Deck 11: Information Technology It Security

ملء الشاشة (f)
exit full mode
سؤال
Specific threats to security of proprietary information include all of the following except

A)employees.
B)discarded information-in most states, garbage in Dumpsters can be legally searched.
C)secured telecommunication.
D)acoustical surveillance.
استخدم زر المسافة أو
up arrow
down arrow
لقلب البطاقة.
سؤال
Telecommunication security information is typically communicated by all of the following except

A)wirelines.
B)microwave links.
C)satellite systems.
D)pipelines.
سؤال
Reaction is the time the computer reactions to any perceived or real attacks on the system.
سؤال
Security measures for computer systems include all of the following except

A)logical controls.
B)physical access controls.
C)administrative controls.
D)protecting against water.
سؤال
Malicious software or malware is one of the many threats to a computer system.
سؤال
The cost of computer crime annually is

A)thousands of dollars.
B)hundreds of thousands of dollars.
C)millions of dollars.
D)hundreds of millions of dollars.
سؤال
Security measures for computer systems include all of the following except

A)illogical controls.
B)physical access controls.
C)administrative controls.
D)protecting against fire.
سؤال
Factors to consider in investigating computer crime include all of the following except

A)investigator's knowledge and whether outside expertise is required.
B)likelihood of victim or an employee being involved.
C)the ease of detecting such crimes.
D)none of the above
سؤال
"A property right in an original work of authorship (including literary, musical, dramatic, choreographic, pictorial, graphic, sculptural and architectural work; motion pictures and other audiovisual works; and sound recordings) fixed in any tangible medium of expression, giving the holder exclusive right to reproduce, adapt, distribute, perform and display the work" Is a definition of:

A)A patent
B)A copyright
C)A trade secret
D)A movie production contract
سؤال
Telecommunication security includes information communicated by

A)voice.
B)fax.
C)computer.
D)all of the above
سؤال
Convergence, integration, unification, holistic security are all buzz words for twenty-first century security.
سؤال
Detection monitors the amount of time a person takes to respond to the attacks the countermeasures defend against.
سؤال
The greatest security threats to computer centers include all of the following except

A)theft by fraud or embezzlement.
B)hackers.
C)sabotage.
D)cold.
سؤال
Employee threats to security of proprietary information include

A)nondisclosure agreements.
B)noncompete agreements.
C)secrecy agreements.
D)all of the above
سؤال
A Trojan horse installs malicious software on a computer.
سؤال
Only the United States government can keep trade secrets through the use of spyware.
سؤال
IP video surveillance systems are the most effective way to control a network.
سؤال
IT projects commonly fail because the IT manager has made the security protocols too difficult for the average user, in other words, the system is not user friendly.
سؤال
A patent and a copyright are different names for the same thing.
سؤال
Protection provides countermeasures to defend against attacks on assets being secured.
سؤال
Protection provides ___________________ to defend against attacks on assets being secured.
سؤال
Computer crimes cost __________________________ of dollars annually.
سؤال
The recordings are ___________ and sold on the black market and loaded onto the _____________ resulting in millions of illegal downloads.
سؤال
Legal departments can use the ________ in determining the validity of-or defending against-lawsuits and _______________ filed by customers.
سؤال
Too often, __________ or __________ information is __________ in trash cans and then collected in plastic bags and put into a dumpster.
سؤال
Digital Rights Management (DRM) is __________ technology used by digital copyright owners.
سؤال
___________________________ are usually requested of high-level executives, research-and-development personnel and other employees who have access to sensitive information.
سؤال
Common equipment that can pose security threats includes ______, _______ and _________.
سؤال
Almost all organizations handle some form of __________information about their employees, management, relationships, customers or others.
سؤال
One of the best defenses against "bot" threats is to __________ and ____________ software on a computer.
فتح الحزمة
قم بالتسجيل لفتح البطاقات في هذه المجموعة!
Unlock Deck
Unlock Deck
1/30
auto play flashcards
العب
simple tutorial
ملء الشاشة (f)
exit full mode
Deck 11: Information Technology It Security
1
Specific threats to security of proprietary information include all of the following except

A)employees.
B)discarded information-in most states, garbage in Dumpsters can be legally searched.
C)secured telecommunication.
D)acoustical surveillance.
C
2
Telecommunication security information is typically communicated by all of the following except

A)wirelines.
B)microwave links.
C)satellite systems.
D)pipelines.
D
3
Reaction is the time the computer reactions to any perceived or real attacks on the system.
False
4
Security measures for computer systems include all of the following except

A)logical controls.
B)physical access controls.
C)administrative controls.
D)protecting against water.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 30 في هذه المجموعة.
فتح الحزمة
k this deck
5
Malicious software or malware is one of the many threats to a computer system.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 30 في هذه المجموعة.
فتح الحزمة
k this deck
6
The cost of computer crime annually is

A)thousands of dollars.
B)hundreds of thousands of dollars.
C)millions of dollars.
D)hundreds of millions of dollars.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 30 في هذه المجموعة.
فتح الحزمة
k this deck
7
Security measures for computer systems include all of the following except

A)illogical controls.
B)physical access controls.
C)administrative controls.
D)protecting against fire.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 30 في هذه المجموعة.
فتح الحزمة
k this deck
8
Factors to consider in investigating computer crime include all of the following except

A)investigator's knowledge and whether outside expertise is required.
B)likelihood of victim or an employee being involved.
C)the ease of detecting such crimes.
D)none of the above
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 30 في هذه المجموعة.
فتح الحزمة
k this deck
9
"A property right in an original work of authorship (including literary, musical, dramatic, choreographic, pictorial, graphic, sculptural and architectural work; motion pictures and other audiovisual works; and sound recordings) fixed in any tangible medium of expression, giving the holder exclusive right to reproduce, adapt, distribute, perform and display the work" Is a definition of:

A)A patent
B)A copyright
C)A trade secret
D)A movie production contract
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 30 في هذه المجموعة.
فتح الحزمة
k this deck
10
Telecommunication security includes information communicated by

A)voice.
B)fax.
C)computer.
D)all of the above
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 30 في هذه المجموعة.
فتح الحزمة
k this deck
11
Convergence, integration, unification, holistic security are all buzz words for twenty-first century security.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 30 في هذه المجموعة.
فتح الحزمة
k this deck
12
Detection monitors the amount of time a person takes to respond to the attacks the countermeasures defend against.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 30 في هذه المجموعة.
فتح الحزمة
k this deck
13
The greatest security threats to computer centers include all of the following except

A)theft by fraud or embezzlement.
B)hackers.
C)sabotage.
D)cold.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 30 في هذه المجموعة.
فتح الحزمة
k this deck
14
Employee threats to security of proprietary information include

A)nondisclosure agreements.
B)noncompete agreements.
C)secrecy agreements.
D)all of the above
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 30 في هذه المجموعة.
فتح الحزمة
k this deck
15
A Trojan horse installs malicious software on a computer.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 30 في هذه المجموعة.
فتح الحزمة
k this deck
16
Only the United States government can keep trade secrets through the use of spyware.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 30 في هذه المجموعة.
فتح الحزمة
k this deck
17
IP video surveillance systems are the most effective way to control a network.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 30 في هذه المجموعة.
فتح الحزمة
k this deck
18
IT projects commonly fail because the IT manager has made the security protocols too difficult for the average user, in other words, the system is not user friendly.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 30 في هذه المجموعة.
فتح الحزمة
k this deck
19
A patent and a copyright are different names for the same thing.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 30 في هذه المجموعة.
فتح الحزمة
k this deck
20
Protection provides countermeasures to defend against attacks on assets being secured.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 30 في هذه المجموعة.
فتح الحزمة
k this deck
21
Protection provides ___________________ to defend against attacks on assets being secured.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 30 في هذه المجموعة.
فتح الحزمة
k this deck
22
Computer crimes cost __________________________ of dollars annually.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 30 في هذه المجموعة.
فتح الحزمة
k this deck
23
The recordings are ___________ and sold on the black market and loaded onto the _____________ resulting in millions of illegal downloads.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 30 في هذه المجموعة.
فتح الحزمة
k this deck
24
Legal departments can use the ________ in determining the validity of-or defending against-lawsuits and _______________ filed by customers.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 30 في هذه المجموعة.
فتح الحزمة
k this deck
25
Too often, __________ or __________ information is __________ in trash cans and then collected in plastic bags and put into a dumpster.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 30 في هذه المجموعة.
فتح الحزمة
k this deck
26
Digital Rights Management (DRM) is __________ technology used by digital copyright owners.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 30 في هذه المجموعة.
فتح الحزمة
k this deck
27
___________________________ are usually requested of high-level executives, research-and-development personnel and other employees who have access to sensitive information.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 30 في هذه المجموعة.
فتح الحزمة
k this deck
28
Common equipment that can pose security threats includes ______, _______ and _________.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 30 في هذه المجموعة.
فتح الحزمة
k this deck
29
Almost all organizations handle some form of __________information about their employees, management, relationships, customers or others.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 30 في هذه المجموعة.
فتح الحزمة
k this deck
30
One of the best defenses against "bot" threats is to __________ and ____________ software on a computer.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 30 في هذه المجموعة.
فتح الحزمة
k this deck
locked card icon
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 30 في هذه المجموعة.