Deck 5: Information Systems Security
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/117
Play
Full screen (f)
Deck 5: Information Systems Security
1
Removing and disabling cookies improves security,but your computer will be more difficult to use.
True
2
Few individuals take security as seriously as they should,and most fail to implement even low-cost safeguards.
True
3
The single most important safeguard for computer security is to create and use strong passwords.
True
4
A vulnerability is some measure that individuals or organizations take to block the threat from obtaining the asset.
Unlock Deck
Unlock for access to all 117 flashcards in this deck.
Unlock Deck
k this deck
5
Most email and messaging are protected by encryption,and you should assume that anything you write in email or messaging is safe.
Unlock Deck
Unlock for access to all 117 flashcards in this deck.
Unlock Deck
k this deck
6
Security policies depend on whether the organization is governmental or nongovernmental.
Unlock Deck
Unlock for access to all 117 flashcards in this deck.
Unlock Deck
k this deck
7
Sniffing is a term used to describe a variety of software that damages or disables computers.
Unlock Deck
Unlock for access to all 117 flashcards in this deck.
Unlock Deck
k this deck
8
If the vendor does not use https,it is still safe to use that online vendor.
Unlock Deck
Unlock for access to all 117 flashcards in this deck.
Unlock Deck
k this deck
9
Information systems security is the process of preventing unauthorized access to an IS or modification of its data.
Unlock Deck
Unlock for access to all 117 flashcards in this deck.
Unlock Deck
k this deck
10
IP spoofing occurs when an intruder uses another site's IP address to masquerade as the other site.
Unlock Deck
Unlock for access to all 117 flashcards in this deck.
Unlock Deck
k this deck
11
Security is rarely breached,and the frequency of security breaches will slow down in the future.
Unlock Deck
Unlock for access to all 117 flashcards in this deck.
Unlock Deck
k this deck
12
Human errors are typically procedure problems: incorrect procedures or procedural
mistakes.
mistakes.
Unlock Deck
Unlock for access to all 117 flashcards in this deck.
Unlock Deck
k this deck
13
Your browser automatically stores a history of your browsing activities and temporary files that contain sensitive data about where you've visited,what you've purchased,and what your account names and passwords are.
Unlock Deck
Unlock for access to all 117 flashcards in this deck.
Unlock Deck
k this deck
14
Increasingly security experts view the cloud as the least secure option for transferring security risks.
Unlock Deck
Unlock for access to all 117 flashcards in this deck.
Unlock Deck
k this deck
15
Human errors and mistakes include accidental or unintended problems caused by both employees and nonemployees.
Unlock Deck
Unlock for access to all 117 flashcards in this deck.
Unlock Deck
k this deck
16
Poorly written application programs and procedures are sources of security threats.
Unlock Deck
Unlock for access to all 117 flashcards in this deck.
Unlock Deck
k this deck
17
Reducing risk always costs,and the elimination of all risk would be exceptionally
expensive if not impossible.
expensive if not impossible.
Unlock Deck
Unlock for access to all 117 flashcards in this deck.
Unlock Deck
k this deck
18
Safeguards are a type of control; and like all controls,they limit behavior.
Unlock Deck
Unlock for access to all 117 flashcards in this deck.
Unlock Deck
k this deck
19
The most challenging aspect of security is businesses do not thoroughly test the security of their new systems before they are employed.
Unlock Deck
Unlock for access to all 117 flashcards in this deck.
Unlock Deck
k this deck
20
A company-wide security policy should include how employees and others can request changes to inaccurate data.
Unlock Deck
Unlock for access to all 117 flashcards in this deck.
Unlock Deck
k this deck
21
Technical safeguards block threats from obtaining an asset by using the hardware and software components of an information system.
Unlock Deck
Unlock for access to all 117 flashcards in this deck.
Unlock Deck
k this deck
22
Malware definitions-patterns that exist in malware code-should be downloaded frequently.
Unlock Deck
Unlock for access to all 117 flashcards in this deck.
Unlock Deck
k this deck
23
A key is a physical device that is used to lock and unlock a message.
Unlock Deck
Unlock for access to all 117 flashcards in this deck.
Unlock Deck
k this deck
24
Input validation is an example of secure design.
Unlock Deck
Unlock for access to all 117 flashcards in this deck.
Unlock Deck
k this deck
25
A public key is like the combination lock,and the private key is like the combination.
Unlock Deck
Unlock for access to all 117 flashcards in this deck.
Unlock Deck
k this deck
26
Malware protection is an example of a data safeguard.
Unlock Deck
Unlock for access to all 117 flashcards in this deck.
Unlock Deck
k this deck
27
The user name identifies the user and the password authenticates that user.
Unlock Deck
Unlock for access to all 117 flashcards in this deck.
Unlock Deck
k this deck
28
Users resist biometric identification because they feel it is invasive.
Unlock Deck
Unlock for access to all 117 flashcards in this deck.
Unlock Deck
k this deck
29
Most secure communication over the Internet uses a protocol called HTTP.
Unlock Deck
Unlock for access to all 117 flashcards in this deck.
Unlock Deck
k this deck
30
It is safe to share a password if you don't send it via email.
Unlock Deck
Unlock for access to all 117 flashcards in this deck.
Unlock Deck
k this deck
31
Symmetric encryption is simpler and much faster than asymmetric encryption.
Unlock Deck
Unlock for access to all 117 flashcards in this deck.
Unlock Deck
k this deck
32
Safeguards restrict freedoms by limiting what employees can do.
Unlock Deck
Unlock for access to all 117 flashcards in this deck.
Unlock Deck
k this deck
33
One type of attack on common passwords is brute force attack.
Unlock Deck
Unlock for access to all 117 flashcards in this deck.
Unlock Deck
k this deck
34
Safeguards are cost prohibitive and increase work efficiency.
Unlock Deck
Unlock for access to all 117 flashcards in this deck.
Unlock Deck
k this deck
35
An organization should store some back-up database copies off premises,possibly in a remote location.
Unlock Deck
Unlock for access to all 117 flashcards in this deck.
Unlock Deck
k this deck
36
No safeguard by itself is completely effective; there is no silver bullet,no simple solution.
Unlock Deck
Unlock for access to all 117 flashcards in this deck.
Unlock Deck
k this deck
37
Human safeguards result when authorized users follow appropriate procedures for system use and recovery.
Unlock Deck
Unlock for access to all 117 flashcards in this deck.
Unlock Deck
k this deck
38
A smart card uses personal physical characteristics such as fingerprints,facial features,and retinal scans to authenticate users.
Unlock Deck
Unlock for access to all 117 flashcards in this deck.
Unlock Deck
k this deck
39
An organization should store all back-up database copies of premises for easier access.
Unlock Deck
Unlock for access to all 117 flashcards in this deck.
Unlock Deck
k this deck
40
A firewall can be a special use computer,or it can be an app on a general-purpose computer or router.
Unlock Deck
Unlock for access to all 117 flashcards in this deck.
Unlock Deck
k this deck
41
After the initial response to the disaster or incident,computer forensics can help determine
the cause of the event.
the cause of the event.
Unlock Deck
Unlock for access to all 117 flashcards in this deck.
Unlock Deck
k this deck
42
Given appropriate job descriptions,user accounts should be defined to give users the most possible privilege needed to perform their jobs.
Unlock Deck
Unlock for access to all 117 flashcards in this deck.
Unlock Deck
k this deck
43
Departmental personnel should develop procedures for system recovery.
Unlock Deck
Unlock for access to all 117 flashcards in this deck.
Unlock Deck
k this deck
44
_________blocks access to a computer until the victim pays money to the attacker.
A) Malware
B) Spyware
C) Ransomware
D) Session Hijacking
A) Malware
B) Spyware
C) Ransomware
D) Session Hijacking
Unlock Deck
Unlock for access to all 117 flashcards in this deck.
Unlock Deck
k this deck
45
When hiring for high-sensitivity positions,extensive interviews,references,and background investigations are appropriate.
Unlock Deck
Unlock for access to all 117 flashcards in this deck.
Unlock Deck
k this deck
46
__________ is a technique for intercepting computer communications.
A) Spoofing
B) Phishing
C) Pretexting
D) Sniffing
A) Spoofing
B) Phishing
C) Pretexting
D) Sniffing
Unlock Deck
Unlock for access to all 117 flashcards in this deck.
Unlock Deck
k this deck
47
Responsibility and accountability are important factors in enforcing security policies.
Unlock Deck
Unlock for access to all 117 flashcards in this deck.
Unlock Deck
k this deck
48
Companies that invest in _________ have been shown to reduce the frequency and severity of their security losses.
A) vulnerability
B) safeguards
C) targets
D) modifications
A) vulnerability
B) safeguards
C) targets
D) modifications
Unlock Deck
Unlock for access to all 117 flashcards in this deck.
Unlock Deck
k this deck
49
Which of the following is a software threat?
A) session hijacking
B) overflow attack
C) cross-site scripting (XSS)
D) hacking
A) session hijacking
B) overflow attack
C) cross-site scripting (XSS)
D) hacking
Unlock Deck
Unlock for access to all 117 flashcards in this deck.
Unlock Deck
k this deck
50
A ______ is a person or organization that seeks to obtain or alter data or other assets illegally,without the owner's permission and often without the owner's knowledge.
A) target
B) vulnerability
C) security breach
D) threat
A) target
B) vulnerability
C) security breach
D) threat
Unlock Deck
Unlock for access to all 117 flashcards in this deck.
Unlock Deck
k this deck
51
When you buy something online,you provide your credit card data; when that data is transmitted over the Internet,it is an example of:
A) threat
B) vulnerability
C) risk
D) target
A) threat
B) vulnerability
C) risk
D) target
Unlock Deck
Unlock for access to all 117 flashcards in this deck.
Unlock Deck
k this deck
52
When a security incident does occur,it's important to slowly and carefully respond.
Unlock Deck
Unlock for access to all 117 flashcards in this deck.
Unlock Deck
k this deck
53
_________is simply the chance of loss.
A) Threat
B) Vulnerability
C) Risk
D) Target
A) Threat
B) Vulnerability
C) Risk
D) Target
Unlock Deck
Unlock for access to all 117 flashcards in this deck.
Unlock Deck
k this deck
54
Management needs to cultivate a culture of compliance.
Unlock Deck
Unlock for access to all 117 flashcards in this deck.
Unlock Deck
k this deck
55
Standard human resource policies should ensure that system administrators receive notification in advance of the employee's last day so they can remove accounts and passwords.
Unlock Deck
Unlock for access to all 117 flashcards in this deck.
Unlock Deck
k this deck
56
Many organizations create honey-pots,which are false targets for hackers to attack.
Unlock Deck
Unlock for access to all 117 flashcards in this deck.
Unlock Deck
k this deck
57
Every organization should have an incident response plan as part of the security program.
Unlock Deck
Unlock for access to all 117 flashcards in this deck.
Unlock Deck
k this deck
58
_________is simply the chance of loss.
A) Threat
B) Vulnerability
C) Risk
D) Target
A) Threat
B) Vulnerability
C) Risk
D) Target
Unlock Deck
Unlock for access to all 117 flashcards in this deck.
Unlock Deck
k this deck
59
Companies often allow employees to use their own personal mobile device to conduct company activities,a policy called Bring Your Own Device (BYOD).
Unlock Deck
Unlock for access to all 117 flashcards in this deck.
Unlock Deck
k this deck
60
In most cases,companies can screen vendor,partner personnel and public users.
Unlock Deck
Unlock for access to all 117 flashcards in this deck.
Unlock Deck
k this deck
61
Which of these following is a true statement about using the cloud?
A) Cloud vendors use current technology and can afford to hire leading security experts.
B) Cloud vendors restrict freedoms by limiting what employees can do.
C) Cloud vendors have complicated polices.
D) Cloud vendors are not audited frequently.
A) Cloud vendors use current technology and can afford to hire leading security experts.
B) Cloud vendors restrict freedoms by limiting what employees can do.
C) Cloud vendors have complicated polices.
D) Cloud vendors are not audited frequently.
Unlock Deck
Unlock for access to all 117 flashcards in this deck.
Unlock Deck
k this deck
62
Which of the following is an example of inadvertent human error:
A) sabotage
B) a procedure problem
C) pretexting
D) theft
A) sabotage
B) a procedure problem
C) pretexting
D) theft
Unlock Deck
Unlock for access to all 117 flashcards in this deck.
Unlock Deck
k this deck
63
The first safeguard against security threats is:
A) use strong passwords
B) to take security seriously
C) use a secure https connection
D) remove your browsing history
A) use strong passwords
B) to take security seriously
C) use a secure https connection
D) remove your browsing history
Unlock Deck
Unlock for access to all 117 flashcards in this deck.
Unlock Deck
k this deck
64
The process ____________of verifies the credentials of the individual seeking access to a computer resource.
A) identification
B) authentication
C) encryption
D) hardening
A) identification
B) authentication
C) encryption
D) hardening
Unlock Deck
Unlock for access to all 117 flashcards in this deck.
Unlock Deck
k this deck
65
Which of these following is a true statement about using the cloud?
A) Cloud vendors use current technology and can afford to hire leading security experts.
B) Cloud vendors restrict freedoms by limiting what employees can do.
C) Cloud vendors have complicated polices.
D) Cloud vendors are not audited frequently.
A) Cloud vendors use current technology and can afford to hire leading security experts.
B) Cloud vendors restrict freedoms by limiting what employees can do.
C) Cloud vendors have complicated polices.
D) Cloud vendors are not audited frequently.
Unlock Deck
Unlock for access to all 117 flashcards in this deck.
Unlock Deck
k this deck
66
__________is a sophisticated,possibly long-running computer hack that is perpetrated by large,well-funded organizations such as governments.
A) Usurpation
B) An overflow attack
C) Advanced Persistent Threat (APT)
D) Malware
A) Usurpation
B) An overflow attack
C) Advanced Persistent Threat (APT)
D) Malware
Unlock Deck
Unlock for access to all 117 flashcards in this deck.
Unlock Deck
k this deck
67
A/An _______________attack in which a malicious hacker floods a Web server with millions of bogus service requests that so occupy the server that it cannot service legitimate requests.
A) overflow attack
B) denial-of-service (DoS)
C) advanced persistent threat (APT)
D) usurpation
A) overflow attack
B) denial-of-service (DoS)
C) advanced persistent threat (APT)
D) usurpation
Unlock Deck
Unlock for access to all 117 flashcards in this deck.
Unlock Deck
k this deck
68
Which of the following statements is true about biometric authentication?
A) It uses personal physical characteristics for authentication.
B) It is less invasive than other methods of authentication.
C) It uses a microchip loaded with identifying data to authenticate users.
D) It provides weak authentication compared to other methods.
A) It uses personal physical characteristics for authentication.
B) It is less invasive than other methods of authentication.
C) It uses a microchip loaded with identifying data to authenticate users.
D) It provides weak authentication compared to other methods.
Unlock Deck
Unlock for access to all 117 flashcards in this deck.
Unlock Deck
k this deck
69
Which of the following is not an example of external threat that can affect software?
A) overflow attack
B) denial-of-service (DoS)
C) pretexting
D) usurpation
A) overflow attack
B) denial-of-service (DoS)
C) pretexting
D) usurpation
Unlock Deck
Unlock for access to all 117 flashcards in this deck.
Unlock Deck
k this deck
70
Which of the following is a valid difference between a password and user name?
A) A password is used to encode information, whereas a user name is used to decode information.
B) Unlike a password, a user name is more complex.
C) A user name identifies the user, whereas a password authenticates the user.
D) A user name is common among users, whereas a password is unique.
A) A password is used to encode information, whereas a user name is used to decode information.
B) Unlike a password, a user name is more complex.
C) A user name identifies the user, whereas a password authenticates the user.
D) A user name is common among users, whereas a password is unique.
Unlock Deck
Unlock for access to all 117 flashcards in this deck.
Unlock Deck
k this deck
71
___________are small files that your browser stores on your computer when you visit Web sites.
A) Temp files
B) Browsing history
C) Viruses
D) Cookies
A) Temp files
B) Browsing history
C) Viruses
D) Cookies
Unlock Deck
Unlock for access to all 117 flashcards in this deck.
Unlock Deck
k this deck
72
________ is the process of transforming clear text into coded,unintelligible text for secure storage or communication.
A) Code injection
B) Pretexting
C) Encryption
D) Authentication
A) Code injection
B) Pretexting
C) Encryption
D) Authentication
Unlock Deck
Unlock for access to all 117 flashcards in this deck.
Unlock Deck
k this deck
73
Which of these following is a true statement about safeguards:
A) safeguards increase work efficiency
B) one safeguard by itself is completely effective
C) safeguards are inexpensive
D) safeguards restrict freedoms by limiting what employees can do.
A) safeguards increase work efficiency
B) one safeguard by itself is completely effective
C) safeguards are inexpensive
D) safeguards restrict freedoms by limiting what employees can do.
Unlock Deck
Unlock for access to all 117 flashcards in this deck.
Unlock Deck
k this deck
74
Firewalls are an example of what type of safeguard?
A) technical
B) data
C) procedural
D) human
A) technical
B) data
C) procedural
D) human
Unlock Deck
Unlock for access to all 117 flashcards in this deck.
Unlock Deck
k this deck
75
Security is a trade-off with_________.
A) benefits
B) risks
C) freedom
D) defense
A) benefits
B) risks
C) freedom
D) defense
Unlock Deck
Unlock for access to all 117 flashcards in this deck.
Unlock Deck
k this deck
76
In a typical _________ attack,the criminal posts a reply to a discussion board but along with
The plaintext reply adds malicious code invisible to the discussion board.
A) brute force attack
B) denial-of-service (DoS)
C) cross-site scripting (XSS)
D) SQL injection attack
The plaintext reply adds malicious code invisible to the discussion board.
A) brute force attack
B) denial-of-service (DoS)
C) cross-site scripting (XSS)
D) SQL injection attack
Unlock Deck
Unlock for access to all 117 flashcards in this deck.
Unlock Deck
k this deck
77
___________are small files that your browser stores on your computer when you visit Web sites.
A) Temp files
B) Browsing history
C) Viruses
D) Cookies
A) Temp files
B) Browsing history
C) Viruses
D) Cookies
Unlock Deck
Unlock for access to all 117 flashcards in this deck.
Unlock Deck
k this deck
78
The preventative measures used by organizations to reduce IS security are called:
A) encryption
B) avoidance
C) safeguards
D) risks
A) encryption
B) avoidance
C) safeguards
D) risks
Unlock Deck
Unlock for access to all 117 flashcards in this deck.
Unlock Deck
k this deck
79
When an unsuspecting user accesses a fake Wi-Fi access point,which has the same name as a legitimate Wi-Fi access point,this is an example of a/an:
A) cross site scripting (XSS)
B) sniffing
C) IP Spoofing
D) evil twin
A) cross site scripting (XSS)
B) sniffing
C) IP Spoofing
D) evil twin
Unlock Deck
Unlock for access to all 117 flashcards in this deck.
Unlock Deck
k this deck
80
When criminals replace a legitimate user or software program with their own access or illegitimate software program to give the attacker unauthorized control of some part of the IS,it is known as:
A) usurpation
B) an overflow attack
C) SQL injection attack
D) malware
A) usurpation
B) an overflow attack
C) SQL injection attack
D) malware
Unlock Deck
Unlock for access to all 117 flashcards in this deck.
Unlock Deck
k this deck