Deck 1: Introduction to Information Security

ملء الشاشة (f)
exit full mode
سؤال
A ____ attempts to protect internal systems from outside threats.

A) security perimeter
B) botnet
C) risk management strategy
D) buffer overflow
استخدم زر المسافة أو
up arrow
down arrow
لقلب البطاقة.
سؤال
The ____ would typically NOT be a member of the security project team.

A) CIO
B) systems adminstrator
C) CISO
D) All of these could be a member of the security project team
سؤال
Acceptance is a viable solution only if the organization has evaluated the risk and determined that the implementation of additional controls or strategies is not justified, due to cost or other organizational issues.
سؤال
A virus that is embedded in the automatically executing scipts commonly found in word processors, spreadsheets, and database applications is called a ____.

A) worm
B) boot virus
C) Trojan horse
D) macro virus
سؤال
An individual who hacks the public telephone network to make free calls or disrupt services is called a ____.

A) phreaker
B) hactivist
C) packet monkey
D) cyberterrorist
سؤال
To make sound decisions about information security, management must be informed about the various threats facing the organization, its people, applications, data, and information systems.
سؤال
To achieve the maximum confidentiality and integrity found in a completely secure information system would require that the system not allow access (or availability) to anyone.
سؤال
According the to CSI/FBI Computer Crime and Security Survey, the most dominant type of attack for the last decade was ____.

A) insider abuse
B) denial of service
C) physical loss (theft)
D) malware infection
سؤال
The ____ is based on a model developed by the U.S.Committee on National Systems Security (CNSS).

A) TVA worksheet
B) C.I.A. triangle
C) McCumber Cube
D) man-in-the-middle attack
سؤال
A(n) ____ is a weakness or fault in the mechanisms that are intended to protect information and information assets from attack or damage.

A) threat
B) exploit
C) vulnerability
D) risk
سؤال
End users are ____.

A) not important to the security of an organization
B) a part of the security project team
C) all risk assessment specialists
D) often considered data custodians
سؤال
A(n) ____ attack is when a system is compromised and used to attack other systems.

A) direct
B) indirect
C) object
D) subject
سؤال
A data ____ might be a specifically identified role or part of the duties of a systems administrator.

A) owner
B) custodian
C) manager
D) user
سؤال
A(n) ____ is a category of object, person, or other entity that poses a potential risk of loss to an asset.

A) risk
B) exploit
C) threat
D) attack
سؤال
Brute force attacks are often successful against systems that have adopted the usual security practices recommended by manufacturers.
سؤال
When a computer is the ____ of an attack, it is used as an active tool to conduct the attack.

A) subject
B) victim
C) object
D) direction
سؤال
A majority of organizations use information systems primarily to support their strategic planning.
سؤال
____ means that information is free from mistakes or errors.

A) Accuracy
B) Availability
C) Confidentiality
D) Integrity
سؤال
____ refers to multiple layers of security controls and safeguards is called.

A) A DMZ
B) A security perimeter
C) Defense in depth
D) Layered redundancy
سؤال
The threat of ____ involves a malicious individual observing another's password by watching the victim while they are performing system login activities.

A) packet monkeys
B) intellectual property
C) shoulder surfing
D) script kiddies
سؤال
Attempting to determine a password that is not known to the attacker is often called ____.

A) brute force
B) hacking
C) cracking
D) spamming
سؤال
Match each item with a statement below.
a.data custodian
b.Trojan horse
c.integrity
d.back door
e.balance
f.worm
g.accuracy
h.data owner
i.confidentiality
Information remains whole, complete, and uncorrupted.
سؤال
____ is a technique used to gain unauthorized access to computers, wherein the attacker assumes or simulates an address that indicate to the victim that the messages are coming from the address of a trusted host.

A) Sniffing
B) Spoofing
C) Spamming
D) DDoS
سؤال
Match each item with a statement below.
a.data custodian
b.Trojan horse
c.integrity
d.back door
e.balance
f.worm
g.accuracy
h.data owner
i.confidentiality
Component in a system that allows the attacker to access the system at will, bypassing standard login controls.
سؤال
____ attacks may involve individuals posing as new employees or as current employees desperately requesting assistance to avoid getting fired.

A) Buffer overflow
B) Cracking
C) Social engineering
D) Spoofing
سؤال
The ____________________ is primarily responsible for advising the chief executive officer, president, or company owner on the strategic planning that affects the management of information in the organization.
سؤال
Match each item with a statement below.
a.data custodian
b.Trojan horse
c.integrity
d.back door
e.balance
f.worm
g.accuracy
h.data owner
i.confidentiality
Software programs that reveals its designed behavior only when activated.
سؤال
Match each item with a statement below.
a.data custodian
b.Trojan horse
c.integrity
d.back door
e.balance
f.worm
g.accuracy
h.data owner
i.confidentiality
Malicious program that replicates itself constantly.
سؤال
Match each item with a statement below.
a.data custodian
b.Trojan horse
c.integrity
d.back door
e.balance
f.worm
g.accuracy
h.data owner
i.confidentiality
Responsible for the storage, maintenance, and protection of the information.
سؤال
A(n) ____________________ is an application error that occurs when more data is sent to a buffer than it can handle.
سؤال
Match each item with a statement below.
a.data custodian
b.Trojan horse
c.integrity
d.back door
e.balance
f.worm
g.accuracy
h.data owner
i.confidentiality
Responsible for the security and use of a particular set of information.
سؤال
In a(n) ____________________ attack, the attacker monitors (or sniffs) packets from the network, modifies them using Internet Protocol spoofing techniques, and then inserts them back into the network.
سؤال
A prolonged increase in power is called a ____.

A) spike
B) surge
C) sag
D) fault
سؤال
In a ____ attack, the attacker sends a large number of connection or information requests to a target in an attempt to overwhelm its capacity and make it unavailable for legitimate users.

A) man-in-the-middle
B) sniffer
C) dictionary
D) denial-of-service (DoS)
سؤال
Match each item with a statement below.
a.data custodian
b.Trojan horse
c.integrity
d.back door
e.balance
f.worm
g.accuracy
h.data owner
i.confidentiality
Information is free from mistakes or errors.
سؤال
An organization will often create a network security ____________________, which defines the boundary between the outer limit of an organization's security and the beginning of the outside network.
سؤال
A ____ is an e-mail attack in which the attacker routes large quantities of e-mail to the target system hoping to overwhelm the target with so much irrelevant email that legitimate email cannot be used.

A) spam attack
B) mail bomb
C) sniffer
D) cracker
سؤال
The most common Intellectual Property breach is ____________________.
سؤال
Match each item with a statement below.
a.data custodian
b.Trojan horse
c.integrity
d.back door
e.balance
f.worm
g.accuracy
h.data owner
i.confidentiality
Information is protected from disclosure or exposure to unauthorized individuals or systems.
سؤال
Match each item with a statement below.
a.data custodian
b.Trojan horse
c.integrity
d.back door
e.balance
f.worm
g.accuracy
h.data owner
i.confidentiality
Involves operating an information system that meets the high level of availability sought by system users as well as the confidentiality and integrity needs of system owners and security professionals
سؤال
Describe the balance between information security and access.
سؤال
Provide an example of a social engineering attack.
سؤال
What is the role of the chief information security officer (CISO)?
سؤال
What is defense in depth?
سؤال
Describe a dictionary attack.
سؤال
Describe the importance of enabling the safe operation of applications.
سؤال
Describe the difference between direct and indirect attacks.
سؤال
Describe characteristic of utility as it relates to information.
سؤال
What are the responsibilities of a data custodian?
سؤال
What important organizational functions are performed by Information Security?
فتح الحزمة
قم بالتسجيل لفتح البطاقات في هذه المجموعة!
Unlock Deck
Unlock Deck
1/50
auto play flashcards
العب
simple tutorial
ملء الشاشة (f)
exit full mode
Deck 1: Introduction to Information Security
1
A ____ attempts to protect internal systems from outside threats.

A) security perimeter
B) botnet
C) risk management strategy
D) buffer overflow
A
2
The ____ would typically NOT be a member of the security project team.

A) CIO
B) systems adminstrator
C) CISO
D) All of these could be a member of the security project team
D
3
Acceptance is a viable solution only if the organization has evaluated the risk and determined that the implementation of additional controls or strategies is not justified, due to cost or other organizational issues.
True
4
A virus that is embedded in the automatically executing scipts commonly found in word processors, spreadsheets, and database applications is called a ____.

A) worm
B) boot virus
C) Trojan horse
D) macro virus
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
5
An individual who hacks the public telephone network to make free calls or disrupt services is called a ____.

A) phreaker
B) hactivist
C) packet monkey
D) cyberterrorist
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
6
To make sound decisions about information security, management must be informed about the various threats facing the organization, its people, applications, data, and information systems.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
7
To achieve the maximum confidentiality and integrity found in a completely secure information system would require that the system not allow access (or availability) to anyone.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
8
According the to CSI/FBI Computer Crime and Security Survey, the most dominant type of attack for the last decade was ____.

A) insider abuse
B) denial of service
C) physical loss (theft)
D) malware infection
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
9
The ____ is based on a model developed by the U.S.Committee on National Systems Security (CNSS).

A) TVA worksheet
B) C.I.A. triangle
C) McCumber Cube
D) man-in-the-middle attack
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
10
A(n) ____ is a weakness or fault in the mechanisms that are intended to protect information and information assets from attack or damage.

A) threat
B) exploit
C) vulnerability
D) risk
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
11
End users are ____.

A) not important to the security of an organization
B) a part of the security project team
C) all risk assessment specialists
D) often considered data custodians
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
12
A(n) ____ attack is when a system is compromised and used to attack other systems.

A) direct
B) indirect
C) object
D) subject
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
13
A data ____ might be a specifically identified role or part of the duties of a systems administrator.

A) owner
B) custodian
C) manager
D) user
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
14
A(n) ____ is a category of object, person, or other entity that poses a potential risk of loss to an asset.

A) risk
B) exploit
C) threat
D) attack
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
15
Brute force attacks are often successful against systems that have adopted the usual security practices recommended by manufacturers.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
16
When a computer is the ____ of an attack, it is used as an active tool to conduct the attack.

A) subject
B) victim
C) object
D) direction
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
17
A majority of organizations use information systems primarily to support their strategic planning.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
18
____ means that information is free from mistakes or errors.

A) Accuracy
B) Availability
C) Confidentiality
D) Integrity
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
19
____ refers to multiple layers of security controls and safeguards is called.

A) A DMZ
B) A security perimeter
C) Defense in depth
D) Layered redundancy
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
20
The threat of ____ involves a malicious individual observing another's password by watching the victim while they are performing system login activities.

A) packet monkeys
B) intellectual property
C) shoulder surfing
D) script kiddies
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
21
Attempting to determine a password that is not known to the attacker is often called ____.

A) brute force
B) hacking
C) cracking
D) spamming
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
22
Match each item with a statement below.
a.data custodian
b.Trojan horse
c.integrity
d.back door
e.balance
f.worm
g.accuracy
h.data owner
i.confidentiality
Information remains whole, complete, and uncorrupted.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
23
____ is a technique used to gain unauthorized access to computers, wherein the attacker assumes or simulates an address that indicate to the victim that the messages are coming from the address of a trusted host.

A) Sniffing
B) Spoofing
C) Spamming
D) DDoS
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
24
Match each item with a statement below.
a.data custodian
b.Trojan horse
c.integrity
d.back door
e.balance
f.worm
g.accuracy
h.data owner
i.confidentiality
Component in a system that allows the attacker to access the system at will, bypassing standard login controls.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
25
____ attacks may involve individuals posing as new employees or as current employees desperately requesting assistance to avoid getting fired.

A) Buffer overflow
B) Cracking
C) Social engineering
D) Spoofing
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
26
The ____________________ is primarily responsible for advising the chief executive officer, president, or company owner on the strategic planning that affects the management of information in the organization.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
27
Match each item with a statement below.
a.data custodian
b.Trojan horse
c.integrity
d.back door
e.balance
f.worm
g.accuracy
h.data owner
i.confidentiality
Software programs that reveals its designed behavior only when activated.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
28
Match each item with a statement below.
a.data custodian
b.Trojan horse
c.integrity
d.back door
e.balance
f.worm
g.accuracy
h.data owner
i.confidentiality
Malicious program that replicates itself constantly.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
29
Match each item with a statement below.
a.data custodian
b.Trojan horse
c.integrity
d.back door
e.balance
f.worm
g.accuracy
h.data owner
i.confidentiality
Responsible for the storage, maintenance, and protection of the information.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
30
A(n) ____________________ is an application error that occurs when more data is sent to a buffer than it can handle.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
31
Match each item with a statement below.
a.data custodian
b.Trojan horse
c.integrity
d.back door
e.balance
f.worm
g.accuracy
h.data owner
i.confidentiality
Responsible for the security and use of a particular set of information.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
32
In a(n) ____________________ attack, the attacker monitors (or sniffs) packets from the network, modifies them using Internet Protocol spoofing techniques, and then inserts them back into the network.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
33
A prolonged increase in power is called a ____.

A) spike
B) surge
C) sag
D) fault
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
34
In a ____ attack, the attacker sends a large number of connection or information requests to a target in an attempt to overwhelm its capacity and make it unavailable for legitimate users.

A) man-in-the-middle
B) sniffer
C) dictionary
D) denial-of-service (DoS)
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
35
Match each item with a statement below.
a.data custodian
b.Trojan horse
c.integrity
d.back door
e.balance
f.worm
g.accuracy
h.data owner
i.confidentiality
Information is free from mistakes or errors.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
36
An organization will often create a network security ____________________, which defines the boundary between the outer limit of an organization's security and the beginning of the outside network.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
37
A ____ is an e-mail attack in which the attacker routes large quantities of e-mail to the target system hoping to overwhelm the target with so much irrelevant email that legitimate email cannot be used.

A) spam attack
B) mail bomb
C) sniffer
D) cracker
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
38
The most common Intellectual Property breach is ____________________.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
39
Match each item with a statement below.
a.data custodian
b.Trojan horse
c.integrity
d.back door
e.balance
f.worm
g.accuracy
h.data owner
i.confidentiality
Information is protected from disclosure or exposure to unauthorized individuals or systems.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
40
Match each item with a statement below.
a.data custodian
b.Trojan horse
c.integrity
d.back door
e.balance
f.worm
g.accuracy
h.data owner
i.confidentiality
Involves operating an information system that meets the high level of availability sought by system users as well as the confidentiality and integrity needs of system owners and security professionals
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
41
Describe the balance between information security and access.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
42
Provide an example of a social engineering attack.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
43
What is the role of the chief information security officer (CISO)?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
44
What is defense in depth?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
45
Describe a dictionary attack.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
46
Describe the importance of enabling the safe operation of applications.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
47
Describe the difference between direct and indirect attacks.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
48
Describe characteristic of utility as it relates to information.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
49
What are the responsibilities of a data custodian?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
50
What important organizational functions are performed by Information Security?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
locked card icon
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.