confidential data.
A) hacker
B) phisher
C) spoofer
D) hawker
E) employee
A) hacker
B) phisher
C) spoofer
D) hawker
E) employee
Unlock Deck
Unlock for access to all 88 flashcards in this deck.
Unlock Deck
k this deck
53
When an employee is terminated,system administrators should receive advance notice so they can
A) plan for security changes.
B) get the employees computer.
C) remove accounts and passwords.
D) fight over the person's office.
E) plan a termination party.
A) plan for security changes.
B) get the employees computer.
C) remove accounts and passwords.
D) fight over the person's office.
E) plan a termination party.
Unlock Deck
Unlock for access to all 88 flashcards in this deck.
Unlock Deck
k this deck
54
When an employee notices a virus on his machine,the ________ plan should specify what to do.
A) antivirus
B) security
C) technology
D) company
E) incident response
A) antivirus
B) security
C) technology
D) company
E) incident response
Unlock Deck
Unlock for access to all 88 flashcards in this deck.
Unlock Deck
k this deck
55
The best way to safeguard a web site from public users is to ________ the web site against an attack.
A) secure
B) prepare
C) defend
D) harden
E) update
A) secure
B) prepare
C) defend
D) harden
E) update
Unlock Deck
Unlock for access to all 88 flashcards in this deck.
Unlock Deck
k this deck
56
________ are the primary means of authentication.
A) Encrypted keys
B) Network administrators
C) Passwords
D) Single sign-on
E) Facial scans
A) Encrypted keys
B) Network administrators
C) Passwords
D) Single sign-on
E) Facial scans
Unlock Deck
Unlock for access to all 88 flashcards in this deck.
Unlock Deck
k this deck
57
________ is a technique for intercepting computer communications.
A) Spoofing
B) Hacking
C) Pretexting
D) Phishing
E) Sniffing
A) Spoofing
B) Hacking
C) Pretexting
D) Phishing
E) Sniffing
Unlock Deck
Unlock for access to all 88 flashcards in this deck.
Unlock Deck
k this deck
58
Computing infrastructure should be located in ________ buildings designed to house expensive and critical equipment.
A) central
B) air-conditioned
C) high-tech
D) fire-resistant
E) easily accessible
A) central
B) air-conditioned
C) high-tech
D) fire-resistant
E) easily accessible
Unlock Deck
Unlock for access to all 88 flashcards in this deck.
Unlock Deck
k this deck
59
Passwords have weaknesses because users often choose simple passwords,which ________ systems can easily guess.
A) security
B) intrusion
C) antivirus
D) malware
E) biometric
A) security
B) intrusion
C) antivirus
D) malware
E) biometric
Unlock Deck
Unlock for access to all 88 flashcards in this deck.
Unlock Deck
k this deck
60
A hacker can launch a denial of service attack against a web server by ________ it with millions of bogus service requests.
A) programming
B) flooding
C) denying
D) hacking
E) probing
A) programming
B) flooding
C) denying
D) hacking
E) probing
Unlock Deck
Unlock for access to all 88 flashcards in this deck.
Unlock Deck
k this deck
61
User accounts should be given (the)________ to perform their jobs
A) least possible privileges needed
B) most possible privileges needed
C) administrator privileges
D) user privileges
E) company standard privileges
A) least possible privileges needed
B) most possible privileges needed
C) administrator privileges
D) user privileges
E) company standard privileges
Unlock Deck
Unlock for access to all 88 flashcards in this deck.
Unlock Deck
k this deck
62
According to PIPEDA every organization needs to identify anyone in the organization who is responsible for ___________ personal information.
A) using
B) safeguarding
C) disclosing
D) collecting
E) maintaining
A) using
B) safeguarding
C) disclosing
D) collecting
E) maintaining
Unlock Deck
Unlock for access to all 88 flashcards in this deck.
Unlock Deck
k this deck
63
What is pretexting?
Unlock Deck
Unlock for access to all 88 flashcards in this deck.
Unlock Deck
k this deck
64
Enforcement consists of ________ interdependent factors.
A) 4
B) 2
C) 5
D) 3
E) 6
A) 4
B) 2
C) 5
D) 3
E) 6
Unlock Deck
Unlock for access to all 88 flashcards in this deck.
Unlock Deck
k this deck
65
The web site _______________________ lists simple things to do to lower your risk of identity theft.
A) HYPERLINK "http://www.wordpress.com" www.wordpress.com
B) HYPERLINK "http://www.google.ca" www.google.ca
C) HYPERLINK "http://www.safecanada.com" www.safecanada.com
D) HYPERLINK "http://www.priv.gc.da" www.priv.gc.da
E) HYPERLINK "http://www.equifax.com" www.equifax.com
A) HYPERLINK "http://www.wordpress.com" www.wordpress.com
B) HYPERLINK "http://www.google.ca" www.google.ca
C) HYPERLINK "http://www.safecanada.com" www.safecanada.com
D) HYPERLINK "http://www.priv.gc.da" www.priv.gc.da
E) HYPERLINK "http://www.equifax.com" www.equifax.com
Unlock Deck
Unlock for access to all 88 flashcards in this deck.
Unlock Deck
k this deck
66
If you suspect an organization has inappropriately disclosed your personal information to a 3ʳᵈ party,you can lodge a complaint with
A) Industry Canada
B) RCMP
C) the local police.
D) Revenue Canada.
E) Office of the Privacy Commissioner of Canada.
A) Industry Canada
B) RCMP
C) the local police.
D) Revenue Canada.
E) Office of the Privacy Commissioner of Canada.
Unlock Deck
Unlock for access to all 88 flashcards in this deck.
Unlock Deck
k this deck
67
________ is an organization-wide function that is in charge of developing data policies and enforcing data standards.
A) Data contents protection
B) Data safeguarding
C) Data integrity
D) Data administration
E) Data rights administration
A) Data contents protection
B) Data safeguarding
C) Data integrity
D) Data administration
E) Data rights administration
Unlock Deck
Unlock for access to all 88 flashcards in this deck.
Unlock Deck
k this deck
68
Users often resist biometric identification because they feel it is
A) expensive.
B) ineffective.
C) too technical.
D) invasive.
E) hard to use.
A) expensive.
B) ineffective.
C) too technical.
D) invasive.
E) hard to use.
Unlock Deck
Unlock for access to all 88 flashcards in this deck.
Unlock Deck
k this deck
69
What is phishing?
Unlock Deck
Unlock for access to all 88 flashcards in this deck.
Unlock Deck
k this deck
70
After installing anti-virus and antispyware,what is the best way to avoid malware?
A) Encrypt your work
B) Give your friend your passwords.
C) Shut the computer down at the end of the day.
D) Open all email by double clicking.
E) Don't open email attachments from unknown sources.
A) Encrypt your work
B) Give your friend your passwords.
C) Shut the computer down at the end of the day.
D) Open all email by double clicking.
E) Don't open email attachments from unknown sources.
Unlock Deck
Unlock for access to all 88 flashcards in this deck.
Unlock Deck
k this deck
71
When an incident is reported,________ is (are)of the essence.
A) the response
B) preparation
C) speed
D) a systematic approach
E) actions
A) the response
B) preparation
C) speed
D) a systematic approach
E) actions
Unlock Deck
Unlock for access to all 88 flashcards in this deck.
Unlock Deck
k this deck
72
PIPEDA stands for
A) Personal Information Protection and Electronic Disclosure Act.
B) Personal Information Protection and Effective Disclosures Act.
C) Personal Information Protection and Electronic Disclosures Act.
D) Personal Information Protection and Electronic Documents Act.
E) Personal Information Protection and Electronic Disclosure Actions.
A) Personal Information Protection and Electronic Disclosure Act.
B) Personal Information Protection and Effective Disclosures Act.
C) Personal Information Protection and Electronic Disclosures Act.
D) Personal Information Protection and Electronic Documents Act.
E) Personal Information Protection and Electronic Disclosure Actions.
Unlock Deck
Unlock for access to all 88 flashcards in this deck.
Unlock Deck
k this deck
73
A security incident reporting plan should ________ all incident reports.
A) centralize
B) generalize
C) standardize
D) decentralize
E) prioritize
A) centralize
B) generalize
C) standardize
D) decentralize
E) prioritize
Unlock Deck
Unlock for access to all 88 flashcards in this deck.
Unlock Deck
k this deck
74
PIPEDA gives individuals the right to know why an organization is ________ their personal information.
A) collecting and disclosing
B) collecting and changing
C) collecting, using or disclosing
D) changing
E) using and disclosing
A) collecting and disclosing
B) collecting and changing
C) collecting, using or disclosing
D) changing
E) using and disclosing
Unlock Deck
Unlock for access to all 88 flashcards in this deck.
Unlock Deck
k this deck
75
Adware is ________ than spyware.
A) more serious
B) less annoying
C) more malicious
D) more benign
E) harder to get rid of
A) more serious
B) less annoying
C) more malicious
D) more benign
E) harder to get rid of
Unlock Deck
Unlock for access to all 88 flashcards in this deck.
Unlock Deck
k this deck
76
Hardening is actually a(n)________ safeguard.
A) technical
B) security
C) data
D) human
E) accountability
A) technical
B) security
C) data
D) human
E) accountability
Unlock Deck
Unlock for access to all 88 flashcards in this deck.
Unlock Deck
k this deck
77
The popularity and efficacy of search engines like Google have created a source of
A) entertainment.
B) inadvertent information disclosure.
C) phishing.
D) pretexting.
E) sniffing.
A) entertainment.
B) inadvertent information disclosure.
C) phishing.
D) pretexting.
E) sniffing.
Unlock Deck
Unlock for access to all 88 flashcards in this deck.
Unlock Deck
k this deck
78
Security policy establishment is the responsibility of
A) middle managers.
B) the CEO.
C) corporate lawyers.
D) senior management.
E) the IT department.
A) middle managers.
B) the CEO.
C) corporate lawyers.
D) senior management.
E) the IT department.
Unlock Deck
Unlock for access to all 88 flashcards in this deck.
Unlock Deck
k this deck
79
What is an unauthorized data disclosure?
Unlock Deck
Unlock for access to all 88 flashcards in this deck.
Unlock Deck
k this deck
80
A company establishes data rights and responsibilities and educates employees on how to backup and recover the database.But,The company still needs to address the ___________ safeguards.
A) inadvertent
B) security
C) human
D) data
E) technical
A) inadvertent
B) security
C) human
D) data
E) technical
Unlock Deck
Unlock for access to all 88 flashcards in this deck.
Unlock Deck
k this deck