Deck 12: Managing Information Security and Privacy

ملء الشاشة (f)
exit full mode
سؤال
When a hacker floods a web server with millions of bogus service requests so that it cannot service legitimate requests,this is called a denial of service attack.
استخدم زر المسافة أو
up arrow
down arrow
لقلب البطاقة.
سؤال
Despite warnings,users have a tendency to write their passwords on sticky notes next to the computer.
سؤال
Denial of service always occurs because of malicious attacks on the system.
سؤال
Smart cards are convenient and easy to use since they don't require any PIN numbers for authentication.
سؤال
Drive-by sniffers take computers with wireless connections through an area and search for unprotected wireless networks.
سؤال
Malware protection is an example of a technical safeguard.
سؤال
Phishing is when someone sends an e-mail pretending to be a legitimate company and asking for confidential data,such as account numbers.
سؤال
Care must be taken when terminating employees because they may take harmful and malicious actions.
سؤال
Malware is used in denial of service attacks.
سؤال
Biometric authentication has been around for some time,and because of weaknesses is not likely to see much usage in the future.
سؤال
Spoofing is a technique for intercepting computer communications.
سؤال
Data safeguards are designed to protect computer networks.
سؤال
A retinal scan would be considered a biometric authentication technique.
سؤال
Technical safeguards involve the hardware and software components of an information system.
سؤال
People who intentionally gain unauthorized access to computer systems are called hackers.
سؤال
Any action,device,procedure,technique,or other measure that reduces a system's vulnerability to a threat is a safeguard.
سؤال
To protect against lost or sabotaged encryption keys,a trusted party should keep a copy of the key.
سؤال
Even if a potential new hire will not have access to sensitive data and systems,they should be extensively screened for security purposes.
سؤال
Encryption is one of several technical safeguards.
سؤال
Most anti-malware programs check e-mail attachments for malware code.
سؤال
Organizations should protect sensitive data by storing it in ________ form.

A) compressed
B) secure
C) digital
D) encrypted
E) standardized
سؤال
Bloggers have not yet had much of an impact on the main stream media.
سؤال
Users should scan their computers with anti-malware programs at least

A) once a year.
B) biannually.
C) once a week.
D) daily.
E) once a month.
سؤال
Backup and recovery,passwords,and encryption are human safeguards.
سؤال
Following a disaster,hot sites provide office space,but customers themselves must come and provide and install the equipment needed to continue operations.
سؤال
Be sure and purchase your antispyware program from a(n)________ vendor,because some free programs in the past were actually malware programs in disguise.

A) reasonable
B) reputable
C) entrepreneurial
D) inexpensive
E) illegitimate
سؤال
About ninety percent of all viruses are spread via

A) spreadsheets.
B) AOL.
C) technology.
D) network worms.
E) email.
سؤال
It is possible for some malware to install itself on your computer by you doing nothing more than opening a(n)

A) web page.
B) file.
C) e-mail
D) computer.
E) account.
سؤال
Because encryption keys can be lost or destroyed,a copy of the key should be stored with a trusted third party called a(n)

A) key account.
B) white-hat hacker.
C) key escrow.
D) authentication certifier.
E) control account.
سؤال
________ safeguards involve the people and procedure components of information systems.

A) Human
B) Data
C) Technical
D) Malware
E) Firewall
سؤال
Organizations should store at least some of the _______________ of the database contents off the premises,possibly in a remote location.

A) backups
B) company information
C) malware definitions
D) smaller parts
سؤال
________,which are the patterns that exist in malware code,should be downloaded and updated frequently.

A) Software updates
B) Service packs
C) Malware patterns
D) Network patches
E) Malware definitions
سؤال
Hardened web sites use special versions of the operating systems and functions that are not required by the application.
سؤال
Viruses and worms don't spread very quickly so it is not essential to move cautiously when one is discovered by someone in your organization.
سؤال
The purpose of a(n)________ is to protect databases and other organizational data.

A) data warehouse
B) data security group
C) operations group
D) data safeguard
E) steering committee
سؤال
The best safeguard against a natural disaster is to have a safe location.
سؤال
Help desks have not been the source of many security problems in the past.
سؤال
Since most organizations are protected by a(n)________,it is not surprising that most viruses spread via e-mail.

A) data dictionary
B) antivirus program
C) biometric authentication device
D) firewall
E) white-hat hacker
سؤال
________ to (for)the physical computers that run the DBMS and all devices that store database data should be carefully controlled.

A) References
B) Access
C) Design plans
D) Connections
E) Documentation
سؤال
If you ever receive notification that your password has been reset when you did not request a reset,immediately contact your IS department.
سؤال
A(n)________ card has a microchip on it that is loaded with identifying data.

A) smart
B) debit
C) credit
D) ATM
E) identity
سؤال
________ considerations should be part of the hiring process.

A) Weight
B) Position
C) Gender
D) Age
E) Security
سؤال
A ________ is a remote processing centre run by a commercial disaster-recovery service that provides all the equipment needed to continue operations after a disaster.

A) web farm
B) development site
C) cold site
D) hot site
E) server farm
سؤال
In order to prioritize their activities and protect an organization from possible risk and loss,security personnel must document the position ________ of all employees.

A) riskiness
B) data access
C) controls
D) level
E) sensitivity
سؤال
In order to intercept communications on ________ networks,drive-by sniffers simply drive or walk around with computers with wireless connections.

A) commercial
B) LAN
C) wireless
D) ISP
E) WAN
سؤال
________________ is one of the fastest-growing crimes in Canada because it is relatively easy to do.

A) phishing
B) Hacking
C) Spoofing
D) PIPEDA
E) Identity theft
سؤال
Because they kept giving out passwords to users who claimed to have forgotten them,________ were a serious security risk in the organization.

A) interns
B) help desks
C) data administrators
D) executives
E) developers
سؤال
Firewalls produce ________ of their activities,which include lists of all dropped packets,and attempts to gain unauthorized access.

A) programs
B) logs
C) graphics
D) calls
E) accounts
سؤال
Some of the biggest security threats are from ________ employees.

A) disinterested
B) disgruntled
C) self-motivated
D) happy
E) contrarian
سؤال
A company should clearly define the security ________ for each position.

A) accounts
B) levels
C) responsibilities
D) backups
E) safeguards
سؤال
The existence of ________ user accounts is a serious security threat.

A) unused
B) network
C) meta
D) employee
E) modified
سؤال
A(n)________ is someone who pretends to be a legitimate company and sends e-mail requesting confidential data.

A) hacker
B) phisher
C) spoofer
D) hawker
E) employee
سؤال
When an employee is terminated,system administrators should receive advance notice so they can

A) plan for security changes.
B) get the employees computer.
C) remove accounts and passwords.
D) fight over the person's office.
E) plan a termination party.
سؤال
When an employee notices a virus on his machine,the ________ plan should specify what to do.

A) antivirus
B) security
C) technology
D) company
E) incident response
سؤال
The best way to safeguard a web site from public users is to ________ the web site against an attack.

A) secure
B) prepare
C) defend
D) harden
E) update
سؤال
________ are the primary means of authentication.

A) Encrypted keys
B) Network administrators
C) Passwords
D) Single sign-on
E) Facial scans
سؤال
________ is a technique for intercepting computer communications.

A) Spoofing
B) Hacking
C) Pretexting
D) Phishing
E) Sniffing
سؤال
Computing infrastructure should be located in ________ buildings designed to house expensive and critical equipment.

A) central
B) air-conditioned
C) high-tech
D) fire-resistant
E) easily accessible
سؤال
Passwords have weaknesses because users often choose simple passwords,which ________ systems can easily guess.

A) security
B) intrusion
C) antivirus
D) malware
E) biometric
سؤال
A hacker can launch a denial of service attack against a web server by ________ it with millions of bogus service requests.

A) programming
B) flooding
C) denying
D) hacking
E) probing
سؤال
User accounts should be given (the)________ to perform their jobs

A) least possible privileges needed
B) most possible privileges needed
C) administrator privileges
D) user privileges
E) company standard privileges
سؤال
According to PIPEDA every organization needs to identify anyone in the organization who is responsible for ___________ personal information.

A) using
B) safeguarding
C) disclosing
D) collecting
E) maintaining
سؤال
What is pretexting?
سؤال
Enforcement consists of ________ interdependent factors.

A) 4
B) 2
C) 5
D) 3
E) 6
سؤال
The web site _______________________ lists simple things to do to lower your risk of identity theft.

A) HYPERLINK "http://www.wordpress.com" www.wordpress.com
B) HYPERLINK "http://www.google.ca" www.google.ca
C) HYPERLINK "http://www.safecanada.com" www.safecanada.com
D) HYPERLINK "http://www.priv.gc.da" www.priv.gc.da
E) HYPERLINK "http://www.equifax.com" www.equifax.com
سؤال
If you suspect an organization has inappropriately disclosed your personal information to a 3ʳᵈ party,you can lodge a complaint with

A) Industry Canada
B) RCMP
C) the local police.
D) Revenue Canada.
E) Office of the Privacy Commissioner of Canada.
سؤال
________ is an organization-wide function that is in charge of developing data policies and enforcing data standards.

A) Data contents protection
B) Data safeguarding
C) Data integrity
D) Data administration
E) Data rights administration
سؤال
Users often resist biometric identification because they feel it is

A) expensive.
B) ineffective.
C) too technical.
D) invasive.
E) hard to use.
سؤال
What is phishing?
سؤال
After installing anti-virus and antispyware,what is the best way to avoid malware?

A) Encrypt your work
B) Give your friend your passwords.
C) Shut the computer down at the end of the day.
D) Open all email by double clicking.
E) Don't open email attachments from unknown sources.
سؤال
When an incident is reported,________ is (are)of the essence.

A) the response
B) preparation
C) speed
D) a systematic approach
E) actions
سؤال
PIPEDA stands for

A) Personal Information Protection and Electronic Disclosure Act.
B) Personal Information Protection and Effective Disclosures Act.
C) Personal Information Protection and Electronic Disclosures Act.
D) Personal Information Protection and Electronic Documents Act.
E) Personal Information Protection and Electronic Disclosure Actions.
سؤال
A security incident reporting plan should ________ all incident reports.

A) centralize
B) generalize
C) standardize
D) decentralize
E) prioritize
سؤال
PIPEDA gives individuals the right to know why an organization is ________ their personal information.

A) collecting and disclosing
B) collecting and changing
C) collecting, using or disclosing
D) changing
E) using and disclosing
سؤال
Adware is ________ than spyware.

A) more serious
B) less annoying
C) more malicious
D) more benign
E) harder to get rid of
سؤال
Hardening is actually a(n)________ safeguard.

A) technical
B) security
C) data
D) human
E) accountability
سؤال
The popularity and efficacy of search engines like Google have created a source of

A) entertainment.
B) inadvertent information disclosure.
C) phishing.
D) pretexting.
E) sniffing.
سؤال
Security policy establishment is the responsibility of

A) middle managers.
B) the CEO.
C) corporate lawyers.
D) senior management.
E) the IT department.
سؤال
What is an unauthorized data disclosure?
سؤال
A company establishes data rights and responsibilities and educates employees on how to backup and recover the database.But,The company still needs to address the ___________ safeguards.

A) inadvertent
B) security
C) human
D) data
E) technical
فتح الحزمة
قم بالتسجيل لفتح البطاقات في هذه المجموعة!
Unlock Deck
Unlock Deck
1/88
auto play flashcards
العب
simple tutorial
ملء الشاشة (f)
exit full mode
Deck 12: Managing Information Security and Privacy
1
When a hacker floods a web server with millions of bogus service requests so that it cannot service legitimate requests,this is called a denial of service attack.
True
2
Despite warnings,users have a tendency to write their passwords on sticky notes next to the computer.
True
3
Denial of service always occurs because of malicious attacks on the system.
False
4
Smart cards are convenient and easy to use since they don't require any PIN numbers for authentication.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 88 في هذه المجموعة.
فتح الحزمة
k this deck
5
Drive-by sniffers take computers with wireless connections through an area and search for unprotected wireless networks.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 88 في هذه المجموعة.
فتح الحزمة
k this deck
6
Malware protection is an example of a technical safeguard.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 88 في هذه المجموعة.
فتح الحزمة
k this deck
7
Phishing is when someone sends an e-mail pretending to be a legitimate company and asking for confidential data,such as account numbers.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 88 في هذه المجموعة.
فتح الحزمة
k this deck
8
Care must be taken when terminating employees because they may take harmful and malicious actions.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 88 في هذه المجموعة.
فتح الحزمة
k this deck
9
Malware is used in denial of service attacks.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 88 في هذه المجموعة.
فتح الحزمة
k this deck
10
Biometric authentication has been around for some time,and because of weaknesses is not likely to see much usage in the future.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 88 في هذه المجموعة.
فتح الحزمة
k this deck
11
Spoofing is a technique for intercepting computer communications.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 88 في هذه المجموعة.
فتح الحزمة
k this deck
12
Data safeguards are designed to protect computer networks.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 88 في هذه المجموعة.
فتح الحزمة
k this deck
13
A retinal scan would be considered a biometric authentication technique.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 88 في هذه المجموعة.
فتح الحزمة
k this deck
14
Technical safeguards involve the hardware and software components of an information system.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 88 في هذه المجموعة.
فتح الحزمة
k this deck
15
People who intentionally gain unauthorized access to computer systems are called hackers.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 88 في هذه المجموعة.
فتح الحزمة
k this deck
16
Any action,device,procedure,technique,or other measure that reduces a system's vulnerability to a threat is a safeguard.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 88 في هذه المجموعة.
فتح الحزمة
k this deck
17
To protect against lost or sabotaged encryption keys,a trusted party should keep a copy of the key.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 88 في هذه المجموعة.
فتح الحزمة
k this deck
18
Even if a potential new hire will not have access to sensitive data and systems,they should be extensively screened for security purposes.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 88 في هذه المجموعة.
فتح الحزمة
k this deck
19
Encryption is one of several technical safeguards.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 88 في هذه المجموعة.
فتح الحزمة
k this deck
20
Most anti-malware programs check e-mail attachments for malware code.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 88 في هذه المجموعة.
فتح الحزمة
k this deck
21
Organizations should protect sensitive data by storing it in ________ form.

A) compressed
B) secure
C) digital
D) encrypted
E) standardized
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 88 في هذه المجموعة.
فتح الحزمة
k this deck
22
Bloggers have not yet had much of an impact on the main stream media.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 88 في هذه المجموعة.
فتح الحزمة
k this deck
23
Users should scan their computers with anti-malware programs at least

A) once a year.
B) biannually.
C) once a week.
D) daily.
E) once a month.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 88 في هذه المجموعة.
فتح الحزمة
k this deck
24
Backup and recovery,passwords,and encryption are human safeguards.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 88 في هذه المجموعة.
فتح الحزمة
k this deck
25
Following a disaster,hot sites provide office space,but customers themselves must come and provide and install the equipment needed to continue operations.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 88 في هذه المجموعة.
فتح الحزمة
k this deck
26
Be sure and purchase your antispyware program from a(n)________ vendor,because some free programs in the past were actually malware programs in disguise.

A) reasonable
B) reputable
C) entrepreneurial
D) inexpensive
E) illegitimate
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 88 في هذه المجموعة.
فتح الحزمة
k this deck
27
About ninety percent of all viruses are spread via

A) spreadsheets.
B) AOL.
C) technology.
D) network worms.
E) email.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 88 في هذه المجموعة.
فتح الحزمة
k this deck
28
It is possible for some malware to install itself on your computer by you doing nothing more than opening a(n)

A) web page.
B) file.
C) e-mail
D) computer.
E) account.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 88 في هذه المجموعة.
فتح الحزمة
k this deck
29
Because encryption keys can be lost or destroyed,a copy of the key should be stored with a trusted third party called a(n)

A) key account.
B) white-hat hacker.
C) key escrow.
D) authentication certifier.
E) control account.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 88 في هذه المجموعة.
فتح الحزمة
k this deck
30
________ safeguards involve the people and procedure components of information systems.

A) Human
B) Data
C) Technical
D) Malware
E) Firewall
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 88 في هذه المجموعة.
فتح الحزمة
k this deck
31
Organizations should store at least some of the _______________ of the database contents off the premises,possibly in a remote location.

A) backups
B) company information
C) malware definitions
D) smaller parts
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 88 في هذه المجموعة.
فتح الحزمة
k this deck
32
________,which are the patterns that exist in malware code,should be downloaded and updated frequently.

A) Software updates
B) Service packs
C) Malware patterns
D) Network patches
E) Malware definitions
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 88 في هذه المجموعة.
فتح الحزمة
k this deck
33
Hardened web sites use special versions of the operating systems and functions that are not required by the application.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 88 في هذه المجموعة.
فتح الحزمة
k this deck
34
Viruses and worms don't spread very quickly so it is not essential to move cautiously when one is discovered by someone in your organization.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 88 في هذه المجموعة.
فتح الحزمة
k this deck
35
The purpose of a(n)________ is to protect databases and other organizational data.

A) data warehouse
B) data security group
C) operations group
D) data safeguard
E) steering committee
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 88 في هذه المجموعة.
فتح الحزمة
k this deck
36
The best safeguard against a natural disaster is to have a safe location.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 88 في هذه المجموعة.
فتح الحزمة
k this deck
37
Help desks have not been the source of many security problems in the past.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 88 في هذه المجموعة.
فتح الحزمة
k this deck
38
Since most organizations are protected by a(n)________,it is not surprising that most viruses spread via e-mail.

A) data dictionary
B) antivirus program
C) biometric authentication device
D) firewall
E) white-hat hacker
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 88 في هذه المجموعة.
فتح الحزمة
k this deck
39
________ to (for)the physical computers that run the DBMS and all devices that store database data should be carefully controlled.

A) References
B) Access
C) Design plans
D) Connections
E) Documentation
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 88 في هذه المجموعة.
فتح الحزمة
k this deck
40
If you ever receive notification that your password has been reset when you did not request a reset,immediately contact your IS department.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 88 في هذه المجموعة.
فتح الحزمة
k this deck
41
A(n)________ card has a microchip on it that is loaded with identifying data.

A) smart
B) debit
C) credit
D) ATM
E) identity
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 88 في هذه المجموعة.
فتح الحزمة
k this deck
42
________ considerations should be part of the hiring process.

A) Weight
B) Position
C) Gender
D) Age
E) Security
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 88 في هذه المجموعة.
فتح الحزمة
k this deck
43
A ________ is a remote processing centre run by a commercial disaster-recovery service that provides all the equipment needed to continue operations after a disaster.

A) web farm
B) development site
C) cold site
D) hot site
E) server farm
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 88 في هذه المجموعة.
فتح الحزمة
k this deck
44
In order to prioritize their activities and protect an organization from possible risk and loss,security personnel must document the position ________ of all employees.

A) riskiness
B) data access
C) controls
D) level
E) sensitivity
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 88 في هذه المجموعة.
فتح الحزمة
k this deck
45
In order to intercept communications on ________ networks,drive-by sniffers simply drive or walk around with computers with wireless connections.

A) commercial
B) LAN
C) wireless
D) ISP
E) WAN
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 88 في هذه المجموعة.
فتح الحزمة
k this deck
46
________________ is one of the fastest-growing crimes in Canada because it is relatively easy to do.

A) phishing
B) Hacking
C) Spoofing
D) PIPEDA
E) Identity theft
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 88 في هذه المجموعة.
فتح الحزمة
k this deck
47
Because they kept giving out passwords to users who claimed to have forgotten them,________ were a serious security risk in the organization.

A) interns
B) help desks
C) data administrators
D) executives
E) developers
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 88 في هذه المجموعة.
فتح الحزمة
k this deck
48
Firewalls produce ________ of their activities,which include lists of all dropped packets,and attempts to gain unauthorized access.

A) programs
B) logs
C) graphics
D) calls
E) accounts
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 88 في هذه المجموعة.
فتح الحزمة
k this deck
49
Some of the biggest security threats are from ________ employees.

A) disinterested
B) disgruntled
C) self-motivated
D) happy
E) contrarian
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 88 في هذه المجموعة.
فتح الحزمة
k this deck
50
A company should clearly define the security ________ for each position.

A) accounts
B) levels
C) responsibilities
D) backups
E) safeguards
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 88 في هذه المجموعة.
فتح الحزمة
k this deck
51
The existence of ________ user accounts is a serious security threat.

A) unused
B) network
C) meta
D) employee
E) modified
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 88 في هذه المجموعة.
فتح الحزمة
k this deck
52
A(n)________ is someone who pretends to be a legitimate company and sends e-mail requesting confidential data.

A) hacker
B) phisher
C) spoofer
D) hawker
E) employee
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 88 في هذه المجموعة.
فتح الحزمة
k this deck
53
When an employee is terminated,system administrators should receive advance notice so they can

A) plan for security changes.
B) get the employees computer.
C) remove accounts and passwords.
D) fight over the person's office.
E) plan a termination party.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 88 في هذه المجموعة.
فتح الحزمة
k this deck
54
When an employee notices a virus on his machine,the ________ plan should specify what to do.

A) antivirus
B) security
C) technology
D) company
E) incident response
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 88 في هذه المجموعة.
فتح الحزمة
k this deck
55
The best way to safeguard a web site from public users is to ________ the web site against an attack.

A) secure
B) prepare
C) defend
D) harden
E) update
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 88 في هذه المجموعة.
فتح الحزمة
k this deck
56
________ are the primary means of authentication.

A) Encrypted keys
B) Network administrators
C) Passwords
D) Single sign-on
E) Facial scans
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 88 في هذه المجموعة.
فتح الحزمة
k this deck
57
________ is a technique for intercepting computer communications.

A) Spoofing
B) Hacking
C) Pretexting
D) Phishing
E) Sniffing
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 88 في هذه المجموعة.
فتح الحزمة
k this deck
58
Computing infrastructure should be located in ________ buildings designed to house expensive and critical equipment.

A) central
B) air-conditioned
C) high-tech
D) fire-resistant
E) easily accessible
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 88 في هذه المجموعة.
فتح الحزمة
k this deck
59
Passwords have weaknesses because users often choose simple passwords,which ________ systems can easily guess.

A) security
B) intrusion
C) antivirus
D) malware
E) biometric
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 88 في هذه المجموعة.
فتح الحزمة
k this deck
60
A hacker can launch a denial of service attack against a web server by ________ it with millions of bogus service requests.

A) programming
B) flooding
C) denying
D) hacking
E) probing
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 88 في هذه المجموعة.
فتح الحزمة
k this deck
61
User accounts should be given (the)________ to perform their jobs

A) least possible privileges needed
B) most possible privileges needed
C) administrator privileges
D) user privileges
E) company standard privileges
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 88 في هذه المجموعة.
فتح الحزمة
k this deck
62
According to PIPEDA every organization needs to identify anyone in the organization who is responsible for ___________ personal information.

A) using
B) safeguarding
C) disclosing
D) collecting
E) maintaining
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 88 في هذه المجموعة.
فتح الحزمة
k this deck
63
What is pretexting?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 88 في هذه المجموعة.
فتح الحزمة
k this deck
64
Enforcement consists of ________ interdependent factors.

A) 4
B) 2
C) 5
D) 3
E) 6
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 88 في هذه المجموعة.
فتح الحزمة
k this deck
65
The web site _______________________ lists simple things to do to lower your risk of identity theft.

A) HYPERLINK "http://www.wordpress.com" www.wordpress.com
B) HYPERLINK "http://www.google.ca" www.google.ca
C) HYPERLINK "http://www.safecanada.com" www.safecanada.com
D) HYPERLINK "http://www.priv.gc.da" www.priv.gc.da
E) HYPERLINK "http://www.equifax.com" www.equifax.com
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 88 في هذه المجموعة.
فتح الحزمة
k this deck
66
If you suspect an organization has inappropriately disclosed your personal information to a 3ʳᵈ party,you can lodge a complaint with

A) Industry Canada
B) RCMP
C) the local police.
D) Revenue Canada.
E) Office of the Privacy Commissioner of Canada.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 88 في هذه المجموعة.
فتح الحزمة
k this deck
67
________ is an organization-wide function that is in charge of developing data policies and enforcing data standards.

A) Data contents protection
B) Data safeguarding
C) Data integrity
D) Data administration
E) Data rights administration
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 88 في هذه المجموعة.
فتح الحزمة
k this deck
68
Users often resist biometric identification because they feel it is

A) expensive.
B) ineffective.
C) too technical.
D) invasive.
E) hard to use.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 88 في هذه المجموعة.
فتح الحزمة
k this deck
69
What is phishing?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 88 في هذه المجموعة.
فتح الحزمة
k this deck
70
After installing anti-virus and antispyware,what is the best way to avoid malware?

A) Encrypt your work
B) Give your friend your passwords.
C) Shut the computer down at the end of the day.
D) Open all email by double clicking.
E) Don't open email attachments from unknown sources.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 88 في هذه المجموعة.
فتح الحزمة
k this deck
71
When an incident is reported,________ is (are)of the essence.

A) the response
B) preparation
C) speed
D) a systematic approach
E) actions
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 88 في هذه المجموعة.
فتح الحزمة
k this deck
72
PIPEDA stands for

A) Personal Information Protection and Electronic Disclosure Act.
B) Personal Information Protection and Effective Disclosures Act.
C) Personal Information Protection and Electronic Disclosures Act.
D) Personal Information Protection and Electronic Documents Act.
E) Personal Information Protection and Electronic Disclosure Actions.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 88 في هذه المجموعة.
فتح الحزمة
k this deck
73
A security incident reporting plan should ________ all incident reports.

A) centralize
B) generalize
C) standardize
D) decentralize
E) prioritize
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 88 في هذه المجموعة.
فتح الحزمة
k this deck
74
PIPEDA gives individuals the right to know why an organization is ________ their personal information.

A) collecting and disclosing
B) collecting and changing
C) collecting, using or disclosing
D) changing
E) using and disclosing
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 88 في هذه المجموعة.
فتح الحزمة
k this deck
75
Adware is ________ than spyware.

A) more serious
B) less annoying
C) more malicious
D) more benign
E) harder to get rid of
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 88 في هذه المجموعة.
فتح الحزمة
k this deck
76
Hardening is actually a(n)________ safeguard.

A) technical
B) security
C) data
D) human
E) accountability
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 88 في هذه المجموعة.
فتح الحزمة
k this deck
77
The popularity and efficacy of search engines like Google have created a source of

A) entertainment.
B) inadvertent information disclosure.
C) phishing.
D) pretexting.
E) sniffing.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 88 في هذه المجموعة.
فتح الحزمة
k this deck
78
Security policy establishment is the responsibility of

A) middle managers.
B) the CEO.
C) corporate lawyers.
D) senior management.
E) the IT department.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 88 في هذه المجموعة.
فتح الحزمة
k this deck
79
What is an unauthorized data disclosure?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 88 في هذه المجموعة.
فتح الحزمة
k this deck
80
A company establishes data rights and responsibilities and educates employees on how to backup and recover the database.But,The company still needs to address the ___________ safeguards.

A) inadvertent
B) security
C) human
D) data
E) technical
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 88 في هذه المجموعة.
فتح الحزمة
k this deck
locked card icon
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 88 في هذه المجموعة.