Deck 6: Information, Communications, and Computer Security

ملء الشاشة (f)
exit full mode
سؤال
According to the United States ________, critical information includes all forms and types of financial, business, scientific, economic, or engineering information.

A) Economic Security Directive 298
B) Economic Security National Statute
C) Economic Security Act of 1986
D) Economic Security Act of 1996
E) All of the above.
استخدم زر المسافة أو
up arrow
down arrow
لقلب البطاقة.
سؤال
________ property is defined as virtually any information belonging to an individual or organization.

A) Real
B) Proprietary
C) Intellectual
D) Private
E) All of the above.
سؤال
________ property is defined as information created through research and development.

A) Real
B) Proprietary
C) Intellectual
D) Private
E) All of the above.
سؤال
Threats to critical information include:

A) Environmental and natural disasters.
B) Fire and accidents.
C) Unintentional human actions.
D) Intentional human actions.
E) All of the above.
سؤال
The purpose of ________ is to protect information assets and systems against any internal or external threat that might endanger them.

A) INTERTEL
B) INFOTEL
C) COMSEC
D) INFOSEC
E) COMSAC
سؤال
In the United States government's hierarchical information security structure, the ________ classification is assigned to information which, if disclosed, could be prejudicial to the interests of the United States.

A) Top secret
B) Secret
C) Confidential
D) Unclassified but sensitive
E) Caveats
سؤال
________ involves information risk assessment and intelligence activities in a process whereby operations are analyzed to identify vulnerabilities.

A) OPSEC
B) COMPSEC
C) INFOTEL
D) INTELSEC
E) OPSEEK
سؤال
The ________ involves collaboration among several organizations and provides operations security training to agencies and businesses.

A) National Operations Security Initiative
B) National Infrastructure Network
C) Interagency OPSEC Services Administration
D) Interagency OPSEC Support Staff
E) Interagency OPSEC Services Group
سؤال
According to the protocol for classification of business information, ________ is assigned to the business equivalent of top secret information.

A) Company confidential, special control
B) Company confidential
C) Private confidential
D) Internal use only
E) Restricted
سؤال
________ information policies remind staff of special agreements created to maintain confidentiality and rights to privacy.

A) Minimum protection
B) Authorization
C) Special audit assignment
D) Legal protection
E) All of the above.
سؤال
________ should be utilized to secure computer systems and data.

A) Passwords
B) Firewalls
C) Physical security
D) Administrative controls
E) All of the above.
سؤال
________ agreements are used to prevent release of information by those who inadvertently come into contact with classified or critical data.

A) Non-disclosure
B) Secrecy
C) Non-compete
D) Classification
E) All of the above.
سؤال
________ includes all efforts to protect information transmitted by voice, wire, satellite, and other systems from unauthorized interception.

A) OPSEC
B) COMSEC
C) INFOTEL
D) INTELSEC
E) OPSEEK
سؤال
Communications ________ security involves prevention of adverse surveillance by devices such as microphones.

A) Line
B) Transmission
C) Cryptographic
D) Emanations
E) Technical
سؤال
_______ security involves the use of non-exclusive codes and ciphers to transform transmitted data to render it unintelligible.

A) Line
B) Transmission
C) Cryptographic
D) Emanations
E) Technical
سؤال
Security for computer systems must include strategies to protect:

A) Computer equipment.
B) Computer software.
C) Information contained in a computer database.
D) Computer databases.
E) All of the above.
سؤال
Computer security strategies in the form of ________ can be implemented to maintain accountability for those who have legitimate access to a computer system or database.

A) Logical controls
B) Administrative controls
C) Data encryption
D) Firewalls
E) All of the above.
سؤال
The ________ is an FBI-maintained computer security resource available to security professionals and computer systems administrators.

A) CERT
B) SCANS
C) SWAT
D) NIPC
E) All of the above.
سؤال
At the United States government level, enforcement of laws relative to the theft of trade secrets or harassment on the Internet falls under the jurisdiction of the:

A) U.S. Secret Service
B) ATF
C) FBI
D) U. S. Customs Service
E) All of the above.
سؤال
The ________ regulates private industry's access to classified government information.

A) National Industrial Security Program
B) OPSEC Support Staff
C) Fair Credit Reporting Agency
D) COMSEC Working Group
E) All of the above.
سؤال
________ pose(s) security risks and challenges for individuals as well as organizations.

A) Social networking media
B) Facebook use
C) Cyberstalking
D) Smart phones
E) All of the above are correct.
سؤال
Digitized information is not distance- or time-dependent.
سؤال
According to some experts, theft of money and securities of government represent the greatest threat to governments and businesses today.
سؤال
Information's worth can only be determined by calculating the political and financial impact of its loss.
سؤال
With discretionary information access control, access is allowed on a need-to-know basis.
سؤال
Mandatory access control strategies trace their origins to restrictive legislation.
سؤال
INFOSEC views operations from an adversary's perspective in an effort to seek out an organization's vulnerabilities and protect its critical information.
سؤال
Unlike business information, all government information must be released upon request.
سؤال
Converting plain text to crypto text is referred to as decryption.
سؤال
Acoustical emanations are produced through the interplay of electrical and mechanical parts contained in communications equipment.
سؤال
Cryptographic security should not be viewed as a substitute for physical, personnel, and information security.
سؤال
Interception of emanations can be prevented if computer rooms are constructed with acoustical materials and non-radiating electronic equipment is used.
سؤال
Computer crime is generally defined as any crime committed with computer technology.
سؤال
Anti-virus software is used to screen electronic traffic before allowing access to computer networks.
سؤال
According to John Carroll's "simple security principle"
for safeguarding sensitive computer information, no person should view information that has a classification that exceeds the viewer's security clearance.
سؤال
Phishing is not a form of identity theft.
سؤال
What is the purpose of information security (INFOSEC)?
سؤال
Define and contrast critical information, proprietary information, and intellectual property.
فتح الحزمة
قم بالتسجيل لفتح البطاقات في هذه المجموعة!
Unlock Deck
Unlock Deck
1/38
auto play flashcards
العب
simple tutorial
ملء الشاشة (f)
exit full mode
Deck 6: Information, Communications, and Computer Security
1
According to the United States ________, critical information includes all forms and types of financial, business, scientific, economic, or engineering information.

A) Economic Security Directive 298
B) Economic Security National Statute
C) Economic Security Act of 1986
D) Economic Security Act of 1996
E) All of the above.
Economic Security Act of 1996
2
________ property is defined as virtually any information belonging to an individual or organization.

A) Real
B) Proprietary
C) Intellectual
D) Private
E) All of the above.
Proprietary
3
________ property is defined as information created through research and development.

A) Real
B) Proprietary
C) Intellectual
D) Private
E) All of the above.
Intellectual
4
Threats to critical information include:

A) Environmental and natural disasters.
B) Fire and accidents.
C) Unintentional human actions.
D) Intentional human actions.
E) All of the above.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 38 في هذه المجموعة.
فتح الحزمة
k this deck
5
The purpose of ________ is to protect information assets and systems against any internal or external threat that might endanger them.

A) INTERTEL
B) INFOTEL
C) COMSEC
D) INFOSEC
E) COMSAC
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 38 في هذه المجموعة.
فتح الحزمة
k this deck
6
In the United States government's hierarchical information security structure, the ________ classification is assigned to information which, if disclosed, could be prejudicial to the interests of the United States.

A) Top secret
B) Secret
C) Confidential
D) Unclassified but sensitive
E) Caveats
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 38 في هذه المجموعة.
فتح الحزمة
k this deck
7
________ involves information risk assessment and intelligence activities in a process whereby operations are analyzed to identify vulnerabilities.

A) OPSEC
B) COMPSEC
C) INFOTEL
D) INTELSEC
E) OPSEEK
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 38 في هذه المجموعة.
فتح الحزمة
k this deck
8
The ________ involves collaboration among several organizations and provides operations security training to agencies and businesses.

A) National Operations Security Initiative
B) National Infrastructure Network
C) Interagency OPSEC Services Administration
D) Interagency OPSEC Support Staff
E) Interagency OPSEC Services Group
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 38 في هذه المجموعة.
فتح الحزمة
k this deck
9
According to the protocol for classification of business information, ________ is assigned to the business equivalent of top secret information.

A) Company confidential, special control
B) Company confidential
C) Private confidential
D) Internal use only
E) Restricted
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 38 في هذه المجموعة.
فتح الحزمة
k this deck
10
________ information policies remind staff of special agreements created to maintain confidentiality and rights to privacy.

A) Minimum protection
B) Authorization
C) Special audit assignment
D) Legal protection
E) All of the above.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 38 في هذه المجموعة.
فتح الحزمة
k this deck
11
________ should be utilized to secure computer systems and data.

A) Passwords
B) Firewalls
C) Physical security
D) Administrative controls
E) All of the above.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 38 في هذه المجموعة.
فتح الحزمة
k this deck
12
________ agreements are used to prevent release of information by those who inadvertently come into contact with classified or critical data.

A) Non-disclosure
B) Secrecy
C) Non-compete
D) Classification
E) All of the above.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 38 في هذه المجموعة.
فتح الحزمة
k this deck
13
________ includes all efforts to protect information transmitted by voice, wire, satellite, and other systems from unauthorized interception.

A) OPSEC
B) COMSEC
C) INFOTEL
D) INTELSEC
E) OPSEEK
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 38 في هذه المجموعة.
فتح الحزمة
k this deck
14
Communications ________ security involves prevention of adverse surveillance by devices such as microphones.

A) Line
B) Transmission
C) Cryptographic
D) Emanations
E) Technical
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 38 في هذه المجموعة.
فتح الحزمة
k this deck
15
_______ security involves the use of non-exclusive codes and ciphers to transform transmitted data to render it unintelligible.

A) Line
B) Transmission
C) Cryptographic
D) Emanations
E) Technical
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 38 في هذه المجموعة.
فتح الحزمة
k this deck
16
Security for computer systems must include strategies to protect:

A) Computer equipment.
B) Computer software.
C) Information contained in a computer database.
D) Computer databases.
E) All of the above.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 38 في هذه المجموعة.
فتح الحزمة
k this deck
17
Computer security strategies in the form of ________ can be implemented to maintain accountability for those who have legitimate access to a computer system or database.

A) Logical controls
B) Administrative controls
C) Data encryption
D) Firewalls
E) All of the above.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 38 في هذه المجموعة.
فتح الحزمة
k this deck
18
The ________ is an FBI-maintained computer security resource available to security professionals and computer systems administrators.

A) CERT
B) SCANS
C) SWAT
D) NIPC
E) All of the above.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 38 في هذه المجموعة.
فتح الحزمة
k this deck
19
At the United States government level, enforcement of laws relative to the theft of trade secrets or harassment on the Internet falls under the jurisdiction of the:

A) U.S. Secret Service
B) ATF
C) FBI
D) U. S. Customs Service
E) All of the above.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 38 في هذه المجموعة.
فتح الحزمة
k this deck
20
The ________ regulates private industry's access to classified government information.

A) National Industrial Security Program
B) OPSEC Support Staff
C) Fair Credit Reporting Agency
D) COMSEC Working Group
E) All of the above.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 38 في هذه المجموعة.
فتح الحزمة
k this deck
21
________ pose(s) security risks and challenges for individuals as well as organizations.

A) Social networking media
B) Facebook use
C) Cyberstalking
D) Smart phones
E) All of the above are correct.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 38 في هذه المجموعة.
فتح الحزمة
k this deck
22
Digitized information is not distance- or time-dependent.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 38 في هذه المجموعة.
فتح الحزمة
k this deck
23
According to some experts, theft of money and securities of government represent the greatest threat to governments and businesses today.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 38 في هذه المجموعة.
فتح الحزمة
k this deck
24
Information's worth can only be determined by calculating the political and financial impact of its loss.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 38 في هذه المجموعة.
فتح الحزمة
k this deck
25
With discretionary information access control, access is allowed on a need-to-know basis.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 38 في هذه المجموعة.
فتح الحزمة
k this deck
26
Mandatory access control strategies trace their origins to restrictive legislation.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 38 في هذه المجموعة.
فتح الحزمة
k this deck
27
INFOSEC views operations from an adversary's perspective in an effort to seek out an organization's vulnerabilities and protect its critical information.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 38 في هذه المجموعة.
فتح الحزمة
k this deck
28
Unlike business information, all government information must be released upon request.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 38 في هذه المجموعة.
فتح الحزمة
k this deck
29
Converting plain text to crypto text is referred to as decryption.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 38 في هذه المجموعة.
فتح الحزمة
k this deck
30
Acoustical emanations are produced through the interplay of electrical and mechanical parts contained in communications equipment.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 38 في هذه المجموعة.
فتح الحزمة
k this deck
31
Cryptographic security should not be viewed as a substitute for physical, personnel, and information security.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 38 في هذه المجموعة.
فتح الحزمة
k this deck
32
Interception of emanations can be prevented if computer rooms are constructed with acoustical materials and non-radiating electronic equipment is used.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 38 في هذه المجموعة.
فتح الحزمة
k this deck
33
Computer crime is generally defined as any crime committed with computer technology.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 38 في هذه المجموعة.
فتح الحزمة
k this deck
34
Anti-virus software is used to screen electronic traffic before allowing access to computer networks.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 38 في هذه المجموعة.
فتح الحزمة
k this deck
35
According to John Carroll's "simple security principle"
for safeguarding sensitive computer information, no person should view information that has a classification that exceeds the viewer's security clearance.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 38 في هذه المجموعة.
فتح الحزمة
k this deck
36
Phishing is not a form of identity theft.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 38 في هذه المجموعة.
فتح الحزمة
k this deck
37
What is the purpose of information security (INFOSEC)?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 38 في هذه المجموعة.
فتح الحزمة
k this deck
38
Define and contrast critical information, proprietary information, and intellectual property.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 38 في هذه المجموعة.
فتح الحزمة
k this deck
locked card icon
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 38 في هذه المجموعة.