Deck 9: E-Commerce Security and Fraud Protection

ملء الشاشة (f)
exit full mode
سؤال
A cyberwarrior is a person who intentionally carries out crimes over the Internet.
استخدم زر المسافة أو
up arrow
down arrow
لقلب البطاقة.
سؤال
Exposure is the estimated cost,loss,or damage that can result if a threat exploits a vulnerability.
سؤال
Protection of the U.S.computer networks is in the hands of the Department of the Interior (DOI).
سؤال
The Internet,or more specifically the Internet and network protocols,was never intended for use by untrusted users or components.
سؤال
Spam and spyware are the most frequently used technical security attack methods used by cybercriminals.
سؤال
An IP address uniquely identifies each computer connected to a network or the Internet.
سؤال
Computer security refers to the protection of data,networks,computer programs,computer power,and other elements of computerized information systems.
سؤال
Detection measures are actions that will make criminals abandon their idea of attacking a specific system.
سؤال
The CyberCop Portal analyzes and combats cyberthreats and vulnerabilities.
سؤال
Validation is the assurance that online customers or trading partners cannot falsely deny their purchase or transaction.
سؤال
There is a clear shift in the nature of the operation of computer criminals from the desire for fame to the desire for financial gain.
سؤال
Fraud is aimed mostly against organizations.
سؤال
Seattle's Northwest Hospital and Medical Center was attacked by malware that was able to enter their network through a Windows flaw.
سؤال
Key logs provide the means to reconstruct what specific actions have occurred and may help EC security investigators identify the person or program that performed unauthorized actions.
سؤال
A macro virus or macro worm is executed when the application object that contains the macro is opened or a particular procedure is executed.
سؤال
Social engineering refers to criminals tricking unsuspecting people into giving them information or access that they should not have.
سؤال
A cyberwar occurs when computers are set up to attack other computers in the same or other organizations.
سؤال
Data leaks were the most important EC security management concern for 2011.
سؤال
The Internet was designed for maximum efficiency and security by providing for error checking to ensure that the message was sent and received correctly,user authentication,and access control.
سؤال
Phishing is an example of a technical attack.
سؤال
________ is a crimeware technique used to steal the identity of target companies to get the identities of their customers.

A) Spamming
B) Pretexting
C) Social engineering
D) Phishing
سؤال
Protecting information and information systems from unauthorized access,use,disclosure,disruption,modification,perusal,inspection,recording,or destruction best defines

A) information security.
B) security audit.
C) anti-virus protection.
D) incident management.
سؤال
Network viruses can enter through unprotected ports and compromise the whole network.
سؤال
Risk aversion is an approach oriented toward prevention and seeks to minimize the chance of avoidable disasters.
سؤال
The ________ translates or converts domain names to their IP addresses.

A) IPS
B) DOS
C) VPN
D) DNS
سؤال
Acceptable use policies (AUP)inform users of their responsibilities when a cyberattack or network intrusion has occurred.
سؤال
A digital envelope is the combination of the encrypted original message and the digital signature,using the recipient's public key.
سؤال
Girlfriend Trojans come to life when computer owners visit one of a number of online banking or e-commerce sites.
سؤال
Due care in EC are those actions that a company is reasonably expected to take based on the risks affecting its business and online transactions.
سؤال
Ninety-three percent of companies that suffer a significant data loss go out of business within 5 years.
سؤال
Biometric systems are authentication systems that identify a person by measurement of a biological characteristic,such as fingerprints,iris patterns,facial features,or voice.
سؤال
General controls are intended to protect specific applications.
سؤال
Access control is a mechanism that determines who can legitimately use a network resource.
سؤال
Splogs are software applications that have some degree of reactivity,autonomy,and adaptability.An agent is able to adapt itself based on changes occurring in its environment.
سؤال
________ refers to the e-markets for stolen information.

A) Internet underground economy
B) Denial of service
C) Cybercriminal
D) Virtual private network
سؤال
________ systems are highly useful for both law enforcement and for law breaking,for example,by providing a means to obtain passwords or encryption keys and thus bypassing other security measures.

A) Biometric
B) Keystroke logging
C) Access control
D) Intrusion detection
سؤال
An intrusion detection system uses the public Internet to carry information but remains private by using encryption,authentication,and access control to verify the identity of anyone using the network.
سؤال
Malvertising is fake online advertising designed to trick you into downloading malicious software onto your computer.
سؤال
The success of an EC security strategy and program depends on the commitment and involvement of senior management.
سؤال
A honeypot is a production system that looks like it does real work,but acts as a decoy and is watched to study how network intrusions occur.
سؤال
The estimated cost,loss,or damage that can result if a threat exploits a vulnerability best describes

A) total cost of ownership.
B) present value of risk.
C) exposure.
D) risk feasibility assessment.
سؤال
A malicious hacker who may represent a serious problem for a corporation best describes a

A) cyberspy.
B) cracker.
C) web surfer.
D) Internet commando.
سؤال
Creating a rogue copy of a popular website that shows contents similar to the original to a Web crawler.Once there,an unsuspecting user is redirected to malicious websites.This description is indicative of

A) electronic splogging.
B) cyberworming.
C) page hijacking.
D) spamming.
سؤال
An attack on a website in which an attacker uses specialized software to send a flood of data packets to the target computer with the aim of overloading its resources best describes

A) cyberraid.
B) denial-of-service attack.
C) cyberhijacking.
D) botnet infestation.
سؤال
The protection of information systems against unauthorized access to or modification of information that is stored,processed,or being sent over a network is referred to as

A) information assurance.
B) data integrity.
C) information integrity.
D) human firewall.
سؤال
A generic term for malicious software is

A) NOS.
B) ad-aware.
C) spynet.
D) malware.
سؤال
A program that appears to have a useful function but that contains a hidden function that presents a security risk best defines

A) virus.
B) worm.
C) Trojan horse.
D) botnet.
سؤال
The probability that a vulnerability will be known and used best describes

A) risk.
B) feasibility.
C) security fault.
D) splog point.
سؤال
According to Sullivan (2011),the vulnerabilities in Business IT and EC systems include each of the following organizational weaknesses except

A) end-user training and security awareness.
B) lax security with mobile devices.
C) inappropriate use of business computers and network services.
D) closed systems not reacting quickly enough to security breaches.
سؤال
The assurance that an online customer or trading partner cannot falsely deny their purchase or transaction is referred to as

A) integrity.
B) availability.
C) authentication.
D) nonrepudiation.
سؤال
A type of nontechnical attack that uses some ruse to trick users into revealing information or performing an action that compromises a computer or network best describes

A) splog.
B) social engineering.
C) viral email.
D) identity theft.
سؤال
Computers infected with malware that are under the control of a spammer,hacker,or other criminal best describes

A) fraud servers.
B) electronic defenders.
C) zombies.
D) cyber warriors.
سؤال
A plan that keeps the business running after a disaster occurs best defines

A) security audit specifications.
B) business continuity plan.
C) vulnerability assessment plan.
D) project initiation plan.
سؤال
The process of verifying the real identity of an individual,computer,computer program,or EC website best defines

A) vulnerability assessment.
B) security audit.
C) authentication.
D) authorization.
سؤال
A strategy that views EC security as the process of preventing and detecting unauthorized use of the organization's brand,identity,website,e-mail,information,or other asset and attempts to defraud the organization,its customers,and employees best describes

A) feasibility assessment.
B) EC security strategy.
C) information systems security plan.
D) disaster recovery plan.
سؤال
The process of determining what the authenticated entity is allowed to access and what operations it is allowed to perform is known as

A) integrity.
B) availability.
C) authorization.
D) nonrepudiation.
سؤال
A software program that runs independently,consuming the resources of its host in order to maintain itself,that is capable of propagating a complete working version of itself onto another machine best describes

A) splog.
B) tidal wave.
C) Trojan horse.
D) worm.
سؤال
Unintentional threats include each of the following except

A) human errors.
B) environmental hazards.
C) computer system malfunctions.
D) identity theft.
سؤال
According to Sullivan (2011),vulnerabilities in IT and EC systems include each of the following except

A) poor application security.
B) weak boundary security.
C) lack of environmental support.
D) unencrypted communications.
سؤال
Someone who gains unauthorized access to a computer system best describes a

A) hacker.
B) network technician.
C) cyberwarrior.
D) cyberseeker.
سؤال
A botnet is a

A) collection of a few hundred hijacked Internet computers that have been set up to forward traffic, including spam and viruses, to other computers on the Internet.
B) piece of software code that inserts itself into a host or operating system to launch DoS attacks.
C) piece of code in a worm that spreads rapidly and exploits some known vulnerability.
D) coordinated network of computers that can scan and compromise other computers and launch DoS attacks.
سؤال
The key reasons why EC criminals cannot be stopped include each of the following except

A) sophisticated hackers use browsers to crack into Web sites.
B) strong EC security makes online shopping inconvenient and demanding on customers.
C) there is a lack of cooperation from credit card issuers and foreign ISPs.
D) online shoppers do not take necessary precautions to avoid becoming a victim.
سؤال
Fingerprint scanners,facial recognition systems,and voice recognition are examples of ________ that recognize a person by some physical trait.

A) biometric systems
B) human firewalls
C) intrusion detection systems
D) access control lists
سؤال
A method used to ensure confidentiality and integrity of data transmitted over the Internet by encrypting data packets,sending them in packets across the Internet,and decrypting them at the destination address best defines

A) data wrapping.
B) message envelope.
C) protocol tunneling.
D) Trojan horse.
سؤال
Security functions or characteristics of digital signatures include all of the following except

A) a digital signature is the electronic equivalent of a personal signature, which can be forged.
B) digital signatures are based on public keys for authenticating the identity of the sender of a message or document.
C) digital signatures ensure that the original content of an electronic message or document is unchanged.
D) digital signatures are portable.
سؤال
A page that uses techniques that deliberately subvert a search engine's algorithms to artificially inflate the page's ranking best describes

A) Trojan page.
B) spam site.
C) zombie.
D) search engine imposter.
سؤال
Which of the following refers to the assurance that access to data,the website,or other EC data service is timely,available,reliable,and restricted to authorized users?

A) spontaneity
B) confidentiality
C) integrity
D) availability
سؤال
An exercise that determines the impact of losing the support of an EC resource to an organization and establishes the escalation of that loss over time,identifies the minimum resources needed to recover,and prioritizes the recovery of processes and supporting systems best describes

A) business continuity plan.
B) business impact analysis.
C) vulnerability assessment.
D) computer security incident management.
سؤال
A mathematical computation that is applied to a message,using a private key to encrypt the message,best defines

A) locking code.
B) Sharpe ratio.
C) hash.
D) standard deviation.
سؤال
Advantages of virtual private networks include each of the following except

A) they are less expensive than private leased lines because they use the public Internet to carry information.
B) they ensure the confidentiality and integrity of the data transmitted over the Internet without requiring encryption.
C) they can reduce communication costs dramatically because VPN equipment is cheaper than other remote solutions.
D) remote users can use broadband connections rather than make long distance calls to access an organization's private network.
سؤال
Which of the following refers to the assurance of data privacy and accuracy?

A) integrity
B) availability
C) confidentiality
D) security
سؤال
Software that gathers user information over an Internet connection without the user's knowledge best defines

A) spyware.
B) Trojan horse.
C) zombie.
D) search engine spam.
سؤال
An EC security strategy and program begins with

A) the commitment and involvement of executive management.
B) layers of hardware and software defenses.
C) information security policies and training.
D) secure design of EC applications.
سؤال
The mathematical formula used to encrypt the plaintext into the ciphertext,and vice versa best defines

A) key space.
B) encryption algorithm.
C) locking algorithm.
D) public key infrastructure.
سؤال
A method of evaluating the security of a computer system or a network by simulating an attack from a malicious source best describes

A) vulnerability assessment.
B) penetration test.
C) security breach.
D) cyber audit.
سؤال
The large number of possible key values created by the algorithm to use when transforming the message best describes

A) determinate.
B) encryption code.
C) encryption lock.
D) key space.
سؤال
The success and security of EC can be measured by

A) encryption, functionality, and privacy.
B) quality, reliability, and speed.
C) authentication, authorization, and nonrepudiation.
D) confidentiality, integrity, and availability.
سؤال
Which of the following refers to the process of identifying,quantifying,and prioritizing the vulnerabilities in a system?

A) vulnerability assessment
B) feasibility assessment
C) initial security report
D) certification audit
سؤال
A summary of a message converted into a string of digits after the hash has been applied best describes

A) reference rate.
B) message digest.
C) digital certificate.
D) key code.
سؤال
Each of the following is a characteristic of access control except

A) access control determines which persons, programs, or machines can legitimately use a network resource and which resources he, she, or it can use.
B) access control lists (ACLs) define users' rights, such as what they are allowed to read, view, write, print, copy, delete, execute, modify, or move.
C) all resources need to be considered together to identify the rights of users or categories of users.
D) after a user has been identified, the user must be authenticated.
فتح الحزمة
قم بالتسجيل لفتح البطاقات في هذه المجموعة!
Unlock Deck
Unlock Deck
1/85
auto play flashcards
العب
simple tutorial
ملء الشاشة (f)
exit full mode
Deck 9: E-Commerce Security and Fraud Protection
1
A cyberwarrior is a person who intentionally carries out crimes over the Internet.
False
2
Exposure is the estimated cost,loss,or damage that can result if a threat exploits a vulnerability.
True
3
Protection of the U.S.computer networks is in the hands of the Department of the Interior (DOI).
False
4
The Internet,or more specifically the Internet and network protocols,was never intended for use by untrusted users or components.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 85 في هذه المجموعة.
فتح الحزمة
k this deck
5
Spam and spyware are the most frequently used technical security attack methods used by cybercriminals.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 85 في هذه المجموعة.
فتح الحزمة
k this deck
6
An IP address uniquely identifies each computer connected to a network or the Internet.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 85 في هذه المجموعة.
فتح الحزمة
k this deck
7
Computer security refers to the protection of data,networks,computer programs,computer power,and other elements of computerized information systems.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 85 في هذه المجموعة.
فتح الحزمة
k this deck
8
Detection measures are actions that will make criminals abandon their idea of attacking a specific system.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 85 في هذه المجموعة.
فتح الحزمة
k this deck
9
The CyberCop Portal analyzes and combats cyberthreats and vulnerabilities.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 85 في هذه المجموعة.
فتح الحزمة
k this deck
10
Validation is the assurance that online customers or trading partners cannot falsely deny their purchase or transaction.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 85 في هذه المجموعة.
فتح الحزمة
k this deck
11
There is a clear shift in the nature of the operation of computer criminals from the desire for fame to the desire for financial gain.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 85 في هذه المجموعة.
فتح الحزمة
k this deck
12
Fraud is aimed mostly against organizations.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 85 في هذه المجموعة.
فتح الحزمة
k this deck
13
Seattle's Northwest Hospital and Medical Center was attacked by malware that was able to enter their network through a Windows flaw.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 85 في هذه المجموعة.
فتح الحزمة
k this deck
14
Key logs provide the means to reconstruct what specific actions have occurred and may help EC security investigators identify the person or program that performed unauthorized actions.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 85 في هذه المجموعة.
فتح الحزمة
k this deck
15
A macro virus or macro worm is executed when the application object that contains the macro is opened or a particular procedure is executed.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 85 في هذه المجموعة.
فتح الحزمة
k this deck
16
Social engineering refers to criminals tricking unsuspecting people into giving them information or access that they should not have.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 85 في هذه المجموعة.
فتح الحزمة
k this deck
17
A cyberwar occurs when computers are set up to attack other computers in the same or other organizations.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 85 في هذه المجموعة.
فتح الحزمة
k this deck
18
Data leaks were the most important EC security management concern for 2011.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 85 في هذه المجموعة.
فتح الحزمة
k this deck
19
The Internet was designed for maximum efficiency and security by providing for error checking to ensure that the message was sent and received correctly,user authentication,and access control.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 85 في هذه المجموعة.
فتح الحزمة
k this deck
20
Phishing is an example of a technical attack.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 85 في هذه المجموعة.
فتح الحزمة
k this deck
21
________ is a crimeware technique used to steal the identity of target companies to get the identities of their customers.

A) Spamming
B) Pretexting
C) Social engineering
D) Phishing
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 85 في هذه المجموعة.
فتح الحزمة
k this deck
22
Protecting information and information systems from unauthorized access,use,disclosure,disruption,modification,perusal,inspection,recording,or destruction best defines

A) information security.
B) security audit.
C) anti-virus protection.
D) incident management.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 85 في هذه المجموعة.
فتح الحزمة
k this deck
23
Network viruses can enter through unprotected ports and compromise the whole network.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 85 في هذه المجموعة.
فتح الحزمة
k this deck
24
Risk aversion is an approach oriented toward prevention and seeks to minimize the chance of avoidable disasters.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 85 في هذه المجموعة.
فتح الحزمة
k this deck
25
The ________ translates or converts domain names to their IP addresses.

A) IPS
B) DOS
C) VPN
D) DNS
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 85 في هذه المجموعة.
فتح الحزمة
k this deck
26
Acceptable use policies (AUP)inform users of their responsibilities when a cyberattack or network intrusion has occurred.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 85 في هذه المجموعة.
فتح الحزمة
k this deck
27
A digital envelope is the combination of the encrypted original message and the digital signature,using the recipient's public key.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 85 في هذه المجموعة.
فتح الحزمة
k this deck
28
Girlfriend Trojans come to life when computer owners visit one of a number of online banking or e-commerce sites.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 85 في هذه المجموعة.
فتح الحزمة
k this deck
29
Due care in EC are those actions that a company is reasonably expected to take based on the risks affecting its business and online transactions.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 85 في هذه المجموعة.
فتح الحزمة
k this deck
30
Ninety-three percent of companies that suffer a significant data loss go out of business within 5 years.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 85 في هذه المجموعة.
فتح الحزمة
k this deck
31
Biometric systems are authentication systems that identify a person by measurement of a biological characteristic,such as fingerprints,iris patterns,facial features,or voice.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 85 في هذه المجموعة.
فتح الحزمة
k this deck
32
General controls are intended to protect specific applications.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 85 في هذه المجموعة.
فتح الحزمة
k this deck
33
Access control is a mechanism that determines who can legitimately use a network resource.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 85 في هذه المجموعة.
فتح الحزمة
k this deck
34
Splogs are software applications that have some degree of reactivity,autonomy,and adaptability.An agent is able to adapt itself based on changes occurring in its environment.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 85 في هذه المجموعة.
فتح الحزمة
k this deck
35
________ refers to the e-markets for stolen information.

A) Internet underground economy
B) Denial of service
C) Cybercriminal
D) Virtual private network
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 85 في هذه المجموعة.
فتح الحزمة
k this deck
36
________ systems are highly useful for both law enforcement and for law breaking,for example,by providing a means to obtain passwords or encryption keys and thus bypassing other security measures.

A) Biometric
B) Keystroke logging
C) Access control
D) Intrusion detection
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 85 في هذه المجموعة.
فتح الحزمة
k this deck
37
An intrusion detection system uses the public Internet to carry information but remains private by using encryption,authentication,and access control to verify the identity of anyone using the network.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 85 في هذه المجموعة.
فتح الحزمة
k this deck
38
Malvertising is fake online advertising designed to trick you into downloading malicious software onto your computer.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 85 في هذه المجموعة.
فتح الحزمة
k this deck
39
The success of an EC security strategy and program depends on the commitment and involvement of senior management.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 85 في هذه المجموعة.
فتح الحزمة
k this deck
40
A honeypot is a production system that looks like it does real work,but acts as a decoy and is watched to study how network intrusions occur.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 85 في هذه المجموعة.
فتح الحزمة
k this deck
41
The estimated cost,loss,or damage that can result if a threat exploits a vulnerability best describes

A) total cost of ownership.
B) present value of risk.
C) exposure.
D) risk feasibility assessment.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 85 في هذه المجموعة.
فتح الحزمة
k this deck
42
A malicious hacker who may represent a serious problem for a corporation best describes a

A) cyberspy.
B) cracker.
C) web surfer.
D) Internet commando.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 85 في هذه المجموعة.
فتح الحزمة
k this deck
43
Creating a rogue copy of a popular website that shows contents similar to the original to a Web crawler.Once there,an unsuspecting user is redirected to malicious websites.This description is indicative of

A) electronic splogging.
B) cyberworming.
C) page hijacking.
D) spamming.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 85 في هذه المجموعة.
فتح الحزمة
k this deck
44
An attack on a website in which an attacker uses specialized software to send a flood of data packets to the target computer with the aim of overloading its resources best describes

A) cyberraid.
B) denial-of-service attack.
C) cyberhijacking.
D) botnet infestation.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 85 في هذه المجموعة.
فتح الحزمة
k this deck
45
The protection of information systems against unauthorized access to or modification of information that is stored,processed,or being sent over a network is referred to as

A) information assurance.
B) data integrity.
C) information integrity.
D) human firewall.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 85 في هذه المجموعة.
فتح الحزمة
k this deck
46
A generic term for malicious software is

A) NOS.
B) ad-aware.
C) spynet.
D) malware.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 85 في هذه المجموعة.
فتح الحزمة
k this deck
47
A program that appears to have a useful function but that contains a hidden function that presents a security risk best defines

A) virus.
B) worm.
C) Trojan horse.
D) botnet.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 85 في هذه المجموعة.
فتح الحزمة
k this deck
48
The probability that a vulnerability will be known and used best describes

A) risk.
B) feasibility.
C) security fault.
D) splog point.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 85 في هذه المجموعة.
فتح الحزمة
k this deck
49
According to Sullivan (2011),the vulnerabilities in Business IT and EC systems include each of the following organizational weaknesses except

A) end-user training and security awareness.
B) lax security with mobile devices.
C) inappropriate use of business computers and network services.
D) closed systems not reacting quickly enough to security breaches.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 85 في هذه المجموعة.
فتح الحزمة
k this deck
50
The assurance that an online customer or trading partner cannot falsely deny their purchase or transaction is referred to as

A) integrity.
B) availability.
C) authentication.
D) nonrepudiation.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 85 في هذه المجموعة.
فتح الحزمة
k this deck
51
A type of nontechnical attack that uses some ruse to trick users into revealing information or performing an action that compromises a computer or network best describes

A) splog.
B) social engineering.
C) viral email.
D) identity theft.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 85 في هذه المجموعة.
فتح الحزمة
k this deck
52
Computers infected with malware that are under the control of a spammer,hacker,or other criminal best describes

A) fraud servers.
B) electronic defenders.
C) zombies.
D) cyber warriors.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 85 في هذه المجموعة.
فتح الحزمة
k this deck
53
A plan that keeps the business running after a disaster occurs best defines

A) security audit specifications.
B) business continuity plan.
C) vulnerability assessment plan.
D) project initiation plan.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 85 في هذه المجموعة.
فتح الحزمة
k this deck
54
The process of verifying the real identity of an individual,computer,computer program,or EC website best defines

A) vulnerability assessment.
B) security audit.
C) authentication.
D) authorization.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 85 في هذه المجموعة.
فتح الحزمة
k this deck
55
A strategy that views EC security as the process of preventing and detecting unauthorized use of the organization's brand,identity,website,e-mail,information,or other asset and attempts to defraud the organization,its customers,and employees best describes

A) feasibility assessment.
B) EC security strategy.
C) information systems security plan.
D) disaster recovery plan.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 85 في هذه المجموعة.
فتح الحزمة
k this deck
56
The process of determining what the authenticated entity is allowed to access and what operations it is allowed to perform is known as

A) integrity.
B) availability.
C) authorization.
D) nonrepudiation.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 85 في هذه المجموعة.
فتح الحزمة
k this deck
57
A software program that runs independently,consuming the resources of its host in order to maintain itself,that is capable of propagating a complete working version of itself onto another machine best describes

A) splog.
B) tidal wave.
C) Trojan horse.
D) worm.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 85 في هذه المجموعة.
فتح الحزمة
k this deck
58
Unintentional threats include each of the following except

A) human errors.
B) environmental hazards.
C) computer system malfunctions.
D) identity theft.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 85 في هذه المجموعة.
فتح الحزمة
k this deck
59
According to Sullivan (2011),vulnerabilities in IT and EC systems include each of the following except

A) poor application security.
B) weak boundary security.
C) lack of environmental support.
D) unencrypted communications.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 85 في هذه المجموعة.
فتح الحزمة
k this deck
60
Someone who gains unauthorized access to a computer system best describes a

A) hacker.
B) network technician.
C) cyberwarrior.
D) cyberseeker.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 85 في هذه المجموعة.
فتح الحزمة
k this deck
61
A botnet is a

A) collection of a few hundred hijacked Internet computers that have been set up to forward traffic, including spam and viruses, to other computers on the Internet.
B) piece of software code that inserts itself into a host or operating system to launch DoS attacks.
C) piece of code in a worm that spreads rapidly and exploits some known vulnerability.
D) coordinated network of computers that can scan and compromise other computers and launch DoS attacks.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 85 في هذه المجموعة.
فتح الحزمة
k this deck
62
The key reasons why EC criminals cannot be stopped include each of the following except

A) sophisticated hackers use browsers to crack into Web sites.
B) strong EC security makes online shopping inconvenient and demanding on customers.
C) there is a lack of cooperation from credit card issuers and foreign ISPs.
D) online shoppers do not take necessary precautions to avoid becoming a victim.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 85 في هذه المجموعة.
فتح الحزمة
k this deck
63
Fingerprint scanners,facial recognition systems,and voice recognition are examples of ________ that recognize a person by some physical trait.

A) biometric systems
B) human firewalls
C) intrusion detection systems
D) access control lists
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 85 في هذه المجموعة.
فتح الحزمة
k this deck
64
A method used to ensure confidentiality and integrity of data transmitted over the Internet by encrypting data packets,sending them in packets across the Internet,and decrypting them at the destination address best defines

A) data wrapping.
B) message envelope.
C) protocol tunneling.
D) Trojan horse.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 85 في هذه المجموعة.
فتح الحزمة
k this deck
65
Security functions or characteristics of digital signatures include all of the following except

A) a digital signature is the electronic equivalent of a personal signature, which can be forged.
B) digital signatures are based on public keys for authenticating the identity of the sender of a message or document.
C) digital signatures ensure that the original content of an electronic message or document is unchanged.
D) digital signatures are portable.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 85 في هذه المجموعة.
فتح الحزمة
k this deck
66
A page that uses techniques that deliberately subvert a search engine's algorithms to artificially inflate the page's ranking best describes

A) Trojan page.
B) spam site.
C) zombie.
D) search engine imposter.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 85 في هذه المجموعة.
فتح الحزمة
k this deck
67
Which of the following refers to the assurance that access to data,the website,or other EC data service is timely,available,reliable,and restricted to authorized users?

A) spontaneity
B) confidentiality
C) integrity
D) availability
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 85 في هذه المجموعة.
فتح الحزمة
k this deck
68
An exercise that determines the impact of losing the support of an EC resource to an organization and establishes the escalation of that loss over time,identifies the minimum resources needed to recover,and prioritizes the recovery of processes and supporting systems best describes

A) business continuity plan.
B) business impact analysis.
C) vulnerability assessment.
D) computer security incident management.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 85 في هذه المجموعة.
فتح الحزمة
k this deck
69
A mathematical computation that is applied to a message,using a private key to encrypt the message,best defines

A) locking code.
B) Sharpe ratio.
C) hash.
D) standard deviation.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 85 في هذه المجموعة.
فتح الحزمة
k this deck
70
Advantages of virtual private networks include each of the following except

A) they are less expensive than private leased lines because they use the public Internet to carry information.
B) they ensure the confidentiality and integrity of the data transmitted over the Internet without requiring encryption.
C) they can reduce communication costs dramatically because VPN equipment is cheaper than other remote solutions.
D) remote users can use broadband connections rather than make long distance calls to access an organization's private network.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 85 في هذه المجموعة.
فتح الحزمة
k this deck
71
Which of the following refers to the assurance of data privacy and accuracy?

A) integrity
B) availability
C) confidentiality
D) security
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 85 في هذه المجموعة.
فتح الحزمة
k this deck
72
Software that gathers user information over an Internet connection without the user's knowledge best defines

A) spyware.
B) Trojan horse.
C) zombie.
D) search engine spam.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 85 في هذه المجموعة.
فتح الحزمة
k this deck
73
An EC security strategy and program begins with

A) the commitment and involvement of executive management.
B) layers of hardware and software defenses.
C) information security policies and training.
D) secure design of EC applications.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 85 في هذه المجموعة.
فتح الحزمة
k this deck
74
The mathematical formula used to encrypt the plaintext into the ciphertext,and vice versa best defines

A) key space.
B) encryption algorithm.
C) locking algorithm.
D) public key infrastructure.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 85 في هذه المجموعة.
فتح الحزمة
k this deck
75
A method of evaluating the security of a computer system or a network by simulating an attack from a malicious source best describes

A) vulnerability assessment.
B) penetration test.
C) security breach.
D) cyber audit.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 85 في هذه المجموعة.
فتح الحزمة
k this deck
76
The large number of possible key values created by the algorithm to use when transforming the message best describes

A) determinate.
B) encryption code.
C) encryption lock.
D) key space.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 85 في هذه المجموعة.
فتح الحزمة
k this deck
77
The success and security of EC can be measured by

A) encryption, functionality, and privacy.
B) quality, reliability, and speed.
C) authentication, authorization, and nonrepudiation.
D) confidentiality, integrity, and availability.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 85 في هذه المجموعة.
فتح الحزمة
k this deck
78
Which of the following refers to the process of identifying,quantifying,and prioritizing the vulnerabilities in a system?

A) vulnerability assessment
B) feasibility assessment
C) initial security report
D) certification audit
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 85 في هذه المجموعة.
فتح الحزمة
k this deck
79
A summary of a message converted into a string of digits after the hash has been applied best describes

A) reference rate.
B) message digest.
C) digital certificate.
D) key code.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 85 في هذه المجموعة.
فتح الحزمة
k this deck
80
Each of the following is a characteristic of access control except

A) access control determines which persons, programs, or machines can legitimately use a network resource and which resources he, she, or it can use.
B) access control lists (ACLs) define users' rights, such as what they are allowed to read, view, write, print, copy, delete, execute, modify, or move.
C) all resources need to be considered together to identify the rights of users or categories of users.
D) after a user has been identified, the user must be authenticated.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 85 في هذه المجموعة.
فتح الحزمة
k this deck
locked card icon
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 85 في هذه المجموعة.