Deck 10: Information Systems Security

ملء الشاشة (f)
exit full mode
سؤال
Mark receives an email from his bank asking him to update and verify his credit card details. He replies to the email with all the requested details. Mark later learns that the email was not actually sent by his bank and that the information he had shared has been misused. Mark is a victim of ________.

A) hacking
B) sniffing
C) data mining
D) phishing
استخدم زر المسافة أو
up arrow
down arrow
لقلب البطاقة.
سؤال
Which of the following is a synonym for phishing?

A) pretexting
B) email spoofing
C) hardening
D) system hacking
سؤال
Explain the types of events that result in faulty service, a type of security loss.
سؤال
________ occurs when computer criminals invade a computer system and replace legitimate programs with their own unauthorized ones.

A) Usurpation
B) Cyber stalking
C) Spoofing
D) Sniffing
سؤال
A(n) ________ is a sophisticated, possibly long-running computer hack that is perpetrated by large, well-funded organizations like governments.

A) advanced persistent threat
B) identity threat
C) copyright theft
D) network sniffer attack
سؤال
Advanced persistent threats can be a means to engage in cyber warfare and cyber espionage.
سؤال
A person calls the Stark residence and pretends to represent a credit card company. He asks Mrs. Stark to confirm her credit card number. This is an example of ________.

A) hacking
B) data mining
C) pretexting
D) sniffing
سؤال
Wardrivers are those who engage in phishing to obtain unauthorized access to data.
سؤال
________ take computers with wireless connections through an area and search for unprotected wireless networks.

A) Wardrivers
B) Pretexters
C) Hackers
D) Phishers
سؤال
Incorrectly increasing a customer's discount is an example of incorrect data modification.
سؤال
Spoofing is a technique for intercepting computer communications.
سؤال
________ is a technique for intercepting computer communications.

A) Spoofing
B) Phishing
C) Pretexting
D) Sniffing
سؤال
IP spoofing occurs when an intruder uses another site's IP address to masquerade as that other site.
سؤال
A threat is a person or an organization that seeks to obtain or alter data illegally, without the owner's permission or knowledge.
سؤال
________ occurs when a threat obtains data that is supposed to be protected.

A) Unauthorized data disclosure
B) Incorrect data modification
C) Faulty service
D) Denial of service
سؤال
A ________ pretends to be a legitimate company and sends emails requesting confidential data.

A) hacker
B) phisher
C) wardriver
D) sniffer
سؤال
Which of the following occurs when millions of bogus service requests flood a Web server and prevent it from servicing legitimate requests?

A) spoofing
B) incorrect data modification
C) usurpation
D) denial of service
سؤال
Breaking into computers, servers, or networks to steal proprietary and confidential data is referred to as ________.

A) pretexting
B) spoofing
C) hacking
D) phishing
سؤال
A(n) ________ is a measure that individuals or organizations take to block a threat from obtaining an asset.

A) denial of service
B) safeguard
C) information silo
D) third-party cookie
سؤال
Pretexting occurs when someone deceives by pretending to be someone else.
سؤال
Which of the following is a human safeguard against security threats?

A) encryption
B) firewall
C) physical security
D) procedure design
سؤال
Explain the concept of denial of service (DOS) in information management.
سؤال
In a brute force attack, a password cracker tries every possible combination of characters.
سؤال
Which of the following statements is TRUE of the financial losses due to computer crimes?

A) All studies on the costs of computer crimes are based on surveys.
B) There are several set standards for tallying computer crime costs and financial losses.
C) Companies are legally required to calculate their financial losses due to computer crime every month.
D) Knowledge about the cost of computer crimes is restricted to large companies.
سؤال
Which of the following is considered a personal security safeguard?

A) creating backup of cookies and temporary files
B) removing high-value assets from computers
C) using a single valid password for all accounts
D) conducting transactions using http rather than https
سؤال
There are no standards for tallying costs of computer crime.
سؤال
Backup and recovery against computer security threats are ________.

A) technical safeguards
B) data safeguards
C) human safeguards
D) hardware safeguards
سؤال
A(n) ________ is a computer program that senses when another computer is attempting to scan a disk or access a computer.

A) intrusion detection system
B) adware
C) packet-filtering firewall
D) network security system
سؤال
Damages to security systems caused by natural disasters are minimal when compared to the damages due to human errors.
سؤال
What are some of the recommended personal security safeguards against security threats?
سؤال
Financial institutions must invest heavily in security safeguards because they are obvious targets for theft.
سؤال
Which of the following is a technical safeguard against security threats?

A) password
B) accountability
C) compliance
D) firewall
سؤال
Risk management is a critical security function addressed by an organization's senior management.
سؤال
While making online purchases, a person should buy only from vendors who support https.
سؤال
Malware protection is an example of a technical safeguard.
سؤال
Which of the following is a data safeguard against security threats?

A) application design
B) accountability
C) physical security
D) malware protection
سؤال
Hiring, training, and educating employees in an organization is a technical safeguard.
سؤال
________ are small files that browsers store on users' computers when they visit Web sites.

A) Cookies
B) Honeypots
C) Mashups
D) Entity tags
سؤال
Davian, a professional hacker, tries every possible combination of characters to crack his victim's email password. Using this technique, he can crack a six-character password of either upper- or lowercase letters in about ten minutes. Which of the following techniques is used by Davian to obtain access to his victim's email?

A) denial-of-service attack
B) brute force attack
C) pretexting
D) spoofing
سؤال
As one of the safeguards against security threats, a person should preferably use the same password for different sites so as to avoid confusion.
سؤال
A(n) ________ sits outside an organizational network and is the first device that Internet traffic encounters.

A) internal firewall
B) perimeter firewall
C) adware
D) malware
سؤال
________ is the process of transforming clear text into coded, unintelligible text for secure storage or communication.

A) Usurpation
B) Authentication
C) Malware protection
D) Encryption
سؤال
Technical safeguards include encryption and usage of passwords.
سؤال
Smart cards are convenient to use because they do not require a personal identification number for authentication.
سؤال
Which of the following information should be provided by users of smart cards for authentication?

A) personal identification number
B) permanent account number
C) fingerprint
D) retinal scan
سؤال
With https, data are encrypted using a protocol called the ________.

A) Secure Shell (SSH)
B) Secure Sockets Layer (SSL)
C) File Transfer Protocol (FTP)
D) Post Office Protocol (POP)
سؤال
A user name authenticates a user, and a password identifies that user.
سؤال
Which of the following uses an individual's personal physical characteristics such as fingerprints, facial features, and retinal scans for verification purposes?

A) credit card
B) smart card
C) biometric authentication
D) symmetric encryption
سؤال
A(n) ________ examines the source address, destination address, and other data of a message and determines whether to let that message pass.

A) encrypted firewall
B) internal malware
C) packet-filtering firewall
D) perimeter shareware
سؤال
Technical safeguards involve both software and hardware components of an information system.
سؤال
What are the two critical security functions that an organization's senior management needs to address?
سؤال
Every information system today should require users to sign on with a user name and a password. In this case, which of the following functions is performed by the user's password?

A) authentication
B) identification
C) decryption
D) encryption
سؤال
Which of the following types of encryption is used by the secure sockets layer protocol?

A) optical encryption
B) physical layer encryption
C) disk encryption
D) public key encryption
سؤال
Adware and spyware are similar to each other in that they both ________.

A) masquerade as useful programs
B) are specifically programmed to spread
C) are installed with a user's permission
D) reside in the background and observe a user's behavior
سؤال
A ________ is a plastic card that has a microchip loaded with identifying data.

A) credit card
B) biometric passport
C) smart card
D) flashcard
سؤال
Most secure communications over the Internet use a protocol called ________.

A) smtp
B) ftp
C) https
D) nntp
سؤال
Which of the following statements is TRUE of symmetric encryption?

A) It uses the same key for both encoding and decoding.
B) It is more difficult and slower than asymmetric encryption.
C) It does not require a key to encrypt or decrypt data.
D) It uses a special version called public/private key on the Internet for a secure communication.
سؤال
________ is a broad category of software that includes viruses, worms, Trojan horses, spyware, and adware.

A) Malware
B) Payload
C) Shareware
D) Firewall
سؤال
________ are viruses that masquerade as useful programs like a computer game, an MP3 file, or some other useful innocuous program.

A) Key loggers
B) Trojan horses
C) Worms
D) Payloads
سؤال
To safeguard data against security threats, every information system today requires a user name and a password. In this case, which of the following functions is performed by the user name?

A) authentication
B) identification
C) decryption
D) encryption
سؤال
Explain how secure sockets layer works when a user communicates securely with a Web site.
سؤال
Spyware programs are installed on a user's computer without the user's knowledge.
سؤال
The creation of backup copies of database contents makes the data more vulnerable to security threats.
سؤال
What are the precautions to be taken when opening email attachments to avoid malwares?
سؤال
Viruses, worms, and Trojan horses are types of firewalls.
سؤال
Packet-filtering firewalls are the most sophisticated type of firewall.
سؤال
Thomas is responsible for creating backup copies of information in a system. He also works along with IT personnel to ensure that the backups are valid and that effective recovery procedures exist. Thomas is involved in establishing ________.

A) human safeguards
B) data safeguards
C) technical safeguards
D) hardware safeguards
سؤال
The procedure of entrusting a party with a copy of an encryption key that can be used in case the actual key is lost or destroyed is called ________.

A) key escrow
B) pledged encryption
C) insured encryption
D) key replication
سؤال
________ refers to an organization-wide function that is in charge of developing data policies and enforcing data standards.

A) Database administration
B) Data encapsulation
C) Data administration
D) Database encapsulation
سؤال
Explain the functions performed by packet-filtering firewalls.
سؤال
The loss of encryption keys by employees is referred to as key escrow.
سؤال
Packet-filtering firewalls cannot prohibit outsiders from starting a session with any user behind the firewall.
سؤال
A virus is a computer program that replicates itself.
سؤال
Malware definitions are patterns that exist in malware code.
سؤال
Explain the functions of the two organizational units responsible for data safeguarding.
سؤال
A criticism of biometric authentication is that it provides weak authentication.
سؤال
In the case of public key encryption, each site has a private key to encode a message and a public key to decode it.
سؤال
A key is a number used with an encryption algorithm to encrypt data.
سؤال
With asymmetric encryption, two different keys are used for encoding and decoding a message.
سؤال
Discuss briefly the pros and cons of biometric authentication.
فتح الحزمة
قم بالتسجيل لفتح البطاقات في هذه المجموعة!
Unlock Deck
Unlock Deck
1/118
auto play flashcards
العب
simple tutorial
ملء الشاشة (f)
exit full mode
Deck 10: Information Systems Security
1
Mark receives an email from his bank asking him to update and verify his credit card details. He replies to the email with all the requested details. Mark later learns that the email was not actually sent by his bank and that the information he had shared has been misused. Mark is a victim of ________.

A) hacking
B) sniffing
C) data mining
D) phishing
D
2
Which of the following is a synonym for phishing?

A) pretexting
B) email spoofing
C) hardening
D) system hacking
B
3
Explain the types of events that result in faulty service, a type of security loss.
Faulty service includes problems that result because of incorrect system operation. It could include incorrect data modification. It also could include systems that work incorrectly by sending wrong goods to a customer or the ordered goods to a wrong customer, inaccurately billing customers, or sending the wrong information to employees. Humans can inadvertently cause faulty service by making procedural mistakes. System developers can write programs incorrectly or make errors during installation of hardware, software programs, and data. Usurpation is also a type of faulty service. Faulty service can also result when a service is improperly restored during recovery from natural disasters.
4
________ occurs when computer criminals invade a computer system and replace legitimate programs with their own unauthorized ones.

A) Usurpation
B) Cyber stalking
C) Spoofing
D) Sniffing
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 118 في هذه المجموعة.
فتح الحزمة
k this deck
5
A(n) ________ is a sophisticated, possibly long-running computer hack that is perpetrated by large, well-funded organizations like governments.

A) advanced persistent threat
B) identity threat
C) copyright theft
D) network sniffer attack
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 118 في هذه المجموعة.
فتح الحزمة
k this deck
6
Advanced persistent threats can be a means to engage in cyber warfare and cyber espionage.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 118 في هذه المجموعة.
فتح الحزمة
k this deck
7
A person calls the Stark residence and pretends to represent a credit card company. He asks Mrs. Stark to confirm her credit card number. This is an example of ________.

A) hacking
B) data mining
C) pretexting
D) sniffing
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 118 في هذه المجموعة.
فتح الحزمة
k this deck
8
Wardrivers are those who engage in phishing to obtain unauthorized access to data.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 118 في هذه المجموعة.
فتح الحزمة
k this deck
9
________ take computers with wireless connections through an area and search for unprotected wireless networks.

A) Wardrivers
B) Pretexters
C) Hackers
D) Phishers
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 118 في هذه المجموعة.
فتح الحزمة
k this deck
10
Incorrectly increasing a customer's discount is an example of incorrect data modification.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 118 في هذه المجموعة.
فتح الحزمة
k this deck
11
Spoofing is a technique for intercepting computer communications.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 118 في هذه المجموعة.
فتح الحزمة
k this deck
12
________ is a technique for intercepting computer communications.

A) Spoofing
B) Phishing
C) Pretexting
D) Sniffing
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 118 في هذه المجموعة.
فتح الحزمة
k this deck
13
IP spoofing occurs when an intruder uses another site's IP address to masquerade as that other site.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 118 في هذه المجموعة.
فتح الحزمة
k this deck
14
A threat is a person or an organization that seeks to obtain or alter data illegally, without the owner's permission or knowledge.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 118 في هذه المجموعة.
فتح الحزمة
k this deck
15
________ occurs when a threat obtains data that is supposed to be protected.

A) Unauthorized data disclosure
B) Incorrect data modification
C) Faulty service
D) Denial of service
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 118 في هذه المجموعة.
فتح الحزمة
k this deck
16
A ________ pretends to be a legitimate company and sends emails requesting confidential data.

A) hacker
B) phisher
C) wardriver
D) sniffer
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 118 في هذه المجموعة.
فتح الحزمة
k this deck
17
Which of the following occurs when millions of bogus service requests flood a Web server and prevent it from servicing legitimate requests?

A) spoofing
B) incorrect data modification
C) usurpation
D) denial of service
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 118 في هذه المجموعة.
فتح الحزمة
k this deck
18
Breaking into computers, servers, or networks to steal proprietary and confidential data is referred to as ________.

A) pretexting
B) spoofing
C) hacking
D) phishing
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 118 في هذه المجموعة.
فتح الحزمة
k this deck
19
A(n) ________ is a measure that individuals or organizations take to block a threat from obtaining an asset.

A) denial of service
B) safeguard
C) information silo
D) third-party cookie
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 118 في هذه المجموعة.
فتح الحزمة
k this deck
20
Pretexting occurs when someone deceives by pretending to be someone else.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 118 في هذه المجموعة.
فتح الحزمة
k this deck
21
Which of the following is a human safeguard against security threats?

A) encryption
B) firewall
C) physical security
D) procedure design
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 118 في هذه المجموعة.
فتح الحزمة
k this deck
22
Explain the concept of denial of service (DOS) in information management.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 118 في هذه المجموعة.
فتح الحزمة
k this deck
23
In a brute force attack, a password cracker tries every possible combination of characters.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 118 في هذه المجموعة.
فتح الحزمة
k this deck
24
Which of the following statements is TRUE of the financial losses due to computer crimes?

A) All studies on the costs of computer crimes are based on surveys.
B) There are several set standards for tallying computer crime costs and financial losses.
C) Companies are legally required to calculate their financial losses due to computer crime every month.
D) Knowledge about the cost of computer crimes is restricted to large companies.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 118 في هذه المجموعة.
فتح الحزمة
k this deck
25
Which of the following is considered a personal security safeguard?

A) creating backup of cookies and temporary files
B) removing high-value assets from computers
C) using a single valid password for all accounts
D) conducting transactions using http rather than https
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 118 في هذه المجموعة.
فتح الحزمة
k this deck
26
There are no standards for tallying costs of computer crime.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 118 في هذه المجموعة.
فتح الحزمة
k this deck
27
Backup and recovery against computer security threats are ________.

A) technical safeguards
B) data safeguards
C) human safeguards
D) hardware safeguards
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 118 في هذه المجموعة.
فتح الحزمة
k this deck
28
A(n) ________ is a computer program that senses when another computer is attempting to scan a disk or access a computer.

A) intrusion detection system
B) adware
C) packet-filtering firewall
D) network security system
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 118 في هذه المجموعة.
فتح الحزمة
k this deck
29
Damages to security systems caused by natural disasters are minimal when compared to the damages due to human errors.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 118 في هذه المجموعة.
فتح الحزمة
k this deck
30
What are some of the recommended personal security safeguards against security threats?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 118 في هذه المجموعة.
فتح الحزمة
k this deck
31
Financial institutions must invest heavily in security safeguards because they are obvious targets for theft.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 118 في هذه المجموعة.
فتح الحزمة
k this deck
32
Which of the following is a technical safeguard against security threats?

A) password
B) accountability
C) compliance
D) firewall
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 118 في هذه المجموعة.
فتح الحزمة
k this deck
33
Risk management is a critical security function addressed by an organization's senior management.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 118 في هذه المجموعة.
فتح الحزمة
k this deck
34
While making online purchases, a person should buy only from vendors who support https.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 118 في هذه المجموعة.
فتح الحزمة
k this deck
35
Malware protection is an example of a technical safeguard.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 118 في هذه المجموعة.
فتح الحزمة
k this deck
36
Which of the following is a data safeguard against security threats?

A) application design
B) accountability
C) physical security
D) malware protection
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 118 في هذه المجموعة.
فتح الحزمة
k this deck
37
Hiring, training, and educating employees in an organization is a technical safeguard.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 118 في هذه المجموعة.
فتح الحزمة
k this deck
38
________ are small files that browsers store on users' computers when they visit Web sites.

A) Cookies
B) Honeypots
C) Mashups
D) Entity tags
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 118 في هذه المجموعة.
فتح الحزمة
k this deck
39
Davian, a professional hacker, tries every possible combination of characters to crack his victim's email password. Using this technique, he can crack a six-character password of either upper- or lowercase letters in about ten minutes. Which of the following techniques is used by Davian to obtain access to his victim's email?

A) denial-of-service attack
B) brute force attack
C) pretexting
D) spoofing
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 118 في هذه المجموعة.
فتح الحزمة
k this deck
40
As one of the safeguards against security threats, a person should preferably use the same password for different sites so as to avoid confusion.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 118 في هذه المجموعة.
فتح الحزمة
k this deck
41
A(n) ________ sits outside an organizational network and is the first device that Internet traffic encounters.

A) internal firewall
B) perimeter firewall
C) adware
D) malware
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 118 في هذه المجموعة.
فتح الحزمة
k this deck
42
________ is the process of transforming clear text into coded, unintelligible text for secure storage or communication.

A) Usurpation
B) Authentication
C) Malware protection
D) Encryption
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 118 في هذه المجموعة.
فتح الحزمة
k this deck
43
Technical safeguards include encryption and usage of passwords.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 118 في هذه المجموعة.
فتح الحزمة
k this deck
44
Smart cards are convenient to use because they do not require a personal identification number for authentication.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 118 في هذه المجموعة.
فتح الحزمة
k this deck
45
Which of the following information should be provided by users of smart cards for authentication?

A) personal identification number
B) permanent account number
C) fingerprint
D) retinal scan
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 118 في هذه المجموعة.
فتح الحزمة
k this deck
46
With https, data are encrypted using a protocol called the ________.

A) Secure Shell (SSH)
B) Secure Sockets Layer (SSL)
C) File Transfer Protocol (FTP)
D) Post Office Protocol (POP)
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 118 في هذه المجموعة.
فتح الحزمة
k this deck
47
A user name authenticates a user, and a password identifies that user.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 118 في هذه المجموعة.
فتح الحزمة
k this deck
48
Which of the following uses an individual's personal physical characteristics such as fingerprints, facial features, and retinal scans for verification purposes?

A) credit card
B) smart card
C) biometric authentication
D) symmetric encryption
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 118 في هذه المجموعة.
فتح الحزمة
k this deck
49
A(n) ________ examines the source address, destination address, and other data of a message and determines whether to let that message pass.

A) encrypted firewall
B) internal malware
C) packet-filtering firewall
D) perimeter shareware
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 118 في هذه المجموعة.
فتح الحزمة
k this deck
50
Technical safeguards involve both software and hardware components of an information system.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 118 في هذه المجموعة.
فتح الحزمة
k this deck
51
What are the two critical security functions that an organization's senior management needs to address?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 118 في هذه المجموعة.
فتح الحزمة
k this deck
52
Every information system today should require users to sign on with a user name and a password. In this case, which of the following functions is performed by the user's password?

A) authentication
B) identification
C) decryption
D) encryption
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 118 في هذه المجموعة.
فتح الحزمة
k this deck
53
Which of the following types of encryption is used by the secure sockets layer protocol?

A) optical encryption
B) physical layer encryption
C) disk encryption
D) public key encryption
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 118 في هذه المجموعة.
فتح الحزمة
k this deck
54
Adware and spyware are similar to each other in that they both ________.

A) masquerade as useful programs
B) are specifically programmed to spread
C) are installed with a user's permission
D) reside in the background and observe a user's behavior
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 118 في هذه المجموعة.
فتح الحزمة
k this deck
55
A ________ is a plastic card that has a microchip loaded with identifying data.

A) credit card
B) biometric passport
C) smart card
D) flashcard
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 118 في هذه المجموعة.
فتح الحزمة
k this deck
56
Most secure communications over the Internet use a protocol called ________.

A) smtp
B) ftp
C) https
D) nntp
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 118 في هذه المجموعة.
فتح الحزمة
k this deck
57
Which of the following statements is TRUE of symmetric encryption?

A) It uses the same key for both encoding and decoding.
B) It is more difficult and slower than asymmetric encryption.
C) It does not require a key to encrypt or decrypt data.
D) It uses a special version called public/private key on the Internet for a secure communication.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 118 في هذه المجموعة.
فتح الحزمة
k this deck
58
________ is a broad category of software that includes viruses, worms, Trojan horses, spyware, and adware.

A) Malware
B) Payload
C) Shareware
D) Firewall
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 118 في هذه المجموعة.
فتح الحزمة
k this deck
59
________ are viruses that masquerade as useful programs like a computer game, an MP3 file, or some other useful innocuous program.

A) Key loggers
B) Trojan horses
C) Worms
D) Payloads
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 118 في هذه المجموعة.
فتح الحزمة
k this deck
60
To safeguard data against security threats, every information system today requires a user name and a password. In this case, which of the following functions is performed by the user name?

A) authentication
B) identification
C) decryption
D) encryption
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 118 في هذه المجموعة.
فتح الحزمة
k this deck
61
Explain how secure sockets layer works when a user communicates securely with a Web site.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 118 في هذه المجموعة.
فتح الحزمة
k this deck
62
Spyware programs are installed on a user's computer without the user's knowledge.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 118 في هذه المجموعة.
فتح الحزمة
k this deck
63
The creation of backup copies of database contents makes the data more vulnerable to security threats.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 118 في هذه المجموعة.
فتح الحزمة
k this deck
64
What are the precautions to be taken when opening email attachments to avoid malwares?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 118 في هذه المجموعة.
فتح الحزمة
k this deck
65
Viruses, worms, and Trojan horses are types of firewalls.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 118 في هذه المجموعة.
فتح الحزمة
k this deck
66
Packet-filtering firewalls are the most sophisticated type of firewall.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 118 في هذه المجموعة.
فتح الحزمة
k this deck
67
Thomas is responsible for creating backup copies of information in a system. He also works along with IT personnel to ensure that the backups are valid and that effective recovery procedures exist. Thomas is involved in establishing ________.

A) human safeguards
B) data safeguards
C) technical safeguards
D) hardware safeguards
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 118 في هذه المجموعة.
فتح الحزمة
k this deck
68
The procedure of entrusting a party with a copy of an encryption key that can be used in case the actual key is lost or destroyed is called ________.

A) key escrow
B) pledged encryption
C) insured encryption
D) key replication
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 118 في هذه المجموعة.
فتح الحزمة
k this deck
69
________ refers to an organization-wide function that is in charge of developing data policies and enforcing data standards.

A) Database administration
B) Data encapsulation
C) Data administration
D) Database encapsulation
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 118 في هذه المجموعة.
فتح الحزمة
k this deck
70
Explain the functions performed by packet-filtering firewalls.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 118 في هذه المجموعة.
فتح الحزمة
k this deck
71
The loss of encryption keys by employees is referred to as key escrow.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 118 في هذه المجموعة.
فتح الحزمة
k this deck
72
Packet-filtering firewalls cannot prohibit outsiders from starting a session with any user behind the firewall.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 118 في هذه المجموعة.
فتح الحزمة
k this deck
73
A virus is a computer program that replicates itself.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 118 في هذه المجموعة.
فتح الحزمة
k this deck
74
Malware definitions are patterns that exist in malware code.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 118 في هذه المجموعة.
فتح الحزمة
k this deck
75
Explain the functions of the two organizational units responsible for data safeguarding.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 118 في هذه المجموعة.
فتح الحزمة
k this deck
76
A criticism of biometric authentication is that it provides weak authentication.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 118 في هذه المجموعة.
فتح الحزمة
k this deck
77
In the case of public key encryption, each site has a private key to encode a message and a public key to decode it.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 118 في هذه المجموعة.
فتح الحزمة
k this deck
78
A key is a number used with an encryption algorithm to encrypt data.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 118 في هذه المجموعة.
فتح الحزمة
k this deck
79
With asymmetric encryption, two different keys are used for encoding and decoding a message.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 118 في هذه المجموعة.
فتح الحزمة
k this deck
80
Discuss briefly the pros and cons of biometric authentication.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 118 في هذه المجموعة.
فتح الحزمة
k this deck
locked card icon
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 118 في هذه المجموعة.