Deck 12: Information Security Management

ملء الشاشة (f)
exit full mode
سؤال
Natural disasters present the largest risk for infrastructure loss.
استخدم زر المسافة أو
up arrow
down arrow
لقلب البطاقة.
سؤال
An intrusion detection system (IDS)is a computer program that senses when another computer is attempting to scan the disk or otherwise access a computer.
سؤال
Email spoofing is a synonym for phishing.
سؤال
Usurpation occurs when computer criminals invade a computer system and replace legitimate programs with their own unauthorized ones.
سؤال
As per the study conducted by Verizon, organizations that have been phished have increased to 40 percent since 2007.
سؤال
Sniffing occurs when an intruder uses another site's IP address to masquerade as that other site.
سؤال
In a study conducted by Verizon, in a year only about a hundred thousand people become victims of computer crimes.
سؤال
In a study conducted by Verizon, data theft has been most successful at large scale enterprises.
سؤال
Most emails and IMs are protected by encryption.
سؤال
When a hacker floods a Web server with millions of bogus service requests so that it cannot service legitimate requests, it is called a denial-of-service attack.
سؤال
In a study conducted by Verizon, in 2011, the four most frequent computer crimes involved criminal activity against servers.
سؤال
Unauthorized data disclosures are possible due to human error.
سؤال
Cookies enable an individual to access Web sites without having to sign in every time.
سؤال
As problems caused by human errors are accidental and not malicious, they are not considered as security threats to the information system.
سؤال
A computer crime is committed if an employee who inadvertently installs an old database on top of the current one.
سؤال
Faulty service includes incorrectly billing customers or sending the wrong information to employees, but not incorrect data modification.
سؤال
Pretexting occurs when a person receives a confidential text message by mistake and pretends to be the intended recipient.
سؤال
Phishing is a technique for intercepting computer communications.
سؤال
Drive-by sniffers monitor and intercept wireless traffic at will.
سؤال
In context of information security, safeguards increase work efficiency by making common tasks easier.
سؤال
It is safer to use the same password for all the Web sites.
سؤال
Most spyware programs are benign in that they do not perform malicious acts or steal data.
سؤال
Symmetric encryption is simpler and much faster than asymmetric encryption.
سؤال
Viruses and worms are examples of malware.
سؤال
Unlike credit, debit, and ATM cards, which have a magnetic strip, smart cards have a microchip.
سؤال
Encryption is an example of a technical safeguard.
سؤال
A magnetic strip holds far more data than a microchip.
سؤال
A Trojan horse is a virus that masquerades as a useful program or file.
سؤال
Security policies must not depend on whether the organization is governmental or nongovernmental,
or whether it is publically held or private.
سؤال
Brute force requires only 2 days to crack a password having a mixture of upper and lowercase letters, numbers, and special characters.
سؤال
Even short passwords with no special characters can make strong passwords.
سؤال
Technical safeguards involve the hardware and software components of an information system.
سؤال
The senior management must establish a company-wide security policy that states the organization's posture regarding the data that it gathers.
سؤال
A new hire must seek out the employer's security policy if it is not discussed in new employee training.
سؤال
In symmetric encryption, two different keys are used to encode and decode a message.
سؤال
Secure Socket Layer (SSL)is a protocol that is restricted to asymmetric encryption.
سؤال
Biometric authentication uses characteristics such as retinal scans.
سؤال
SQL injection attack occurs when users enter an SQL statement into a form in which they are supposed to enter a name or other data.
سؤال
Data safeguards are measures used to protect computer hardware from external threat.
سؤال
Improper data disclosure and data damage and loss are possible consequences of an SQL injection attack.
سؤال
Hardening is actually a human safeguard.
سؤال
Which of the following is considered a threat caused by human error?

A)An employee inadvertently installs an old database on top of the current one.
B)An employee intentionally destroys data and system components.
C)A virus and worm writer infects computer systems.
D)A hacker breaks into a system to steal for financial gain.
سؤال
A ________ is a person or organization that seeks to obtain data or other assets illegally, without the owner's permission and often without the owner's knowledge.

A)target
B)vulnerability
C)threat
D)warning
سؤال
A ________ pretends to be a legitimate company and sends an email requesting confidential data, such as account numbers, Social Security numbers, account passwords, and so forth.

A)hacker
B)phisher
C)safeguard
D)sniffer
سؤال
When referring to security threats, pretexting, sniffing, spoofing, and phishing are all examples of ________.

A)unauthorized data disclosure
B)incorrect data modification
C)faulty services
D)loss of infrastructure
سؤال
________ occurs when someone deceives by pretending to be someone else.

A)Hacking
B)Baiting
C)Sniffing
D)Pretexting
سؤال
Companies should require vendors and partners to perform appropriate screening and security training.
سؤال
Which of the following is an example of a sniffing technique?

A)IP spoofing
B)caches
C)ad blockers
D)adware
سؤال
The existence of accounts that are no longer in use are not a security threat to an organization.
سؤال
________ take computers with wireless connections through an area and search for unprotected wireless networks and then monitor and intercept wireless traffic at will.

A)Drive-by spoofers
B)Pretexters
C)Drive-by sniffers
D)Phishers
سؤال
If a backup of the database contents is made, the database is protected.
سؤال
Which of the following is considered a computer crime?

A)internal software bug deleting customer records
B)poorly written programs resulting in data losses
C)loss of data as a result of flooding
D)hacking of information systems
سؤال
If the incident-response plan is not well prepared, there is substantial risk that the actions of well-meaning people will make the problem worse.
سؤال
Email spoofing is a synonym for ________.

A)hacking
B)phishing
C)usurping
D)sniffing
سؤال
Business requirements do not necessitate opening information systems to nonemployee personnel-temporary personnel, vendors or partner personnel.
سؤال
It is easy and economical to hold public users of Web sites accountable for security violations.
سؤال
Employee termination is a potential security threat for an organization.
سؤال
Hardening a site means to take extraordinary measures to reduce a system's vulnerability.
سؤال
Documenting position sensitivity enables security personnel to prioritize their activities in accordance with the possible risk and loss.
سؤال
________ is a technique for intercepting computer communications, either through a physical connection to a network or without physical connection in the case of wireless networks.

A)Spoofing
B)Phishing
C)Sniffing
D)Pretexting
سؤال
Which of the following is a critical security function of senior management in an organization?

A)safeguarding computer hardware and software
B)developing IS security software
C)establishing the security policy and managing risk
D)managing security programs on a real-time basis
سؤال
Which of the following was passed to give individuals the right to access their own health data created by doctors and other healthcare providers?

A)Privacy Act of 1974
B)Sarbanes-Oxley Act
C)HIPAA of 1996
D)Gramm-Leach-Bliley Act
سؤال
Nonword passwords are vulnerable to a(n)________ attack, in which the password cracker tries every possible combination of characters.

A)denial-of-service
B)side channel
C)brute force
D)obfuscation
سؤال
________ present the largest risk for an organization's infrastructure loss.

A)Employees
B)Natural disasters
C)Hackers
D)Competitors
سؤال
Which of the following usually happens in a malicious denial-of-service attack?

A)A hacker monitors and intercepts wireless traffic at will.
B)A hacker floods a Web server with millions of bogus service requests.
C)A hacker uses another site's IP address to masquerade as that other site.
D)A phisher pretends to be a legitimate company and requests confidential data.
سؤال
A(n)________ is a computer program that senses when another computer is attempting to scan the disk or otherwise access a computer.

A)IDS
B)botnet
C)antivirus
D)firewall
سؤال
Which of the following is most likely to be the result of hacking?

A)certain Web sites being blocked from viewing for security reasons
B)small amounts of spam in your inbox
C)an unexplained reduction in your account balance
D)pop-up ads appearing frequently
سؤال
________ are small files that your browser stores on your computer when you visit Web sites and enable you to access Web sites without having to sign in every time.

A)Cookies
B)Registers
C)Pop-ups
D)Public keys
سؤال
Which of the following is an example of a technical safeguard?

A)position definitions
B)firewalls
C)key escrow
D)locked down servers
سؤال
________ occurs through human error when employees do not follow proper procedures or when procedures have not been well designed.

A)Unauthorized data disclosure
B)Incorrect data modification
C)Denial of service
D)Loss of infrastructure
سؤال
________ occurs when computer criminals invade a computer system and replace legitimate programs with their own unauthorized ones that shut down legitimate applications and substitute their own processing to spy, steal and manipulate data, or other purposes.

A)Hacking
B)Spoofing
C)Phishing
D)Usurpation
سؤال
A ________ is a number used to encrypt the data.

A)key
B)WPA
C)pretext
D)WEP
سؤال
________ enable you to access Web sites without having to sign in every time.

A)Bookmarks
B)Pop-ups
C)Cookies
D)Public keys
سؤال
Users of smart cards are required to enter a ________ to be authenticated.

A)Social Security number
B)public key
C)personal identification number
D)private key
سؤال
A(n)________ has a microchip in it to hold data.

A)ATM card
B)smart card
C)cookie
D)escrow
سؤال
Which of the following is used for biometric authentication?

A)smart cards
B)facial features
C)passwords
D)personal identification numbers
سؤال
In asymmetric encryption, each site has a ________ for encoding messages.

A)wireless fidelity
B)private key
C)public key
D)pretext
سؤال
Which of the following statements is true of biometric identification?

A)It involves the use of a PIN for authentication.
B)It provides weak authentication.
C)It is a relatively inexpensive mode of authentication.
D)It often faces resistance from users for its invasive nature.
سؤال
The Privacy Act of 1974 provides protection to individuals regarding ________.

A)records held by private companies
B)records held by the U.S.government
C)records held by banks and other financial institutions
D)records held by non-government agencies
سؤال
________ occurs when a person breaks into a network to steal data such as customer lists, product inventory data, employee data, and other proprietary and confidential data.

A)Pretexting
B)Phishing
C)Hacking
D)Spoofing
فتح الحزمة
قم بالتسجيل لفتح البطاقات في هذه المجموعة!
Unlock Deck
Unlock Deck
1/123
auto play flashcards
العب
simple tutorial
ملء الشاشة (f)
exit full mode
Deck 12: Information Security Management
1
Natural disasters present the largest risk for infrastructure loss.
True
2
An intrusion detection system (IDS)is a computer program that senses when another computer is attempting to scan the disk or otherwise access a computer.
True
3
Email spoofing is a synonym for phishing.
True
4
Usurpation occurs when computer criminals invade a computer system and replace legitimate programs with their own unauthorized ones.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 123 في هذه المجموعة.
فتح الحزمة
k this deck
5
As per the study conducted by Verizon, organizations that have been phished have increased to 40 percent since 2007.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 123 في هذه المجموعة.
فتح الحزمة
k this deck
6
Sniffing occurs when an intruder uses another site's IP address to masquerade as that other site.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 123 في هذه المجموعة.
فتح الحزمة
k this deck
7
In a study conducted by Verizon, in a year only about a hundred thousand people become victims of computer crimes.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 123 في هذه المجموعة.
فتح الحزمة
k this deck
8
In a study conducted by Verizon, data theft has been most successful at large scale enterprises.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 123 في هذه المجموعة.
فتح الحزمة
k this deck
9
Most emails and IMs are protected by encryption.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 123 في هذه المجموعة.
فتح الحزمة
k this deck
10
When a hacker floods a Web server with millions of bogus service requests so that it cannot service legitimate requests, it is called a denial-of-service attack.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 123 في هذه المجموعة.
فتح الحزمة
k this deck
11
In a study conducted by Verizon, in 2011, the four most frequent computer crimes involved criminal activity against servers.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 123 في هذه المجموعة.
فتح الحزمة
k this deck
12
Unauthorized data disclosures are possible due to human error.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 123 في هذه المجموعة.
فتح الحزمة
k this deck
13
Cookies enable an individual to access Web sites without having to sign in every time.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 123 في هذه المجموعة.
فتح الحزمة
k this deck
14
As problems caused by human errors are accidental and not malicious, they are not considered as security threats to the information system.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 123 في هذه المجموعة.
فتح الحزمة
k this deck
15
A computer crime is committed if an employee who inadvertently installs an old database on top of the current one.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 123 في هذه المجموعة.
فتح الحزمة
k this deck
16
Faulty service includes incorrectly billing customers or sending the wrong information to employees, but not incorrect data modification.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 123 في هذه المجموعة.
فتح الحزمة
k this deck
17
Pretexting occurs when a person receives a confidential text message by mistake and pretends to be the intended recipient.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 123 في هذه المجموعة.
فتح الحزمة
k this deck
18
Phishing is a technique for intercepting computer communications.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 123 في هذه المجموعة.
فتح الحزمة
k this deck
19
Drive-by sniffers monitor and intercept wireless traffic at will.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 123 في هذه المجموعة.
فتح الحزمة
k this deck
20
In context of information security, safeguards increase work efficiency by making common tasks easier.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 123 في هذه المجموعة.
فتح الحزمة
k this deck
21
It is safer to use the same password for all the Web sites.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 123 في هذه المجموعة.
فتح الحزمة
k this deck
22
Most spyware programs are benign in that they do not perform malicious acts or steal data.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 123 في هذه المجموعة.
فتح الحزمة
k this deck
23
Symmetric encryption is simpler and much faster than asymmetric encryption.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 123 في هذه المجموعة.
فتح الحزمة
k this deck
24
Viruses and worms are examples of malware.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 123 في هذه المجموعة.
فتح الحزمة
k this deck
25
Unlike credit, debit, and ATM cards, which have a magnetic strip, smart cards have a microchip.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 123 في هذه المجموعة.
فتح الحزمة
k this deck
26
Encryption is an example of a technical safeguard.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 123 في هذه المجموعة.
فتح الحزمة
k this deck
27
A magnetic strip holds far more data than a microchip.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 123 في هذه المجموعة.
فتح الحزمة
k this deck
28
A Trojan horse is a virus that masquerades as a useful program or file.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 123 في هذه المجموعة.
فتح الحزمة
k this deck
29
Security policies must not depend on whether the organization is governmental or nongovernmental,
or whether it is publically held or private.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 123 في هذه المجموعة.
فتح الحزمة
k this deck
30
Brute force requires only 2 days to crack a password having a mixture of upper and lowercase letters, numbers, and special characters.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 123 في هذه المجموعة.
فتح الحزمة
k this deck
31
Even short passwords with no special characters can make strong passwords.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 123 في هذه المجموعة.
فتح الحزمة
k this deck
32
Technical safeguards involve the hardware and software components of an information system.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 123 في هذه المجموعة.
فتح الحزمة
k this deck
33
The senior management must establish a company-wide security policy that states the organization's posture regarding the data that it gathers.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 123 في هذه المجموعة.
فتح الحزمة
k this deck
34
A new hire must seek out the employer's security policy if it is not discussed in new employee training.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 123 في هذه المجموعة.
فتح الحزمة
k this deck
35
In symmetric encryption, two different keys are used to encode and decode a message.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 123 في هذه المجموعة.
فتح الحزمة
k this deck
36
Secure Socket Layer (SSL)is a protocol that is restricted to asymmetric encryption.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 123 في هذه المجموعة.
فتح الحزمة
k this deck
37
Biometric authentication uses characteristics such as retinal scans.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 123 في هذه المجموعة.
فتح الحزمة
k this deck
38
SQL injection attack occurs when users enter an SQL statement into a form in which they are supposed to enter a name or other data.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 123 في هذه المجموعة.
فتح الحزمة
k this deck
39
Data safeguards are measures used to protect computer hardware from external threat.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 123 في هذه المجموعة.
فتح الحزمة
k this deck
40
Improper data disclosure and data damage and loss are possible consequences of an SQL injection attack.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 123 في هذه المجموعة.
فتح الحزمة
k this deck
41
Hardening is actually a human safeguard.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 123 في هذه المجموعة.
فتح الحزمة
k this deck
42
Which of the following is considered a threat caused by human error?

A)An employee inadvertently installs an old database on top of the current one.
B)An employee intentionally destroys data and system components.
C)A virus and worm writer infects computer systems.
D)A hacker breaks into a system to steal for financial gain.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 123 في هذه المجموعة.
فتح الحزمة
k this deck
43
A ________ is a person or organization that seeks to obtain data or other assets illegally, without the owner's permission and often without the owner's knowledge.

A)target
B)vulnerability
C)threat
D)warning
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 123 في هذه المجموعة.
فتح الحزمة
k this deck
44
A ________ pretends to be a legitimate company and sends an email requesting confidential data, such as account numbers, Social Security numbers, account passwords, and so forth.

A)hacker
B)phisher
C)safeguard
D)sniffer
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 123 في هذه المجموعة.
فتح الحزمة
k this deck
45
When referring to security threats, pretexting, sniffing, spoofing, and phishing are all examples of ________.

A)unauthorized data disclosure
B)incorrect data modification
C)faulty services
D)loss of infrastructure
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 123 في هذه المجموعة.
فتح الحزمة
k this deck
46
________ occurs when someone deceives by pretending to be someone else.

A)Hacking
B)Baiting
C)Sniffing
D)Pretexting
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 123 في هذه المجموعة.
فتح الحزمة
k this deck
47
Companies should require vendors and partners to perform appropriate screening and security training.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 123 في هذه المجموعة.
فتح الحزمة
k this deck
48
Which of the following is an example of a sniffing technique?

A)IP spoofing
B)caches
C)ad blockers
D)adware
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 123 في هذه المجموعة.
فتح الحزمة
k this deck
49
The existence of accounts that are no longer in use are not a security threat to an organization.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 123 في هذه المجموعة.
فتح الحزمة
k this deck
50
________ take computers with wireless connections through an area and search for unprotected wireless networks and then monitor and intercept wireless traffic at will.

A)Drive-by spoofers
B)Pretexters
C)Drive-by sniffers
D)Phishers
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 123 في هذه المجموعة.
فتح الحزمة
k this deck
51
If a backup of the database contents is made, the database is protected.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 123 في هذه المجموعة.
فتح الحزمة
k this deck
52
Which of the following is considered a computer crime?

A)internal software bug deleting customer records
B)poorly written programs resulting in data losses
C)loss of data as a result of flooding
D)hacking of information systems
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 123 في هذه المجموعة.
فتح الحزمة
k this deck
53
If the incident-response plan is not well prepared, there is substantial risk that the actions of well-meaning people will make the problem worse.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 123 في هذه المجموعة.
فتح الحزمة
k this deck
54
Email spoofing is a synonym for ________.

A)hacking
B)phishing
C)usurping
D)sniffing
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 123 في هذه المجموعة.
فتح الحزمة
k this deck
55
Business requirements do not necessitate opening information systems to nonemployee personnel-temporary personnel, vendors or partner personnel.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 123 في هذه المجموعة.
فتح الحزمة
k this deck
56
It is easy and economical to hold public users of Web sites accountable for security violations.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 123 في هذه المجموعة.
فتح الحزمة
k this deck
57
Employee termination is a potential security threat for an organization.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 123 في هذه المجموعة.
فتح الحزمة
k this deck
58
Hardening a site means to take extraordinary measures to reduce a system's vulnerability.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 123 في هذه المجموعة.
فتح الحزمة
k this deck
59
Documenting position sensitivity enables security personnel to prioritize their activities in accordance with the possible risk and loss.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 123 في هذه المجموعة.
فتح الحزمة
k this deck
60
________ is a technique for intercepting computer communications, either through a physical connection to a network or without physical connection in the case of wireless networks.

A)Spoofing
B)Phishing
C)Sniffing
D)Pretexting
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 123 في هذه المجموعة.
فتح الحزمة
k this deck
61
Which of the following is a critical security function of senior management in an organization?

A)safeguarding computer hardware and software
B)developing IS security software
C)establishing the security policy and managing risk
D)managing security programs on a real-time basis
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 123 في هذه المجموعة.
فتح الحزمة
k this deck
62
Which of the following was passed to give individuals the right to access their own health data created by doctors and other healthcare providers?

A)Privacy Act of 1974
B)Sarbanes-Oxley Act
C)HIPAA of 1996
D)Gramm-Leach-Bliley Act
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 123 في هذه المجموعة.
فتح الحزمة
k this deck
63
Nonword passwords are vulnerable to a(n)________ attack, in which the password cracker tries every possible combination of characters.

A)denial-of-service
B)side channel
C)brute force
D)obfuscation
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 123 في هذه المجموعة.
فتح الحزمة
k this deck
64
________ present the largest risk for an organization's infrastructure loss.

A)Employees
B)Natural disasters
C)Hackers
D)Competitors
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 123 في هذه المجموعة.
فتح الحزمة
k this deck
65
Which of the following usually happens in a malicious denial-of-service attack?

A)A hacker monitors and intercepts wireless traffic at will.
B)A hacker floods a Web server with millions of bogus service requests.
C)A hacker uses another site's IP address to masquerade as that other site.
D)A phisher pretends to be a legitimate company and requests confidential data.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 123 في هذه المجموعة.
فتح الحزمة
k this deck
66
A(n)________ is a computer program that senses when another computer is attempting to scan the disk or otherwise access a computer.

A)IDS
B)botnet
C)antivirus
D)firewall
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 123 في هذه المجموعة.
فتح الحزمة
k this deck
67
Which of the following is most likely to be the result of hacking?

A)certain Web sites being blocked from viewing for security reasons
B)small amounts of spam in your inbox
C)an unexplained reduction in your account balance
D)pop-up ads appearing frequently
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 123 في هذه المجموعة.
فتح الحزمة
k this deck
68
________ are small files that your browser stores on your computer when you visit Web sites and enable you to access Web sites without having to sign in every time.

A)Cookies
B)Registers
C)Pop-ups
D)Public keys
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 123 في هذه المجموعة.
فتح الحزمة
k this deck
69
Which of the following is an example of a technical safeguard?

A)position definitions
B)firewalls
C)key escrow
D)locked down servers
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 123 في هذه المجموعة.
فتح الحزمة
k this deck
70
________ occurs through human error when employees do not follow proper procedures or when procedures have not been well designed.

A)Unauthorized data disclosure
B)Incorrect data modification
C)Denial of service
D)Loss of infrastructure
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 123 في هذه المجموعة.
فتح الحزمة
k this deck
71
________ occurs when computer criminals invade a computer system and replace legitimate programs with their own unauthorized ones that shut down legitimate applications and substitute their own processing to spy, steal and manipulate data, or other purposes.

A)Hacking
B)Spoofing
C)Phishing
D)Usurpation
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 123 في هذه المجموعة.
فتح الحزمة
k this deck
72
A ________ is a number used to encrypt the data.

A)key
B)WPA
C)pretext
D)WEP
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 123 في هذه المجموعة.
فتح الحزمة
k this deck
73
________ enable you to access Web sites without having to sign in every time.

A)Bookmarks
B)Pop-ups
C)Cookies
D)Public keys
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 123 في هذه المجموعة.
فتح الحزمة
k this deck
74
Users of smart cards are required to enter a ________ to be authenticated.

A)Social Security number
B)public key
C)personal identification number
D)private key
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 123 في هذه المجموعة.
فتح الحزمة
k this deck
75
A(n)________ has a microchip in it to hold data.

A)ATM card
B)smart card
C)cookie
D)escrow
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 123 في هذه المجموعة.
فتح الحزمة
k this deck
76
Which of the following is used for biometric authentication?

A)smart cards
B)facial features
C)passwords
D)personal identification numbers
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 123 في هذه المجموعة.
فتح الحزمة
k this deck
77
In asymmetric encryption, each site has a ________ for encoding messages.

A)wireless fidelity
B)private key
C)public key
D)pretext
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 123 في هذه المجموعة.
فتح الحزمة
k this deck
78
Which of the following statements is true of biometric identification?

A)It involves the use of a PIN for authentication.
B)It provides weak authentication.
C)It is a relatively inexpensive mode of authentication.
D)It often faces resistance from users for its invasive nature.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 123 في هذه المجموعة.
فتح الحزمة
k this deck
79
The Privacy Act of 1974 provides protection to individuals regarding ________.

A)records held by private companies
B)records held by the U.S.government
C)records held by banks and other financial institutions
D)records held by non-government agencies
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 123 في هذه المجموعة.
فتح الحزمة
k this deck
80
________ occurs when a person breaks into a network to steal data such as customer lists, product inventory data, employee data, and other proprietary and confidential data.

A)Pretexting
B)Phishing
C)Hacking
D)Spoofing
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 123 في هذه المجموعة.
فتح الحزمة
k this deck
locked card icon
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 123 في هذه المجموعة.