Deck 1: Introduction
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/25
Play
Full screen (f)
Deck 1: Introduction
1
Information security is defined as
A) Protecting information and information systems from unauthorized access, use, disclosure, disruption, modification, or destruction in order to provide incentives, confidence and avoidance
B) Protecting information and information systems from unauthorized access, use, disclosure, disruption, modification, or destruction in order to provide intelligence, control and evidence
C) Protecting information and information systems from unauthorized access, use, disclosure, disruption, modification, or destruction in order to provide insights, competence and advantage
D) Protecting information and information systems from unauthorized access, use, disclosure, disruption, modification, or destruction in order to provide integrity, confidentiality and availability
A) Protecting information and information systems from unauthorized access, use, disclosure, disruption, modification, or destruction in order to provide incentives, confidence and avoidance
B) Protecting information and information systems from unauthorized access, use, disclosure, disruption, modification, or destruction in order to provide intelligence, control and evidence
C) Protecting information and information systems from unauthorized access, use, disclosure, disruption, modification, or destruction in order to provide insights, competence and advantage
D) Protecting information and information systems from unauthorized access, use, disclosure, disruption, modification, or destruction in order to provide integrity, confidentiality and availability
D
2
The Internet is relevant for information security because
A) It exposed computers to attacks from around the world
B) It caused one of the most significant Internet outages ever
C) It led to exploits from weakness is wireless networks
D) It caused falsification of financial records at publicly traded companies
A) It exposed computers to attacks from around the world
B) It caused one of the most significant Internet outages ever
C) It led to exploits from weakness is wireless networks
D) It caused falsification of financial records at publicly traded companies
A
3
The Sarbanes-Oxley act is important to information security for
A) Compelling investments in specified information security procedures
B) Stealing commercial information by exploiting weakness is wireless networks
C) Exposing the implications of international differences in cyber-law
D) Popularizing computers among the masses
A) Compelling investments in specified information security procedures
B) Stealing commercial information by exploiting weakness is wireless networks
C) Exposing the implications of international differences in cyber-law
D) Popularizing computers among the masses
A
4
Information security is becoming increasingly important because of
A) The increasing criticality of information to individuals and organizations
B) There is a general increase in criminal behavior in society
C) People are greedier these days
D) Organizations are wealthier these days
A) The increasing criticality of information to individuals and organizations
B) There is a general increase in criminal behavior in society
C) People are greedier these days
D) Organizations are wealthier these days
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
5
As the use of personal devices for work has increased, the work of information security professionals has
A) Decreased
B) Stayed the same
C) Increased
D) None of the above
A) Decreased
B) Stayed the same
C) Increased
D) None of the above
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
6
Windows 95 is important to information security for
A) Intruding into a number of high profile computer installations
B) Stealing commercial information by exploiting weakness is wireless networks
C) Causing one of the most significant Internet outages ever
D) Popularizing computers among the masses
A) Intruding into a number of high profile computer installations
B) Stealing commercial information by exploiting weakness is wireless networks
C) Causing one of the most significant Internet outages ever
D) Popularizing computers among the masses
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
7
Information security professional do not report spending a lot of time on
A) Researching new technologies
B) Political issues
C) Developing internal security policies, standards and procedures
D) Fixing software bugs
A) Researching new technologies
B) Political issues
C) Developing internal security policies, standards and procedures
D) Fixing software bugs
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
8
Albert Gonzalez and T J Maxx are well known in the information security literature for
A) Intruding into a number of high profile computer installations
B) Stealing commercial information by exploiting weakness is wireless networks
C) Causing one of the most significant Internet outages ever
D) Falsification of financial records at publicly traded companies
A) Intruding into a number of high profile computer installations
B) Stealing commercial information by exploiting weakness is wireless networks
C) Causing one of the most significant Internet outages ever
D) Falsification of financial records at publicly traded companies
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
9
HIPAA is important to information security for
A) Intruding into a number of high profile computer installations
B) Driving demand for information security in a large sector of the US economy
C) Causing one of the most significant Internet outages ever
D) Popularizing computers among the masses
A) Intruding into a number of high profile computer installations
B) Driving demand for information security in a large sector of the US economy
C) Causing one of the most significant Internet outages ever
D) Popularizing computers among the masses
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
10
A desired competency for information security professionals is
A) Marketing
B) End user awareness
C) Financial planning
D) Accounting
A) Marketing
B) End user awareness
C) Financial planning
D) Accounting
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
11
The Sarbanes-Oxley act was enacted in 2002 to prevent
A) Intruding into a number of high profile computer installations
B) Causing one of the most significant Internet outages ever
C) Stealing commercial information by exploiting weakness is wireless networks
D) Falsification of financial records at publicly traded companies
A) Intruding into a number of high profile computer installations
B) Causing one of the most significant Internet outages ever
C) Stealing commercial information by exploiting weakness is wireless networks
D) Falsification of financial records at publicly traded companies
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
12
HIPAA stands for
A) Health Insurance Portability and Accountability Act
B) Health Insurance Privacy and Accountability Act
C) Health Insurance Privacy and Awareness Act
D) Health Insurance Portability and Awareness Act
A) Health Insurance Portability and Accountability Act
B) Health Insurance Privacy and Accountability Act
C) Health Insurance Privacy and Awareness Act
D) Health Insurance Portability and Awareness Act
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
13
The war between Russia and Georgia in 2008 is important to information security for
A) Its impact on global warming
B) The use of nuclear weapons
C) Making people aware of the possibility of state-sponsored cyber-attacks
D) The heavy loss of life
A) Its impact on global warming
B) The use of nuclear weapons
C) Making people aware of the possibility of state-sponsored cyber-attacks
D) The heavy loss of life
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
14
The biggest time-consuming activity for most Information security professionals is
A) Responding to information security incidents
B) Fixing software bugs
C) Researching new technologies
D) Helping customers
A) Responding to information security incidents
B) Fixing software bugs
C) Researching new technologies
D) Helping customers
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
15
Desired competencies for information security professionals include all of the following except
A) Marketing
B) Risk management
C) Secure SDLC
D) Forensics
A) Marketing
B) Risk management
C) Secure SDLC
D) Forensics
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
16
The Morris worm is well known in the information security literature for
A) Intruding into a number of high profile computer installations
B) Stealing commercial information by exploiting weakness is wireless networks
C) Causing one of the most significant Internet outages ever
D) Falsification of financial records at publicly traded companies
A) Intruding into a number of high profile computer installations
B) Stealing commercial information by exploiting weakness is wireless networks
C) Causing one of the most significant Internet outages ever
D) Falsification of financial records at publicly traded companies
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
17
Many users are vulnerable to
A) Attacks on ATM machines
B) Stolen usernames and passwords from a compromised site being used to compromise their bank accounts
C) Hackers compromising the IT systems at large financial institutions
D) Demands for usernames and passwords at gun-point
A) Attacks on ATM machines
B) Stolen usernames and passwords from a compromised site being used to compromise their bank accounts
C) Hackers compromising the IT systems at large financial institutions
D) Demands for usernames and passwords at gun-point
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
18
Information security professional report spending a lot of time on
A) Researching new technologies
B) Political issues
C) Developing internal security policies, standards and procedures
D) Fixing software bugs
A) Researching new technologies
B) Political issues
C) Developing internal security policies, standards and procedures
D) Fixing software bugs
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
19
The ILOVEYOU virus is important to information security for
A) Intruding into a number of high profile computer installations
B) Stealing commercial information by exploiting weakness is wireless networks
C) Exposing the implications of international differences in cyber-law
D) Popularizing computers among the masses
A) Intruding into a number of high profile computer installations
B) Stealing commercial information by exploiting weakness is wireless networks
C) Exposing the implications of international differences in cyber-law
D) Popularizing computers among the masses
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
20
The gang of 414 is famous in the information security literature for
A) Causing one of the most significant Internet outages ever
B) Intruding into a number of high profile computer installations
C) Stealing commercial information by exploiting weakness is wireless networks
D) Falsification of financial records at publicly traded companies
A) Causing one of the most significant Internet outages ever
B) Intruding into a number of high profile computer installations
C) Stealing commercial information by exploiting weakness is wireless networks
D) Falsification of financial records at publicly traded companies
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
21
Availability is
A) Protecting information and information systems from unauthorized use
B) Preserving authorized restrictions on access and disclosure, including means for protecting personal privacy and proprietary information Choices
C) Guarding against improper information modification or destruction, and includes ensuring information non-repudiation and authenticity
D) Ensuring timely and reliable access to and use of information
A) Protecting information and information systems from unauthorized use
B) Preserving authorized restrictions on access and disclosure, including means for protecting personal privacy and proprietary information Choices
C) Guarding against improper information modification or destruction, and includes ensuring information non-repudiation and authenticity
D) Ensuring timely and reliable access to and use of information
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
22
Confidentiality is
A) Protecting information and information systems from unauthorized use
B) Preserving authorized restrictions on access and disclosure, including means for protecting personal privacy and proprietary information Choices
C) Guarding against improper information modification or destruction, and includes ensuring information non-repudiation and authenticity
D) Ensuring timely and reliable access to and use of information
A) Protecting information and information systems from unauthorized use
B) Preserving authorized restrictions on access and disclosure, including means for protecting personal privacy and proprietary information Choices
C) Guarding against improper information modification or destruction, and includes ensuring information non-repudiation and authenticity
D) Ensuring timely and reliable access to and use of information
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
23
Of the measures you can take to improve your personal security, the least important is
A) Spending lot of money
B) Using end-point virus) protection
C) Automating software updates
D) Using appropriate passwords
A) Spending lot of money
B) Using end-point virus) protection
C) Automating software updates
D) Using appropriate passwords
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
24
The term CIA in information security refers to
A) Confidentiality, integrity and availability
B) Central intelligence agency
C) Common information awareness
D) Critical information analysis
A) Confidentiality, integrity and availability
B) Central intelligence agency
C) Common information awareness
D) Critical information analysis
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
25
Integrity is
A) Protecting information and information systems from unauthorized use
B) Preserving authorized restrictions on access and disclosure, including means for protecting personal privacy and proprietary information Choices
C) Guarding against improper information modification or destruction, and includes ensuring information non-repudiation and authenticity
D) Ensuring timely and reliable access to and use of information
A) Protecting information and information systems from unauthorized use
B) Preserving authorized restrictions on access and disclosure, including means for protecting personal privacy and proprietary information Choices
C) Guarding against improper information modification or destruction, and includes ensuring information non-repudiation and authenticity
D) Ensuring timely and reliable access to and use of information
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck