Deck 5: Protecting Information Resources
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/84
Play
Full screen (f)
Deck 5: Protecting Information Resources
1
In the context of the CIA triangle, confidentiality means that computers and networks are operating and authorized users can access the information they need.
False
2
The main drawback of an intrusion detection system (IDS) is its inability to prevent denial-of-service (DoS) attacks.
False
3
When disaster strikes, an organization should contact the insurance company to resume normal operations as soon as possible.
True
4
The three important aspects of computer and network security, confidentiality, integrity, and availability, are collectively referred to as the CIA triangle.
Unlock Deck
Unlock for access to all 84 flashcards in this deck.
Unlock Deck
k this deck
5
An intrusion detection system (IDS) can protect networks against both external and internal access.
Unlock Deck
Unlock for access to all 84 flashcards in this deck.
Unlock Deck
k this deck
6
In the context of intentional security threats, _____ can erase data and wreak havoc on computers and networks but do not replicate themselves.
A) Trojan programs
B) worms
C) viruses
D) McCumber cubes
A) Trojan programs
B) worms
C) viruses
D) McCumber cubes
Unlock Deck
Unlock for access to all 84 flashcards in this deck.
Unlock Deck
k this deck
7
When an organization develops a comprehensive security plan, it should set up a security committee with representatives from all departments as well as upper management.
Unlock Deck
Unlock for access to all 84 flashcards in this deck.
Unlock Deck
k this deck
8
Application-filtering firewalls are less expensive than packet-filtering firewalls.
Unlock Deck
Unlock for access to all 84 flashcards in this deck.
Unlock Deck
k this deck
9
When a program containing a virus is used, the virus attaches itself to other files, and the cycle continues.
Unlock Deck
Unlock for access to all 84 flashcards in this deck.
Unlock Deck
k this deck
10
In contrast to pharming, phishing involves hijacking an official Web site address by hacking a Domain Name System server.
Unlock Deck
Unlock for access to all 84 flashcards in this deck.
Unlock Deck
k this deck
11
Level 1 security protects back-end systems to ensure confidentiality, accuracy, and integrity of data.
Unlock Deck
Unlock for access to all 84 flashcards in this deck.
Unlock Deck
k this deck
12
Viruses can be transmitted through a network or through e-mail attachments.
Unlock Deck
Unlock for access to all 84 flashcards in this deck.
Unlock Deck
k this deck
13
In the context of intentional computer and network threats, social engineers protects the integrity of information resources.
Unlock Deck
Unlock for access to all 84 flashcards in this deck.
Unlock Deck
k this deck
14
When using mirror disks, if one of the two disks containing the same data fails, the other disk also fails.
Unlock Deck
Unlock for access to all 84 flashcards in this deck.
Unlock Deck
k this deck
15
In some instances, after examining an incoming packet, a firewall can send a message to the packet's sender that the attempt to transmit the packet has failed.
Unlock Deck
Unlock for access to all 84 flashcards in this deck.
Unlock Deck
k this deck
16
Social engineering is an attack that takes advantage of the backdoors in security systems.
Unlock Deck
Unlock for access to all 84 flashcards in this deck.
Unlock Deck
k this deck
17
The cost of setting up a virtual private network (VPN) is usually high.
Unlock Deck
Unlock for access to all 84 flashcards in this deck.
Unlock Deck
k this deck
18
Auction fraud is sending fraudulent e-mails that seem to come from legitimate sources, such as a bank or university.
Unlock Deck
Unlock for access to all 84 flashcards in this deck.
Unlock Deck
k this deck
19
If a drive in a redundant array of independent disks (RAID) system fails, data stored on it can be reconstructed from data stored on the remaining drives.
Unlock Deck
Unlock for access to all 84 flashcards in this deck.
Unlock Deck
k this deck
20
Terminal resource security is a software feature that erases the screen and signs a user off automatically after a specified length of inactivity.
Unlock Deck
Unlock for access to all 84 flashcards in this deck.
Unlock Deck
k this deck
21
_____ outlines procedures for keeping an organization operational in the event of a natural disaster or a network attack or intrusion.
A) An access control system
B) Business continuity planning
C) An intrusion detection system
D) Terminal resource security
A) An access control system
B) Business continuity planning
C) An intrusion detection system
D) Terminal resource security
Unlock Deck
Unlock for access to all 84 flashcards in this deck.
Unlock Deck
k this deck
22
In the context of security, _____ is an attack that takes advantage of the human element of security systems.
A) disk mirroring
B) weblogging
C) voice recognition
D) social engineering
A) disk mirroring
B) weblogging
C) voice recognition
D) social engineering
Unlock Deck
Unlock for access to all 84 flashcards in this deck.
Unlock Deck
k this deck
23
__________is the unauthorized use of system data for personal gain, such as transferring money from another's account or charging purchases to someone else's account.
A) Computer fraud
B) Denial-of-service
C) Keystroke logging
D) Social engineering
E) Select
A) Computer fraud
B) Denial-of-service
C) Keystroke logging
D) Social engineering
E) Select
Unlock Deck
Unlock for access to all 84 flashcards in this deck.
Unlock Deck
k this deck
24
Which of the following statements best describes spyware?
A) It is software that secretly gathers information about users while they browse the Web.
B) It is an attack that floods a server with service requests to prevent legitimate users' access to the system.
C) It is encryption security that manages transmission security on the Internet.
D) It is a programming routine built into a system by its designer to bypass system security and sneak back into the system later to access programs or files.
A) It is software that secretly gathers information about users while they browse the Web.
B) It is an attack that floods a server with service requests to prevent legitimate users' access to the system.
C) It is encryption security that manages transmission security on the Internet.
D) It is a programming routine built into a system by its designer to bypass system security and sneak back into the system later to access programs or files.
Unlock Deck
Unlock for access to all 84 flashcards in this deck.
Unlock Deck
k this deck
25
In the context of intentional computer and network threats, a _____ floods a network or server with service requests to prevent legitimate users' access to the system.
A) blended threat
B) denial-of-service attack
C) keystroke logging attack
D) backdoor threat
A) blended threat
B) denial-of-service attack
C) keystroke logging attack
D) backdoor threat
Unlock Deck
Unlock for access to all 84 flashcards in this deck.
Unlock Deck
k this deck
26
When planning a comprehensive security system, the first step is designing__________, which use a combination of hardware and software for improving reliability-a way of ensuring availability in case of a system failure.
A) fault-tolerant systems
B) vulnerability-evade systems
C) primary-defense systems
D) database-resilient systems
E) Select
A) fault-tolerant systems
B) vulnerability-evade systems
C) primary-defense systems
D) database-resilient systems
E) Select
Unlock Deck
Unlock for access to all 84 flashcards in this deck.
Unlock Deck
k this deck
27
_____ primarily control access to computers and networks and include devices for securing computers and peripherals from theft.
A) Nonbiometric security measures
B) Virtual security measures
C) Biometric security measures
D) Physical security measures
A) Nonbiometric security measures
B) Virtual security measures
C) Biometric security measures
D) Physical security measures
Unlock Deck
Unlock for access to all 84 flashcards in this deck.
Unlock Deck
k this deck
28
In data encryption, thehttpsin a browser address bar indicates a safe HTTP connection over _____.
A) Secure Sockets Layer
B) Transport Layer Security
C) User Datagram Protocol
D) Transmission Control Protocol
A) Secure Sockets Layer
B) Transport Layer Security
C) User Datagram Protocol
D) Transmission Control Protocol
Unlock Deck
Unlock for access to all 84 flashcards in this deck.
Unlock Deck
k this deck
29
When a computer is infected by a virus, _____.
A) the system's disk access is fast
B) system updates are recommended often
C) some programs suddenly increase in size
D) the available memory space remains constant
A) the system's disk access is fast
B) system updates are recommended often
C) some programs suddenly increase in size
D) the available memory space remains constant
Unlock Deck
Unlock for access to all 84 flashcards in this deck.
Unlock Deck
k this deck
30
In the context of firewall as a nonbiometric security measure, a _____ is software that acts as an intermediary between two systems.
A) logic bomb
B) callback modem
C) proxy server
D) block multiplexer
A) logic bomb
B) callback modem
C) proxy server
D) block multiplexer
Unlock Deck
Unlock for access to all 84 flashcards in this deck.
Unlock Deck
k this deck
31
_____ can interfere with users' control of their computers, through such methods as installing additional software and redirecting Web browsers.
A) Keystroke loggers
B) Spyware
C) Firmware
D) Script loggers
A) Keystroke loggers
B) Spyware
C) Firmware
D) Script loggers
Unlock Deck
Unlock for access to all 84 flashcards in this deck.
Unlock Deck
k this deck
32
Which of the following biometric security measures compares the length of each finger, the translucence of fingertips, and the webbing between fingers against stored data to verify users' identities?
A) Hand geometry
B) Fingerprint recognition
C) Vein analysis
D) Palm prints
A) Hand geometry
B) Fingerprint recognition
C) Vein analysis
D) Palm prints
Unlock Deck
Unlock for access to all 84 flashcards in this deck.
Unlock Deck
k this deck
33
_____ is also known as secret key encryption.
A) Symmetric encryption
B) Auto key generation
C) Public key cryptography
D) Message authentication
A) Symmetric encryption
B) Auto key generation
C) Public key cryptography
D) Message authentication
Unlock Deck
Unlock for access to all 84 flashcards in this deck.
Unlock Deck
k this deck
34
__________is used to encrypt the data sent through a virtual private network (VPN).
A) User Datagram Protocol
B) Transmission Control Protocol
C) Transport Layer Security
D) Internet Protocol Security
E) Select
A) User Datagram Protocol
B) Transmission Control Protocol
C) Transport Layer Security
D) Internet Protocol Security
E) Select
Unlock Deck
Unlock for access to all 84 flashcards in this deck.
Unlock Deck
k this deck
35
In the context of computer and network security, _____ means that computers and networks are operating and authorized users can access the information they need.
A) validity
B) confidentiality
C) integrity
D) availability
A) validity
B) confidentiality
C) integrity
D) availability
Unlock Deck
Unlock for access to all 84 flashcards in this deck.
Unlock Deck
k this deck
36
The process of capturing and recording network traffic is referred to as _____.
A) sniffing
B) phishing
C) bombing
D) pharming
A) sniffing
B) phishing
C) bombing
D) pharming
Unlock Deck
Unlock for access to all 84 flashcards in this deck.
Unlock Deck
k this deck
37
_____ is a type of data encryption that enables users of the Internet to securely and privately exchange data through the use of a pair of keys that is obtained from a trusted authority and shared through that authority.
A) A public key infrastructure
B) Open key encryption
C) Secret key encryption
D) A private key infrastructure
A) A public key infrastructure
B) Open key encryption
C) Secret key encryption
D) A private key infrastructure
Unlock Deck
Unlock for access to all 84 flashcards in this deck.
Unlock Deck
k this deck
38
__________is a form of spyware that collects information about a user (without the user's consent) to determine which commercials to display in the user's Web browser.
A) Adware
B) Silverware
C) Freeware
D) Hardware
E) Select
A) Adware
B) Silverware
C) Freeware
D) Hardware
E) Select
Unlock Deck
Unlock for access to all 84 flashcards in this deck.
Unlock Deck
k this deck
39
Which of the following is a type of access control used to protect systems from unauthorized access?
A) Electronic trackers
B) Passwords
C) Firewalls
D) Identification badges
A) Electronic trackers
B) Passwords
C) Firewalls
D) Identification badges
Unlock Deck
Unlock for access to all 84 flashcards in this deck.
Unlock Deck
k this deck
40
In the context of computer and network security, _____ means that a system must not allow the disclosing of information by anyone who is not authorized to access it.
A) reliability
B) confidentiality
C) integrity
D) availability
A) reliability
B) confidentiality
C) integrity
D) availability
Unlock Deck
Unlock for access to all 84 flashcards in this deck.
Unlock Deck
k this deck
41
A level 1 security system is used to protect _____ against unauthorized access.
A) users' workstations
B) back-end systems
C) internal database servers
D) front-end servers
A) users' workstations
B) back-end systems
C) internal database servers
D) front-end servers
Unlock Deck
Unlock for access to all 84 flashcards in this deck.
Unlock Deck
k this deck
42
In a level 2 security system, _____ must be protected to ensure confidentiality, accuracy, and integrity of data.
A) back-end systems
B) external databases
C) private networks
D) front-end servers
A) back-end systems
B) external databases
C) private networks
D) front-end servers
Unlock Deck
Unlock for access to all 84 flashcards in this deck.
Unlock Deck
k this deck
43
_____ are an inexpensive way to secure a computer to a desktop or counter and often have locks as an additional protection against theft.
A) Corner bolts
B) Identification badges
C) Callback modems
D) Electronic trackers
A) Corner bolts
B) Identification badges
C) Callback modems
D) Electronic trackers
Unlock Deck
Unlock for access to all 84 flashcards in this deck.
Unlock Deck
k this deck
44
Spoofing happens when:
A) an illegitimate program poses as a legitimate one.
B) keystrokes are monitored and recorded.
C) a word is converted into a digital pattern.
D) a firewall rejects the incoming data packets.
A) an illegitimate program poses as a legitimate one.
B) keystrokes are monitored and recorded.
C) a word is converted into a digital pattern.
D) a firewall rejects the incoming data packets.
Unlock Deck
Unlock for access to all 84 flashcards in this deck.
Unlock Deck
k this deck
45
__________is an attempt to gain access to a network by posing as an authorized user in order to find sensitive information, such as passwords and credit card information.
A) Spoofing
B) Keystroke logging
C) Phishing
D) Pharming
E) Select
A) Spoofing
B) Keystroke logging
C) Phishing
D) Pharming
E) Select
Unlock Deck
Unlock for access to all 84 flashcards in this deck.
Unlock Deck
k this deck
46
Which of the following intentional computer and network threats is a type of Trojan program used to release a virus, worm, or other destructive code?
A) A logic bomb
B) Dumpster diving
C) A blended threat
D) Shoulder surfing
A) A logic bomb
B) Dumpster diving
C) A blended threat
D) Shoulder surfing
Unlock Deck
Unlock for access to all 84 flashcards in this deck.
Unlock Deck
k this deck
47
_____ is a commonly used encryption protocol that manages transmission security on the Internet.
A) Application Layer
B) Secure Sockets Layer
C) Transmission Control Protocol
D) User Datagram Protocol
A) Application Layer
B) Secure Sockets Layer
C) Transmission Control Protocol
D) User Datagram Protocol
Unlock Deck
Unlock for access to all 84 flashcards in this deck.
Unlock Deck
k this deck
48
__________is one of the most popular password managers.
A) Dashlane
B) STOPzilla
C) CounterSpy
D) FilePro
E) Select
A) Dashlane
B) STOPzilla
C) CounterSpy
D) FilePro
E) Select
Unlock Deck
Unlock for access to all 84 flashcards in this deck.
Unlock Deck
k this deck
49
A _____ is a type of an intentional computer and network threat.
A) latch
B) proxy server
C) backdoor
D) corner bolt
A) latch
B) proxy server
C) backdoor
D) corner bolt
Unlock Deck
Unlock for access to all 84 flashcards in this deck.
Unlock Deck
k this deck
50
The Committee on National Security Systems (CNSS) proposed a model known as the _____ for evaluating information security.
A) McCumber cube
B) Six Sigma model
C) Bohr model
D) SWOT analysis
A) McCumber cube
B) Six Sigma model
C) Bohr model
D) SWOT analysis
Unlock Deck
Unlock for access to all 84 flashcards in this deck.
Unlock Deck
k this deck
51
A level 3 security system focuses on protecting the _____ against intrusion, denial-of-service attacks, and unauthorized access.
A) back-end server
B) corporate network
C) user's work station
D) front-end server
A) back-end server
B) corporate network
C) user's work station
D) front-end server
Unlock Deck
Unlock for access to all 84 flashcards in this deck.
Unlock Deck
k this deck
52
_____ is a computer crime that involves destroying or disrupting computer services.
A) Sabotage
B) Dumpster diving
C) Bombing
D) Keystroke logging
A) Sabotage
B) Dumpster diving
C) Bombing
D) Keystroke logging
Unlock Deck
Unlock for access to all 84 flashcards in this deck.
Unlock Deck
k this deck
53
The main function of Cyber Incident Response Capability (CIRC) is to _____.
A) provide level 1 security
B) restrict access controls to unauthorized personnel
C) provide information on security incidents
D) create backdoors to bypass security protocols
A) provide level 1 security
B) restrict access controls to unauthorized personnel
C) provide information on security incidents
D) create backdoors to bypass security protocols
Unlock Deck
Unlock for access to all 84 flashcards in this deck.
Unlock Deck
k this deck
54
__________, a biometric security measure, translates words into digital patterns, which are recorded and examined for tone and pitch.
A) Voice recognition
B) Audio manipulation
C) Word exhibition
D) Keyword identification
E) Select
A) Voice recognition
B) Audio manipulation
C) Word exhibition
D) Keyword identification
E) Select
Unlock Deck
Unlock for access to all 84 flashcards in this deck.
Unlock Deck
k this deck
55
Which of the following statements is true of phishing?
A) It involves sending fraudulent e-mails that seem to come from legitimate sources.
B) It consists of self-propagating program code that is triggered by a specified time or event.
C) It monitors and records keystrokes and can be software or hardware devices.
D) It prevents the disclosure of information to anyone who is not authorized to access it.
A) It involves sending fraudulent e-mails that seem to come from legitimate sources.
B) It consists of self-propagating program code that is triggered by a specified time or event.
C) It monitors and records keystrokes and can be software or hardware devices.
D) It prevents the disclosure of information to anyone who is not authorized to access it.
Unlock Deck
Unlock for access to all 84 flashcards in this deck.
Unlock Deck
k this deck
56
Code Red, Melissa, and Sasser are examples of__________.
A) worms
B) firewalls
C) cable shields
D) corner bolts
E) Select
A) worms
B) firewalls
C) cable shields
D) corner bolts
E) Select
Unlock Deck
Unlock for access to all 84 flashcards in this deck.
Unlock Deck
k this deck
57
In the context of computer and network security, _____ refers to the accuracy of information resources within an organization.
A) validity
B) confidentiality
C) integrity
D) availability
A) validity
B) confidentiality
C) integrity
D) availability
Unlock Deck
Unlock for access to all 84 flashcards in this deck.
Unlock Deck
k this deck
58
Which of the following is a biometric security measure?
A) Terminal resource security
B) A corner bolt
C) A callback modem
D) Signature analysis
A) Terminal resource security
B) A corner bolt
C) A callback modem
D) Signature analysis
Unlock Deck
Unlock for access to all 84 flashcards in this deck.
Unlock Deck
k this deck
59
_____, a recent cryptographic protocol, ensures data security and integrity over public networks, such as the Internet.
A) Transport Layer Security
B) Terminal Resource Security
C) Transmission Control Security
D) User Datagram Security
A) Transport Layer Security
B) Terminal Resource Security
C) Transmission Control Security
D) User Datagram Security
Unlock Deck
Unlock for access to all 84 flashcards in this deck.
Unlock Deck
k this deck
60
A(n)__________is a combination of hardware and software that acts as a filter or barrier between a private network and external computers or networks.
A) firewall
B) rootkit
C) intrusion detection system
D) electronic tracker
E) Select
A) firewall
B) rootkit
C) intrusion detection system
D) electronic tracker
E) Select
Unlock Deck
Unlock for access to all 84 flashcards in this deck.
Unlock Deck
k this deck
61
Which of the following statements is true of a worm?
A) It is an independent program that can spread itself without attaching itself to a host program.
B) It floods a network or server with service requests to prevent legitimate users' access to the system.
C) It is usually hidden inside a popular program, but it is not capable of replicating itself.
D) It enables a system designer to bypass the security of a system and sneak back into the system later to access files.
A) It is an independent program that can spread itself without attaching itself to a host program.
B) It floods a network or server with service requests to prevent legitimate users' access to the system.
C) It is usually hidden inside a popular program, but it is not capable of replicating itself.
D) It enables a system designer to bypass the security of a system and sneak back into the system later to access files.
Unlock Deck
Unlock for access to all 84 flashcards in this deck.
Unlock Deck
k this deck
62
Which of the following is a nonbiometric security measure?
A) Electronic trackers
B) Retinal scanning
C) Callback modems
D) Signature analysis
A) Electronic trackers
B) Retinal scanning
C) Callback modems
D) Signature analysis
Unlock Deck
Unlock for access to all 84 flashcards in this deck.
Unlock Deck
k this deck
63
In the context of intentional computer and network threats, a _____ is a programming routine built into a system by its designer or programmer to bypass system security and sneak back into the system later to access programs or files.
A) logic bomb
B) proxy server
C) firewall
D) backdoor
A) logic bomb
B) proxy server
C) firewall
D) backdoor
Unlock Deck
Unlock for access to all 84 flashcards in this deck.
Unlock Deck
k this deck
64
A__________consists of self-propagating program code that is triggered by a specified time or event.
A) virus
B) mirror disk
C) cable shield
D) backdoor
E) Select
A) virus
B) mirror disk
C) cable shield
D) backdoor
E) Select
Unlock Deck
Unlock for access to all 84 flashcards in this deck.
Unlock Deck
k this deck
65
Data sent through a virtual private network (VPN) can be encrypted using the _____.
A) User Datagram Protocol
B) Transmission Control Protocol
C) Internet Control Message Protocol
D) Layer Two Tunneling Protocol
A) User Datagram Protocol
B) Transmission Control Protocol
C) Internet Control Message Protocol
D) Layer Two Tunneling Protocol
Unlock Deck
Unlock for access to all 84 flashcards in this deck.
Unlock Deck
k this deck
66
Which of the following statements is true of asymmetric encryption?
A) It uses the same key to encrypt and decrypt a message.
B) It requires a large amount of processing power.
C) It can easily share a key over the Internet.
D) It needs the shared key to be a secret between the sender and the receiver.
A) It uses the same key to encrypt and decrypt a message.
B) It requires a large amount of processing power.
C) It can easily share a key over the Internet.
D) It needs the shared key to be a secret between the sender and the receiver.
Unlock Deck
Unlock for access to all 84 flashcards in this deck.
Unlock Deck
k this deck
67
Which of the following statements is true of application-filtering firewalls?
A) They are less secure than packet-filtering firewalls.
B) They filter viruses less effectively than packet-filtering firewalls.
C) They filter faster than packet-filtering firewalls.
D) They are more expensive than packet-filtering firewalls.
A) They are less secure than packet-filtering firewalls.
B) They filter viruses less effectively than packet-filtering firewalls.
C) They filter faster than packet-filtering firewalls.
D) They are more expensive than packet-filtering firewalls.
Unlock Deck
Unlock for access to all 84 flashcards in this deck.
Unlock Deck
k this deck
68
In the event of a network attack or intrusion, a _____ lists the tasks that must be performed by the organization to restore damaged data and equipment.
A) risk assessment plan
B) systems engineering plan
C) disaster recovery plan
D) security compliance plan
A) risk assessment plan
B) systems engineering plan
C) disaster recovery plan
D) security compliance plan
Unlock Deck
Unlock for access to all 84 flashcards in this deck.
Unlock Deck
k this deck
69
In the context of the common intentional security threats, which of the following statements best describes a worm?
A) It travels from computer to computer in a network, but it does not usually erase data.
B) It attaches itself to a host program to spread to other files in a computer.
C) It is a programming routine built into a system by its designer to bypass system security and sneak back into the system later to access data.
D) It floods a network or server with service requests to prevent legitimate users' access to the system.
A) It travels from computer to computer in a network, but it does not usually erase data.
B) It attaches itself to a host program to spread to other files in a computer.
C) It is a programming routine built into a system by its designer to bypass system security and sneak back into the system later to access data.
D) It floods a network or server with service requests to prevent legitimate users' access to the system.
Unlock Deck
Unlock for access to all 84 flashcards in this deck.
Unlock Deck
k this deck
70
__________is a method of access control that prevents unauthorized users from using an unattended computer to access the network and data.
A) Terminal resource security
B) Distance-vector routing
C) Direct digital synthesis
D) Link-state routing
E) Select
A) Terminal resource security
B) Distance-vector routing
C) Direct digital synthesis
D) Link-state routing
E) Select
Unlock Deck
Unlock for access to all 84 flashcards in this deck.
Unlock Deck
k this deck
71
In the context of e-commerce transaction security measures, authentication is a critical factor because it ensures that:
A) a system quickly recovers in the event of a system failure or disaster.
B) the person using a credit card number is the card's legitimate owner.
C) the accuracy of information resources within an organization is maintained.
D) a system can easily be restored to operational status.
A) a system quickly recovers in the event of a system failure or disaster.
B) the person using a credit card number is the card's legitimate owner.
C) the accuracy of information resources within an organization is maintained.
D) a system can easily be restored to operational status.
Unlock Deck
Unlock for access to all 84 flashcards in this deck.
Unlock Deck
k this deck
72
Similar to phishing, _____ is directing Internet users to fraudulent Web sites with the intention of stealing their personal information, such as Social Security numbers, passwords, bank account numbers, and credit card numbers.
A) sniffing
B) screening
C) pharming
D) cybersquatting
A) sniffing
B) screening
C) pharming
D) cybersquatting
Unlock Deck
Unlock for access to all 84 flashcards in this deck.
Unlock Deck
k this deck
73
A(n) _____ is often used so that remote users have a secure connection to an organization's network.
A) biometric security network
B) intrusion detection network
C) virtual private network
D) terminal resource network
A) biometric security network
B) intrusion detection network
C) virtual private network
D) terminal resource network
Unlock Deck
Unlock for access to all 84 flashcards in this deck.
Unlock Deck
k this deck
74
__________monitor and record the keys pressed on a keyboard and can be software or hardware devices.
A) Keystroke loggers
B) Key chain planners
C) Key punchers
D) Key performers
E) Select
A) Keystroke loggers
B) Key chain planners
C) Key punchers
D) Key performers
E) Select
Unlock Deck
Unlock for access to all 84 flashcards in this deck.
Unlock Deck
k this deck
75
Which of the following forms of text needs to be unscrambled using a decryption key?
A) Plaintext
B) Cleartext
C) Teletext
D) Ciphertext
A) Plaintext
B) Cleartext
C) Teletext
D) Ciphertext
Unlock Deck
Unlock for access to all 84 flashcards in this deck.
Unlock Deck
k this deck
76
In the context of intentional computer and network threats, a _____ combines the characteristics of computer viruses, worms, and other malicious codes with vulnerabilities found on public and private networks.
A) blended threat
B) mirror disk
C) backdoor threat
D) firewall
A) blended threat
B) mirror disk
C) backdoor threat
D) firewall
Unlock Deck
Unlock for access to all 84 flashcards in this deck.
Unlock Deck
k this deck
77
As a physical security measure, _____.
A) electronic trackers are attached to a computer at the power outlet
B) passwords are used to restrict access to computers
C) firewalls are used to filter data packets
D) a user's signature is verified before granting accessibility
A) electronic trackers are attached to a computer at the power outlet
B) passwords are used to restrict access to computers
C) firewalls are used to filter data packets
D) a user's signature is verified before granting accessibility
Unlock Deck
Unlock for access to all 84 flashcards in this deck.
Unlock Deck
k this deck
78
__________is an example of antispyware software.
A) STOPzilla
B) AndroZip
C) Tumblr
D) Dogpile
E) Select
A) STOPzilla
B) AndroZip
C) Tumblr
D) Dogpile
E) Select
Unlock Deck
Unlock for access to all 84 flashcards in this deck.
Unlock Deck
k this deck
79
_____ are usually placed in front of a firewall and can identify attack signatures, trace patterns, generate alarms for a network administrator, and cause routers to terminate connections with suspicious sources.
A) Intrusion detection systems
B) Proxy servers
C) Identification badges
D) Virtual private networks
A) Intrusion detection systems
B) Proxy servers
C) Identification badges
D) Virtual private networks
Unlock Deck
Unlock for access to all 84 flashcards in this deck.
Unlock Deck
k this deck
80
A(n)__________contains code intended to disrupt a computer, network, or Web site and is usually hidden inside a popular program.
A) Trojan program
B) PageRank
C) exit application
D) withdrawal suite
E) Select
A) Trojan program
B) PageRank
C) exit application
D) withdrawal suite
E) Select
Unlock Deck
Unlock for access to all 84 flashcards in this deck.
Unlock Deck
k this deck