Deck 6: Information Security

ملء الشاشة (f)
exit full mode
سؤال
Which of the following is not considered a type of biometrics?

A) Voice
B) Face
C) Iris
D) None of the above
استخدم زر المسافة أو
up arrow
down arrow
لقلب البطاقة.
سؤال
Where do organizations typically place firewalls?

A) Between a personal computer and the server
B) Between a personal computer and a printer
C) Between the server and the content filtering software
D) Between the server and the Internet
سؤال
Which of the following can be completed by encryption?

A) Switch the order of characters
B) Replace characters with other characters
C) Use a mathematical formula to convert the information into some sort of code
D) All of the above
سؤال
What is the most costly and intrusive form of authentication?

A) Something the user knows such as a user ID and password
B) Something the user has such as a smart card or token
C) Something that is part of the user such as a fingerprint or voice signature
D) None of the above
سؤال
What is social engineering?

A) Using one's social skills to trick people into revealing access credentials or other information valuable to the attacker
B) Legitimate users who purposely or accidentally misuse their access to the environment and cause some kind of business-affecting incident
C) Small electronic devices that change user passwords automatically
D) A method for confirming user's identities
سؤال
Which term describes legitimate users who purposely or accidentally misuse their access to the environment and cause some kind of business-affecting incident?

A) Hactivist
B) Social engineering
C) Insiders
D) Virus
سؤال
What is the most secure type of authentication?

A) Something the user knows such as a user ID and password
B) Something the user has such as a smart card or token
C) Something that is part of the user such as a fingerprint or voice signature
D) Combination of all of the above
سؤال
Which of the following authentication methods is 100 percent accurate?

A) Smart card
B) Fingerprint authentication
C) User ID
D) None of the above
سؤال
What occurs when an organization uses software that filters content to prevent the transmission of unauthorized information?

A) Biometrics
B) Encryption
C) Firewalls
D) None of the above
سؤال
What is spam?

A) A type of encryption
B) A type of content filtering
C) A form of unsolicited email
D) None of the above
سؤال
What is a device that is around the same size as a credit card, containing embedded technologies that can store information and small amounts of software to perform some limited processing?

A) Token
B) Password
C) Smart card
D) Biometrics
سؤال
What is the recommended way to implement information security lines of defense?

A) People first, technology second
B) Technology first, people second
C) None of the above
D) All of the above
سؤال
What is encryption?

A) Occurs when an organization uses software that filters content to prevent the transmission of unauthorized information
B) Scrambles information into an alternative form that requires a key or password to decrypt the information
C) Hardware and/or software that guards a private network by analyzing the information leaving and entering the network
D) A form of unsolicited email
سؤال
What are the technologies available to help prevent and build resistance to attacks?

A) Content filtering, encryption, firewalls
B) Content filtering, encryption, insiders
C) Encryption, firewalls, insiders
D) Firewalls, social engineering, encryption
سؤال
What is the identification of a user based on a physical characteristic, such as a fingerprint, iris, face, voice, or handwriting?

A) Smart card
B) Token
C) Biometrics
D) Content filtering
سؤال
Which of the following is not one of the five steps for creating an information security plan?

A) Develop the information security policies
B) Communicate the information security policies
C) Revise and test the information security policies
D) Test and reevaluate risks
سؤال
Which of the following is not one of the three primary information security areas?

A) Authentication and authorization
B) Prevention and resistance
C) Detection and resistance
D) None of the above
سؤال
What identifies the rules required to maintain information security?

A) Information security plan
B) Information security policies
C) Authentication
D) Biometrics
سؤال
What is a method for confirming users' identities?

A) Authentication
B) Prevention
C) Detection
D) Response
سؤال
Which of the following is not one of the top 10 questions managers should ask regarding information security?

A) Is there clear accountability for information security in our organization?
B) How much is spent on information security and what is it being spent on?
C) What is the impact on the organization of a serious security incident?
D) How do we identify potential insiders?
سؤال
Which is a virus that opens a way into the network for future attacks?

A) Distributed denial-of-service attack
B) Worm
C) Denial-of-service attack
D) Backdoor programs
سؤال
What attacks computer systems by transmitting a virus hoax, with a real virus attached?

A) Malicious code
B) Hoaxes
C) Spoofing
D) Sniffer
سؤال
Who works at the request of the system owners to find system vulnerabilities and plug the holes?

A) White-hat hackers
B) Black-hat hackers
C) Hactivists
D) Script kiddies
سؤال
What is a type of virus that spreads itself, not just from file to file, but also from computer to computer?

A) Computer virus
B) Worm
C) Denial-of-service attack
D) None of the above
سؤال
If there is a security breech on your organizational information systems, which information security area is best suited to handle the breech?

A) Authentication and authorization
B) Prevention and resistance
C) Detection and response
D) Detection and resistance
سؤال
Who are hackers with criminal intent?

A) White-hat hacker
B) Black-hat hacker
C) Crackers
D) Cyberterrorists
سؤال
Which of the following is a program or device that can monitor data traveling over a network?

A) Malicious code
B) Hoaxes
C) Spoofing
D) Sniffer
سؤال
Information security is a broad term encompassing the protection of information from accidental or intentional misuse by persons inside or outside an organization.
سؤال
Who breaks into other people's computer systems and just looks around or steals and destroys information?

A) White-hat hacker
B) Black-hat hacker
C) Hactivists
D) Script kiddies
سؤال
Information security policies detail how an organization will implement the information security plan.
سؤال
Who finds hacking code on the Internet and click-and-points their way into systems to cause damage or spread viruses?

A) White-hat hacker
B) Black-hat hacker
C) Hactivists
D) Script kiddies
سؤال
What is the forging of the return address on an email so that the email message appears to come from someone other than the actual sender?

A) Malicious code
B) Hoaxes
C) Spoofing
D) Sniffer
سؤال
The Trojan-horse virus hides inside other software, usually as an attachment or a downloadable file.
سؤال
What includes a variety of threats such as viruses, worms, and Trojan horses?

A) Malicious code
B) Hoaxes
C) Spoofing
D) Sniffer
سؤال
What is the most common type of defense within detection and response technologies?

A) Malicious code
B) Token
C) User ID
D) Antivirus software
سؤال
Tokens are small electronic devices that change user passwords automatically.
سؤال
Insiders are illegitimate users who purposely or accidentally misuse their access to the environment to do business.
سؤال
What floods a website with so many requests for service that it slows down or crashes the site?

A) Computer virus
B) Worm
C) Denial-of-service attack
D) None of the above
سؤال
Which of the following does a firewall perform?

A) Examines each message that wants entrance to the network
B) Blocks messages without the correct markings from entering the network
C) Detects computers communicating with the Internet without approval
D) All of the above
سؤال
Who are those who seek to cause harm to people or to destroy critical systems or information and use the Internet as a weapon of mass destruction?

A) White-hat hacker
B) Black-hat hacker
C) Crackers
D) Cyberterrorists
سؤال
The most common type of defense within detection and response technologies is _________ software.
سؤال
A(n) information security ____________ details how an organization will implement the information security policies.
سؤال
Tokens are small electronic devices that change user passwords __________.
سؤال
____________ is the identification of a user based on a physical characteristic.
سؤال
Malicious code includes a variety of threats such as ______________, worms, and Trojan horses.
سؤال
Intrusion detection software (IDS) searches out patterns in information and network traffic to indicate __________ and quickly respond to prevent any harm.
سؤال
Spoofing is the forging of the _________ address on an email so teat the email message appears to come from someone other than the actual sender.
سؤال
Obtain ___________ support is the last step for creating an information security plan.
سؤال
_________ scrambles information into an alternative form that requires a key or password to decrypt the information.
سؤال
___________ diving is a form of social engineering when a hacker looks through people's trash to find personal information.
سؤال
A(n) _________ is hardware and/or software that guards a private network by analyzing the information leaving and entering the network.
سؤال
____________ security is a broad term encompassing the protection of information from accidental or intentional misuse by persons inside or outside an organization.
سؤال
Smart card is a(n) ___________ that is around the same size as a credit card, containing embedded technologies that can store information and small amounts of software to perform some limited processing.
سؤال
___________ attack computer systems by transmitting a virus hoax, with a real virus attached.
سؤال
Information security ______________ identify the rules required to maintain information security.
سؤال
___________ is a method for confirming users' identities.
سؤال
Social engineering is using one's __________ skills to trick people into revealing access credentials or other information valuable to the attacker.
سؤال
Content filtering, _________, and firewalls are the three types of prevention and resistance technologies.
سؤال
Develop the information security policies is the ________________ step for creating an information security plan.
سؤال
_________ filtering occurs when an organization uses software that filters content to prevent the transmission of unauthorized information.
سؤال
List and describe the three primary security areas.
سؤال
A(n) _________ is software written with malicious intent to cause annoyance or damage.
سؤال
_________ programs are viruses that open a way into the network for future attacks.
سؤال
_________ hat hackers work at the request of the system owners to find system vulnerabilities and plug the holes.
سؤال
Distributed denial-of-service attack (DDoS) attacks from multiple __________ that flood a website with so many requests for service that it slows down or crashes.
سؤال
Describe the relationship between information security policies and an information security plan.
سؤال
Trojan-horse virus hides inside other ________, usually as an attachment or a downloadable file.
سؤال
___________ hat hackers break into other people's computer systems and may just look around or may steal and destroy information.
سؤال
A(n) _______ is a program or device that can monitor data traveling over a network.
سؤال
Describe authentication and the most secure type of authentication.
سؤال
Describe the relationships and differences between hackers and viruses.
سؤال
Denial-of-service attack (DoS) _______________ a website with so many requests for service that it slows down or crashes the site.
سؤال
_________ have philosophical and political reasons for breaking into systems and will often deface the website as a protest.
سؤال
A(n) _________ is a type of virus that spreads itself, not only from file to file, but also from computer to computer.
سؤال
Summarize the five steps to creating an information security plan.
سؤال
_________ are people very knowledgeable about computers who use their knowledge to invade other people's computers.
سؤال
_________ seek to cause harm to people or to destroy critical systems or information and use the Internet as a weapon of mass destruction.
سؤال
_______________ is a hacker with criminal intent.
سؤال
_______________ kiddies find hacking code on the Internet and click-and-point their way into systems to cause damage or spread viruses.
سؤال
The ____________ of Death is a common type of DDoS and occurs when thousands of computers try to access a website at the same time, overloading it and shutting it down.
فتح الحزمة
قم بالتسجيل لفتح البطاقات في هذه المجموعة!
Unlock Deck
Unlock Deck
1/80
auto play flashcards
العب
simple tutorial
ملء الشاشة (f)
exit full mode
Deck 6: Information Security
1
Which of the following is not considered a type of biometrics?

A) Voice
B) Face
C) Iris
D) None of the above
D
2
Where do organizations typically place firewalls?

A) Between a personal computer and the server
B) Between a personal computer and a printer
C) Between the server and the content filtering software
D) Between the server and the Internet
D
3
Which of the following can be completed by encryption?

A) Switch the order of characters
B) Replace characters with other characters
C) Use a mathematical formula to convert the information into some sort of code
D) All of the above
D
4
What is the most costly and intrusive form of authentication?

A) Something the user knows such as a user ID and password
B) Something the user has such as a smart card or token
C) Something that is part of the user such as a fingerprint or voice signature
D) None of the above
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
5
What is social engineering?

A) Using one's social skills to trick people into revealing access credentials or other information valuable to the attacker
B) Legitimate users who purposely or accidentally misuse their access to the environment and cause some kind of business-affecting incident
C) Small electronic devices that change user passwords automatically
D) A method for confirming user's identities
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
6
Which term describes legitimate users who purposely or accidentally misuse their access to the environment and cause some kind of business-affecting incident?

A) Hactivist
B) Social engineering
C) Insiders
D) Virus
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
7
What is the most secure type of authentication?

A) Something the user knows such as a user ID and password
B) Something the user has such as a smart card or token
C) Something that is part of the user such as a fingerprint or voice signature
D) Combination of all of the above
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
8
Which of the following authentication methods is 100 percent accurate?

A) Smart card
B) Fingerprint authentication
C) User ID
D) None of the above
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
9
What occurs when an organization uses software that filters content to prevent the transmission of unauthorized information?

A) Biometrics
B) Encryption
C) Firewalls
D) None of the above
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
10
What is spam?

A) A type of encryption
B) A type of content filtering
C) A form of unsolicited email
D) None of the above
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
11
What is a device that is around the same size as a credit card, containing embedded technologies that can store information and small amounts of software to perform some limited processing?

A) Token
B) Password
C) Smart card
D) Biometrics
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
12
What is the recommended way to implement information security lines of defense?

A) People first, technology second
B) Technology first, people second
C) None of the above
D) All of the above
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
13
What is encryption?

A) Occurs when an organization uses software that filters content to prevent the transmission of unauthorized information
B) Scrambles information into an alternative form that requires a key or password to decrypt the information
C) Hardware and/or software that guards a private network by analyzing the information leaving and entering the network
D) A form of unsolicited email
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
14
What are the technologies available to help prevent and build resistance to attacks?

A) Content filtering, encryption, firewalls
B) Content filtering, encryption, insiders
C) Encryption, firewalls, insiders
D) Firewalls, social engineering, encryption
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
15
What is the identification of a user based on a physical characteristic, such as a fingerprint, iris, face, voice, or handwriting?

A) Smart card
B) Token
C) Biometrics
D) Content filtering
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
16
Which of the following is not one of the five steps for creating an information security plan?

A) Develop the information security policies
B) Communicate the information security policies
C) Revise and test the information security policies
D) Test and reevaluate risks
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
17
Which of the following is not one of the three primary information security areas?

A) Authentication and authorization
B) Prevention and resistance
C) Detection and resistance
D) None of the above
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
18
What identifies the rules required to maintain information security?

A) Information security plan
B) Information security policies
C) Authentication
D) Biometrics
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
19
What is a method for confirming users' identities?

A) Authentication
B) Prevention
C) Detection
D) Response
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
20
Which of the following is not one of the top 10 questions managers should ask regarding information security?

A) Is there clear accountability for information security in our organization?
B) How much is spent on information security and what is it being spent on?
C) What is the impact on the organization of a serious security incident?
D) How do we identify potential insiders?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
21
Which is a virus that opens a way into the network for future attacks?

A) Distributed denial-of-service attack
B) Worm
C) Denial-of-service attack
D) Backdoor programs
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
22
What attacks computer systems by transmitting a virus hoax, with a real virus attached?

A) Malicious code
B) Hoaxes
C) Spoofing
D) Sniffer
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
23
Who works at the request of the system owners to find system vulnerabilities and plug the holes?

A) White-hat hackers
B) Black-hat hackers
C) Hactivists
D) Script kiddies
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
24
What is a type of virus that spreads itself, not just from file to file, but also from computer to computer?

A) Computer virus
B) Worm
C) Denial-of-service attack
D) None of the above
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
25
If there is a security breech on your organizational information systems, which information security area is best suited to handle the breech?

A) Authentication and authorization
B) Prevention and resistance
C) Detection and response
D) Detection and resistance
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
26
Who are hackers with criminal intent?

A) White-hat hacker
B) Black-hat hacker
C) Crackers
D) Cyberterrorists
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
27
Which of the following is a program or device that can monitor data traveling over a network?

A) Malicious code
B) Hoaxes
C) Spoofing
D) Sniffer
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
28
Information security is a broad term encompassing the protection of information from accidental or intentional misuse by persons inside or outside an organization.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
29
Who breaks into other people's computer systems and just looks around or steals and destroys information?

A) White-hat hacker
B) Black-hat hacker
C) Hactivists
D) Script kiddies
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
30
Information security policies detail how an organization will implement the information security plan.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
31
Who finds hacking code on the Internet and click-and-points their way into systems to cause damage or spread viruses?

A) White-hat hacker
B) Black-hat hacker
C) Hactivists
D) Script kiddies
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
32
What is the forging of the return address on an email so that the email message appears to come from someone other than the actual sender?

A) Malicious code
B) Hoaxes
C) Spoofing
D) Sniffer
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
33
The Trojan-horse virus hides inside other software, usually as an attachment or a downloadable file.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
34
What includes a variety of threats such as viruses, worms, and Trojan horses?

A) Malicious code
B) Hoaxes
C) Spoofing
D) Sniffer
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
35
What is the most common type of defense within detection and response technologies?

A) Malicious code
B) Token
C) User ID
D) Antivirus software
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
36
Tokens are small electronic devices that change user passwords automatically.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
37
Insiders are illegitimate users who purposely or accidentally misuse their access to the environment to do business.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
38
What floods a website with so many requests for service that it slows down or crashes the site?

A) Computer virus
B) Worm
C) Denial-of-service attack
D) None of the above
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
39
Which of the following does a firewall perform?

A) Examines each message that wants entrance to the network
B) Blocks messages without the correct markings from entering the network
C) Detects computers communicating with the Internet without approval
D) All of the above
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
40
Who are those who seek to cause harm to people or to destroy critical systems or information and use the Internet as a weapon of mass destruction?

A) White-hat hacker
B) Black-hat hacker
C) Crackers
D) Cyberterrorists
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
41
The most common type of defense within detection and response technologies is _________ software.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
42
A(n) information security ____________ details how an organization will implement the information security policies.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
43
Tokens are small electronic devices that change user passwords __________.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
44
____________ is the identification of a user based on a physical characteristic.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
45
Malicious code includes a variety of threats such as ______________, worms, and Trojan horses.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
46
Intrusion detection software (IDS) searches out patterns in information and network traffic to indicate __________ and quickly respond to prevent any harm.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
47
Spoofing is the forging of the _________ address on an email so teat the email message appears to come from someone other than the actual sender.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
48
Obtain ___________ support is the last step for creating an information security plan.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
49
_________ scrambles information into an alternative form that requires a key or password to decrypt the information.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
50
___________ diving is a form of social engineering when a hacker looks through people's trash to find personal information.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
51
A(n) _________ is hardware and/or software that guards a private network by analyzing the information leaving and entering the network.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
52
____________ security is a broad term encompassing the protection of information from accidental or intentional misuse by persons inside or outside an organization.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
53
Smart card is a(n) ___________ that is around the same size as a credit card, containing embedded technologies that can store information and small amounts of software to perform some limited processing.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
54
___________ attack computer systems by transmitting a virus hoax, with a real virus attached.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
55
Information security ______________ identify the rules required to maintain information security.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
56
___________ is a method for confirming users' identities.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
57
Social engineering is using one's __________ skills to trick people into revealing access credentials or other information valuable to the attacker.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
58
Content filtering, _________, and firewalls are the three types of prevention and resistance technologies.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
59
Develop the information security policies is the ________________ step for creating an information security plan.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
60
_________ filtering occurs when an organization uses software that filters content to prevent the transmission of unauthorized information.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
61
List and describe the three primary security areas.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
62
A(n) _________ is software written with malicious intent to cause annoyance or damage.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
63
_________ programs are viruses that open a way into the network for future attacks.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
64
_________ hat hackers work at the request of the system owners to find system vulnerabilities and plug the holes.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
65
Distributed denial-of-service attack (DDoS) attacks from multiple __________ that flood a website with so many requests for service that it slows down or crashes.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
66
Describe the relationship between information security policies and an information security plan.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
67
Trojan-horse virus hides inside other ________, usually as an attachment or a downloadable file.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
68
___________ hat hackers break into other people's computer systems and may just look around or may steal and destroy information.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
69
A(n) _______ is a program or device that can monitor data traveling over a network.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
70
Describe authentication and the most secure type of authentication.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
71
Describe the relationships and differences between hackers and viruses.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
72
Denial-of-service attack (DoS) _______________ a website with so many requests for service that it slows down or crashes the site.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
73
_________ have philosophical and political reasons for breaking into systems and will often deface the website as a protest.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
74
A(n) _________ is a type of virus that spreads itself, not only from file to file, but also from computer to computer.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
75
Summarize the five steps to creating an information security plan.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
76
_________ are people very knowledgeable about computers who use their knowledge to invade other people's computers.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
77
_________ seek to cause harm to people or to destroy critical systems or information and use the Internet as a weapon of mass destruction.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
78
_______________ is a hacker with criminal intent.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
79
_______________ kiddies find hacking code on the Internet and click-and-point their way into systems to cause damage or spread viruses.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
80
The ____________ of Death is a common type of DDoS and occurs when thousands of computers try to access a website at the same time, overloading it and shutting it down.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
locked card icon
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.