Deck 4: Information Security

ملء الشاشة (f)
exit full mode
سؤال
A(n)_________ network is any network within your organization; a(n)_________ network is any network external to your organization.

A)trusted; trusted
B)trusted; untrusted
C)untrusted; trusted
D)untrusted; untrusted
استخدم زر المسافة أو
up arrow
down arrow
لقلب البطاقة.
سؤال
The US intelligence community accused _________ of the hacks on the Democratic National Committee in 2015 and 2016.

A)China
B)India
C)North Korea
D)Russia
سؤال
You leave your laptop at your desk while you go to the restroom.This is _________ and is an _________ mistake.

A)a human error; intentional
B)a human error; unintentional
C)social engineering; intentional
D)social engineering; unintentional
سؤال
Careless Internet surfing is _________ and is an _________ mistake.

A)a human error; intentional
B)a human error; unintentional
C)social engineering; intentional
D)social engineering; unintentional
سؤال
Carelessness using unmanaged devices is _________ and is an _________ mistake.

A)a human error; intentional
B)a human error; unintentional
C)social engineering; intentional
D)social engineering; unintentional
سؤال
You never wipe the dust off your computer.This is _________ and is an _________ mistake.

A)a human error; intentional
B)a human error; unintentional
C)social engineering; intentional
D)social engineering; unintentional
سؤال
Which of the following does NOT contribute to the increasing vulnerability of organizational information resources?

A)Increasing skills necessary to be a computer hacker
B)International organized crime taking over cybercrime
C)Lack of management support
D)Smaller,faster,cheaper computers and storage devices
E)Today's interconnected,interdependent,wirelessly networked business environment
سؤال
You don't lock your computer when you go to the restroom.This is _________ and is an _________ mistake.

A)a human error; intentional
B)a human error; unintentional
C)social engineering; intentional
D)social engineering; unintentional
سؤال
Computer crimes typically average _________ of dollars and cause businesses _________ of dollars in damages.

A)hundreds; millions
B)hundreds; billions
C)hundreds of thousands; millions
D)hundreds of thousands; billions
سؤال
Hackers used _________ to get into the Democratic National Committee computer systems.

A)denial-of-service attacks
B)spear-phishing
C)a Trojan horse
D)viruses
سؤال
_________ is an attack in which the perpetrator uses social skills to trick or manipulate legitimate employees into providing confidential company information such as passwords.

A)Espionage
B)Malware
C)Profiling
D)Social engineering
سؤال
You are a nice person,so you hold the door open for the person running in behind you.Since you needed to use your ID badge to open the door,the person running in behind you is __________; this is _________.

A)shoulder surfing; a good way to show kindness that causes no harm
B)shoulder surfing; an unintentional threat to your organization
C)tailgating; a good way to show kindness that causes no harm
D)tailgating; an unintentional threat to your organization
سؤال
An information resource's _________ is the possibility that the system will be harmed by a threat.

A)exposure
B)risk
C)threat
D)vulnerability
سؤال
A(n)_________ to an information resource is any danger to which a system may be exposed.

A)exposure
B)risk
C)threat
D)vulnerability
سؤال
You lose the company's USB with your sales spreadsheets on it.This is _________ and is an _________ mistake.

A)a human error; intentional
B)a human error; unintentional
C)social engineering; intentional
D)social engineering; unintentional
سؤال
It took the Democratic National Committee _________ to respond to the FBI's discovery of hacking on their system.

A)1 day
B)7 days
C)1 month
D)7 months
سؤال
The _________ of an information resource is the harm,loss,or damage that can result if a threat compromises that resource.

A)exposure
B)risk
C)threat
D)vulnerability
سؤال
You open an e-mail from your friend that looks a little odd,but you figure your friend would never send you anything bad.This is _________ and is an _________ mistake.

A)a human error; intentional
B)a human error; unintentional
C)social engineering; intentional
D)social engineering; unintentional
سؤال
You get a new smartphone and throw your old one away without erasing all your data.This is _________ and is an _________ mistake.

A)a human error; intentional
B)a human error; unintentional
C)social engineering; intentional
D)social engineering; unintentional
سؤال
Which of the following does NOT contribute to the increasing vulnerability of organizational information resources?

A)Additional management support
B)Decreasing skills necessary to be a computer hacker
C)International organized crime taking over cybercrime
D)Smaller,faster,cheaper computers and storage devices
E)Today's interconnected,interdependent,wirelessly networked business environment
سؤال
Intellectual property is NOT protected under _________ laws.

A)copyright
B)patent
C)privacy
D)trade secret
سؤال
A _________ is an official document that grants the holder exclusive rights on an invention or a process for a specified period of time.

A)copyright
B)patent
C)trade secret
D)trademark
سؤال
_________ collects personal information about users without their consent.

A)Adware
B)Marketware
C)Spamware
D)Spyware
سؤال
_________ occurs when an unauthorized individual attempts to gain illegal access to organizational information.

A)Alien software
B)Espionage
C)Identity theft
D)Information extortion
سؤال
_________ is a remote attack requiring user action.

A)DoS
B)A logic bomb
C)A Trojan horse
D)Virus
سؤال
_________ is an unintentional threat.

A)Espionage
B)Identity theft
C)Social engineering
D)Software attacks
سؤال
Current US laws award patents for _________ years and copyright protection for _________ years.

A)20; 20
B)20; life+70
C)life+70; 20
D)life+70; life+70
سؤال
A _________ is a statutory grant that provides the creators or owners of intellectual property with ownership of the property for a designated period.

A)copyright
B)patent
C)trade secret
D)trademark
سؤال
_________ occur(s)when an attacker either threatens to steal,or actually steals,information from a company and then demands payment for not carrying out a particular act.

A)Alien software
B)Espionage
C)Information extortion
D)SCADA attacks
سؤال
_________ causes pop-up advertisements to appear on your screen.

A)Adware
B)Marketware
C)Spamware
D)Spyware
سؤال
Keystroke loggers and screen scrapers are examples of _________.

A)adware
B)marketware
C)spamware
D)spyware
سؤال
You purchased a copy of Microsoft Office and give a copy to a friend so he/she doesn't have to buy it too.This is _________ and is _________.

A)piracy; legal
B)piracy; illegal
C)social engineering; legal
D)social engineering; illegal
سؤال
_________ is a remote attack requiring no user action.

A)DoS
B)A logic bomb
C)A Trojan horse
D)Virus
سؤال
_________ is an attack by a programmer developing a system.

A)DoS
B)A phishing attack
C)A Trojan horse
D)Virus
سؤال
If humans are careless with laptops,this is an _________ error which could cause theft of equipment or information (an _________ error).

A)intentional; intentional
B)intentional; unintentional
C)unintentional; intentional
D)unintentional; unintentional
سؤال
_________ is pestware that users your computer as a launch pad for unsolicited e-mail,usually advertising for products and services.

A)Adware
B)Marketware
C)Spamware
D)Spyware
سؤال
Piracy costs businesses _________ of dollars per year.

A)hundreds
B)millions
C)billions
D)trillions
سؤال
_________ is a deliberate act that involves defacing an organization's website,potentially damaging the organization's image and causing its customers to lose faith.

A)Espionage
B)Sabotage
C)SCADA attacks
D)Software attacks
سؤال
A _________ is an intellectual work that is not based on public information.

A)copyright
B)patent
C)trade secret
D)trademark
سؤال
Hackers would use a botnet to perform a _________.

A)DDoS
B)a logic bomb
C)a Trojan horse
D)virus
سؤال
_________ is a possible solution to the ransomware problem but is not recommended by the FBI.

A)Backing up data
B)Employ real-time monitoring
C)Pay the ransom
D)Provide user education and training
سؤال
If you limit your risk by implementing controls that minimize the impact of the threat,you have implemented a risk _________ strategy.

A)acceptance
B)avoidance
C)limitation
D)transference
سؤال
Spam costs US companies _________ of dollars per year.

A)hundreds
B)millions
C)billions
D)trillions
سؤال
_________ refers to malicious acts in which attackers use a target's computer systems to cause physical,real-world harm or severe disruption,often to carry out a political agenda.

A)A SCADA attack
B)Cyberterrorism
C)Espionage
D)Identity theft
سؤال
Your company hires FireEye to install security software and monitor your systems.This is an example of risk _________.

A)acceptance
B)avoidance
C)limitation
D)transference
سؤال
Russia attacked Ukraine's _________ system.

A)internet
B)power
C)transportation
D)water
سؤال
The Houston Astros contacted the _________ to investigate a security breach in 2014.

A)CIA
B)FBI
C)MLB
D)NFL
سؤال
If you accept the potential risk,continue operating with no controls,and absorb any damages that occur,you have adopted a risk _________ strategy.

A)acceptance
B)avoidance
C)limitation
D)transference
سؤال
Which of the following was NOT used in the cyberattack on Ukraine?

A)DoS
B)Spear-phishing
C)a logic bomb
D)a SCADA attack
سؤال
If a hacker takes control of equipment such as power grids or nuclear power plants,this is an example of a(n)_________ attack.

A)alien software
B)espionage
C)SCADA
D)virus
سؤال
Your company decides not to implement security procedures because employees refuse to comply anyway.This is an example of risk _________.

A)acceptance
B)avoidance
C)limitation
D)transference
سؤال
St.Louis Cardinal scouting director Christopher Correa hacked the Houston Astros' system.This was an example of _________.

A)alien software
B)cyberterrorism
C)espionage
D)identity theft
سؤال
Dyn is a cloud-based internet performance management company that provides DNS services for internet websites.It was attacked with _________ in 2016.

A)alien software
B)a DDoS
C)espionage
D)a SCADA attack
سؤال
Ransomware is typically disseminated through _________.

A)botnets
B)logic bombs
C)Trojan horses
D)viruses
سؤال
Almost _________ percent of ransomware victims pay the ransom and hackers _________ decrypt the data as promised.

A)50; do
B)50; do not
C)95; do
D)95; do not
سؤال
Ukraine's protection of their SCADA systems is _________ than in the US but was vulnerable because of its use of _________.

A)better; RFID
B)better; VPN
C)worse; RFID
D)worse; VPN
سؤال
The most current form of ransomware demands payment in the form of _________.

A)Bitcoins
B)cash
C)credit cards
D)Paypal transactions
سؤال
_________ is also called digital extortion.

A)Adware
B)Ransomware
C)Spamware
D)Spyware
سؤال
The US government considers the Sony hack _________.

A)a SCADA attack
B)cyberterrorism
C)espionage
D)identity theft
سؤال
Dyn's hackers formed a botnet from _________.

A)corporate servers
B)devices incorporating the Internet of Things
C)individuals willing to become part-time hackers
D)programmers within the company
سؤال
In public-key encryption,the _________ key is used for locking and the _________ key is used for unlocking.

A)private; private
B)private; public
C)public; private
D)public; public
سؤال
Biometrics is an example of something the user _________.

A)does
B)has
C)is
D)knows
سؤال
_________ is the process of converting an original message into a form that cannot be read by anyone except the intended receiver.

A)Authorization
B)Blacklisting
C)Encryption
D)Firewalling
سؤال
_________ is a communications control.

A)A company gate
B)Encryption
C)A firewall
D)RFID
سؤال
_________ controls restrict unauthorized individuals from using information resources.

A)Access
B)Communications
C)Physical
D)Useful
سؤال
Suppose your university automatically logs you off of a university computer after 15 minutes of disuse.This is an example of a(n)_________ control.

A)access
B)communication
C)physical
D)useful
سؤال
_________ is a physical control.

A)A company gate
B)Encryption
C)A firewall
D)VPN
سؤال
Your company decides to purchase security insurance from Travelers Insurance in case your systems get hacked and employee information is stolen.This is an example of risk _________.

A)acceptance
B)avoidance
C)limitation
D)transference
سؤال
_________ is a private network that uses a public network to connect users.

A)DoS
B)ERP
C)RFID
D)VPN
سؤال
A(n)_________ is a system that prevents a specific type of information from moving between untrusted networks and private networks.

A)anti-malware system
B)DMZ
C)ERP
D)firewall
سؤال
A(n)_________ is a software package that attempts to identify and eliminate viruses and worms.

A)anti-malware system
B)DMZ
C)ERP
D)firewall
سؤال
Your student ID is an example of something the user _________.

A)does
B)has
C)is
D)knows
سؤال
Typing in your password to access a system is an example of something the user _________.

A)does
B)has
C)is
D)knows
سؤال
_________ controls secure the movement of data across networks.

A)Access
B)Communications
C)Physical
D)Useful
سؤال
Which of the following is NOT an advantage of VPN?

A)Cost
B)Flexibility
C)Remote access
D)Security
سؤال
If you shift your risk by using other means to compensate for the loss like purchasing insurance,you have implemented a risk _________ strategy.

A)acceptance
B)avoidance
C)limitation
D)transference
سؤال
_________ controls prevent unauthorized individuals from gaining access to a company's facilities.

A)Access
B)Communications
C)Physical
D)Useful
سؤال
If you have to speak into your phone to unlock it,this is an example of something the user _________.

A)does
B)has
C)is
D)knows
سؤال
A(n)_________ is located between two firewalls.

A)anti-malware system
B)DMZ
C)ERP
D)spamware detector
سؤال
_________ is an access control.

A)A company gate
B)Encryption
C)A firewall
D)RFID
فتح الحزمة
قم بالتسجيل لفتح البطاقات في هذه المجموعة!
Unlock Deck
Unlock Deck
1/169
auto play flashcards
العب
simple tutorial
ملء الشاشة (f)
exit full mode
Deck 4: Information Security
1
A(n)_________ network is any network within your organization; a(n)_________ network is any network external to your organization.

A)trusted; trusted
B)trusted; untrusted
C)untrusted; trusted
D)untrusted; untrusted
B
2
The US intelligence community accused _________ of the hacks on the Democratic National Committee in 2015 and 2016.

A)China
B)India
C)North Korea
D)Russia
D
3
You leave your laptop at your desk while you go to the restroom.This is _________ and is an _________ mistake.

A)a human error; intentional
B)a human error; unintentional
C)social engineering; intentional
D)social engineering; unintentional
B
4
Careless Internet surfing is _________ and is an _________ mistake.

A)a human error; intentional
B)a human error; unintentional
C)social engineering; intentional
D)social engineering; unintentional
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 169 في هذه المجموعة.
فتح الحزمة
k this deck
5
Carelessness using unmanaged devices is _________ and is an _________ mistake.

A)a human error; intentional
B)a human error; unintentional
C)social engineering; intentional
D)social engineering; unintentional
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 169 في هذه المجموعة.
فتح الحزمة
k this deck
6
You never wipe the dust off your computer.This is _________ and is an _________ mistake.

A)a human error; intentional
B)a human error; unintentional
C)social engineering; intentional
D)social engineering; unintentional
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 169 في هذه المجموعة.
فتح الحزمة
k this deck
7
Which of the following does NOT contribute to the increasing vulnerability of organizational information resources?

A)Increasing skills necessary to be a computer hacker
B)International organized crime taking over cybercrime
C)Lack of management support
D)Smaller,faster,cheaper computers and storage devices
E)Today's interconnected,interdependent,wirelessly networked business environment
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 169 في هذه المجموعة.
فتح الحزمة
k this deck
8
You don't lock your computer when you go to the restroom.This is _________ and is an _________ mistake.

A)a human error; intentional
B)a human error; unintentional
C)social engineering; intentional
D)social engineering; unintentional
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 169 في هذه المجموعة.
فتح الحزمة
k this deck
9
Computer crimes typically average _________ of dollars and cause businesses _________ of dollars in damages.

A)hundreds; millions
B)hundreds; billions
C)hundreds of thousands; millions
D)hundreds of thousands; billions
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 169 في هذه المجموعة.
فتح الحزمة
k this deck
10
Hackers used _________ to get into the Democratic National Committee computer systems.

A)denial-of-service attacks
B)spear-phishing
C)a Trojan horse
D)viruses
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 169 في هذه المجموعة.
فتح الحزمة
k this deck
11
_________ is an attack in which the perpetrator uses social skills to trick or manipulate legitimate employees into providing confidential company information such as passwords.

A)Espionage
B)Malware
C)Profiling
D)Social engineering
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 169 في هذه المجموعة.
فتح الحزمة
k this deck
12
You are a nice person,so you hold the door open for the person running in behind you.Since you needed to use your ID badge to open the door,the person running in behind you is __________; this is _________.

A)shoulder surfing; a good way to show kindness that causes no harm
B)shoulder surfing; an unintentional threat to your organization
C)tailgating; a good way to show kindness that causes no harm
D)tailgating; an unintentional threat to your organization
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 169 في هذه المجموعة.
فتح الحزمة
k this deck
13
An information resource's _________ is the possibility that the system will be harmed by a threat.

A)exposure
B)risk
C)threat
D)vulnerability
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 169 في هذه المجموعة.
فتح الحزمة
k this deck
14
A(n)_________ to an information resource is any danger to which a system may be exposed.

A)exposure
B)risk
C)threat
D)vulnerability
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 169 في هذه المجموعة.
فتح الحزمة
k this deck
15
You lose the company's USB with your sales spreadsheets on it.This is _________ and is an _________ mistake.

A)a human error; intentional
B)a human error; unintentional
C)social engineering; intentional
D)social engineering; unintentional
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 169 في هذه المجموعة.
فتح الحزمة
k this deck
16
It took the Democratic National Committee _________ to respond to the FBI's discovery of hacking on their system.

A)1 day
B)7 days
C)1 month
D)7 months
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 169 في هذه المجموعة.
فتح الحزمة
k this deck
17
The _________ of an information resource is the harm,loss,or damage that can result if a threat compromises that resource.

A)exposure
B)risk
C)threat
D)vulnerability
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 169 في هذه المجموعة.
فتح الحزمة
k this deck
18
You open an e-mail from your friend that looks a little odd,but you figure your friend would never send you anything bad.This is _________ and is an _________ mistake.

A)a human error; intentional
B)a human error; unintentional
C)social engineering; intentional
D)social engineering; unintentional
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 169 في هذه المجموعة.
فتح الحزمة
k this deck
19
You get a new smartphone and throw your old one away without erasing all your data.This is _________ and is an _________ mistake.

A)a human error; intentional
B)a human error; unintentional
C)social engineering; intentional
D)social engineering; unintentional
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 169 في هذه المجموعة.
فتح الحزمة
k this deck
20
Which of the following does NOT contribute to the increasing vulnerability of organizational information resources?

A)Additional management support
B)Decreasing skills necessary to be a computer hacker
C)International organized crime taking over cybercrime
D)Smaller,faster,cheaper computers and storage devices
E)Today's interconnected,interdependent,wirelessly networked business environment
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 169 في هذه المجموعة.
فتح الحزمة
k this deck
21
Intellectual property is NOT protected under _________ laws.

A)copyright
B)patent
C)privacy
D)trade secret
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 169 في هذه المجموعة.
فتح الحزمة
k this deck
22
A _________ is an official document that grants the holder exclusive rights on an invention or a process for a specified period of time.

A)copyright
B)patent
C)trade secret
D)trademark
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 169 في هذه المجموعة.
فتح الحزمة
k this deck
23
_________ collects personal information about users without their consent.

A)Adware
B)Marketware
C)Spamware
D)Spyware
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 169 في هذه المجموعة.
فتح الحزمة
k this deck
24
_________ occurs when an unauthorized individual attempts to gain illegal access to organizational information.

A)Alien software
B)Espionage
C)Identity theft
D)Information extortion
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 169 في هذه المجموعة.
فتح الحزمة
k this deck
25
_________ is a remote attack requiring user action.

A)DoS
B)A logic bomb
C)A Trojan horse
D)Virus
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 169 في هذه المجموعة.
فتح الحزمة
k this deck
26
_________ is an unintentional threat.

A)Espionage
B)Identity theft
C)Social engineering
D)Software attacks
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 169 في هذه المجموعة.
فتح الحزمة
k this deck
27
Current US laws award patents for _________ years and copyright protection for _________ years.

A)20; 20
B)20; life+70
C)life+70; 20
D)life+70; life+70
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 169 في هذه المجموعة.
فتح الحزمة
k this deck
28
A _________ is a statutory grant that provides the creators or owners of intellectual property with ownership of the property for a designated period.

A)copyright
B)patent
C)trade secret
D)trademark
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 169 في هذه المجموعة.
فتح الحزمة
k this deck
29
_________ occur(s)when an attacker either threatens to steal,or actually steals,information from a company and then demands payment for not carrying out a particular act.

A)Alien software
B)Espionage
C)Information extortion
D)SCADA attacks
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 169 في هذه المجموعة.
فتح الحزمة
k this deck
30
_________ causes pop-up advertisements to appear on your screen.

A)Adware
B)Marketware
C)Spamware
D)Spyware
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 169 في هذه المجموعة.
فتح الحزمة
k this deck
31
Keystroke loggers and screen scrapers are examples of _________.

A)adware
B)marketware
C)spamware
D)spyware
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 169 في هذه المجموعة.
فتح الحزمة
k this deck
32
You purchased a copy of Microsoft Office and give a copy to a friend so he/she doesn't have to buy it too.This is _________ and is _________.

A)piracy; legal
B)piracy; illegal
C)social engineering; legal
D)social engineering; illegal
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 169 في هذه المجموعة.
فتح الحزمة
k this deck
33
_________ is a remote attack requiring no user action.

A)DoS
B)A logic bomb
C)A Trojan horse
D)Virus
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 169 في هذه المجموعة.
فتح الحزمة
k this deck
34
_________ is an attack by a programmer developing a system.

A)DoS
B)A phishing attack
C)A Trojan horse
D)Virus
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 169 في هذه المجموعة.
فتح الحزمة
k this deck
35
If humans are careless with laptops,this is an _________ error which could cause theft of equipment or information (an _________ error).

A)intentional; intentional
B)intentional; unintentional
C)unintentional; intentional
D)unintentional; unintentional
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 169 في هذه المجموعة.
فتح الحزمة
k this deck
36
_________ is pestware that users your computer as a launch pad for unsolicited e-mail,usually advertising for products and services.

A)Adware
B)Marketware
C)Spamware
D)Spyware
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 169 في هذه المجموعة.
فتح الحزمة
k this deck
37
Piracy costs businesses _________ of dollars per year.

A)hundreds
B)millions
C)billions
D)trillions
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 169 في هذه المجموعة.
فتح الحزمة
k this deck
38
_________ is a deliberate act that involves defacing an organization's website,potentially damaging the organization's image and causing its customers to lose faith.

A)Espionage
B)Sabotage
C)SCADA attacks
D)Software attacks
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 169 في هذه المجموعة.
فتح الحزمة
k this deck
39
A _________ is an intellectual work that is not based on public information.

A)copyright
B)patent
C)trade secret
D)trademark
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 169 في هذه المجموعة.
فتح الحزمة
k this deck
40
Hackers would use a botnet to perform a _________.

A)DDoS
B)a logic bomb
C)a Trojan horse
D)virus
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 169 في هذه المجموعة.
فتح الحزمة
k this deck
41
_________ is a possible solution to the ransomware problem but is not recommended by the FBI.

A)Backing up data
B)Employ real-time monitoring
C)Pay the ransom
D)Provide user education and training
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 169 في هذه المجموعة.
فتح الحزمة
k this deck
42
If you limit your risk by implementing controls that minimize the impact of the threat,you have implemented a risk _________ strategy.

A)acceptance
B)avoidance
C)limitation
D)transference
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 169 في هذه المجموعة.
فتح الحزمة
k this deck
43
Spam costs US companies _________ of dollars per year.

A)hundreds
B)millions
C)billions
D)trillions
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 169 في هذه المجموعة.
فتح الحزمة
k this deck
44
_________ refers to malicious acts in which attackers use a target's computer systems to cause physical,real-world harm or severe disruption,often to carry out a political agenda.

A)A SCADA attack
B)Cyberterrorism
C)Espionage
D)Identity theft
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 169 في هذه المجموعة.
فتح الحزمة
k this deck
45
Your company hires FireEye to install security software and monitor your systems.This is an example of risk _________.

A)acceptance
B)avoidance
C)limitation
D)transference
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 169 في هذه المجموعة.
فتح الحزمة
k this deck
46
Russia attacked Ukraine's _________ system.

A)internet
B)power
C)transportation
D)water
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 169 في هذه المجموعة.
فتح الحزمة
k this deck
47
The Houston Astros contacted the _________ to investigate a security breach in 2014.

A)CIA
B)FBI
C)MLB
D)NFL
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 169 في هذه المجموعة.
فتح الحزمة
k this deck
48
If you accept the potential risk,continue operating with no controls,and absorb any damages that occur,you have adopted a risk _________ strategy.

A)acceptance
B)avoidance
C)limitation
D)transference
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 169 في هذه المجموعة.
فتح الحزمة
k this deck
49
Which of the following was NOT used in the cyberattack on Ukraine?

A)DoS
B)Spear-phishing
C)a logic bomb
D)a SCADA attack
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 169 في هذه المجموعة.
فتح الحزمة
k this deck
50
If a hacker takes control of equipment such as power grids or nuclear power plants,this is an example of a(n)_________ attack.

A)alien software
B)espionage
C)SCADA
D)virus
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 169 في هذه المجموعة.
فتح الحزمة
k this deck
51
Your company decides not to implement security procedures because employees refuse to comply anyway.This is an example of risk _________.

A)acceptance
B)avoidance
C)limitation
D)transference
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 169 في هذه المجموعة.
فتح الحزمة
k this deck
52
St.Louis Cardinal scouting director Christopher Correa hacked the Houston Astros' system.This was an example of _________.

A)alien software
B)cyberterrorism
C)espionage
D)identity theft
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 169 في هذه المجموعة.
فتح الحزمة
k this deck
53
Dyn is a cloud-based internet performance management company that provides DNS services for internet websites.It was attacked with _________ in 2016.

A)alien software
B)a DDoS
C)espionage
D)a SCADA attack
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 169 في هذه المجموعة.
فتح الحزمة
k this deck
54
Ransomware is typically disseminated through _________.

A)botnets
B)logic bombs
C)Trojan horses
D)viruses
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 169 في هذه المجموعة.
فتح الحزمة
k this deck
55
Almost _________ percent of ransomware victims pay the ransom and hackers _________ decrypt the data as promised.

A)50; do
B)50; do not
C)95; do
D)95; do not
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 169 في هذه المجموعة.
فتح الحزمة
k this deck
56
Ukraine's protection of their SCADA systems is _________ than in the US but was vulnerable because of its use of _________.

A)better; RFID
B)better; VPN
C)worse; RFID
D)worse; VPN
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 169 في هذه المجموعة.
فتح الحزمة
k this deck
57
The most current form of ransomware demands payment in the form of _________.

A)Bitcoins
B)cash
C)credit cards
D)Paypal transactions
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 169 في هذه المجموعة.
فتح الحزمة
k this deck
58
_________ is also called digital extortion.

A)Adware
B)Ransomware
C)Spamware
D)Spyware
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 169 في هذه المجموعة.
فتح الحزمة
k this deck
59
The US government considers the Sony hack _________.

A)a SCADA attack
B)cyberterrorism
C)espionage
D)identity theft
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 169 في هذه المجموعة.
فتح الحزمة
k this deck
60
Dyn's hackers formed a botnet from _________.

A)corporate servers
B)devices incorporating the Internet of Things
C)individuals willing to become part-time hackers
D)programmers within the company
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 169 في هذه المجموعة.
فتح الحزمة
k this deck
61
In public-key encryption,the _________ key is used for locking and the _________ key is used for unlocking.

A)private; private
B)private; public
C)public; private
D)public; public
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 169 في هذه المجموعة.
فتح الحزمة
k this deck
62
Biometrics is an example of something the user _________.

A)does
B)has
C)is
D)knows
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 169 في هذه المجموعة.
فتح الحزمة
k this deck
63
_________ is the process of converting an original message into a form that cannot be read by anyone except the intended receiver.

A)Authorization
B)Blacklisting
C)Encryption
D)Firewalling
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 169 في هذه المجموعة.
فتح الحزمة
k this deck
64
_________ is a communications control.

A)A company gate
B)Encryption
C)A firewall
D)RFID
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 169 في هذه المجموعة.
فتح الحزمة
k this deck
65
_________ controls restrict unauthorized individuals from using information resources.

A)Access
B)Communications
C)Physical
D)Useful
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 169 في هذه المجموعة.
فتح الحزمة
k this deck
66
Suppose your university automatically logs you off of a university computer after 15 minutes of disuse.This is an example of a(n)_________ control.

A)access
B)communication
C)physical
D)useful
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 169 في هذه المجموعة.
فتح الحزمة
k this deck
67
_________ is a physical control.

A)A company gate
B)Encryption
C)A firewall
D)VPN
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 169 في هذه المجموعة.
فتح الحزمة
k this deck
68
Your company decides to purchase security insurance from Travelers Insurance in case your systems get hacked and employee information is stolen.This is an example of risk _________.

A)acceptance
B)avoidance
C)limitation
D)transference
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 169 في هذه المجموعة.
فتح الحزمة
k this deck
69
_________ is a private network that uses a public network to connect users.

A)DoS
B)ERP
C)RFID
D)VPN
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 169 في هذه المجموعة.
فتح الحزمة
k this deck
70
A(n)_________ is a system that prevents a specific type of information from moving between untrusted networks and private networks.

A)anti-malware system
B)DMZ
C)ERP
D)firewall
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 169 في هذه المجموعة.
فتح الحزمة
k this deck
71
A(n)_________ is a software package that attempts to identify and eliminate viruses and worms.

A)anti-malware system
B)DMZ
C)ERP
D)firewall
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 169 في هذه المجموعة.
فتح الحزمة
k this deck
72
Your student ID is an example of something the user _________.

A)does
B)has
C)is
D)knows
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 169 في هذه المجموعة.
فتح الحزمة
k this deck
73
Typing in your password to access a system is an example of something the user _________.

A)does
B)has
C)is
D)knows
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 169 في هذه المجموعة.
فتح الحزمة
k this deck
74
_________ controls secure the movement of data across networks.

A)Access
B)Communications
C)Physical
D)Useful
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 169 في هذه المجموعة.
فتح الحزمة
k this deck
75
Which of the following is NOT an advantage of VPN?

A)Cost
B)Flexibility
C)Remote access
D)Security
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 169 في هذه المجموعة.
فتح الحزمة
k this deck
76
If you shift your risk by using other means to compensate for the loss like purchasing insurance,you have implemented a risk _________ strategy.

A)acceptance
B)avoidance
C)limitation
D)transference
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 169 في هذه المجموعة.
فتح الحزمة
k this deck
77
_________ controls prevent unauthorized individuals from gaining access to a company's facilities.

A)Access
B)Communications
C)Physical
D)Useful
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 169 في هذه المجموعة.
فتح الحزمة
k this deck
78
If you have to speak into your phone to unlock it,this is an example of something the user _________.

A)does
B)has
C)is
D)knows
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 169 في هذه المجموعة.
فتح الحزمة
k this deck
79
A(n)_________ is located between two firewalls.

A)anti-malware system
B)DMZ
C)ERP
D)spamware detector
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 169 في هذه المجموعة.
فتح الحزمة
k this deck
80
_________ is an access control.

A)A company gate
B)Encryption
C)A firewall
D)RFID
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 169 في هذه المجموعة.
فتح الحزمة
k this deck
locked card icon
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 169 في هذه المجموعة.