Deck 12: Information Security Management

ملء الشاشة (f)
exit full mode
سؤال
________ occurs when a person gains unauthorized access to a computer system.

A) Usurpation
B) Spoofing
C) Hacking
D) Phishing
استخدم زر المسافة أو
up arrow
down arrow
لقلب البطاقة.
سؤال
Which of the following is an example of a security threat resulting from malicious human activity?

A) an employee who misunderstands operating procedures
B) an employee who accidentally deletes customer records
C) an employee who inadvertently installs an old database on top of the current one
D) an employee who intentionally destroys data or other system components
سؤال
A(n)________ card has a microchip on it that is loaded with identifying data.

A) USB
B) biometric
C) smart
D) encryption
سؤال
Users of smart cards are required to enter a ________ to be authenticated.

A) PIN
B) password
C) biometric detail
D) key
سؤال
A problem in a customer billing system that occurs due to errors made during software installation is a case of ________ resulting from ________.

A) faulty service; human error
B) distributed denial of service; malicious activity
C) faulty service; malicious activity
D) distributed denial of service; human error
سؤال
A ________ pretends to be a legitimate company and sends emails requesting confidential data.

A) hacker
B) phisher
C) drive-by sniffer
D) sniffer
سؤال
________ is an example of a data safeguard against security threats.

A) Application design
B) Backup and recovery
C) Accountability
D) Procedure design
سؤال
Mark recently received an email from what appeared to be a legitimate company,asking him to update and verify his credit card details.Unknowingly,he obliged and later realized that the information had been misused.Mark is a victim of ________.

A) hacking
B) phishing
C) pretexting
D) sniffing
سؤال
________ use(s)personal physical characteristics such as fingerprints,facial features,and retinal scans to verify users.

A) Passwords
B) Smart cards
C) Biometric authentication
D) Personal identification numbers
سؤال
________ is a technique for intercepting computer communications.

A) Spoofing
B) Hacking
C) Pretexting
D) Sniffing
سؤال
A user name ________ a user.

A) authenticates
B) identifies
C) conceals
D) encrypts
سؤال
A person calls the Draper residence and pretends to represent a credit card company.He asks Mrs.Draper to confirm her credit card number.This is an example of ________.

A) hacking
B) phishing
C) pretexting
D) sniffing
سؤال
Some unauthorized programs are able to ________ legitimate systems and substitute their own processing.

A) usurp
B) spoof
C) hack
D) flood
سؤال
________ simply take computers with wireless connections through an area and search for unprotected wireless networks.

A) Drive-by sniffers
B) Spoofers
C) Hackers
D) Phishers
سؤال
________ occur when bogus services flood a Web server.

A) Spoofing attacks
B) Hacking attacks
C) Phishing attacks
D) DOS attacks
سؤال
Which of the following is a human safeguard against security threats?

A) backup
B) firewalls
C) physical security
D) procedure design
سؤال
Which of the following is a technical safeguard against security threats?

A) passwords
B) backup and recovery
C) compliance
D) identification and authorization
سؤال
A password ________ a user.

A) authenticates
B) identifies
C) conceals
D) encrypts
سؤال
Which of the following is a synonym for phishing?

A) drive-by sniffing
B) e-mail spoofing
C) IP spoofing
D) system hacking
سؤال
An employee carelessly releases proprietary data to the media.This is a case of ________ resulting from ________.

A) loss of infrastructure; human error
B) unauthorized data disclosure; human error
C) loss of infrastructure; malicious activity
D) unauthorized data disclosure; malicious activity
سؤال
Enforcement of security procedures and policies consists of three interdependent factors: ________.

A) centralized reporting, preparation, and practice
B) account administration, systems procedures, and security monitoring
C) separation of duties, least privilege, and position sensitivity
D) responsibility, accountability, and compliance
سؤال
________ firewalls can prohibit outsiders from starting a session with any user behind the firewall.

A) Perimeter
B) Internal
C) Packet-filtering
D) Malware
سؤال
Organizations should protect sensitive data by storing it in ________ form.

A) digital
B) standardized
C) encrypted
D) authenticated
سؤال
________ is the process of transforming clear text into coded,unintelligible text for secure storage or communication.

A) Usurpation
B) Authentication
C) Standardization
D) Encryption
سؤال
Which of the following is an example of a data safeguard?

A) application design
B) dissemination of information
C) physical security
D) malware protection
سؤال
What is the similarity between adware and spyware?

A) Both masquerade as useful programs.
B) Both are specifically programmed to spread.
C) Both are installed without user's permission.
D) Both are used to steal data.
سؤال
________ are remote processing centers run by commercial disaster-recovery services.

A) Cold sites
B) Web browsers
C) Hot sites
D) Backup centres
سؤال
Which of the following is true regarding an incident-response plan?

A) The plan should provide decentralized reporting of all security incidents.
B) The plan should require minimal training on the part of employees.
C) The plan should identify critical personnel and their off-hours contact information.
D) The plan should be simple enough to ensure a fast response with limited practice.
سؤال
In terms of password management,when an account is created,users should ________.

A) create two passwords and switch back and forth between those two
B) immediately change the password they are given to a password of their own
C) maintain the same password they are given for all future authentication purposes
D) ensure that they do not change their passwords frequently, thereby reducing the risk of password loss
سؤال
Every organization should have a(n)________ as part of the security program,which should include how employees are to react to security problems,whom they should contact,the reports they should make,and steps they can take to reduce further loss.

A) key escrow
B) smart card
C) human safeguard plan
D) incident-response plan
سؤال
Which of the following steps of the Secure Socket Layer is NOT true?

A) The computer obtains the public key of the website to which it will connect.
B) The computer generates a key for symmetric encryption.
C) The computer encodes that key using the Web site's public key.
D) The Web site decodes the symmetric key using its public key.
سؤال
The broadest definition of ________ includes viruses,worms,Trojan horses,spyware,and adware.

A) malware
B) metadata
C) software
D) widgets
سؤال
The program code that causes unwanted activity is called the ________.

A) key escrow
B) metadata
C) widget
D) payload
سؤال
Which of the following are malware masquerading as useful programs?

A) macro viruses
B) trojan horses
C) worms
D) payloads
سؤال
Typically,a help-desk information system has answers to questions that only a true user would know,such as the user's birthplace,mother's maiden name,or last four digits of an important account number.This information ________.

A) allows help-desk representatives to create new passwords for users
B) reduces the strength of the security system
C) protects the anonymity of a user
D) helps authenticate a user
سؤال
Which of the following statements is true regarding position sensitivity?

A) It is a type of data safeguard.
B) It enables security personnel to prioritize their activities in accordance with the possible risk and loss.
C) It is documented only for high-sensitivity positions.
D) It applies to new employees only.
سؤال
Because encryption keys can get lost or destroyed,a copy of the key should be stored with a trusted third party.This safety procedure is sometimes called ________.

A) key escrow
B) white hat
C) key encryption
D) biometric authentication
سؤال
Activity log analysis is an important ________ function.

A) account administration
B) security monitoring
C) backup
D) data administration
سؤال
________ are the patterns that exist in malware code and should be downloaded and updated frequently.

A) Data safeguards
B) Patches
C) Antivirus scans
D) Malware definitions
سؤال
A(n)________ sits outside the organizational network and is the first device that Internet traffic encounters.

A) internal firewall
B) perimeter firewall
C) packet-filtering firewall
D) malware firewall
سؤال
Smart cards are convenient and easy to use since they don't require a PIN number for authentication.
سؤال
Sniffing is usually initiated via email.
سؤال
Once a backup of database contents is made,it is safe to assume that the database is protected.
سؤال
Most spyware is benign in that it does not perform malicious acts or steal data.
سؤال
Malware protection is an example of a technical safeguard.
سؤال
Technical safeguards include passwords and encryption.
سؤال
Most secure communication over the Internet uses a protocol called HTTP.
سؤال
Packet-filtering firewalls examine each part of a message and determine whether to let that part pass.
سؤال
Pretexting occurs when someone deceives by pretending to be someone else.
سؤال
A criticism against biometric authentication is that it provides weak authentication.
سؤال
Perimeter firewalls are the simplest type of firewalls.
سؤال
Senior management has two critical security functions: overall policy and risk management.
سؤال
Denial-of-service attacks are caused by human error,not malicious intent.
سؤال
Creating backup copies of database contents is a technical safeguard.
سؤال
System errors are not caused by human error.
سؤال
The existence of spyware is generally unknown to the user.
سؤال
Internal firewalls sit outside the organizational network.
سؤال
Viruses,worms,and Trojan horses are types of firewalls.
سؤال
Technical safeguards involve just the software components of an information system.
سؤال
Incorrectly increasing a customer's discount is an example of incorrect data modification.
سؤال
Differentiate between symmetric and asymmetric encryption.
سؤال
In the context of human safeguards against security threats,the security sensitivity for each position should be documented.
سؤال
What is the difference between adware and spyware?
سؤال
How is a Trojan horse different from a worm?
سؤال
Explain denial of service (DOS)in information management.
سؤال
Every organization must have an incident-response plan that allows for decentralized reporting of all security incidents.
سؤال
What are firewalls? What types of firewalls are commonly used?
سؤال
What are the three interdependent factors involved in the enforcement of security policies and procedures?
سؤال
Explain how defining positions in an organization can safeguard against security threats.
سؤال
Following a disaster,hot sites provide office space,but customers themselves must provide and install the equipment needed to continue operations.
سؤال
What should an organization do when a security breach occurs in its information systems?
سؤال
Explain account management.
سؤال
Discuss in brief the pros and cons of biometric authentication.
سؤال
Backup procedures for system users include backing up Web site resources,databases,administrative data,account and password data,and other data.
سؤال
Distinguish between phishing,spoofing,and sniffing.
سؤال
What is the difference between a hot site and a cold site?
سؤال
Describe an incident-response plan.
سؤال
How can data safeguards protect against security threats?
سؤال
The existence of accounts that are no longer necessary do not pose a serious security threat.
سؤال
List some important malware safeguards.
فتح الحزمة
قم بالتسجيل لفتح البطاقات في هذه المجموعة!
Unlock Deck
Unlock Deck
1/80
auto play flashcards
العب
simple tutorial
ملء الشاشة (f)
exit full mode
Deck 12: Information Security Management
1
________ occurs when a person gains unauthorized access to a computer system.

A) Usurpation
B) Spoofing
C) Hacking
D) Phishing
C
2
Which of the following is an example of a security threat resulting from malicious human activity?

A) an employee who misunderstands operating procedures
B) an employee who accidentally deletes customer records
C) an employee who inadvertently installs an old database on top of the current one
D) an employee who intentionally destroys data or other system components
D
3
A(n)________ card has a microchip on it that is loaded with identifying data.

A) USB
B) biometric
C) smart
D) encryption
C
4
Users of smart cards are required to enter a ________ to be authenticated.

A) PIN
B) password
C) biometric detail
D) key
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
5
A problem in a customer billing system that occurs due to errors made during software installation is a case of ________ resulting from ________.

A) faulty service; human error
B) distributed denial of service; malicious activity
C) faulty service; malicious activity
D) distributed denial of service; human error
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
6
A ________ pretends to be a legitimate company and sends emails requesting confidential data.

A) hacker
B) phisher
C) drive-by sniffer
D) sniffer
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
7
________ is an example of a data safeguard against security threats.

A) Application design
B) Backup and recovery
C) Accountability
D) Procedure design
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
8
Mark recently received an email from what appeared to be a legitimate company,asking him to update and verify his credit card details.Unknowingly,he obliged and later realized that the information had been misused.Mark is a victim of ________.

A) hacking
B) phishing
C) pretexting
D) sniffing
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
9
________ use(s)personal physical characteristics such as fingerprints,facial features,and retinal scans to verify users.

A) Passwords
B) Smart cards
C) Biometric authentication
D) Personal identification numbers
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
10
________ is a technique for intercepting computer communications.

A) Spoofing
B) Hacking
C) Pretexting
D) Sniffing
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
11
A user name ________ a user.

A) authenticates
B) identifies
C) conceals
D) encrypts
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
12
A person calls the Draper residence and pretends to represent a credit card company.He asks Mrs.Draper to confirm her credit card number.This is an example of ________.

A) hacking
B) phishing
C) pretexting
D) sniffing
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
13
Some unauthorized programs are able to ________ legitimate systems and substitute their own processing.

A) usurp
B) spoof
C) hack
D) flood
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
14
________ simply take computers with wireless connections through an area and search for unprotected wireless networks.

A) Drive-by sniffers
B) Spoofers
C) Hackers
D) Phishers
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
15
________ occur when bogus services flood a Web server.

A) Spoofing attacks
B) Hacking attacks
C) Phishing attacks
D) DOS attacks
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
16
Which of the following is a human safeguard against security threats?

A) backup
B) firewalls
C) physical security
D) procedure design
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
17
Which of the following is a technical safeguard against security threats?

A) passwords
B) backup and recovery
C) compliance
D) identification and authorization
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
18
A password ________ a user.

A) authenticates
B) identifies
C) conceals
D) encrypts
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
19
Which of the following is a synonym for phishing?

A) drive-by sniffing
B) e-mail spoofing
C) IP spoofing
D) system hacking
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
20
An employee carelessly releases proprietary data to the media.This is a case of ________ resulting from ________.

A) loss of infrastructure; human error
B) unauthorized data disclosure; human error
C) loss of infrastructure; malicious activity
D) unauthorized data disclosure; malicious activity
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
21
Enforcement of security procedures and policies consists of three interdependent factors: ________.

A) centralized reporting, preparation, and practice
B) account administration, systems procedures, and security monitoring
C) separation of duties, least privilege, and position sensitivity
D) responsibility, accountability, and compliance
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
22
________ firewalls can prohibit outsiders from starting a session with any user behind the firewall.

A) Perimeter
B) Internal
C) Packet-filtering
D) Malware
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
23
Organizations should protect sensitive data by storing it in ________ form.

A) digital
B) standardized
C) encrypted
D) authenticated
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
24
________ is the process of transforming clear text into coded,unintelligible text for secure storage or communication.

A) Usurpation
B) Authentication
C) Standardization
D) Encryption
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
25
Which of the following is an example of a data safeguard?

A) application design
B) dissemination of information
C) physical security
D) malware protection
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
26
What is the similarity between adware and spyware?

A) Both masquerade as useful programs.
B) Both are specifically programmed to spread.
C) Both are installed without user's permission.
D) Both are used to steal data.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
27
________ are remote processing centers run by commercial disaster-recovery services.

A) Cold sites
B) Web browsers
C) Hot sites
D) Backup centres
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
28
Which of the following is true regarding an incident-response plan?

A) The plan should provide decentralized reporting of all security incidents.
B) The plan should require minimal training on the part of employees.
C) The plan should identify critical personnel and their off-hours contact information.
D) The plan should be simple enough to ensure a fast response with limited practice.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
29
In terms of password management,when an account is created,users should ________.

A) create two passwords and switch back and forth between those two
B) immediately change the password they are given to a password of their own
C) maintain the same password they are given for all future authentication purposes
D) ensure that they do not change their passwords frequently, thereby reducing the risk of password loss
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
30
Every organization should have a(n)________ as part of the security program,which should include how employees are to react to security problems,whom they should contact,the reports they should make,and steps they can take to reduce further loss.

A) key escrow
B) smart card
C) human safeguard plan
D) incident-response plan
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
31
Which of the following steps of the Secure Socket Layer is NOT true?

A) The computer obtains the public key of the website to which it will connect.
B) The computer generates a key for symmetric encryption.
C) The computer encodes that key using the Web site's public key.
D) The Web site decodes the symmetric key using its public key.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
32
The broadest definition of ________ includes viruses,worms,Trojan horses,spyware,and adware.

A) malware
B) metadata
C) software
D) widgets
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
33
The program code that causes unwanted activity is called the ________.

A) key escrow
B) metadata
C) widget
D) payload
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
34
Which of the following are malware masquerading as useful programs?

A) macro viruses
B) trojan horses
C) worms
D) payloads
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
35
Typically,a help-desk information system has answers to questions that only a true user would know,such as the user's birthplace,mother's maiden name,or last four digits of an important account number.This information ________.

A) allows help-desk representatives to create new passwords for users
B) reduces the strength of the security system
C) protects the anonymity of a user
D) helps authenticate a user
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
36
Which of the following statements is true regarding position sensitivity?

A) It is a type of data safeguard.
B) It enables security personnel to prioritize their activities in accordance with the possible risk and loss.
C) It is documented only for high-sensitivity positions.
D) It applies to new employees only.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
37
Because encryption keys can get lost or destroyed,a copy of the key should be stored with a trusted third party.This safety procedure is sometimes called ________.

A) key escrow
B) white hat
C) key encryption
D) biometric authentication
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
38
Activity log analysis is an important ________ function.

A) account administration
B) security monitoring
C) backup
D) data administration
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
39
________ are the patterns that exist in malware code and should be downloaded and updated frequently.

A) Data safeguards
B) Patches
C) Antivirus scans
D) Malware definitions
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
40
A(n)________ sits outside the organizational network and is the first device that Internet traffic encounters.

A) internal firewall
B) perimeter firewall
C) packet-filtering firewall
D) malware firewall
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
41
Smart cards are convenient and easy to use since they don't require a PIN number for authentication.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
42
Sniffing is usually initiated via email.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
43
Once a backup of database contents is made,it is safe to assume that the database is protected.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
44
Most spyware is benign in that it does not perform malicious acts or steal data.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
45
Malware protection is an example of a technical safeguard.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
46
Technical safeguards include passwords and encryption.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
47
Most secure communication over the Internet uses a protocol called HTTP.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
48
Packet-filtering firewalls examine each part of a message and determine whether to let that part pass.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
49
Pretexting occurs when someone deceives by pretending to be someone else.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
50
A criticism against biometric authentication is that it provides weak authentication.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
51
Perimeter firewalls are the simplest type of firewalls.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
52
Senior management has two critical security functions: overall policy and risk management.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
53
Denial-of-service attacks are caused by human error,not malicious intent.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
54
Creating backup copies of database contents is a technical safeguard.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
55
System errors are not caused by human error.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
56
The existence of spyware is generally unknown to the user.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
57
Internal firewalls sit outside the organizational network.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
58
Viruses,worms,and Trojan horses are types of firewalls.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
59
Technical safeguards involve just the software components of an information system.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
60
Incorrectly increasing a customer's discount is an example of incorrect data modification.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
61
Differentiate between symmetric and asymmetric encryption.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
62
In the context of human safeguards against security threats,the security sensitivity for each position should be documented.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
63
What is the difference between adware and spyware?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
64
How is a Trojan horse different from a worm?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
65
Explain denial of service (DOS)in information management.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
66
Every organization must have an incident-response plan that allows for decentralized reporting of all security incidents.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
67
What are firewalls? What types of firewalls are commonly used?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
68
What are the three interdependent factors involved in the enforcement of security policies and procedures?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
69
Explain how defining positions in an organization can safeguard against security threats.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
70
Following a disaster,hot sites provide office space,but customers themselves must provide and install the equipment needed to continue operations.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
71
What should an organization do when a security breach occurs in its information systems?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
72
Explain account management.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
73
Discuss in brief the pros and cons of biometric authentication.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
74
Backup procedures for system users include backing up Web site resources,databases,administrative data,account and password data,and other data.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
75
Distinguish between phishing,spoofing,and sniffing.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
76
What is the difference between a hot site and a cold site?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
77
Describe an incident-response plan.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
78
How can data safeguards protect against security threats?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
79
The existence of accounts that are no longer necessary do not pose a serious security threat.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
80
List some important malware safeguards.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
locked card icon
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.