Deck 4: Information Security

ملء الشاشة (f)
exit full mode
سؤال
The main purpose for the attack on Sony Picture Entertainment on November 24, 2014 was to __________.

A)sell social security numbers
B)steal credit card numbers
C)stop the release of the move The Interview
D)threaten the US government
استخدم زر المسافة أو
up arrow
down arrow
لقلب البطاقة.
سؤال
Weak passwords are a(n)___________ threat.

A)outside
B)employee
C)hardware
D)software
سؤال
_________ is the possibility that the system will be harmed by a threat.

A)Exposure
B)Threat
C)Security
D)Vulnerability
سؤال
The Heartbleed bug is an encryption security flaw in the ___________ software package that was an _____________ mistake by the software developer.

A)Microsoft; intended
B)Microsoft; unintended
C)OpenSSL; intended
D)OpenSSL; unintended
سؤال
The airport's self check-in computers are a(n)__________ threat.

A)outside
B)employee
C)hardware
D)software
سؤال
Which of the following is NOT an unintentional threat to information systems?

A)Careless monitoring of environmental hazards
B)Choosing a weak password
C)Having an unlocked desk or filing cabinet after going home
D)Viruses
سؤال
Social engineering is a(n)___________ threat on the part of the employee and a(n)_________ threat on the part of the social engineer.

A)deliberate; unintentional
B)deliberate; deliberate
C)unintentional; deliberate
D)unintentional; unintentional
سؤال
_________________ was originally accused of the Sony Picture Entertainment hack on November 24, 2014; their involvement ____________ been proved.

A)China; has
B)China; has not
C)North Korea; has
D)North Korea; has not
سؤال
_________ is any danger to which a system may be exposed.

A)Exposure
B)Information security
C)Threat
D)Security
سؤال
Which hacker group successfully attacked Sony Picture Entertainment on November 24, 2014?

A)Anonymous
B)Guardians of Peace
C)Hackweiser
D)Legion of Doom
سؤال
Which country is currently in a dispute with the US over bilateral hacking?

A)Australia
B)China
C)India
D)United Kingdom
سؤال
Wireless is a(n)inherently _________ network.

A)trusted
B)neutral
C)untrusted
D)useful
سؤال
Which of the following is NOT one of the most dangerous employees to information security?

A)Accountants
B)HR employees
C)Janitors
D)MIS employees
سؤال
Cybercriminals _________

A)are violent criminals.
B)can be easily arrested, once they are found.
C)don't make that much money; they do it for fun.
D)target known software security weaknesses.
سؤال
_____________________ is an attack in which the perpetrator uses social skills to trick or manipulate legitimate employees into providing confidential company information such as passwords.

A)Dumpster diving
B)Shoulder surfing
C)Social engineering
D)Tailgating
سؤال
Google created a code fix for the Heartbleed bug. Which of the following is a TRUE statement?

A)Home internet routers should be largely safe from this bug since they don't exchange enough sensitive data to be a target.
B)Industrial control systems are highly vulnerable since they are updated infrequently.
C)Organizations simply have to install the fix.
D)Organizations need to install the fix and just create new private key-public key pairs.
سؤال
_________________ manages the internet connections for North Korea and could stop hacking attempts on the US.

A)Australia
B)China
C)India
D)Russia
سؤال
Which of the following is NOT a lesson learned from the Sony Picture Entertainment hack on November 24, 2014?

A)China is the leading hacking group that encourages similar behavior from other countries.
B)It appears that it is impossible to secure the Internet.
C)It is difficult, if not impossible, for organization to provide perfect security for their data.
D)There is a growing danger that countries are engaging in economic cyberwarfare among themselves.
سؤال
OpenSSL is __________ software.

A)Banking
B)Encryption
C)Hacking
D)Free
سؤال
Which of the following is FALSE?

A)It is easier to be a hacker nowadays.
B)Mainframes make it easy to communicate freely and seamlessly with everyone.
C)Management doesn't always support security efforts.
D)Thumb drives make it easy to steal huge amounts of sensitive information.
سؤال
Phishing is an example of __________.

A)Copyright infringement
B)Espionage
C)Sabotage
D)Software attack
سؤال
You decide to use the password "1234" on your computer because you figure nobody cares enough about your information to steal it. This is a risk __________ strategy.

A)acceptance
B)analysis
C)limitation
D)transference
سؤال
A ___________ is a remote attack requiring user action.

A)back door
B)denial-of-service attack
C)logic bomb
D)phishing attack
سؤال
If you hire a cybersecurity company like FireEye to identify security weaknesses in your information systems, you are using a risk _________ strategy.

A)acceptance
B)analysis
C)limitation
D)transference
سؤال
Risk _______________ means absorbing any damages that occur.

A)acceptance
B)analysis
C)limitation
D)transference
سؤال
A ___________ is an attack by a programmer developing a system.

A)back door
B)denial-of-service attack
C)phishing attack
D)virus
سؤال
You have a small business that has had problems with malware on your employees' computers. You decide to hire a third-party company such as GFI Software to implement security controls and then monitor your company's systems. You are adopting a risk ________ strategy.

A)acceptance
B)analysis
C)limitation
D)transference
سؤال
___________ is threatening to steal or actually stealing information from a company and then demanding payment to not use or release that information.

A)Competitive intelligence
B)Espionage
C)Information extortion
D)Intellectual property
سؤال
Coca-Cola's formula is an example of a ___________.

A)Copyright
B)Patent
C)Trade secret
D)All of the above
سؤال
_______________ is a process whereby the organization takes concrete actions against risks, such as implementing controls and developing a disaster recovery plan.

A)Risk
B)Risk analysis
C)Risk management
D)Risk mitigation
سؤال
Shodan is used for _________.

A)creating a backdoor
B)SCADA attacks
C)spreading viruses
D)phishing
سؤال
A ___________ is an attack by a programmer developing a system.

A)denial-of-service attack
B)logic bomb
C)phishing attack
D)worm
سؤال
__________ is an identity theft technique.

A)Dumpster diving
B)Espionage
C)Sabotage
D)Vandalism
سؤال
Which of the following is NOT an example of alien software?

A)Adware
B)Blockware
C)Spamware
D)Spyware
سؤال
You start browsing your favorite home improvement company's website and notice someone has changed all the logos to their main competitor's logos. This is an example of ___________.

A)Espionage
B)Identity theft
C)Information extortion
D)Sabotage
سؤال
Shodan's primary purpose is ___________.

A)a hacker website
B)a service that searches the internet for devices connected to the internet
C)a website that shows which devices are vulnerable to hackers
D)to help users search for other people who use similar devices
سؤال
The Shodan case illustrates ___________.

A)how vulnerable all devices are, even if they aren't connected to the internet
B)strong passwords aren't necessary on home devices since most hackers don't care about such a small target
C)that hackers and security researchers use the same sites to identify vulnerabilities
D)the government is doing nothing to protect our privacy
سؤال
The goal of CAPTCHA is to ___________.

A)ensure you aren't alien software
B)hack into secure networks
C)protect networks against hackers
D)remove alien software from your computer
سؤال
SCADA attacks typically occur on ___________.

A)Hacker networks
B)Industrial control systems
C)Personal computers
D)Government networks
سؤال
A ___________ is a remote attack needing no user action.

A)back door
B)denial-of-service attack
C)logic bomb
D)phishing attack
سؤال
_________ is one common example of SSL.

A)http
B)https
C)www
D)wwws
سؤال
The purpose of SpyEye is to _____________.

A)catch hackers in the act of hacking
B)collect personal and financial information
C)facilitate SCADA attacks by seeing which systems are vulnerable
D)watch what you do on your computer
سؤال
___ percent of organizational breaches exploit weak or stolen user credentials.

A)26
B)51
C)76
D)99
سؤال
A patent lasts for the life of the creator plus 70 years.
سؤال
By hiring FireEye to improve their security, Target adopted a risk _________ strategy; this strategy was ___________.

A)limitation; a failure
B)limitation; successful
C)transference; a failure
D)transference; successful
سؤال
Competitive intelligence is industrial espionage.
سؤال
The Target data breach started with a ____________.

A)back door
B)denial-of-service attack
C)logic bomb
D)phishing attack
سؤال
The main problem with multifactor authentication is _____________.

A)it's a single point of failure
B)it's too hard to do
C)it will invade our privacy
D)there are no problems with multifactor authentication
سؤال
__________ is a computer security firm that sells malware detection tools to companies like Target.

A)Heartbleed
B)FireEye
C)Shodan
D)SpyEye
سؤال
A copyright lasts 20 years.
سؤال
Wireless is an untrusted network.
سؤال
Security must be balanced with _________ for people to use systems.

A)Convenience
B)Cost
C)Time
D)Trust
سؤال
According to the "Catching a Hacker" case, ____________ is one of the most sophisticated and destructive malicious software programs ever developed.

A)the Heartbleed bug
B)FireEye
C)Shodan
D)SpyEye
سؤال
Auditing __________ the computer means inputs, outputs, and processing are checked.

A)Around
B)Into
C)Through
D)With
سؤال
If you have an empty building you can move into if your primary location is destroyed, you've implemented a _________ site.

A)Cold
B)Hot
C)Neutral
D)Warm
سؤال
Janitors are no threat to information security since they have no access to company systems.
سؤال
A firewall is a _______ control.

A)access
B)communication
C)physical
D)virtual
سؤال
Biometrics is something the user _______.

A)Does
B)Has
C)Is
D)Knows
سؤال
The goal of risk management is to reduce risk to acceptable levels.
سؤال
A smart ID card is something the user _______.

A)Does
B)Has
C)Is
D)Knows
سؤال
________________ controls restrict unauthorized individuals from using information resources.
سؤال
Identity theft is a deliberate threat to information systems and is one of the largest concerns of consumers and businesses today. What are the four techniques the book mentions for illegally obtaining information? How can you protect yourself or your future business from these threats?
سؤال
What are the five factors that contribute to the increasing vulnerability of organizational information resources? Using the Target case as an example, how did each of these five factors contribute to that situation?
سؤال
____________________ is the loss of business from increased customer turnover.
سؤال
Whitelisting is when nothing can run unless it is on the list.
سؤال
_____________ is the probability that a threat will impact an information resource.
سؤال
_____________________________ is an attack in which the perpetrator uses social skills to trick or manipulate legitimate employees into providing confidential company information such as passwords.
سؤال
Blacklisting is when everything can run except what is on the list.
سؤال
_________________________ refers to all the processes and policies designed to protect an organization's information and information systems from unauthorized access, use, disclosure, disruption, modification, or destruction.
سؤال
Biometrics is an authentication tool.
سؤال
Why are IT people, consultants, janitors, and guards such dangerous employees? How can you protect a company's assets against these people?
سؤال
Why is it so difficult to stop cybercriminals?
سؤال
What are the six basic guidelines for creating strong passwords? Without divulging your passwords, how do your passwords "add up" and why? HINT: You should specifically address each of the six guidelines for your passwords.
سؤال
Tracking down cybercriminals is the most difficult and only real challenge authorities face.
سؤال
________________ is software that causes pop-up advertisements to appear on your screen.
فتح الحزمة
قم بالتسجيل لفتح البطاقات في هذه المجموعة!
Unlock Deck
Unlock Deck
1/75
auto play flashcards
العب
simple tutorial
ملء الشاشة (f)
exit full mode
Deck 4: Information Security
1
The main purpose for the attack on Sony Picture Entertainment on November 24, 2014 was to __________.

A)sell social security numbers
B)steal credit card numbers
C)stop the release of the move The Interview
D)threaten the US government
C
2
Weak passwords are a(n)___________ threat.

A)outside
B)employee
C)hardware
D)software
B
3
_________ is the possibility that the system will be harmed by a threat.

A)Exposure
B)Threat
C)Security
D)Vulnerability
D
4
The Heartbleed bug is an encryption security flaw in the ___________ software package that was an _____________ mistake by the software developer.

A)Microsoft; intended
B)Microsoft; unintended
C)OpenSSL; intended
D)OpenSSL; unintended
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
5
The airport's self check-in computers are a(n)__________ threat.

A)outside
B)employee
C)hardware
D)software
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
6
Which of the following is NOT an unintentional threat to information systems?

A)Careless monitoring of environmental hazards
B)Choosing a weak password
C)Having an unlocked desk or filing cabinet after going home
D)Viruses
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
7
Social engineering is a(n)___________ threat on the part of the employee and a(n)_________ threat on the part of the social engineer.

A)deliberate; unintentional
B)deliberate; deliberate
C)unintentional; deliberate
D)unintentional; unintentional
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
8
_________________ was originally accused of the Sony Picture Entertainment hack on November 24, 2014; their involvement ____________ been proved.

A)China; has
B)China; has not
C)North Korea; has
D)North Korea; has not
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
9
_________ is any danger to which a system may be exposed.

A)Exposure
B)Information security
C)Threat
D)Security
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
10
Which hacker group successfully attacked Sony Picture Entertainment on November 24, 2014?

A)Anonymous
B)Guardians of Peace
C)Hackweiser
D)Legion of Doom
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
11
Which country is currently in a dispute with the US over bilateral hacking?

A)Australia
B)China
C)India
D)United Kingdom
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
12
Wireless is a(n)inherently _________ network.

A)trusted
B)neutral
C)untrusted
D)useful
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
13
Which of the following is NOT one of the most dangerous employees to information security?

A)Accountants
B)HR employees
C)Janitors
D)MIS employees
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
14
Cybercriminals _________

A)are violent criminals.
B)can be easily arrested, once they are found.
C)don't make that much money; they do it for fun.
D)target known software security weaknesses.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
15
_____________________ is an attack in which the perpetrator uses social skills to trick or manipulate legitimate employees into providing confidential company information such as passwords.

A)Dumpster diving
B)Shoulder surfing
C)Social engineering
D)Tailgating
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
16
Google created a code fix for the Heartbleed bug. Which of the following is a TRUE statement?

A)Home internet routers should be largely safe from this bug since they don't exchange enough sensitive data to be a target.
B)Industrial control systems are highly vulnerable since they are updated infrequently.
C)Organizations simply have to install the fix.
D)Organizations need to install the fix and just create new private key-public key pairs.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
17
_________________ manages the internet connections for North Korea and could stop hacking attempts on the US.

A)Australia
B)China
C)India
D)Russia
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
18
Which of the following is NOT a lesson learned from the Sony Picture Entertainment hack on November 24, 2014?

A)China is the leading hacking group that encourages similar behavior from other countries.
B)It appears that it is impossible to secure the Internet.
C)It is difficult, if not impossible, for organization to provide perfect security for their data.
D)There is a growing danger that countries are engaging in economic cyberwarfare among themselves.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
19
OpenSSL is __________ software.

A)Banking
B)Encryption
C)Hacking
D)Free
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
20
Which of the following is FALSE?

A)It is easier to be a hacker nowadays.
B)Mainframes make it easy to communicate freely and seamlessly with everyone.
C)Management doesn't always support security efforts.
D)Thumb drives make it easy to steal huge amounts of sensitive information.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
21
Phishing is an example of __________.

A)Copyright infringement
B)Espionage
C)Sabotage
D)Software attack
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
22
You decide to use the password "1234" on your computer because you figure nobody cares enough about your information to steal it. This is a risk __________ strategy.

A)acceptance
B)analysis
C)limitation
D)transference
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
23
A ___________ is a remote attack requiring user action.

A)back door
B)denial-of-service attack
C)logic bomb
D)phishing attack
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
24
If you hire a cybersecurity company like FireEye to identify security weaknesses in your information systems, you are using a risk _________ strategy.

A)acceptance
B)analysis
C)limitation
D)transference
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
25
Risk _______________ means absorbing any damages that occur.

A)acceptance
B)analysis
C)limitation
D)transference
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
26
A ___________ is an attack by a programmer developing a system.

A)back door
B)denial-of-service attack
C)phishing attack
D)virus
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
27
You have a small business that has had problems with malware on your employees' computers. You decide to hire a third-party company such as GFI Software to implement security controls and then monitor your company's systems. You are adopting a risk ________ strategy.

A)acceptance
B)analysis
C)limitation
D)transference
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
28
___________ is threatening to steal or actually stealing information from a company and then demanding payment to not use or release that information.

A)Competitive intelligence
B)Espionage
C)Information extortion
D)Intellectual property
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
29
Coca-Cola's formula is an example of a ___________.

A)Copyright
B)Patent
C)Trade secret
D)All of the above
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
30
_______________ is a process whereby the organization takes concrete actions against risks, such as implementing controls and developing a disaster recovery plan.

A)Risk
B)Risk analysis
C)Risk management
D)Risk mitigation
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
31
Shodan is used for _________.

A)creating a backdoor
B)SCADA attacks
C)spreading viruses
D)phishing
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
32
A ___________ is an attack by a programmer developing a system.

A)denial-of-service attack
B)logic bomb
C)phishing attack
D)worm
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
33
__________ is an identity theft technique.

A)Dumpster diving
B)Espionage
C)Sabotage
D)Vandalism
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
34
Which of the following is NOT an example of alien software?

A)Adware
B)Blockware
C)Spamware
D)Spyware
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
35
You start browsing your favorite home improvement company's website and notice someone has changed all the logos to their main competitor's logos. This is an example of ___________.

A)Espionage
B)Identity theft
C)Information extortion
D)Sabotage
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
36
Shodan's primary purpose is ___________.

A)a hacker website
B)a service that searches the internet for devices connected to the internet
C)a website that shows which devices are vulnerable to hackers
D)to help users search for other people who use similar devices
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
37
The Shodan case illustrates ___________.

A)how vulnerable all devices are, even if they aren't connected to the internet
B)strong passwords aren't necessary on home devices since most hackers don't care about such a small target
C)that hackers and security researchers use the same sites to identify vulnerabilities
D)the government is doing nothing to protect our privacy
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
38
The goal of CAPTCHA is to ___________.

A)ensure you aren't alien software
B)hack into secure networks
C)protect networks against hackers
D)remove alien software from your computer
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
39
SCADA attacks typically occur on ___________.

A)Hacker networks
B)Industrial control systems
C)Personal computers
D)Government networks
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
40
A ___________ is a remote attack needing no user action.

A)back door
B)denial-of-service attack
C)logic bomb
D)phishing attack
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
41
_________ is one common example of SSL.

A)http
B)https
C)www
D)wwws
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
42
The purpose of SpyEye is to _____________.

A)catch hackers in the act of hacking
B)collect personal and financial information
C)facilitate SCADA attacks by seeing which systems are vulnerable
D)watch what you do on your computer
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
43
___ percent of organizational breaches exploit weak or stolen user credentials.

A)26
B)51
C)76
D)99
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
44
A patent lasts for the life of the creator plus 70 years.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
45
By hiring FireEye to improve their security, Target adopted a risk _________ strategy; this strategy was ___________.

A)limitation; a failure
B)limitation; successful
C)transference; a failure
D)transference; successful
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
46
Competitive intelligence is industrial espionage.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
47
The Target data breach started with a ____________.

A)back door
B)denial-of-service attack
C)logic bomb
D)phishing attack
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
48
The main problem with multifactor authentication is _____________.

A)it's a single point of failure
B)it's too hard to do
C)it will invade our privacy
D)there are no problems with multifactor authentication
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
49
__________ is a computer security firm that sells malware detection tools to companies like Target.

A)Heartbleed
B)FireEye
C)Shodan
D)SpyEye
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
50
A copyright lasts 20 years.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
51
Wireless is an untrusted network.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
52
Security must be balanced with _________ for people to use systems.

A)Convenience
B)Cost
C)Time
D)Trust
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
53
According to the "Catching a Hacker" case, ____________ is one of the most sophisticated and destructive malicious software programs ever developed.

A)the Heartbleed bug
B)FireEye
C)Shodan
D)SpyEye
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
54
Auditing __________ the computer means inputs, outputs, and processing are checked.

A)Around
B)Into
C)Through
D)With
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
55
If you have an empty building you can move into if your primary location is destroyed, you've implemented a _________ site.

A)Cold
B)Hot
C)Neutral
D)Warm
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
56
Janitors are no threat to information security since they have no access to company systems.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
57
A firewall is a _______ control.

A)access
B)communication
C)physical
D)virtual
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
58
Biometrics is something the user _______.

A)Does
B)Has
C)Is
D)Knows
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
59
The goal of risk management is to reduce risk to acceptable levels.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
60
A smart ID card is something the user _______.

A)Does
B)Has
C)Is
D)Knows
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
61
________________ controls restrict unauthorized individuals from using information resources.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
62
Identity theft is a deliberate threat to information systems and is one of the largest concerns of consumers and businesses today. What are the four techniques the book mentions for illegally obtaining information? How can you protect yourself or your future business from these threats?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
63
What are the five factors that contribute to the increasing vulnerability of organizational information resources? Using the Target case as an example, how did each of these five factors contribute to that situation?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
64
____________________ is the loss of business from increased customer turnover.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
65
Whitelisting is when nothing can run unless it is on the list.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
66
_____________ is the probability that a threat will impact an information resource.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
67
_____________________________ is an attack in which the perpetrator uses social skills to trick or manipulate legitimate employees into providing confidential company information such as passwords.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
68
Blacklisting is when everything can run except what is on the list.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
69
_________________________ refers to all the processes and policies designed to protect an organization's information and information systems from unauthorized access, use, disclosure, disruption, modification, or destruction.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
70
Biometrics is an authentication tool.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
71
Why are IT people, consultants, janitors, and guards such dangerous employees? How can you protect a company's assets against these people?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
72
Why is it so difficult to stop cybercriminals?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
73
What are the six basic guidelines for creating strong passwords? Without divulging your passwords, how do your passwords "add up" and why? HINT: You should specifically address each of the six guidelines for your passwords.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
74
Tracking down cybercriminals is the most difficult and only real challenge authorities face.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
75
________________ is software that causes pop-up advertisements to appear on your screen.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
locked card icon
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.