Deck 3: Cyberattacks and Cybersecurity

ملء الشاشة (f)
exit full mode
سؤال
The Controlling the Assault of Non-Solicited Pornography and Marketing (CAN-SPAM) Act states that it is legal to spam, provided the messages meet a few basic requirements.
استخدم زر المسافة أو
up arrow
down arrow
لقلب البطاقة.
سؤال
After virus eradication, you can use a previous backup to restore an infected computer.
سؤال
Ransomware is malware that stops you from using your computer or accessing your data until you meet certain demands, such as paying a ransom or sending photos to the attacker.
سؤال
Vishing frequently leads consumers to counterfeit Web sites designed to trick them into initiating a denial-of-service attack.
سؤال
Employees and contract workers must be educated about the importance of security so that they will be motivated to understand and follow the security policies.
سؤال
The cost to repair the worldwide damage done by a computer worm has exceeded $1 billion on more than one occasion.
سؤال
Computer forensics is such a new field that there is little training or certification processes available.
سؤال
Whenever possible, automated system rules should mirror an organization's written policies.
سؤال
Trojan horse has become an umbrella term for many types of malicious code.
سؤال
Computer viruses differ from worms in that viruses can propagate without human intervention, often sending copies of themselves to other computers by email.
سؤال
Bring your own device (BYOD) is a business policy that permits, and in some cases encourages, employees to use their own mobile devices (smartphones, tablets, or laptops) to access company computing resources and applications.
سؤال
The cost of creating an email campaign for a product or a service is typically more expensive and takes longer to conduct than a direct-mail campaign.
سؤال
Cyberterrorism involves the deployment of malware that secretly steals data in the computer systems of organizations, such as government agencies, military contractors, political organizations, and manufacturing firms.
سؤال
Today's computer menace is much better organized and may be part of an organized group.
سؤال
A completed risk assessment identifies the most dangerous threats to a company and helps focus security efforts on the areas of highest payoff.
سؤال
Cyberterrorism is the intimidation of government or civilian population by using information technology to disable critical national infrastructure to achieve political, religious, or ideological goals.
سؤال
The Fifth Amendment regulates the collection of the content of wire and electronic communications.
سؤال
Rootkit is a set of programs that enables its users to gain administrator-level access to a computer without the end user's consent or knowledge.
سؤال
A security policy outlines exactly what needs to be done to safeguard computers and their data, but not how it must be accomplished.
سؤال
A spear phishing attack typically employs a group of zombies to keep the target so busy responding to a stream of automated requests that legitimate users cannot access the target.
سؤال
A network attack in which an intruder gains access to a network and stays there, undetected, with the intention of stealing data over a long period of time is known as which of the following?

A)DDoS
B)APT
C)rootkit
D)trojan horse
سؤال
Installation of a corporate firewall is the least common security precaution taken by businesses as it does not provide sufficient security.
سؤال
In computing, a term for any sort of general attack on an information system that takes advantage of a particular system vulnerability is known as which of the following?

A)exploit
B)patch
C)firewall
D)security audit
سؤال
Which of the following is a form of Trojan horse which executes when it is triggered by a specific event such as a change in a particular file, by typing a specific series of keystrokes, or by a specific time or date?

A)denial-of-service attack
B)logic bomb
C)botnet
D)rootkit
سؤال
Which of the following is a federal law that provides a definition of the term cyberterrorism and under which young people primarily involved in what they consider to be minor computer pranks have been tried as cyberterrorist?

A)USA Patriot Act
B)Computer Fraud and Abuse Act
C)Stored Wire and Electronic Communications and Transactional Records Access Statutes
D)Identity Theft and Assumption Deterrence Act
سؤال
Which of the following is a partnership between the Department of Homeland Security and the public and private sectors, established in 2003 to protect the nation's Internet infrastructure against cyberattacks?

A)Carnegie Mellon's Computer Response Team
B)U.S.Computer Emergency Readiness Team
C)The National Institute of Standards and Technology
D)The Science and Technology Directorate of Homeland Security
سؤال
Which of the following concepts recognizes that managers must use their judgment to ensure that the cost of control does not exceed the system's benefits or the risks involved?

A)competitive intelligence
B)reasonable assurance
C)separation of duties
D)risk assessment
سؤال
Discussing security attacks through public trials and the associated publicity has not only enormous potential costs in public relations but real monetary costs as well.
سؤال
Software and/or hardware that monitors system and network resources and activities, and notifies network security personnel when it identifies network traffic that attempts to circumvent the security measures of a networked computer environment is known as which of the following?

A)anti-virus device
B)intrusion prevention system
C)intrusion detection system
D)virtual private network
سؤال
A router is a hardware- or software-based network security system that is able to detect and block sophisticated attacks by filtering network traffic dependent on the packet contents.
سؤال
What exploit is characterized as the abuse of email systems to send unsolicited email to large numbers of people?

A)A botnet
B)Spam
C)Logic bombing
D)A worm
سؤال
Which type of attacker hacks computers or websites in an attempt to promote a political ideology?

A)Industrial spies
B)Hackers
C)Cyberterrorists
D)Hacktivists
سؤال
Often a successful attack on an information system is due to poor system design or implementation. Once such a vulnerability is discovered, software developers quickly create and issue which of the following, in order to eliminate the problem?

A)patch
B)bot
C)rootkit
D)Trojan horse
سؤال
What type of viruses have become a common and easily created form of malware that are created using applications such as Visual Basic or VBScript?

A)Macro viruses
B)Logic bombs
C)Trojan horses
D)Zombies
سؤال
It is not unusual for a security audit to reveal that too many people have access to critical data and that many people have capabilities beyond those needed to perform their jobs.
سؤال
The fundamental problem with trying to detect a rootkit is that the operating system cannot be trusted to provide which of the following?

A)valid test results
B)correct system login ids
C)the correct date and time
D)sufficient memory for operations
سؤال
Which of the following gets a rootkit installation started and can be easily activated by clicking on a link to a malicious Web site in an email or opening an infected PDF file?

A)logic bomb
B)zombie
C)dropper code
D)loader
سؤال
Spammers can defeat the registration process of free email services by launching a coordinated attack that can sign up for thousands of untraceable email accounts. What is this type of attack known as?

A)distributed denial-of-service attack
B)bot attack
C)CAPTCHA attack
D)logic bomb
سؤال
A type of computer crime perpetrator whose primary motive is to achieve financial gain is known as which of the following?

A)industrial spy
B)hacktivist
C)black hat hacker
D)cybercriminal
سؤال
Even when preventive measures are implemented, no organization is completely secure from a determined computer attack.
سؤال
Malware that stops you from using your computer or accessing your data until you meet certain demands is known as which of the following?

A)trojan horse
B)worm
C)ransomware
D)phishing
سؤال
Which type of exploit is defined as the sending of fraudulent emails to an organization's employees designed to look like they came from high-level executives from within the organization?

A)Spamdexing
B)Vishing
C)Smishing
D)Spear phishing
سؤال
Which term is defined as an exploit that takes place before the security community or software developer knows about the vulnerability or has been able to repair it?

A)logic bomb
B)DDoS attack
C)zero-day attack
D)rootkit
سؤال
An antivirus software scans for a specific sequence of bytes that indicates the presence of specific malware. This sequence of bytes is known as which of the following?

A)script kiddie
B)virus signature
C)CAPTCHA
D)Trojan horse
سؤال
The act of fraudulently using email to try to get the recipient to reveal personal data is known as which of the following?

A)Pharming
B)Phishing
C)Spamdexing
D)Flyposting
سؤال
Which of the following enables remote users to securely access an organization's collection of computing and storage devices and share data remotely?

A)firewall
B)social network
C)intrusion detection device
D)virtual private network
سؤال
Which organization offers a number of security-related policy templates that can help an organization quickly develop effective security policies?

A)Department of Homeland Security
B)IEEE
C)SANS Institute
D)US-CERT
سؤال
State the purpose of an IT security audit and briefly discuss the key elements of such an audit.
سؤال
Many organizations use software to provide a comprehensive display of all key performance indicators related to an organization's security defenses, including threats, exposures, policy compliance, and incident alerts. What is this type of software known as?

A)firewall
B)security dashboard
C)intrusion detection software
D)proxy server software
سؤال
Briefly describe ransomware and how a computer typically becomes infected with this type of malware.
سؤال
A piece of programming code, usually disguised as something else, that causes a computer to behave in an unexpected and usually undesirable manner is known as which of the following?

A)virus
B)operating system
C)zombie
D)CAPTCHA
سؤال
A business policy that permits employees to use their own mobile devices to access company computing resources and applications is known as which of the following?

A)USA Patriot Act
B)Bring your own device (BYOD)
C)Mobile Alliance Policy (MAP)
D)CAPTCHA
سؤال
The most common computer security precaution taken by businesses is the installation of which of the following?

A)emergency response team
B)rootkit
C)virtual private network
D)firewall
سؤال
What type of attack keeps the target so busy responding to a stream of automated requests that legitimate users cannot get in?

A)spam
B)rootkit
C)logic bomb
D)distributed denial-of-service
سؤال
Identify and briefly discuss five reasons why the number, variety, and impact of security incidents is increasing.
سؤال
Briefly explain why many organizations are choosing to outsource their network security operations to a managed security service provider (MSSP).
سؤال
Define computer forensics and briefly describe how one may prepare for a role as a computer forensics investigator.
سؤال
Many organizations outsource their network security operations to a company that monitors, manages, and maintains computer and network security for them. This type of company is known as which of the following?

A)security dashboard
B)computer forensics
C)managed security service provider
D)product lifecycle management
سؤال
Before the IT security group can begin an eradication effort, it must:

A)seek permission of the firm's legal counsel
B)collect and log all possible criminal evidence from the system
C)consider the potential for negative publicity
D)develop an estimate for the monetary damage caused
سؤال
The intimidation of government or civilian population by using information technology to disable critical national infrastructure in order to achieve political, religious, or ideological goals is known as which of the following?

A)whistleblowing
B)cyberterrorism
C)hacktivism
D)cyberespionage
فتح الحزمة
قم بالتسجيل لفتح البطاقات في هذه المجموعة!
Unlock Deck
Unlock Deck
1/60
auto play flashcards
العب
simple tutorial
ملء الشاشة (f)
exit full mode
Deck 3: Cyberattacks and Cybersecurity
1
The Controlling the Assault of Non-Solicited Pornography and Marketing (CAN-SPAM) Act states that it is legal to spam, provided the messages meet a few basic requirements.
True
2
After virus eradication, you can use a previous backup to restore an infected computer.
False
3
Ransomware is malware that stops you from using your computer or accessing your data until you meet certain demands, such as paying a ransom or sending photos to the attacker.
True
4
Vishing frequently leads consumers to counterfeit Web sites designed to trick them into initiating a denial-of-service attack.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 60 في هذه المجموعة.
فتح الحزمة
k this deck
5
Employees and contract workers must be educated about the importance of security so that they will be motivated to understand and follow the security policies.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 60 في هذه المجموعة.
فتح الحزمة
k this deck
6
The cost to repair the worldwide damage done by a computer worm has exceeded $1 billion on more than one occasion.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 60 في هذه المجموعة.
فتح الحزمة
k this deck
7
Computer forensics is such a new field that there is little training or certification processes available.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 60 في هذه المجموعة.
فتح الحزمة
k this deck
8
Whenever possible, automated system rules should mirror an organization's written policies.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 60 في هذه المجموعة.
فتح الحزمة
k this deck
9
Trojan horse has become an umbrella term for many types of malicious code.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 60 في هذه المجموعة.
فتح الحزمة
k this deck
10
Computer viruses differ from worms in that viruses can propagate without human intervention, often sending copies of themselves to other computers by email.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 60 في هذه المجموعة.
فتح الحزمة
k this deck
11
Bring your own device (BYOD) is a business policy that permits, and in some cases encourages, employees to use their own mobile devices (smartphones, tablets, or laptops) to access company computing resources and applications.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 60 في هذه المجموعة.
فتح الحزمة
k this deck
12
The cost of creating an email campaign for a product or a service is typically more expensive and takes longer to conduct than a direct-mail campaign.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 60 في هذه المجموعة.
فتح الحزمة
k this deck
13
Cyberterrorism involves the deployment of malware that secretly steals data in the computer systems of organizations, such as government agencies, military contractors, political organizations, and manufacturing firms.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 60 في هذه المجموعة.
فتح الحزمة
k this deck
14
Today's computer menace is much better organized and may be part of an organized group.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 60 في هذه المجموعة.
فتح الحزمة
k this deck
15
A completed risk assessment identifies the most dangerous threats to a company and helps focus security efforts on the areas of highest payoff.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 60 في هذه المجموعة.
فتح الحزمة
k this deck
16
Cyberterrorism is the intimidation of government or civilian population by using information technology to disable critical national infrastructure to achieve political, religious, or ideological goals.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 60 في هذه المجموعة.
فتح الحزمة
k this deck
17
The Fifth Amendment regulates the collection of the content of wire and electronic communications.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 60 في هذه المجموعة.
فتح الحزمة
k this deck
18
Rootkit is a set of programs that enables its users to gain administrator-level access to a computer without the end user's consent or knowledge.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 60 في هذه المجموعة.
فتح الحزمة
k this deck
19
A security policy outlines exactly what needs to be done to safeguard computers and their data, but not how it must be accomplished.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 60 في هذه المجموعة.
فتح الحزمة
k this deck
20
A spear phishing attack typically employs a group of zombies to keep the target so busy responding to a stream of automated requests that legitimate users cannot access the target.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 60 في هذه المجموعة.
فتح الحزمة
k this deck
21
A network attack in which an intruder gains access to a network and stays there, undetected, with the intention of stealing data over a long period of time is known as which of the following?

A)DDoS
B)APT
C)rootkit
D)trojan horse
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 60 في هذه المجموعة.
فتح الحزمة
k this deck
22
Installation of a corporate firewall is the least common security precaution taken by businesses as it does not provide sufficient security.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 60 في هذه المجموعة.
فتح الحزمة
k this deck
23
In computing, a term for any sort of general attack on an information system that takes advantage of a particular system vulnerability is known as which of the following?

A)exploit
B)patch
C)firewall
D)security audit
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 60 في هذه المجموعة.
فتح الحزمة
k this deck
24
Which of the following is a form of Trojan horse which executes when it is triggered by a specific event such as a change in a particular file, by typing a specific series of keystrokes, or by a specific time or date?

A)denial-of-service attack
B)logic bomb
C)botnet
D)rootkit
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 60 في هذه المجموعة.
فتح الحزمة
k this deck
25
Which of the following is a federal law that provides a definition of the term cyberterrorism and under which young people primarily involved in what they consider to be minor computer pranks have been tried as cyberterrorist?

A)USA Patriot Act
B)Computer Fraud and Abuse Act
C)Stored Wire and Electronic Communications and Transactional Records Access Statutes
D)Identity Theft and Assumption Deterrence Act
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 60 في هذه المجموعة.
فتح الحزمة
k this deck
26
Which of the following is a partnership between the Department of Homeland Security and the public and private sectors, established in 2003 to protect the nation's Internet infrastructure against cyberattacks?

A)Carnegie Mellon's Computer Response Team
B)U.S.Computer Emergency Readiness Team
C)The National Institute of Standards and Technology
D)The Science and Technology Directorate of Homeland Security
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 60 في هذه المجموعة.
فتح الحزمة
k this deck
27
Which of the following concepts recognizes that managers must use their judgment to ensure that the cost of control does not exceed the system's benefits or the risks involved?

A)competitive intelligence
B)reasonable assurance
C)separation of duties
D)risk assessment
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 60 في هذه المجموعة.
فتح الحزمة
k this deck
28
Discussing security attacks through public trials and the associated publicity has not only enormous potential costs in public relations but real monetary costs as well.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 60 في هذه المجموعة.
فتح الحزمة
k this deck
29
Software and/or hardware that monitors system and network resources and activities, and notifies network security personnel when it identifies network traffic that attempts to circumvent the security measures of a networked computer environment is known as which of the following?

A)anti-virus device
B)intrusion prevention system
C)intrusion detection system
D)virtual private network
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 60 في هذه المجموعة.
فتح الحزمة
k this deck
30
A router is a hardware- or software-based network security system that is able to detect and block sophisticated attacks by filtering network traffic dependent on the packet contents.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 60 في هذه المجموعة.
فتح الحزمة
k this deck
31
What exploit is characterized as the abuse of email systems to send unsolicited email to large numbers of people?

A)A botnet
B)Spam
C)Logic bombing
D)A worm
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 60 في هذه المجموعة.
فتح الحزمة
k this deck
32
Which type of attacker hacks computers or websites in an attempt to promote a political ideology?

A)Industrial spies
B)Hackers
C)Cyberterrorists
D)Hacktivists
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 60 في هذه المجموعة.
فتح الحزمة
k this deck
33
Often a successful attack on an information system is due to poor system design or implementation. Once such a vulnerability is discovered, software developers quickly create and issue which of the following, in order to eliminate the problem?

A)patch
B)bot
C)rootkit
D)Trojan horse
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 60 في هذه المجموعة.
فتح الحزمة
k this deck
34
What type of viruses have become a common and easily created form of malware that are created using applications such as Visual Basic or VBScript?

A)Macro viruses
B)Logic bombs
C)Trojan horses
D)Zombies
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 60 في هذه المجموعة.
فتح الحزمة
k this deck
35
It is not unusual for a security audit to reveal that too many people have access to critical data and that many people have capabilities beyond those needed to perform their jobs.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 60 في هذه المجموعة.
فتح الحزمة
k this deck
36
The fundamental problem with trying to detect a rootkit is that the operating system cannot be trusted to provide which of the following?

A)valid test results
B)correct system login ids
C)the correct date and time
D)sufficient memory for operations
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 60 في هذه المجموعة.
فتح الحزمة
k this deck
37
Which of the following gets a rootkit installation started and can be easily activated by clicking on a link to a malicious Web site in an email or opening an infected PDF file?

A)logic bomb
B)zombie
C)dropper code
D)loader
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 60 في هذه المجموعة.
فتح الحزمة
k this deck
38
Spammers can defeat the registration process of free email services by launching a coordinated attack that can sign up for thousands of untraceable email accounts. What is this type of attack known as?

A)distributed denial-of-service attack
B)bot attack
C)CAPTCHA attack
D)logic bomb
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 60 في هذه المجموعة.
فتح الحزمة
k this deck
39
A type of computer crime perpetrator whose primary motive is to achieve financial gain is known as which of the following?

A)industrial spy
B)hacktivist
C)black hat hacker
D)cybercriminal
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 60 في هذه المجموعة.
فتح الحزمة
k this deck
40
Even when preventive measures are implemented, no organization is completely secure from a determined computer attack.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 60 في هذه المجموعة.
فتح الحزمة
k this deck
41
Malware that stops you from using your computer or accessing your data until you meet certain demands is known as which of the following?

A)trojan horse
B)worm
C)ransomware
D)phishing
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 60 في هذه المجموعة.
فتح الحزمة
k this deck
42
Which type of exploit is defined as the sending of fraudulent emails to an organization's employees designed to look like they came from high-level executives from within the organization?

A)Spamdexing
B)Vishing
C)Smishing
D)Spear phishing
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 60 في هذه المجموعة.
فتح الحزمة
k this deck
43
Which term is defined as an exploit that takes place before the security community or software developer knows about the vulnerability or has been able to repair it?

A)logic bomb
B)DDoS attack
C)zero-day attack
D)rootkit
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 60 في هذه المجموعة.
فتح الحزمة
k this deck
44
An antivirus software scans for a specific sequence of bytes that indicates the presence of specific malware. This sequence of bytes is known as which of the following?

A)script kiddie
B)virus signature
C)CAPTCHA
D)Trojan horse
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 60 في هذه المجموعة.
فتح الحزمة
k this deck
45
The act of fraudulently using email to try to get the recipient to reveal personal data is known as which of the following?

A)Pharming
B)Phishing
C)Spamdexing
D)Flyposting
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 60 في هذه المجموعة.
فتح الحزمة
k this deck
46
Which of the following enables remote users to securely access an organization's collection of computing and storage devices and share data remotely?

A)firewall
B)social network
C)intrusion detection device
D)virtual private network
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 60 في هذه المجموعة.
فتح الحزمة
k this deck
47
Which organization offers a number of security-related policy templates that can help an organization quickly develop effective security policies?

A)Department of Homeland Security
B)IEEE
C)SANS Institute
D)US-CERT
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 60 في هذه المجموعة.
فتح الحزمة
k this deck
48
State the purpose of an IT security audit and briefly discuss the key elements of such an audit.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 60 في هذه المجموعة.
فتح الحزمة
k this deck
49
Many organizations use software to provide a comprehensive display of all key performance indicators related to an organization's security defenses, including threats, exposures, policy compliance, and incident alerts. What is this type of software known as?

A)firewall
B)security dashboard
C)intrusion detection software
D)proxy server software
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 60 في هذه المجموعة.
فتح الحزمة
k this deck
50
Briefly describe ransomware and how a computer typically becomes infected with this type of malware.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 60 في هذه المجموعة.
فتح الحزمة
k this deck
51
A piece of programming code, usually disguised as something else, that causes a computer to behave in an unexpected and usually undesirable manner is known as which of the following?

A)virus
B)operating system
C)zombie
D)CAPTCHA
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 60 في هذه المجموعة.
فتح الحزمة
k this deck
52
A business policy that permits employees to use their own mobile devices to access company computing resources and applications is known as which of the following?

A)USA Patriot Act
B)Bring your own device (BYOD)
C)Mobile Alliance Policy (MAP)
D)CAPTCHA
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 60 في هذه المجموعة.
فتح الحزمة
k this deck
53
The most common computer security precaution taken by businesses is the installation of which of the following?

A)emergency response team
B)rootkit
C)virtual private network
D)firewall
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 60 في هذه المجموعة.
فتح الحزمة
k this deck
54
What type of attack keeps the target so busy responding to a stream of automated requests that legitimate users cannot get in?

A)spam
B)rootkit
C)logic bomb
D)distributed denial-of-service
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 60 في هذه المجموعة.
فتح الحزمة
k this deck
55
Identify and briefly discuss five reasons why the number, variety, and impact of security incidents is increasing.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 60 في هذه المجموعة.
فتح الحزمة
k this deck
56
Briefly explain why many organizations are choosing to outsource their network security operations to a managed security service provider (MSSP).
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 60 في هذه المجموعة.
فتح الحزمة
k this deck
57
Define computer forensics and briefly describe how one may prepare for a role as a computer forensics investigator.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 60 في هذه المجموعة.
فتح الحزمة
k this deck
58
Many organizations outsource their network security operations to a company that monitors, manages, and maintains computer and network security for them. This type of company is known as which of the following?

A)security dashboard
B)computer forensics
C)managed security service provider
D)product lifecycle management
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 60 في هذه المجموعة.
فتح الحزمة
k this deck
59
Before the IT security group can begin an eradication effort, it must:

A)seek permission of the firm's legal counsel
B)collect and log all possible criminal evidence from the system
C)consider the potential for negative publicity
D)develop an estimate for the monetary damage caused
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 60 في هذه المجموعة.
فتح الحزمة
k this deck
60
The intimidation of government or civilian population by using information technology to disable critical national infrastructure in order to achieve political, religious, or ideological goals is known as which of the following?

A)whistleblowing
B)cyberterrorism
C)hacktivism
D)cyberespionage
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 60 في هذه المجموعة.
فتح الحزمة
k this deck
locked card icon
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 60 في هذه المجموعة.