Deck 14: Risks, security, and Disaster Recovery

ملء الشاشة (f)
exit full mode
سؤال
Bots are implemented not only for access but also to implement policies and ensure that nonsensical data is not entered into corporate databases.
استخدم زر المسافة أو
up arrow
down arrow
لقلب البطاقة.
سؤال
A digital certificate contains its holder's name,a serial number,expiration dates,and a copy of the certificate holder's public key (used to encrypt messages and digital signatures).
سؤال
Computer "infections" are so named because they act on programs and data in a fashion similar to the way viruses act on living tissue.
سؤال
Intentional damage to software occurs because of poor training,lack of adherence to simple backup procedures,or simple human error.
سؤال
Blackout units are a solution to extreme changes in voltage,and can provide several minutes to several hours of backup battery power.
سؤال
Companies that choose not to fully develop their own recovery plan can outsource it to companies that specialize in either disaster recovery planning or provision of alternative sites.
سؤال
In recent years,identity theft has been more prevalent as part of phishing.
سؤال
A protocol called Transport Layer Security (TLS)is used for transactions on the Web.
سؤال
Symmetric encryption is also called "public-key" encryption.
سؤال
Redundancies increase expected downtime.
سؤال
IS managers encourage users to change their user IDs frequently.
سؤال
Atomic transactions ensure encrypting of all appropriate files.
سؤال
The recipient of an encrypted message uses the certificate authority's private key to decode the digital certificate attached to the message.
سؤال
Controls translate business policies into system features.
سؤال
Encryption slows down communication because the software must encrypt and decrypt every message.
سؤال
Several manufacturers of computer equipment offer individual keyboard-embedded and mouse-embedded fingerprint devices.
سؤال
With encryption,the original message is called plaintext.
سؤال
Copies of applications are usually kept in a safe place to replace those that get damaged.
سؤال
The greater the number of interdependent systems,the greater the expected downtime.
سؤال
The best defense against unauthorized access to systems over the Internet is a firewall,which is hardware and software that blocks access to computing resources.
سؤال
A ____ is a server that contains a mirrored copy of a production database (a database that is used for business operations),or one with invalid records.

A) honeytoken
B) phish
C) bogus server
D) honeypot
سؤال
____ a computer means using some or all of the resources of a computer linked to a public network without the consent of its owner.

A) Hijacking
B) Attacking
C) Phishing
D) Sequestering
سؤال
____ are usually planted by insiders,that is,employees of the victimized organization.

A) Spams
B) Logic bombs
C) Phishes
D) Flames
سؤال
With encryption,the coded message is called ____.

A) plaintext
B) privatetext
C) ciphertext
D) publictext
سؤال
In ____,the voltage of the power decreases,or there are very short interruptions in the flow of power.

A) brownouts
B) blackouts
C) keystroke logging
D) UPSs
سؤال
A ____ "represents" another server for all information requests from resources inside the trusted network.

A) proxy server
B) honeypot server
C) DNS server
D) secure server
سؤال
One way to protect against viruses is to use ____,which is readily available on the market from companies that specialize in developing this kind of software,such as Symantec and McAfee.

A) antiphish software
B) security worms
C) antivirus software
D) secure viruses
سؤال
____ encryption comprises two keys: one is public,and the other is private.

A) Parallel
B) Asymmetric
C) Symmetric
D) Double
سؤال
A(n)____ is a set of indivisible transactions that are either all executed or none are-never only some.

A) biometric
B) a-transaction
C) biometric measurement
D) atomic transaction
سؤال
____ occurs when a Web site receives an overwhelming number of information requests,such as merely logging on to a site.

A) Denial-of-service (DoS)
B) Global denial-of-service (GDoS)
C) Global attack
D) Full denial-of-service (FDoS)
سؤال
____ is a set of disks that is programmed to replicate stored data to provide a higher degree of reliability.

A) SSP
B) RAI
C) RAID
D) SAN
سؤال
Hijacking is carried out by surreptitiously installing a small program called a ____ on a computer.

A) mine
B) bot
C) spot
D) robot
سؤال
____ software records individual keystrokes.

A) Clickstream
B) Keystroke logging
C) Virus
D) Remote access
سؤال
____ are measures taken to ensure that only those who are authorized have access to a computer or network or to certain applications or data.

A) Boarding keys
B) Encrypted passes
C) Boarding passes
D) Access controls
سؤال
A ____ is a bogus record in a networked database that neither employees nor business partners would ever access for legitimate purposes.

A) honeypot
B) phish
C) flame
D) honeytoken
سؤال
Sometimes a(n)____ is automatically created using data,such as the date and time of a transaction or the name or password of the user updating the file.

A) atomic transaction
B) audit trail
C) denial of service
D) global transaction
سؤال
____ is the secure version of HTTP.

A) SHTTP
B) HTMLSec
C) HTTPS
D) HTMLS
سؤال
Coding a message into a form unreadable to an interceptor is called ____.

A) classification
B) encryption
C) modulation
D) demodulation
سؤال
Con artists use tricks known as ____.

A) social pathology
B) knowledge theft
C) social engineering
D) data mining
سؤال
To increase security,some companies implement the ____ approach.

A) DMZ (demilitarized zone)
B) denial of service (DoS)
C) atomic transaction
D) boarding key
سؤال
A(n)____________________ is software that is programmed to cause damage at a specified time to specific applications and data files.
سؤال
____________________ are constraints and other restrictions imposed on a user or a system,and they can be used to secure systems against risks or to reduce damage caused to systems,applications,and data.
سؤال
Managers should focus on the asset they must protect,which in most cases is ____,not applications.

A) hardware
B) software
C) information
D) systems
سؤال
When tapping communications,law enforcement agencies need the cooperation of a third party,such as a telephone company or a(n)____.

A) ISP
B) SSP
C) Web site
D) systems developer
سؤال
CIOs often find the tasks of earmarking funds for ____ difficult because they cannot show the return on investment (ROI)of such planning.

A) backup programs
B) disaster recovery programs
C) archival programs
D) database security programs
سؤال
____________________ occurs when a Web site receives an overwhelming number of information requests,such as merely logging on to a site.
سؤال
____________________,the time during which ISs or data are not available in the course of conducting business,has become a dreaded situation for almost every business worldwide.
سؤال
Employees are especially annoyed when they have to remember a different password for every system they use,a simpler solution is an approach called ____.

A) one-ID
B) SP (single password)
C) multiple encryption
D) SSO (single sign-on)
سؤال
____,those without which the business cannot conduct its operations,are given the highest priority by the disaster recovery coordinator.

A) Backup applications
B) Up applications
C) Mission-critical applications
D) Recovery applications
سؤال
The ____,as it is popularly known,gives law enforcement agencies surveillance and wiretapping rights they did not have before 2001.

A) PATRIOT Act
B) 9/11 Decree
C) 9/11 Act
D) PATRIOT Manifesto
سؤال
CIOs often cite ____ as an effective way to bring down the amount of work their subordinates must do.

A) SSL
B) SDLC
C) DoS
D) SSO
سؤال
Some viruses are called ____________________,analogous to the destructive gift given to the ancient Trojans.
سؤال
____________________ are total losses of electrical power.
سؤال
Once criminals have a person's identifying details,such as a Social Security number,driver's license number,or credit-card number,they can pretend to be this person,which is a crime called ____________________.
سؤال
Experience in ____ certain systems,such as ERP and SCM systems,can teach the IT staff for how many minutes or seconds per year the system is likely to fail.

A) operating
B) developing
C) maintaining
D) archiving
سؤال
Probably the easiest way to protect against loss of data is to automatically duplicate all data periodically,a process referred to as data ____________________.
سؤال
An issuer of digital certificates is called a ____.

A) certificate dealer (CD)
B) certificate bank (CB)
C) certificate authority (CA)
D) certificate warehouse (CW)
سؤال
A(n)____________________ characteristic is a unique physical,measurable characteristic of a human being that is used to identify a person.
سؤال
Experts are usually employed to estimate the cost and ____ of damages,as well as the cost of security measures.

A) impact
B) probabilities
C) effect
D) causes
سؤال
To ensure against interruptions in power supply,organizations use ____________________ systems,which provide an alternative power supply for a short time,as soon as a power network fails.
سؤال
What are honeytokens?
سؤال
The cost of damage is the aggregate of all the potential damages multiplied by their respective ____________________.
سؤال
A(n)____________________ is a way to authenticate online messages,analogous to a physical signature on a piece of paper,but implemented with public-key cryptography.
سؤال
What is a Trojan horse?
سؤال
____________________ is the process of ensuring that the person who sends a message to or receives a message from you is indeed that person.
سؤال
When both the sender and recipient use the same secret key,the technique is called ____________________.
سؤال
The audit trail is the most important tool of the ____________________,the professional whose job it is to find erroneous or fraudulent cases and investigate them.
سؤال
What are the main goals of information security?
سؤال
To prepare for mishaps,either natural or malicious,many organizations have well-planned programs in place,called ____________________.
سؤال
There might be no point in spending much money to increase the "____________________" of uptime for every system.
سؤال
Discuss natural disasters that pose a risk to ISs.
سؤال
____________________ provide backup and operation facilities to which a client's employees can move and continue operations in case of a disaster.
سؤال
List common controls to protect systems from risks.
سؤال
One popular tracking tool is the ____________________: a series of documented facts that help detect who recorded which transactions,at what time,and under whose approval.
سؤال
____________________ are computer files that serve as the equivalent of ID cards by associating one's identity with one's public key.
فتح الحزمة
قم بالتسجيل لفتح البطاقات في هذه المجموعة!
Unlock Deck
Unlock Deck
1/75
auto play flashcards
العب
simple tutorial
ملء الشاشة (f)
exit full mode
Deck 14: Risks, security, and Disaster Recovery
1
Bots are implemented not only for access but also to implement policies and ensure that nonsensical data is not entered into corporate databases.
False
2
A digital certificate contains its holder's name,a serial number,expiration dates,and a copy of the certificate holder's public key (used to encrypt messages and digital signatures).
True
3
Computer "infections" are so named because they act on programs and data in a fashion similar to the way viruses act on living tissue.
False
4
Intentional damage to software occurs because of poor training,lack of adherence to simple backup procedures,or simple human error.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
5
Blackout units are a solution to extreme changes in voltage,and can provide several minutes to several hours of backup battery power.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
6
Companies that choose not to fully develop their own recovery plan can outsource it to companies that specialize in either disaster recovery planning or provision of alternative sites.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
7
In recent years,identity theft has been more prevalent as part of phishing.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
8
A protocol called Transport Layer Security (TLS)is used for transactions on the Web.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
9
Symmetric encryption is also called "public-key" encryption.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
10
Redundancies increase expected downtime.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
11
IS managers encourage users to change their user IDs frequently.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
12
Atomic transactions ensure encrypting of all appropriate files.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
13
The recipient of an encrypted message uses the certificate authority's private key to decode the digital certificate attached to the message.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
14
Controls translate business policies into system features.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
15
Encryption slows down communication because the software must encrypt and decrypt every message.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
16
Several manufacturers of computer equipment offer individual keyboard-embedded and mouse-embedded fingerprint devices.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
17
With encryption,the original message is called plaintext.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
18
Copies of applications are usually kept in a safe place to replace those that get damaged.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
19
The greater the number of interdependent systems,the greater the expected downtime.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
20
The best defense against unauthorized access to systems over the Internet is a firewall,which is hardware and software that blocks access to computing resources.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
21
A ____ is a server that contains a mirrored copy of a production database (a database that is used for business operations),or one with invalid records.

A) honeytoken
B) phish
C) bogus server
D) honeypot
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
22
____ a computer means using some or all of the resources of a computer linked to a public network without the consent of its owner.

A) Hijacking
B) Attacking
C) Phishing
D) Sequestering
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
23
____ are usually planted by insiders,that is,employees of the victimized organization.

A) Spams
B) Logic bombs
C) Phishes
D) Flames
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
24
With encryption,the coded message is called ____.

A) plaintext
B) privatetext
C) ciphertext
D) publictext
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
25
In ____,the voltage of the power decreases,or there are very short interruptions in the flow of power.

A) brownouts
B) blackouts
C) keystroke logging
D) UPSs
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
26
A ____ "represents" another server for all information requests from resources inside the trusted network.

A) proxy server
B) honeypot server
C) DNS server
D) secure server
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
27
One way to protect against viruses is to use ____,which is readily available on the market from companies that specialize in developing this kind of software,such as Symantec and McAfee.

A) antiphish software
B) security worms
C) antivirus software
D) secure viruses
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
28
____ encryption comprises two keys: one is public,and the other is private.

A) Parallel
B) Asymmetric
C) Symmetric
D) Double
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
29
A(n)____ is a set of indivisible transactions that are either all executed or none are-never only some.

A) biometric
B) a-transaction
C) biometric measurement
D) atomic transaction
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
30
____ occurs when a Web site receives an overwhelming number of information requests,such as merely logging on to a site.

A) Denial-of-service (DoS)
B) Global denial-of-service (GDoS)
C) Global attack
D) Full denial-of-service (FDoS)
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
31
____ is a set of disks that is programmed to replicate stored data to provide a higher degree of reliability.

A) SSP
B) RAI
C) RAID
D) SAN
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
32
Hijacking is carried out by surreptitiously installing a small program called a ____ on a computer.

A) mine
B) bot
C) spot
D) robot
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
33
____ software records individual keystrokes.

A) Clickstream
B) Keystroke logging
C) Virus
D) Remote access
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
34
____ are measures taken to ensure that only those who are authorized have access to a computer or network or to certain applications or data.

A) Boarding keys
B) Encrypted passes
C) Boarding passes
D) Access controls
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
35
A ____ is a bogus record in a networked database that neither employees nor business partners would ever access for legitimate purposes.

A) honeypot
B) phish
C) flame
D) honeytoken
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
36
Sometimes a(n)____ is automatically created using data,such as the date and time of a transaction or the name or password of the user updating the file.

A) atomic transaction
B) audit trail
C) denial of service
D) global transaction
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
37
____ is the secure version of HTTP.

A) SHTTP
B) HTMLSec
C) HTTPS
D) HTMLS
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
38
Coding a message into a form unreadable to an interceptor is called ____.

A) classification
B) encryption
C) modulation
D) demodulation
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
39
Con artists use tricks known as ____.

A) social pathology
B) knowledge theft
C) social engineering
D) data mining
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
40
To increase security,some companies implement the ____ approach.

A) DMZ (demilitarized zone)
B) denial of service (DoS)
C) atomic transaction
D) boarding key
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
41
A(n)____________________ is software that is programmed to cause damage at a specified time to specific applications and data files.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
42
____________________ are constraints and other restrictions imposed on a user or a system,and they can be used to secure systems against risks or to reduce damage caused to systems,applications,and data.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
43
Managers should focus on the asset they must protect,which in most cases is ____,not applications.

A) hardware
B) software
C) information
D) systems
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
44
When tapping communications,law enforcement agencies need the cooperation of a third party,such as a telephone company or a(n)____.

A) ISP
B) SSP
C) Web site
D) systems developer
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
45
CIOs often find the tasks of earmarking funds for ____ difficult because they cannot show the return on investment (ROI)of such planning.

A) backup programs
B) disaster recovery programs
C) archival programs
D) database security programs
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
46
____________________ occurs when a Web site receives an overwhelming number of information requests,such as merely logging on to a site.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
47
____________________,the time during which ISs or data are not available in the course of conducting business,has become a dreaded situation for almost every business worldwide.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
48
Employees are especially annoyed when they have to remember a different password for every system they use,a simpler solution is an approach called ____.

A) one-ID
B) SP (single password)
C) multiple encryption
D) SSO (single sign-on)
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
49
____,those without which the business cannot conduct its operations,are given the highest priority by the disaster recovery coordinator.

A) Backup applications
B) Up applications
C) Mission-critical applications
D) Recovery applications
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
50
The ____,as it is popularly known,gives law enforcement agencies surveillance and wiretapping rights they did not have before 2001.

A) PATRIOT Act
B) 9/11 Decree
C) 9/11 Act
D) PATRIOT Manifesto
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
51
CIOs often cite ____ as an effective way to bring down the amount of work their subordinates must do.

A) SSL
B) SDLC
C) DoS
D) SSO
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
52
Some viruses are called ____________________,analogous to the destructive gift given to the ancient Trojans.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
53
____________________ are total losses of electrical power.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
54
Once criminals have a person's identifying details,such as a Social Security number,driver's license number,or credit-card number,they can pretend to be this person,which is a crime called ____________________.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
55
Experience in ____ certain systems,such as ERP and SCM systems,can teach the IT staff for how many minutes or seconds per year the system is likely to fail.

A) operating
B) developing
C) maintaining
D) archiving
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
56
Probably the easiest way to protect against loss of data is to automatically duplicate all data periodically,a process referred to as data ____________________.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
57
An issuer of digital certificates is called a ____.

A) certificate dealer (CD)
B) certificate bank (CB)
C) certificate authority (CA)
D) certificate warehouse (CW)
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
58
A(n)____________________ characteristic is a unique physical,measurable characteristic of a human being that is used to identify a person.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
59
Experts are usually employed to estimate the cost and ____ of damages,as well as the cost of security measures.

A) impact
B) probabilities
C) effect
D) causes
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
60
To ensure against interruptions in power supply,organizations use ____________________ systems,which provide an alternative power supply for a short time,as soon as a power network fails.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
61
What are honeytokens?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
62
The cost of damage is the aggregate of all the potential damages multiplied by their respective ____________________.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
63
A(n)____________________ is a way to authenticate online messages,analogous to a physical signature on a piece of paper,but implemented with public-key cryptography.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
64
What is a Trojan horse?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
65
____________________ is the process of ensuring that the person who sends a message to or receives a message from you is indeed that person.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
66
When both the sender and recipient use the same secret key,the technique is called ____________________.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
67
The audit trail is the most important tool of the ____________________,the professional whose job it is to find erroneous or fraudulent cases and investigate them.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
68
What are the main goals of information security?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
69
To prepare for mishaps,either natural or malicious,many organizations have well-planned programs in place,called ____________________.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
70
There might be no point in spending much money to increase the "____________________" of uptime for every system.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
71
Discuss natural disasters that pose a risk to ISs.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
72
____________________ provide backup and operation facilities to which a client's employees can move and continue operations in case of a disaster.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
73
List common controls to protect systems from risks.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
74
One popular tracking tool is the ____________________: a series of documented facts that help detect who recorded which transactions,at what time,and under whose approval.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
75
____________________ are computer files that serve as the equivalent of ID cards by associating one's identity with one's public key.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
locked card icon
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.