Deck 6: Information, Communications, and Computer Security

Full screen (f)
exit full mode
Question
According to the United States ________, critical information includes all forms and types of financial, business, scientific, economic, or engineering information.

A) Economic Security Directive 298
B) Economic Security National Statute
C) Economic Security Act of 1986
D) Economic Security Act of 1996
E) All of the above.
Use Space or
up arrow
down arrow
to flip the card.
Question
________ property is defined as virtually any information belonging to an individual or organization.

A) Real
B) Proprietary
C) Intellectual
D) Private
E) All of the above.
Question
________ property is defined as information created through research and development.

A) Real
B) Proprietary
C) Intellectual
D) Private
E) All of the above.
Question
Threats to critical information include:

A) Environmental and natural disasters.
B) Fire and accidents.
C) Unintentional human actions.
D) Intentional human actions.
E) All of the above.
Question
The purpose of ________ is to protect information assets and systems against any internal or external threat that might endanger them.

A) INTERTEL
B) INFOTEL
C) COMSEC
D) INFOSEC
E) COMSAC
Question
In the United States government's hierarchical information security structure, the ________ classification is assigned to information which, if disclosed, could be prejudicial to the interests of the United States.

A) Top secret
B) Secret
C) Confidential
D) Unclassified but sensitive
E) Caveats
Question
________ involves information risk assessment and intelligence activities in a process whereby operations are analyzed to identify vulnerabilities.

A) OPSEC
B) COMPSEC
C) INFOTEL
D) INTELSEC
E) OPSEEK
Question
The ________ involves collaboration among several organizations and provides operations security training to agencies and businesses.

A) National Operations Security Initiative
B) National Infrastructure Network
C) Interagency OPSEC Services Administration
D) Interagency OPSEC Support Staff
E) Interagency OPSEC Services Group
Question
According to the protocol for classification of business information, ________ is assigned to the business equivalent of top secret information.

A) Company confidential, special control
B) Company confidential
C) Private confidential
D) Internal use only
E) Restricted
Question
________ information policies remind staff of special agreements created to maintain confidentiality and rights to privacy.

A) Minimum protection
B) Authorization
C) Special audit assignment
D) Legal protection
E) All of the above.
Question
________ should be utilized to secure computer systems and data.

A) Passwords
B) Firewalls
C) Physical security
D) Administrative controls
E) All of the above.
Question
________ agreements are used to prevent release of information by those who inadvertently come into contact with classified or critical data.

A) Non-disclosure
B) Secrecy
C) Non-compete
D) Classification
E) All of the above.
Question
________ includes all efforts to protect information transmitted by voice, wire, satellite, and other systems from unauthorized interception.

A) OPSEC
B) COMSEC
C) INFOTEL
D) INTELSEC
E) OPSEEK
Question
Communications ________ security involves prevention of adverse surveillance by devices such as microphones.

A) Line
B) Transmission
C) Cryptographic
D) Emanations
E) Technical
Question
_______ security involves the use of non-exclusive codes and ciphers to transform transmitted data to render it unintelligible.

A) Line
B) Transmission
C) Cryptographic
D) Emanations
E) Technical
Question
Security for computer systems must include strategies to protect:

A) Computer equipment.
B) Computer software.
C) Information contained in a computer database.
D) Computer databases.
E) All of the above.
Question
Computer security strategies in the form of ________ can be implemented to maintain accountability for those who have legitimate access to a computer system or database.

A) Logical controls
B) Administrative controls
C) Data encryption
D) Firewalls
E) All of the above.
Question
The ________ is an FBI-maintained computer security resource available to security professionals and computer systems administrators.

A) CERT
B) SCANS
C) SWAT
D) NIPC
E) All of the above.
Question
At the United States government level, enforcement of laws relative to the theft of trade secrets or harassment on the Internet falls under the jurisdiction of the:

A) U.S. Secret Service
B) ATF
C) FBI
D) U. S. Customs Service
E) All of the above.
Question
The ________ regulates private industry's access to classified government information.

A) National Industrial Security Program
B) OPSEC Support Staff
C) Fair Credit Reporting Agency
D) COMSEC Working Group
E) All of the above.
Question
________ pose(s) security risks and challenges for individuals as well as organizations.

A) Social networking media
B) Facebook use
C) Cyberstalking
D) Smart phones
E) All of the above are correct.
Question
Digitized information is not distance- or time-dependent.
Question
According to some experts, theft of money and securities of government represent the greatest threat to governments and businesses today.
Question
Information's worth can only be determined by calculating the political and financial impact of its loss.
Question
With discretionary information access control, access is allowed on a need-to-know basis.
Question
Mandatory access control strategies trace their origins to restrictive legislation.
Question
INFOSEC views operations from an adversary's perspective in an effort to seek out an organization's vulnerabilities and protect its critical information.
Question
Unlike business information, all government information must be released upon request.
Question
Converting plain text to crypto text is referred to as decryption.
Question
Acoustical emanations are produced through the interplay of electrical and mechanical parts contained in communications equipment.
Question
Cryptographic security should not be viewed as a substitute for physical, personnel, and information security.
Question
Interception of emanations can be prevented if computer rooms are constructed with acoustical materials and non-radiating electronic equipment is used.
Question
Computer crime is generally defined as any crime committed with computer technology.
Question
Anti-virus software is used to screen electronic traffic before allowing access to computer networks.
Question
According to John Carroll's "simple security principle"
for safeguarding sensitive computer information, no person should view information that has a classification that exceeds the viewer's security clearance.
Question
Phishing is not a form of identity theft.
Question
What is the purpose of information security (INFOSEC)?
Question
Define and contrast critical information, proprietary information, and intellectual property.
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/38
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 6: Information, Communications, and Computer Security
1
According to the United States ________, critical information includes all forms and types of financial, business, scientific, economic, or engineering information.

A) Economic Security Directive 298
B) Economic Security National Statute
C) Economic Security Act of 1986
D) Economic Security Act of 1996
E) All of the above.
Economic Security Act of 1996
2
________ property is defined as virtually any information belonging to an individual or organization.

A) Real
B) Proprietary
C) Intellectual
D) Private
E) All of the above.
Proprietary
3
________ property is defined as information created through research and development.

A) Real
B) Proprietary
C) Intellectual
D) Private
E) All of the above.
Intellectual
4
Threats to critical information include:

A) Environmental and natural disasters.
B) Fire and accidents.
C) Unintentional human actions.
D) Intentional human actions.
E) All of the above.
Unlock Deck
Unlock for access to all 38 flashcards in this deck.
Unlock Deck
k this deck
5
The purpose of ________ is to protect information assets and systems against any internal or external threat that might endanger them.

A) INTERTEL
B) INFOTEL
C) COMSEC
D) INFOSEC
E) COMSAC
Unlock Deck
Unlock for access to all 38 flashcards in this deck.
Unlock Deck
k this deck
6
In the United States government's hierarchical information security structure, the ________ classification is assigned to information which, if disclosed, could be prejudicial to the interests of the United States.

A) Top secret
B) Secret
C) Confidential
D) Unclassified but sensitive
E) Caveats
Unlock Deck
Unlock for access to all 38 flashcards in this deck.
Unlock Deck
k this deck
7
________ involves information risk assessment and intelligence activities in a process whereby operations are analyzed to identify vulnerabilities.

A) OPSEC
B) COMPSEC
C) INFOTEL
D) INTELSEC
E) OPSEEK
Unlock Deck
Unlock for access to all 38 flashcards in this deck.
Unlock Deck
k this deck
8
The ________ involves collaboration among several organizations and provides operations security training to agencies and businesses.

A) National Operations Security Initiative
B) National Infrastructure Network
C) Interagency OPSEC Services Administration
D) Interagency OPSEC Support Staff
E) Interagency OPSEC Services Group
Unlock Deck
Unlock for access to all 38 flashcards in this deck.
Unlock Deck
k this deck
9
According to the protocol for classification of business information, ________ is assigned to the business equivalent of top secret information.

A) Company confidential, special control
B) Company confidential
C) Private confidential
D) Internal use only
E) Restricted
Unlock Deck
Unlock for access to all 38 flashcards in this deck.
Unlock Deck
k this deck
10
________ information policies remind staff of special agreements created to maintain confidentiality and rights to privacy.

A) Minimum protection
B) Authorization
C) Special audit assignment
D) Legal protection
E) All of the above.
Unlock Deck
Unlock for access to all 38 flashcards in this deck.
Unlock Deck
k this deck
11
________ should be utilized to secure computer systems and data.

A) Passwords
B) Firewalls
C) Physical security
D) Administrative controls
E) All of the above.
Unlock Deck
Unlock for access to all 38 flashcards in this deck.
Unlock Deck
k this deck
12
________ agreements are used to prevent release of information by those who inadvertently come into contact with classified or critical data.

A) Non-disclosure
B) Secrecy
C) Non-compete
D) Classification
E) All of the above.
Unlock Deck
Unlock for access to all 38 flashcards in this deck.
Unlock Deck
k this deck
13
________ includes all efforts to protect information transmitted by voice, wire, satellite, and other systems from unauthorized interception.

A) OPSEC
B) COMSEC
C) INFOTEL
D) INTELSEC
E) OPSEEK
Unlock Deck
Unlock for access to all 38 flashcards in this deck.
Unlock Deck
k this deck
14
Communications ________ security involves prevention of adverse surveillance by devices such as microphones.

A) Line
B) Transmission
C) Cryptographic
D) Emanations
E) Technical
Unlock Deck
Unlock for access to all 38 flashcards in this deck.
Unlock Deck
k this deck
15
_______ security involves the use of non-exclusive codes and ciphers to transform transmitted data to render it unintelligible.

A) Line
B) Transmission
C) Cryptographic
D) Emanations
E) Technical
Unlock Deck
Unlock for access to all 38 flashcards in this deck.
Unlock Deck
k this deck
16
Security for computer systems must include strategies to protect:

A) Computer equipment.
B) Computer software.
C) Information contained in a computer database.
D) Computer databases.
E) All of the above.
Unlock Deck
Unlock for access to all 38 flashcards in this deck.
Unlock Deck
k this deck
17
Computer security strategies in the form of ________ can be implemented to maintain accountability for those who have legitimate access to a computer system or database.

A) Logical controls
B) Administrative controls
C) Data encryption
D) Firewalls
E) All of the above.
Unlock Deck
Unlock for access to all 38 flashcards in this deck.
Unlock Deck
k this deck
18
The ________ is an FBI-maintained computer security resource available to security professionals and computer systems administrators.

A) CERT
B) SCANS
C) SWAT
D) NIPC
E) All of the above.
Unlock Deck
Unlock for access to all 38 flashcards in this deck.
Unlock Deck
k this deck
19
At the United States government level, enforcement of laws relative to the theft of trade secrets or harassment on the Internet falls under the jurisdiction of the:

A) U.S. Secret Service
B) ATF
C) FBI
D) U. S. Customs Service
E) All of the above.
Unlock Deck
Unlock for access to all 38 flashcards in this deck.
Unlock Deck
k this deck
20
The ________ regulates private industry's access to classified government information.

A) National Industrial Security Program
B) OPSEC Support Staff
C) Fair Credit Reporting Agency
D) COMSEC Working Group
E) All of the above.
Unlock Deck
Unlock for access to all 38 flashcards in this deck.
Unlock Deck
k this deck
21
________ pose(s) security risks and challenges for individuals as well as organizations.

A) Social networking media
B) Facebook use
C) Cyberstalking
D) Smart phones
E) All of the above are correct.
Unlock Deck
Unlock for access to all 38 flashcards in this deck.
Unlock Deck
k this deck
22
Digitized information is not distance- or time-dependent.
Unlock Deck
Unlock for access to all 38 flashcards in this deck.
Unlock Deck
k this deck
23
According to some experts, theft of money and securities of government represent the greatest threat to governments and businesses today.
Unlock Deck
Unlock for access to all 38 flashcards in this deck.
Unlock Deck
k this deck
24
Information's worth can only be determined by calculating the political and financial impact of its loss.
Unlock Deck
Unlock for access to all 38 flashcards in this deck.
Unlock Deck
k this deck
25
With discretionary information access control, access is allowed on a need-to-know basis.
Unlock Deck
Unlock for access to all 38 flashcards in this deck.
Unlock Deck
k this deck
26
Mandatory access control strategies trace their origins to restrictive legislation.
Unlock Deck
Unlock for access to all 38 flashcards in this deck.
Unlock Deck
k this deck
27
INFOSEC views operations from an adversary's perspective in an effort to seek out an organization's vulnerabilities and protect its critical information.
Unlock Deck
Unlock for access to all 38 flashcards in this deck.
Unlock Deck
k this deck
28
Unlike business information, all government information must be released upon request.
Unlock Deck
Unlock for access to all 38 flashcards in this deck.
Unlock Deck
k this deck
29
Converting plain text to crypto text is referred to as decryption.
Unlock Deck
Unlock for access to all 38 flashcards in this deck.
Unlock Deck
k this deck
30
Acoustical emanations are produced through the interplay of electrical and mechanical parts contained in communications equipment.
Unlock Deck
Unlock for access to all 38 flashcards in this deck.
Unlock Deck
k this deck
31
Cryptographic security should not be viewed as a substitute for physical, personnel, and information security.
Unlock Deck
Unlock for access to all 38 flashcards in this deck.
Unlock Deck
k this deck
32
Interception of emanations can be prevented if computer rooms are constructed with acoustical materials and non-radiating electronic equipment is used.
Unlock Deck
Unlock for access to all 38 flashcards in this deck.
Unlock Deck
k this deck
33
Computer crime is generally defined as any crime committed with computer technology.
Unlock Deck
Unlock for access to all 38 flashcards in this deck.
Unlock Deck
k this deck
34
Anti-virus software is used to screen electronic traffic before allowing access to computer networks.
Unlock Deck
Unlock for access to all 38 flashcards in this deck.
Unlock Deck
k this deck
35
According to John Carroll's "simple security principle"
for safeguarding sensitive computer information, no person should view information that has a classification that exceeds the viewer's security clearance.
Unlock Deck
Unlock for access to all 38 flashcards in this deck.
Unlock Deck
k this deck
36
Phishing is not a form of identity theft.
Unlock Deck
Unlock for access to all 38 flashcards in this deck.
Unlock Deck
k this deck
37
What is the purpose of information security (INFOSEC)?
Unlock Deck
Unlock for access to all 38 flashcards in this deck.
Unlock Deck
k this deck
38
Define and contrast critical information, proprietary information, and intellectual property.
Unlock Deck
Unlock for access to all 38 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 38 flashcards in this deck.