Deck 11: Cybersecurity
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
فتح الحزمة
قم بالتسجيل لفتح البطاقات في هذه المجموعة!
Unlock Deck
Unlock Deck
1/113
العب
ملء الشاشة (f)
Deck 11: Cybersecurity
1
Most data thieves are professional criminals deliberately trying to steal information they can turn into cash.
True
2
________ relates to the laws and regulations to prevent, investigate, and prosecute cybercrimes.
Cyberlaw
3
________ refers to rummaging through garbage for discarded documents or digital media.
Dumpster diving
4
Match the legislation to the description
-Federal Information Security Management Act (FISMA)
A)This legislation requires organizations that handle credit and debit card data to meet cybersecurity requirements to safeguard the data.
B)Frank-Dodd Wall Street Reform and Consumer Protection Act
C)This legislation requires each federal agency to develop, document, and implement an agency-wide information security program.
D)This legislation requires proper internal control, including information security and controls.
E)Federal Privacy Act of 1974
F)This legislation requires financial institutions to provide customers with privacy notices and prohibits the institutions from sharing customer information with nonaffiliated third parties.
-Federal Information Security Management Act (FISMA)
A)This legislation requires organizations that handle credit and debit card data to meet cybersecurity requirements to safeguard the data.
B)Frank-Dodd Wall Street Reform and Consumer Protection Act
C)This legislation requires each federal agency to develop, document, and implement an agency-wide information security program.
D)This legislation requires proper internal control, including information security and controls.
E)Federal Privacy Act of 1974
F)This legislation requires financial institutions to provide customers with privacy notices and prohibits the institutions from sharing customer information with nonaffiliated third parties.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 113 في هذه المجموعة.
فتح الحزمة
k this deck
5
Match the legislation to the description
-Sarbanes-Oxley (SOX)
A)This legislation requires organizations that handle credit and debit card data to meet cybersecurity requirements to safeguard the data.
B)Frank-Dodd Wall Street Reform and Consumer Protection Act
C)This legislation requires each federal agency to develop, document, and implement an agency-wide information security program.
D)This legislation requires proper internal control, including information security and controls.
E)Federal Privacy Act of 1974
F)This legislation requires financial institutions to provide customers with privacy notices and prohibits the institutions from sharing customer information with nonaffiliated third parties.
-Sarbanes-Oxley (SOX)
A)This legislation requires organizations that handle credit and debit card data to meet cybersecurity requirements to safeguard the data.
B)Frank-Dodd Wall Street Reform and Consumer Protection Act
C)This legislation requires each federal agency to develop, document, and implement an agency-wide information security program.
D)This legislation requires proper internal control, including information security and controls.
E)Federal Privacy Act of 1974
F)This legislation requires financial institutions to provide customers with privacy notices and prohibits the institutions from sharing customer information with nonaffiliated third parties.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 113 في هذه المجموعة.
فتح الحزمة
k this deck
6
Phishing involves attempts to obtain passwords by sniffing messages sent between computers on the network.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 113 في هذه المجموعة.
فتح الحزمة
k this deck
7
Successful data breaches never involves multiple means of attach.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 113 في هذه المجموعة.
فتح الحزمة
k this deck
8
Cybersecurity combines people, processes, and technology to continually monitor vulnerabilities and respond proactively to secure the system.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 113 في هذه المجموعة.
فتح الحزمة
k this deck
9
Personal data, such as home address and credit card number, are stored on hotel card keys.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 113 في هذه المجموعة.
فتح الحزمة
k this deck
10
________ developed the 10-domain Common Body of Knowledge (CBK)for IT security and controls.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 113 في هذه المجموعة.
فتح الحزمة
k this deck
11
________ involves collecting, examining, and preserving evidence of cybercrimes.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 113 في هذه المجموعة.
فتح الحزمة
k this deck
12
List the 10 domains that comprise the 10-domain Common Body of Knowledge (CBK).
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 113 في هذه المجموعة.
فتح الحزمة
k this deck
13
Match the legislation to the description
-Gramm-Leach-Bliley Act
A)This legislation requires organizations that handle credit and debit card data to meet cybersecurity requirements to safeguard the data.
B)Frank-Dodd Wall Street Reform and Consumer Protection Act
C)This legislation requires each federal agency to develop, document, and implement an agency-wide information security program.
D)This legislation requires proper internal control, including information security and controls.
E)Federal Privacy Act of 1974
F)This legislation requires financial institutions to provide customers with privacy notices and prohibits the institutions from sharing customer information with nonaffiliated third parties.
-Gramm-Leach-Bliley Act
A)This legislation requires organizations that handle credit and debit card data to meet cybersecurity requirements to safeguard the data.
B)Frank-Dodd Wall Street Reform and Consumer Protection Act
C)This legislation requires each federal agency to develop, document, and implement an agency-wide information security program.
D)This legislation requires proper internal control, including information security and controls.
E)Federal Privacy Act of 1974
F)This legislation requires financial institutions to provide customers with privacy notices and prohibits the institutions from sharing customer information with nonaffiliated third parties.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 113 في هذه المجموعة.
فتح الحزمة
k this deck
14
Match the legislation to the description
-Payment Card Industry Data Security Standards
A)This legislation requires organizations that handle credit and debit card data to meet cybersecurity requirements to safeguard the data.
B)Frank-Dodd Wall Street Reform and Consumer Protection Act
C)This legislation requires each federal agency to develop, document, and implement an agency-wide information security program.
D)This legislation requires proper internal control, including information security and controls.
E)Federal Privacy Act of 1974
F)This legislation requires financial institutions to provide customers with privacy notices and prohibits the institutions from sharing customer information with nonaffiliated third parties.
-Payment Card Industry Data Security Standards
A)This legislation requires organizations that handle credit and debit card data to meet cybersecurity requirements to safeguard the data.
B)Frank-Dodd Wall Street Reform and Consumer Protection Act
C)This legislation requires each federal agency to develop, document, and implement an agency-wide information security program.
D)This legislation requires proper internal control, including information security and controls.
E)Federal Privacy Act of 1974
F)This legislation requires financial institutions to provide customers with privacy notices and prohibits the institutions from sharing customer information with nonaffiliated third parties.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 113 في هذه المجموعة.
فتح الحزمة
k this deck
15
While dumpster diving is unethical, it may not be illegal.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 113 في هذه المجموعة.
فتح الحزمة
k this deck
16
________ are crimes connected to information assets and IT.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 113 في هذه المجموعة.
فتح الحزمة
k this deck
17
Which of the following is NOT part of the 10 domains of cybersecurity?
A)Cryptography
B)Database security
C)Physical and environmental security
D)Access control
A)Cryptography
B)Database security
C)Physical and environmental security
D)Access control
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 113 في هذه المجموعة.
فتح الحزمة
k this deck
18
Laws related to cybersecurity originate from legislation, regulations, and case law.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 113 في هذه المجموعة.
فتح الحزمة
k this deck
19
Cybercrimes are crimes connected to what? (Select the best answer)
A)Information assets and IT
B)The financial services industry
C)Electronic payments
D)Electronic transfer of funds
A)Information assets and IT
B)The financial services industry
C)Electronic payments
D)Electronic transfer of funds
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 113 في هذه المجموعة.
فتح الحزمة
k this deck
20
________ involves attempts to obtain passwords by sniffing messages sent between computers on the network.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 113 في هذه المجموعة.
فتح الحزمة
k this deck
21
Provide example of how security and controls measures can be included in the planning, design, installation, and deployment phases of the SDLC.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 113 في هذه المجموعة.
فتح الحزمة
k this deck
22
Which legislation requires financial institutions to provide customers with privacy notices and prohibits the institutions from sharing customer information with nonaffiliated third parties?
A)Federal Privacy Act of 1974
B)Sarbanes-Oxley
C)Gramm-Leach-Bliley Act
D)Computer Security Act of 1987
A)Federal Privacy Act of 1974
B)Sarbanes-Oxley
C)Gramm-Leach-Bliley Act
D)Computer Security Act of 1987
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 113 في هذه المجموعة.
فتح الحزمة
k this deck
23
Data ________ is a security principle that ensures data is accurate and reliable.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 113 في هذه المجموعة.
فتح الحزمة
k this deck
24
Enterprise security architecture studies the enterprise architecture and business environment to develop an overall strategy and plan that best fits enterprise-specific needs.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 113 في هذه المجموعة.
فتح الحزمة
k this deck
25
The Internet is a collection of many networks of various types, connecting different LANs
MANs, and WANs together.
MANs, and WANs together.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 113 في هذه المجموعة.
فتح الحزمة
k this deck
26
According to Verizon's 2012 Data Breach Investigations Report, what percentage of attacks were from activist groups?
A)63%
B)58%
C)52%
D)48%
A)63%
B)58%
C)52%
D)48%
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 113 في هذه المجموعة.
فتح الحزمة
k this deck
27
The information security principle integrity ensures that sensitive data at each point in information processing is secure and protected from unauthorized access.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 113 في هذه المجموعة.
فتح الحزمة
k this deck
28
Wide area networks (WANs)cover a large geographic region, such as the lower Midwest.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 113 في هذه المجموعة.
فتح الحزمة
k this deck
29
According to Verizon's 2012 Data Breach Investigations Report, what percentage of breaches were physical attacks, such as a stolen laptop?
A)10%
B)15%
C)23%
D)45%
A)10%
B)15%
C)23%
D)45%
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 113 في هذه المجموعة.
فتح الحزمة
k this deck
30
This security management principle ensures that sensitive data at each point in information processing is secure and protected from unauthorized access.
A)Confidentiality
B)Integrity
C)Private
D)Availability
A)Confidentiality
B)Integrity
C)Private
D)Availability
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 113 في هذه المجموعة.
فتح الحزمة
k this deck
31
According to Verizon's 2012 Data Breach Investigations Report, what percentage of breaches were tied to organized criminal groups?
A)79%
B)65%
C)83%
D)58%
A)79%
B)65%
C)83%
D)58%
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 113 في هذه المجموعة.
فتح الحزمة
k this deck
32
In the government sector, unauthorized disclosure of data with this classification might be harmful to national security.
A)Sensitive But Unclassified
B)Top Secret
C)Confidential
D)Secret
A)Sensitive But Unclassified
B)Top Secret
C)Confidential
D)Secret
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 113 في هذه المجموعة.
فتح الحزمة
k this deck
33
List and define information sensitivity classification for governmental sector.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 113 في هذه المجموعة.
فتح الحزمة
k this deck
34
Which legislation requires organizations that handle credit and debit card data to meet cybersecurity requirements to safeguard data?
A)Computer Fraud and Abuse Act
B)Federal Information Security Management Act of 2002 (FISMA)
C)Economic Espionage Act of 1996
D)Payment Card Industries Data Security Standards (PCI-DDS)
A)Computer Fraud and Abuse Act
B)Federal Information Security Management Act of 2002 (FISMA)
C)Economic Espionage Act of 1996
D)Payment Card Industries Data Security Standards (PCI-DDS)
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 113 في هذه المجموعة.
فتح الحزمة
k this deck
35
________ is a piece of computer hardware that extracts instructions and data and decodes and executes the instructions.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 113 في هذه المجموعة.
فتح الحزمة
k this deck
36
List and describe three frameworks that provide a conceptual structure to address security and control.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 113 في هذه المجموعة.
فتح الحزمة
k this deck
37
Which legislation requires each federal agency to develop, document, and implement an agency-wide information security program?
A)Employee Privacy Issues
B)Federal Information Security Management Act of 2002 (FISMA)
C)Computer Fraud and Abuse Act
D)Federal Privacy Act of 1974
A)Employee Privacy Issues
B)Federal Information Security Management Act of 2002 (FISMA)
C)Computer Fraud and Abuse Act
D)Federal Privacy Act of 1974
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 113 في هذه المجموعة.
فتح الحزمة
k this deck
38
Bridges connect LANs of similar or different types to create an intranet.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 113 في هذه المجموعة.
فتح الحزمة
k this deck
39
List and define the information sensitivity classifications for the private sector.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 113 في هذه المجموعة.
فتح الحزمة
k this deck
40
It is the first day of your new job as an accounting intern. In the elevator on the way to your cubicle, a gentleman in the elevator (that you later learn is the controller of the company)says to you, "A salami attack." Shaking his head, he repeats, "It sounds more like someone being hit over the head with a sausage. It's just a small amount, so why should we care? You are our new intern, aren't you? Well, why don't you send me an email by this afternoon explaining what is a salami attack and why we should prevent them."
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 113 في هذه المجموعة.
فتح الحزمة
k this deck
41
Match the network protocol with the appropriate definition.
-Electronic data interchange (EDI)
A)A software program that provides message transportation services between sending and receiving computers
B)A software program commonly used to connect computers to create a LAN
C)A software program that provides routing services to messages transmitted over the Internet
D)A software program that allows the enterprise network to connect to the network of vendors and suppliers through proprietary lines
-Electronic data interchange (EDI)
A)A software program that provides message transportation services between sending and receiving computers
B)A software program commonly used to connect computers to create a LAN
C)A software program that provides routing services to messages transmitted over the Internet
D)A software program that allows the enterprise network to connect to the network of vendors and suppliers through proprietary lines
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 113 في هذه المجموعة.
فتح الحزمة
k this deck
42
What are the basic hardware components of a computer?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 113 في هذه المجموعة.
فتح الحزمة
k this deck
43
Match the network protocol with the appropriate definition.
-Internet protocol (IP)
A)A software program that provides message transportation services between sending and receiving computers
B)A software program commonly used to connect computers to create a LAN
C)A software program that provides routing services to messages transmitted over the Internet
D)A software program that allows the enterprise network to connect to the network of vendors and suppliers through proprietary lines
-Internet protocol (IP)
A)A software program that provides message transportation services between sending and receiving computers
B)A software program commonly used to connect computers to create a LAN
C)A software program that provides routing services to messages transmitted over the Internet
D)A software program that allows the enterprise network to connect to the network of vendors and suppliers through proprietary lines
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 113 في هذه المجموعة.
فتح الحزمة
k this deck
44
Which of the following network hardware are utility devices connected to the network for shared use?
A)Workstation computers
B)Server computers
C)Routing devices
D)Peripherals
A)Workstation computers
B)Server computers
C)Routing devices
D)Peripherals
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 113 في هذه المجموعة.
فتح الحزمة
k this deck
45
________ is a network used by external customers and/or suppliers.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 113 في هذه المجموعة.
فتح الحزمة
k this deck
46
Security of the IT architecture should be considered in which phase of the system development life cycle (SDLC)?
A)All the phases
B)Design phase
C)Install phase
D)Build/purchase phase
A)All the phases
B)Design phase
C)Install phase
D)Build/purchase phase
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 113 في هذه المجموعة.
فتح الحزمة
k this deck
47
What is a microcomputer?
A)A computer with moderate computing power
B)A personal computer or laptop
C)A smart phone
D)A powerful, high-speed computer used for complex numerical calculations
A)A computer with moderate computing power
B)A personal computer or laptop
C)A smart phone
D)A powerful, high-speed computer used for complex numerical calculations
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 113 في هذه المجموعة.
فتح الحزمة
k this deck
48
Which network protocol (software)allows the enterprise network to connect to the network of vendors and suppliers through proprietary lines?
A)Transport control protocol (TCP)
B)Ethernet protocol
C)Internet protocol (IP)
D)Electronic data interchange (EDI)
A)Transport control protocol (TCP)
B)Ethernet protocol
C)Internet protocol (IP)
D)Electronic data interchange (EDI)
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 113 في هذه المجموعة.
فتح الحزمة
k this deck
49
________ firewall is a special type of firewall located on a server used to intercept and inspect all incoming messages prior to delivering them to the intended recipients.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 113 في هذه المجموعة.
فتح الحزمة
k this deck
50
Match the network protocol with the appropriate definition.
-Ethernet protocol
A)A software program that provides message transportation services between sending and receiving computers
B)A software program commonly used to connect computers to create a LAN
C)A software program that provides routing services to messages transmitted over the Internet
D)A software program that allows the enterprise network to connect to the network of vendors and suppliers through proprietary lines
-Ethernet protocol
A)A software program that provides message transportation services between sending and receiving computers
B)A software program commonly used to connect computers to create a LAN
C)A software program that provides routing services to messages transmitted over the Internet
D)A software program that allows the enterprise network to connect to the network of vendors and suppliers through proprietary lines
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 113 في هذه المجموعة.
فتح الحزمة
k this deck
51
Network cyberattacks typically target ________ because they offer access to the network.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 113 في هذه المجموعة.
فتح الحزمة
k this deck
52
Securing computer architecture involves three rings of protection. What is in each ring? Provide examples.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 113 في هذه المجموعة.
فتح الحزمة
k this deck
53
When application software is updated to fix an error or add a new feature, a section of coding called a ________ is inserted into the program.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 113 في هذه المجموعة.
فتح الحزمة
k this deck
54
Telecommunications, networks, and the internet all relate to data transmission.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 113 في هذه المجموعة.
فتح الحزمة
k this deck
55
Which of the following network hardware are typically personal computers and laptops connected to the network?
A)Workstation computers
B)Server computers
C)Routing devices
D)Peripherals
A)Workstation computers
B)Server computers
C)Routing devices
D)Peripherals
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 113 في هذه المجموعة.
فتح الحزمة
k this deck
56
Which network protocol (software)is commonly used to connect computers to create a LAN?
A)Internet protocol (IP)
B)Ethernet protocol
C)Electronic data interchange (EDI)
D)Transport control protocol (TCP)
A)Internet protocol (IP)
B)Ethernet protocol
C)Electronic data interchange (EDI)
D)Transport control protocol (TCP)
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 113 في هذه المجموعة.
فتح الحزمة
k this deck
57
________ are types of computer hardware that capture data from various sources and move the data into main memory.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 113 في هذه المجموعة.
فتح الحزمة
k this deck
58
In IT architecture security, what is NOT part of the software application ring?
A)Accounting software
B)Web browsers
C)Word processing applications
D)Relational database management system
A)Accounting software
B)Web browsers
C)Word processing applications
D)Relational database management system
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 113 في هذه المجموعة.
فتح الحزمة
k this deck
59
List and describe four types of network software protocols.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 113 في هذه المجموعة.
فتح الحزمة
k this deck
60
Match the network protocol with the appropriate definition.
-Transport control protocol (TCP)
A)A software program that provides message transportation services between sending and receiving computers
B)A software program commonly used to connect computers to create a LAN
C)A software program that provides routing services to messages transmitted over the Internet
D)A software program that allows the enterprise network to connect to the network of vendors and suppliers through proprietary lines
-Transport control protocol (TCP)
A)A software program that provides message transportation services between sending and receiving computers
B)A software program commonly used to connect computers to create a LAN
C)A software program that provides routing services to messages transmitted over the Internet
D)A software program that allows the enterprise network to connect to the network of vendors and suppliers through proprietary lines
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 113 في هذه المجموعة.
فتح الحزمة
k this deck
61
A ________ is a hardware device containing a password generator protocol that creates a new password each time the token is used.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 113 في هذه المجموعة.
فتح الحزمة
k this deck
62
Which access control threat are programs or devices that examine traffic on the enterprise network?
A)Password attack
B)Network sniffer
C)Identify theft
D)Spoofing at log-on
A)Password attack
B)Network sniffer
C)Identify theft
D)Spoofing at log-on
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 113 في هذه المجموعة.
فتح الحزمة
k this deck
63
Which of the following is NOT a network access point?
A)Keyboard
B)Bridge
C)Computer
D)Router
A)Keyboard
B)Bridge
C)Computer
D)Router
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 113 في هذه المجموعة.
فتح الحزمة
k this deck
64
Which of the following firewalls destroys suspicious messages?
A)Low-level security firewall
B)Medium-level security firewall
C)High-level security firewall
D)Proxy firewall
A)Low-level security firewall
B)Medium-level security firewall
C)High-level security firewall
D)Proxy firewall
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 113 في هذه المجموعة.
فتح الحزمة
k this deck
65
What is a honeypot and why is it used?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 113 في هذه المجموعة.
فتح الحزمة
k this deck
66
Operations security refers to
A)Security for access to the enterprise system, including computers, networks, routers, and databases
B)Security for telecommunications, networks, and the Internet
C)The physical security of information technology components, such as hardware and software
D)Activities and procedures required to keep information technology running securely
A)Security for access to the enterprise system, including computers, networks, routers, and databases
B)Security for telecommunications, networks, and the Internet
C)The physical security of information technology components, such as hardware and software
D)Activities and procedures required to keep information technology running securely
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 113 في هذه المجموعة.
فتح الحزمة
k this deck
67
A user with specialized knowledge cannot use partial database access to gain full access to a database.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 113 في هذه المجموعة.
فتح الحزمة
k this deck
68
________ are tiny pieces of programming code that install themselves on an infected computer called a Zombie.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 113 في هذه المجموعة.
فتح الحزمة
k this deck
69
Which access control threat uses programs or devices that examine traffic on the enterprise network?
A)Network sniffers
B)Phishing
C)Identify theft
D)Spoofing at log-on
A)Network sniffers
B)Phishing
C)Identify theft
D)Spoofing at log-on
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 113 في هذه المجموعة.
فتح الحزمة
k this deck
70
The company where you work is opening offices in another state. Because the manager of the new office is determined to keep costs down, she does not want to purchase additional firewall software for the routers and bridges being installed behind the corporate firewall. The IT department has asked you for help. Prepare a memo explaining the need for additional firewalls.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 113 في هذه المجموعة.
فتح الحزمة
k this deck
71
List and define five access control threats.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 113 في هذه المجموعة.
فتح الحزمة
k this deck
72
Match the malware with the appropriate definition.
-Viruses
A)Code is disguised as a legitimate program, that can be downloaded and installed by users without realizing it is malware
B)A relatively small program that infects other application software by attaching to it and disrupting application function
C)Tiny piece(s)of programming code that install themselves on the infected computer called a Zombie
D)Similar to a virus except it does not need a host application to function or reproduce
E)Software executes when a specified event happens within the computer
-Viruses
A)Code is disguised as a legitimate program, that can be downloaded and installed by users without realizing it is malware
B)A relatively small program that infects other application software by attaching to it and disrupting application function
C)Tiny piece(s)of programming code that install themselves on the infected computer called a Zombie
D)Similar to a virus except it does not need a host application to function or reproduce
E)Software executes when a specified event happens within the computer
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 113 في هذه المجموعة.
فتح الحزمة
k this deck
73
Physical security frameworks are useful to provide guidance on how to secure the physical facilities, grounds, and IT assets.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 113 في هذه المجموعة.
فتح الحزمة
k this deck
74
Which of the following is NOT considered a deterrent to the physical access to corporate offices?
A)GPS tracking
B)Locked doors
C)Fences
D)Cameras
A)GPS tracking
B)Locked doors
C)Fences
D)Cameras
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 113 في هذه المجموعة.
فتح الحزمة
k this deck
75
What is the purpose of a physical security framework? Provide examples of physical security.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 113 في هذه المجموعة.
فتح الحزمة
k this deck
76
The physical and environmental security domain addresses
A)Activities and procedures required to keep information technology running securely
B)The physical security of information technology components, such as hardware and software
C)Security for telecommunications, networks, and the Internet
D)Security for access to the enterprise system, including computers, networks, routers, and databases
A)Activities and procedures required to keep information technology running securely
B)The physical security of information technology components, such as hardware and software
C)Security for telecommunications, networks, and the Internet
D)Security for access to the enterprise system, including computers, networks, routers, and databases
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 113 في هذه المجموعة.
فتح الحزمة
k this deck
77
________ controls ensure that reports and messages reach intended recipients.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 113 في هذه المجموعة.
فتح الحزمة
k this deck
78
IT security management responsibility includes
A)Developing contingency plans for virus attacks
B)Input/output controls
C)Maintaining security devices and software
D)Training to all employees to inform and educate them regarding security policies and procedures
A)Developing contingency plans for virus attacks
B)Input/output controls
C)Maintaining security devices and software
D)Training to all employees to inform and educate them regarding security policies and procedures
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 113 في هذه المجموعة.
فتح الحزمة
k this deck
79
Which domain covers security for the electrical transmission of data through analog or digital transmission media?
A)Security architecture and design
B)Telecommunications
C)Application security
D)Cryptography
A)Security architecture and design
B)Telecommunications
C)Application security
D)Cryptography
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 113 في هذه المجموعة.
فتح الحزمة
k this deck
80
Which authentication method involves analyzing the user's retina?
A)Single sign-on
B)Biometrics
C)Token device
D)Dynamic password
A)Single sign-on
B)Biometrics
C)Token device
D)Dynamic password
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 113 في هذه المجموعة.
فتح الحزمة
k this deck

