Deck 12: Information Systems Development

ملء الشاشة (f)
exit full mode
سؤال
Drive-by sniffers monitor and intercept wireless traffic at will.
استخدم زر المسافة أو
up arrow
down arrow
لقلب البطاقة.
سؤال
Usurpation occurs when computer criminals invade a computer system and replace legitimate programs with their own unauthorized ones.
سؤال
Email spoofing is a synonym for phishing.
سؤال
The single most important computer security safeguard that can be implemented is to create and use passwords that comprise of names.
سؤال
Pretexting occurs when a person receives a confidential text message by mistake.
سؤال
Natural disasters present the largest risk for infrastructure loss.
سؤال
Cookies enable an individual to access Web sites without having to sign in every time.
سؤال
An intrusion detection system (IDS) is a computer program that senses when another computer is attempting to scan the disk or otherwise access a computer.
سؤال
In the context of information security, safeguards increase work efficiency by making common tasks easier.
سؤال
Unauthorized data disclosures are possible due to human error.
سؤال
When a hacker floods a Web server with millions of bogus service requests so that it cannot service legitimate requests, it is called a denial-of-service attack.
سؤال
The losses due to human error are minimal; hence, organizations tend to ignore these losses.
سؤال
An Advanced Persistent Threat (APT) is a sophisticated computer hack that is perpetrated by large, well-funded organizations such as governments.
سؤال
The security of online transactions has increased with the use of https.
سؤال
Most emails and IMs are protected by encryption.
سؤال
As problems caused by human errors are accidental and not malicious, they are not considered as security threats to the information system.
سؤال
Sniffing occurs when an intruder uses another site's IP address to masquerade as that other site.
سؤال
A computer crime is committed if an employee inadvertently installs an old database on top of the current one.
سؤال
Faulty service excludes problems that result due to incorrect data modification.
سؤال
Phishing is a technique for intercepting computer communications.
سؤال
A magnetic strip holds far more data than a microchip.
سؤال
Specific security policies should not depend on whether the organization is governmental or nongovernmental or whether it is publicly held or private.
سؤال
Viruses and worms are examples of malware.
سؤال
The senior management must establish a company-wide security policy that states the organization's posture regarding the data that it gathers.
سؤال
A new hire must seek out the employer's security policy if it is not discussed in new-employee training.
سؤال
Data safeguards are measures used to protect computer hardware from external threat.
سؤال
It is safer to use the same password for all the Web sites.
سؤال
Most spyware programs are benign in that they do not perform malicious acts or steal data.
سؤال
Secure Socket Layer (SSL) is a protocol that is restricted to asymmetric encryption.
سؤال
In symmetric encryption, two different keys are used to encode and decode a message.
سؤال
Encryption is an example of a technical safeguard.
سؤال
Improper data disclosure and data damage and loss are possible consequences of an SQL injection attack.
سؤال
Nonword passwords are also vulnerable to brute force attacks.
سؤال
Even short passwords with no special characters can make strong passwords.
سؤال
SQL injection attack occurs when users enter an SQL statement into a form in which they are supposed to enter a name or other data.
سؤال
Symmetric encryption is simpler and much faster than asymmetric encryption.
سؤال
A Trojan horse is a virus that masquerades as a useful program or file.
سؤال
Unlike credit, debit, and ATM cards, which have a magnetic strip, smart cards have a microchip.
سؤال
Technical safeguards involve the hardware and software components of an information system.
سؤال
Biometric authentication uses physical characteristics such as retinal scans to authenticate users.
سؤال
A ________ is a person or an organization that seeks to obtain or alter data or other IS assets illegally, without the owner's permission and often without the owner's knowledge.

A) target
B) vulnerability
C) threat
D) key escrow
سؤال
Which of the following is considered a threat caused by human error?

A) an employee inadvertently installs an old database on top of the current one
B) an employee intentionally destroys data and system components
C) a virus and worm writer infects computer systems
D) a hacker breaks into a system to steal for financial gain
سؤال
Documenting position sensitivity enables security personnel to prioritize their activities in accordance with the possible risk and loss.
سؤال
Hardening a site means to take extraordinary measures to reduce a system's vulnerability.
سؤال
A ________ pretends to be a legitimate company and sends an email requesting confidential data, such as account numbers, Social Security numbers, account passwords, and so forth.

A) hacker
B) phisher
C) safeguard
D) sniffer
سؤال
If a backup of the database contents is made, the database is completely protected.
سؤال
Business requirements do not necessitate opening information systems to nonemployee personnel, such as temporary personnel, vendors, or partner personnel.
سؤال
Companies should require vendors and partners to perform appropriate screening and security training.
سؤال
Which of the following is considered a computer crime?

A) deletion of records by an employee who is unaware of operating procedures
B) poorly written programs resulting in data losses
C) loss of data as a result of flooding
D) hacking of information systems
سؤال
Which of the following is an example of a sniffing technique?

A) IP spoofing
B) caches
C) denial of service
D) adware
سؤال
When referring to security threats, pretexting, sniffing, spoofing, and phishing are all examples of ________.

A) unauthorized data disclosure
B) incorrect data modification
C) faulty services
D) loss of infrastructure
سؤال
________ take computers with wireless connections through an area and search for unprotected wireless networks and then monitor and intercept wireless traffic at will.

A) Keyloggers
B) Pretexters
C) Drive-by sniffers
D) Phishers
سؤال
The existence of accounts that are no longer in use are not a security threat to an organization.
سؤال
________ occurs when someone deceives by pretending to be someone else.

A) Hacking
B) Usurping
C) Sniffing
D) Pretexting
سؤال
Employee termination is a potential security threat for an organization.
سؤال
________ is a technique for intercepting computer communications, either through a physical connection to a network or without a physical connection in the case of wireless networks.

A) Spoofing
B) Phishing
C) Sniffing
D) Pretexting
سؤال
If the incident-response plan is not well-prepared, there is substantial risk that the actions of well-meaning people will make the problem worse.
سؤال
It is easy and economical to hold public users of Web sites accountable for security violations.
سؤال
Email spoofing is a synonym for ________.

A) hacking
B) phishing
C) usurping
D) sniffing
سؤال
Hardening is actually a human safeguard.
سؤال
________ occurs when a person breaks into a network to steal data such as customer lists, product inventory data, employee data, and other proprietary and confidential data.

A) Pretexting
B) Phishing
C) Hacking
D) Spoofing
سؤال
A(n) ________ has a microchip in it to hold data.

A) ATM card
B) smart card
C) cookie
D) key escrow
سؤال
Which of the following statements is true of biometric identification?

A) It involves the use of a PIN for authentication.
B) It provides weak authentication.
C) It is a relatively inexpensive mode of authentication.
D) It often faces resistance from users for its invasive nature.
سؤال
________ occurs through human error when employees do not follow proper procedures or when procedures have not been well designed.

A) Unauthorized data disclosure
B) Incorrect data modification
C) Denial of service
D) Loss of infrastructure
سؤال
________ are small files that the browser stores on the user's computer when he/she visits Web sites and enables him/her to access Web sites without having to sign in every time.

A) Cookies
B) Botnets
C) Payloads
D) Public keys
سؤال
A(n) ________ is a computer program that senses when another computer is attempting to scan the disk or otherwise access a computer.

A) intrusion detection system
B) keylogger
C) botnet
D) access control system
سؤال
In information security, which of the following is true of managing risk?

A) All organizations except financial institutions should invest heavily in security safeguards.
B) Organizations should implement safeguards that balance the trade-off between risk and cost.
C) Passwords are classified under the technical safeguards category.
D) Physical security is classified under the human safeguards category.
سؤال
Users of smart cards are required to enter a ________ to be authenticated.

A) Social Security number
B) public key
C) personal identification number
D) private key
سؤال
Which of the following is a critical security function that the senior management should address in an organization?

A) sharing the private key with all systems connected to the network
B) creating IS security software programs
C) establishing the security policy
D) avoiding the use of perimeter firewalls
سؤال
Which of the following was passed to give individuals the right to access their own health data created by doctors and other healthcare providers?

A) the Privacy Act of 1974
B) the Sarbanes-Oxley Act
C) the HIPAA of 1996
D) the Gramm-Leach-Bliley Act
سؤال
________ is the type of security loss that involves computer criminals invading a computer system and replacing legitimate programs with their own unauthorized ones that shut down legitimate applications and substitute their own processing to spy, steal, and manipulate data.

A) Encryption
B) Spoofing
C) Phishing
D) Usurpation
سؤال
Which of the following is most likely to be a result of hacking?

A) certain Web sites being censored for hurting sentiments
B) small amounts of spam in a user's inbox
C) an unauthorized transaction from a user's credit card
D) pop-up ads appearing frequently
سؤال
Nonword passwords are vulnerable to a ________ attack, in which the password cracker tries every possible combination of characters.

A) denial-of-service
B) sniffing
C) brute force
D) phishing
سؤال
Which of the following statements is true about losses due to computer security threats?

A) Surveys on computer crimes provide accurate results since they use standard parameters to measure and tally computer crime costs.
B) Some organizations don't report all their computer crime losses, and some won't report such losses at all.
C) Losses due to natural disasters can be measured accurately.
D) Losses due to human error are insignificant.
سؤال
Which of the following is classified as a technical safeguard?

A) cookies
B) firewalls
C) key escrow
D) passwords
سؤال
________ present the largest risk for an organization's infrastructure loss.

A) Employees
B) Natural disasters
C) Hackers
D) Competitors
سؤال
Which of the following is used for biometric authentication?

A) smart cards
B) facial features
C) passwords
D) personal identification numbers
سؤال
Which of the following usually happens in a malicious denial-of-service attack?

A) a hacker monitors and intercepts wireless traffic at will
B) a hacker floods a Web server with millions of bogus service requests
C) an intruder uses another site's IP address to masquerade as that other site
D) a phisher pretends to be a legitimate company and requests confidential data
سؤال
A ________ is a number used to encrypt data.

A) key
B) honeypot
C) cookie
D) cache
سؤال
Removing and disabling ________, which may contain sensitive security data, presents an excellent example of the trade-off between improved security and cost.

A) bookmarks
B) pop-ups
C) cookies
D) toolbars
فتح الحزمة
قم بالتسجيل لفتح البطاقات في هذه المجموعة!
Unlock Deck
Unlock Deck
1/123
auto play flashcards
العب
simple tutorial
ملء الشاشة (f)
exit full mode
Deck 12: Information Systems Development
1
Drive-by sniffers monitor and intercept wireless traffic at will.
True
2
Usurpation occurs when computer criminals invade a computer system and replace legitimate programs with their own unauthorized ones.
True
3
Email spoofing is a synonym for phishing.
True
4
The single most important computer security safeguard that can be implemented is to create and use passwords that comprise of names.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 123 في هذه المجموعة.
فتح الحزمة
k this deck
5
Pretexting occurs when a person receives a confidential text message by mistake.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 123 في هذه المجموعة.
فتح الحزمة
k this deck
6
Natural disasters present the largest risk for infrastructure loss.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 123 في هذه المجموعة.
فتح الحزمة
k this deck
7
Cookies enable an individual to access Web sites without having to sign in every time.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 123 في هذه المجموعة.
فتح الحزمة
k this deck
8
An intrusion detection system (IDS) is a computer program that senses when another computer is attempting to scan the disk or otherwise access a computer.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 123 في هذه المجموعة.
فتح الحزمة
k this deck
9
In the context of information security, safeguards increase work efficiency by making common tasks easier.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 123 في هذه المجموعة.
فتح الحزمة
k this deck
10
Unauthorized data disclosures are possible due to human error.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 123 في هذه المجموعة.
فتح الحزمة
k this deck
11
When a hacker floods a Web server with millions of bogus service requests so that it cannot service legitimate requests, it is called a denial-of-service attack.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 123 في هذه المجموعة.
فتح الحزمة
k this deck
12
The losses due to human error are minimal; hence, organizations tend to ignore these losses.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 123 في هذه المجموعة.
فتح الحزمة
k this deck
13
An Advanced Persistent Threat (APT) is a sophisticated computer hack that is perpetrated by large, well-funded organizations such as governments.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 123 في هذه المجموعة.
فتح الحزمة
k this deck
14
The security of online transactions has increased with the use of https.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 123 في هذه المجموعة.
فتح الحزمة
k this deck
15
Most emails and IMs are protected by encryption.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 123 في هذه المجموعة.
فتح الحزمة
k this deck
16
As problems caused by human errors are accidental and not malicious, they are not considered as security threats to the information system.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 123 في هذه المجموعة.
فتح الحزمة
k this deck
17
Sniffing occurs when an intruder uses another site's IP address to masquerade as that other site.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 123 في هذه المجموعة.
فتح الحزمة
k this deck
18
A computer crime is committed if an employee inadvertently installs an old database on top of the current one.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 123 في هذه المجموعة.
فتح الحزمة
k this deck
19
Faulty service excludes problems that result due to incorrect data modification.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 123 في هذه المجموعة.
فتح الحزمة
k this deck
20
Phishing is a technique for intercepting computer communications.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 123 في هذه المجموعة.
فتح الحزمة
k this deck
21
A magnetic strip holds far more data than a microchip.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 123 في هذه المجموعة.
فتح الحزمة
k this deck
22
Specific security policies should not depend on whether the organization is governmental or nongovernmental or whether it is publicly held or private.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 123 في هذه المجموعة.
فتح الحزمة
k this deck
23
Viruses and worms are examples of malware.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 123 في هذه المجموعة.
فتح الحزمة
k this deck
24
The senior management must establish a company-wide security policy that states the organization's posture regarding the data that it gathers.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 123 في هذه المجموعة.
فتح الحزمة
k this deck
25
A new hire must seek out the employer's security policy if it is not discussed in new-employee training.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 123 في هذه المجموعة.
فتح الحزمة
k this deck
26
Data safeguards are measures used to protect computer hardware from external threat.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 123 في هذه المجموعة.
فتح الحزمة
k this deck
27
It is safer to use the same password for all the Web sites.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 123 في هذه المجموعة.
فتح الحزمة
k this deck
28
Most spyware programs are benign in that they do not perform malicious acts or steal data.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 123 في هذه المجموعة.
فتح الحزمة
k this deck
29
Secure Socket Layer (SSL) is a protocol that is restricted to asymmetric encryption.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 123 في هذه المجموعة.
فتح الحزمة
k this deck
30
In symmetric encryption, two different keys are used to encode and decode a message.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 123 في هذه المجموعة.
فتح الحزمة
k this deck
31
Encryption is an example of a technical safeguard.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 123 في هذه المجموعة.
فتح الحزمة
k this deck
32
Improper data disclosure and data damage and loss are possible consequences of an SQL injection attack.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 123 في هذه المجموعة.
فتح الحزمة
k this deck
33
Nonword passwords are also vulnerable to brute force attacks.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 123 في هذه المجموعة.
فتح الحزمة
k this deck
34
Even short passwords with no special characters can make strong passwords.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 123 في هذه المجموعة.
فتح الحزمة
k this deck
35
SQL injection attack occurs when users enter an SQL statement into a form in which they are supposed to enter a name or other data.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 123 في هذه المجموعة.
فتح الحزمة
k this deck
36
Symmetric encryption is simpler and much faster than asymmetric encryption.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 123 في هذه المجموعة.
فتح الحزمة
k this deck
37
A Trojan horse is a virus that masquerades as a useful program or file.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 123 في هذه المجموعة.
فتح الحزمة
k this deck
38
Unlike credit, debit, and ATM cards, which have a magnetic strip, smart cards have a microchip.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 123 في هذه المجموعة.
فتح الحزمة
k this deck
39
Technical safeguards involve the hardware and software components of an information system.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 123 في هذه المجموعة.
فتح الحزمة
k this deck
40
Biometric authentication uses physical characteristics such as retinal scans to authenticate users.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 123 في هذه المجموعة.
فتح الحزمة
k this deck
41
A ________ is a person or an organization that seeks to obtain or alter data or other IS assets illegally, without the owner's permission and often without the owner's knowledge.

A) target
B) vulnerability
C) threat
D) key escrow
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 123 في هذه المجموعة.
فتح الحزمة
k this deck
42
Which of the following is considered a threat caused by human error?

A) an employee inadvertently installs an old database on top of the current one
B) an employee intentionally destroys data and system components
C) a virus and worm writer infects computer systems
D) a hacker breaks into a system to steal for financial gain
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 123 في هذه المجموعة.
فتح الحزمة
k this deck
43
Documenting position sensitivity enables security personnel to prioritize their activities in accordance with the possible risk and loss.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 123 في هذه المجموعة.
فتح الحزمة
k this deck
44
Hardening a site means to take extraordinary measures to reduce a system's vulnerability.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 123 في هذه المجموعة.
فتح الحزمة
k this deck
45
A ________ pretends to be a legitimate company and sends an email requesting confidential data, such as account numbers, Social Security numbers, account passwords, and so forth.

A) hacker
B) phisher
C) safeguard
D) sniffer
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 123 في هذه المجموعة.
فتح الحزمة
k this deck
46
If a backup of the database contents is made, the database is completely protected.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 123 في هذه المجموعة.
فتح الحزمة
k this deck
47
Business requirements do not necessitate opening information systems to nonemployee personnel, such as temporary personnel, vendors, or partner personnel.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 123 في هذه المجموعة.
فتح الحزمة
k this deck
48
Companies should require vendors and partners to perform appropriate screening and security training.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 123 في هذه المجموعة.
فتح الحزمة
k this deck
49
Which of the following is considered a computer crime?

A) deletion of records by an employee who is unaware of operating procedures
B) poorly written programs resulting in data losses
C) loss of data as a result of flooding
D) hacking of information systems
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 123 في هذه المجموعة.
فتح الحزمة
k this deck
50
Which of the following is an example of a sniffing technique?

A) IP spoofing
B) caches
C) denial of service
D) adware
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 123 في هذه المجموعة.
فتح الحزمة
k this deck
51
When referring to security threats, pretexting, sniffing, spoofing, and phishing are all examples of ________.

A) unauthorized data disclosure
B) incorrect data modification
C) faulty services
D) loss of infrastructure
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 123 في هذه المجموعة.
فتح الحزمة
k this deck
52
________ take computers with wireless connections through an area and search for unprotected wireless networks and then monitor and intercept wireless traffic at will.

A) Keyloggers
B) Pretexters
C) Drive-by sniffers
D) Phishers
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 123 في هذه المجموعة.
فتح الحزمة
k this deck
53
The existence of accounts that are no longer in use are not a security threat to an organization.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 123 في هذه المجموعة.
فتح الحزمة
k this deck
54
________ occurs when someone deceives by pretending to be someone else.

A) Hacking
B) Usurping
C) Sniffing
D) Pretexting
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 123 في هذه المجموعة.
فتح الحزمة
k this deck
55
Employee termination is a potential security threat for an organization.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 123 في هذه المجموعة.
فتح الحزمة
k this deck
56
________ is a technique for intercepting computer communications, either through a physical connection to a network or without a physical connection in the case of wireless networks.

A) Spoofing
B) Phishing
C) Sniffing
D) Pretexting
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 123 في هذه المجموعة.
فتح الحزمة
k this deck
57
If the incident-response plan is not well-prepared, there is substantial risk that the actions of well-meaning people will make the problem worse.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 123 في هذه المجموعة.
فتح الحزمة
k this deck
58
It is easy and economical to hold public users of Web sites accountable for security violations.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 123 في هذه المجموعة.
فتح الحزمة
k this deck
59
Email spoofing is a synonym for ________.

A) hacking
B) phishing
C) usurping
D) sniffing
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 123 في هذه المجموعة.
فتح الحزمة
k this deck
60
Hardening is actually a human safeguard.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 123 في هذه المجموعة.
فتح الحزمة
k this deck
61
________ occurs when a person breaks into a network to steal data such as customer lists, product inventory data, employee data, and other proprietary and confidential data.

A) Pretexting
B) Phishing
C) Hacking
D) Spoofing
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 123 في هذه المجموعة.
فتح الحزمة
k this deck
62
A(n) ________ has a microchip in it to hold data.

A) ATM card
B) smart card
C) cookie
D) key escrow
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 123 في هذه المجموعة.
فتح الحزمة
k this deck
63
Which of the following statements is true of biometric identification?

A) It involves the use of a PIN for authentication.
B) It provides weak authentication.
C) It is a relatively inexpensive mode of authentication.
D) It often faces resistance from users for its invasive nature.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 123 في هذه المجموعة.
فتح الحزمة
k this deck
64
________ occurs through human error when employees do not follow proper procedures or when procedures have not been well designed.

A) Unauthorized data disclosure
B) Incorrect data modification
C) Denial of service
D) Loss of infrastructure
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 123 في هذه المجموعة.
فتح الحزمة
k this deck
65
________ are small files that the browser stores on the user's computer when he/she visits Web sites and enables him/her to access Web sites without having to sign in every time.

A) Cookies
B) Botnets
C) Payloads
D) Public keys
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 123 في هذه المجموعة.
فتح الحزمة
k this deck
66
A(n) ________ is a computer program that senses when another computer is attempting to scan the disk or otherwise access a computer.

A) intrusion detection system
B) keylogger
C) botnet
D) access control system
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 123 في هذه المجموعة.
فتح الحزمة
k this deck
67
In information security, which of the following is true of managing risk?

A) All organizations except financial institutions should invest heavily in security safeguards.
B) Organizations should implement safeguards that balance the trade-off between risk and cost.
C) Passwords are classified under the technical safeguards category.
D) Physical security is classified under the human safeguards category.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 123 في هذه المجموعة.
فتح الحزمة
k this deck
68
Users of smart cards are required to enter a ________ to be authenticated.

A) Social Security number
B) public key
C) personal identification number
D) private key
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 123 في هذه المجموعة.
فتح الحزمة
k this deck
69
Which of the following is a critical security function that the senior management should address in an organization?

A) sharing the private key with all systems connected to the network
B) creating IS security software programs
C) establishing the security policy
D) avoiding the use of perimeter firewalls
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 123 في هذه المجموعة.
فتح الحزمة
k this deck
70
Which of the following was passed to give individuals the right to access their own health data created by doctors and other healthcare providers?

A) the Privacy Act of 1974
B) the Sarbanes-Oxley Act
C) the HIPAA of 1996
D) the Gramm-Leach-Bliley Act
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 123 في هذه المجموعة.
فتح الحزمة
k this deck
71
________ is the type of security loss that involves computer criminals invading a computer system and replacing legitimate programs with their own unauthorized ones that shut down legitimate applications and substitute their own processing to spy, steal, and manipulate data.

A) Encryption
B) Spoofing
C) Phishing
D) Usurpation
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 123 في هذه المجموعة.
فتح الحزمة
k this deck
72
Which of the following is most likely to be a result of hacking?

A) certain Web sites being censored for hurting sentiments
B) small amounts of spam in a user's inbox
C) an unauthorized transaction from a user's credit card
D) pop-up ads appearing frequently
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 123 في هذه المجموعة.
فتح الحزمة
k this deck
73
Nonword passwords are vulnerable to a ________ attack, in which the password cracker tries every possible combination of characters.

A) denial-of-service
B) sniffing
C) brute force
D) phishing
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 123 في هذه المجموعة.
فتح الحزمة
k this deck
74
Which of the following statements is true about losses due to computer security threats?

A) Surveys on computer crimes provide accurate results since they use standard parameters to measure and tally computer crime costs.
B) Some organizations don't report all their computer crime losses, and some won't report such losses at all.
C) Losses due to natural disasters can be measured accurately.
D) Losses due to human error are insignificant.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 123 في هذه المجموعة.
فتح الحزمة
k this deck
75
Which of the following is classified as a technical safeguard?

A) cookies
B) firewalls
C) key escrow
D) passwords
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 123 في هذه المجموعة.
فتح الحزمة
k this deck
76
________ present the largest risk for an organization's infrastructure loss.

A) Employees
B) Natural disasters
C) Hackers
D) Competitors
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 123 في هذه المجموعة.
فتح الحزمة
k this deck
77
Which of the following is used for biometric authentication?

A) smart cards
B) facial features
C) passwords
D) personal identification numbers
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 123 في هذه المجموعة.
فتح الحزمة
k this deck
78
Which of the following usually happens in a malicious denial-of-service attack?

A) a hacker monitors and intercepts wireless traffic at will
B) a hacker floods a Web server with millions of bogus service requests
C) an intruder uses another site's IP address to masquerade as that other site
D) a phisher pretends to be a legitimate company and requests confidential data
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 123 في هذه المجموعة.
فتح الحزمة
k this deck
79
A ________ is a number used to encrypt data.

A) key
B) honeypot
C) cookie
D) cache
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 123 في هذه المجموعة.
فتح الحزمة
k this deck
80
Removing and disabling ________, which may contain sensitive security data, presents an excellent example of the trade-off between improved security and cost.

A) bookmarks
B) pop-ups
C) cookies
D) toolbars
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 123 في هذه المجموعة.
فتح الحزمة
k this deck
locked card icon
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 123 في هذه المجموعة.