Deck 5: Protecting Information Resources
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/100
Play
Full screen (f)
Deck 5: Protecting Information Resources
1
Social engineering is an example of an unintentional security threat.
False
2
Trojan programs replicate themselves as viruses and worms do.
False
3
When using mirror disks,if one of the two disks containing the same data fails,the other disk also fails.
False
4
Spoofing is sending fraudulent e-mails that seem to come from legitimate sources,such as a bank or university.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
5
In the context of security,social engineering protects the integrity of information resources.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
6
Part of ensuring integrity is identifying authorized users and granting them access privileges.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
7
Phishing is different from pharming as phishing usually involves hijacking an official Web site address by hacking a Domain Name System server.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
8
After examining an incoming packet,a firewall cannot reject that packet.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
9
When a program containing a virus is used,the virus attaches itself to other files,and the cycle continues.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
10
Viruses can only be transmitted through sharing of infected files directly from one computer to another.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
11
An intrusion detection system (IDS) can protect networks against both external and internal access.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
12
A distributed denial-of-service (DDoS) attack involves hundreds of computers working together to bombard a Web site with thousands of requests for information in a short period.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
13
Hand geometry is an example of a biometric security measure.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
14
If a drive in a redundant array of independent disks (RAID) system fails,data stored on it can be reconstructed from data stored on the remaining drives.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
15
Keystroke loggers can be used for malicious purposes,such as collecting the credit card numbers that users enter while shopping online.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
16
Application-filtering firewalls are less expensive than packet-filtering firewalls.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
17
Level 1 security protects the back-end systems to ensure confidentiality,accuracy,and integrity of data.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
18
A proxy server is often used to help protect the network against unauthorized access from outside the network by hiding the network addresses of internal systems.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
19
Social engineering is an attack that takes advantage of the backdoors in security systems.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
20
Confidentiality,integrity,and availability are collectively referred to as the CIA triangle.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
21
The cost of setting up a virtual private network (VPN) is usually high.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
22
In symmetric encryption,the same key is used to encrypt and decrypt a message.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
23
_____ is the process of capturing and recording network traffic.
A) Sniffing
B) Phishing
C) Spoofing
D) Pharming
A) Sniffing
B) Phishing
C) Spoofing
D) Pharming
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
24
A level 2 security system protects _____.
A) back-end systems
B) corporate networks
C) Web servers
D) e-mail servers
A) back-end systems
B) corporate networks
C) Web servers
D) e-mail servers
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
25
In the context of computer and network security,_____ means that computers and networks are operating and authorized users can access the information they need.
A) validity
B) confidentiality
C) integrity
D) availability
A) validity
B) confidentiality
C) integrity
D) availability
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
26
_____ is a computer crime that involves destroying or disrupting computer services.
A) Sabotage
B) Slander
C) Libel
D) Keystroke logging
A) Sabotage
B) Slander
C) Libel
D) Keystroke logging
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
27
In the context of computer and network security,_____ refers to the accuracy of information resources within an organization.
A) validity
B) confidentiality
C) integrity
D) availability
A) validity
B) confidentiality
C) integrity
D) availability
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
28
An intrusion detection system (IDS) cannot prevent denial-of-service (DoS) attacks.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
29
Similar to phishing,_____ is directing Internet users to fraudulent Web sites with the intention of stealing their personal information,such as Social Security numbers,passwords,bank account numbers,and credit card numbers.
A) sniffing
B) spoofing
C) pharming
D) cybersquatting
A) sniffing
B) spoofing
C) pharming
D) cybersquatting
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
30
An ideal password should be eight characters or longer.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
31
Data encryption transforms data into a scrambled form called ciphertext.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
32
Terminal resource security is a software feature that erases the screen and signs the user off automatically after a specified length of inactivity.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
33
A level 1 security system is used to protect _____ against unauthorized access.
A) users' work stations
B) corporate networks
C) internal database servers
D) front-end servers
A) users' work stations
B) corporate networks
C) internal database servers
D) front-end servers
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
34
A level 3 security system focuses on protecting _____.
A) back-end systems
B) corporate networks
C) users' work stations
D) front-end servers
A) back-end systems
B) corporate networks
C) users' work stations
D) front-end servers
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
35
Backup facilities should never be shared in an attempt to reduce costs.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
36
The main advantage of asymmetric encryption is that it is faster and requires only a small amount of processing power.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
37
_____ can interfere with users' control of their computers,through such methods as installing additional software and redirecting Web browsers.
A) Kernels
B) Spyware
C) Cookies
D) Log files
A) Kernels
B) Spyware
C) Cookies
D) Log files
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
38
In the context of computer and network security,_____ means that a system must not allow the disclosing of information by anyone who is not authorized to access it.
A) validity
B) confidentiality
C) integrity
D) availability
A) validity
B) confidentiality
C) integrity
D) availability
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
39
Corner bolts are an expensive way to secure a computer to a desktop or a counter.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
40
Symmetric encryption is also called public key encryption.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
41
Which of the following is considered an intentional security threat?
A) Floods
B) A user's accidental deletion of data
C) Backdoors
D) Power outages
A) Floods
B) A user's accidental deletion of data
C) Backdoors
D) Power outages
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
42
Which of the following is a biometric security measure?
A) Electronic trackers
B) Passwords
C) Firewalls
D) Signature analysis
A) Electronic trackers
B) Passwords
C) Firewalls
D) Signature analysis
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
43
A(n) _____ is often used,so remote users have a secure connection to an organization's network.
A) biometric security system
B) intrusion detection system
C) virtual private network
D) terminal resource network
A) biometric security system
B) intrusion detection system
C) virtual private network
D) terminal resource network
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
44
Which of the following is a nonbiometric security measure?
A) Electronic trackers
B) Passwords
C) Firewalls
D) Signature analysis
A) Electronic trackers
B) Passwords
C) Firewalls
D) Signature analysis
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
45
Which of the following is a type of access control used to protect systems from unauthorized access?
A) Steel encasements
B) Passwords
C) Firewalls
D) Identification badges
A) Steel encasements
B) Passwords
C) Firewalls
D) Identification badges
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
46
A (n) _____ travels from computer to computer in a network,but it does not usually erase data.
A) Trojan program
B) worm
C) applet
D) backdoor
A) Trojan program
B) worm
C) applet
D) backdoor
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
47
_____ security measures primarily control access to computers and networks,and they include devices for securing computers and peripherals from theft.
A) Nonbiometric
B) Physiological
C) Biometric
D) Physical
A) Nonbiometric
B) Physiological
C) Biometric
D) Physical
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
48
Data sent through a virtual private network (VPN) can be encrypted using the _____ protocol.
A) User Datagram
B) Transmission Control
C) Secured Sockets layer
D) Layer Two Tunneling
A) User Datagram
B) Transmission Control
C) Secured Sockets layer
D) Layer Two Tunneling
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
49
_____ encryption uses a public key known to everyone and a private key known only to the recipient.
A) Symmetric
B) Asymmetric
C) Synchronous
D) Asynchronous
A) Symmetric
B) Asymmetric
C) Synchronous
D) Asynchronous
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
50
_____ ensures data security and integrity over public networks,such as the Internet.
A) Transport Layer Security
B) Terminal Resource Security
C) Transmission Control Protocol
D) User Datagram Protocol
A) Transport Layer Security
B) Terminal Resource Security
C) Transmission Control Protocol
D) User Datagram Protocol
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
51
_____ are usually placed in front of a firewall and can identify attack signatures and trace patterns.
A) Intrusion detection systems
B) Proxy servers
C) Physical security measures
D) Biometric security measures
A) Intrusion detection systems
B) Proxy servers
C) Physical security measures
D) Biometric security measures
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
52
A _____ attack floods a network or server with service requests to prevent legitimate users' access to the system.
A) social engineering
B) denial-of-service
C) backdoor
D) phishing
A) social engineering
B) denial-of-service
C) backdoor
D) phishing
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
53
A _____ is a programming routine built into a system by its designer or programmer.
A) logic bomb
B) worm
C) virus
D) backdoor
A) logic bomb
B) worm
C) virus
D) backdoor
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
54
A _____ is the software that acts as an intermediary between two systems.
A) database
B) backdoor
C) proxy server
D) Trojan program
A) database
B) backdoor
C) proxy server
D) Trojan program
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
55
_____ is a commonly used encryption protocol that manages transmission security on the Internet.
A) Applications Layer
B) Secure Sockets Layer
C) Transmission Control Protocol
D) User Datagram Protocol
A) Applications Layer
B) Secure Sockets Layer
C) Transmission Control Protocol
D) User Datagram Protocol
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
56
_____ use a physiological element to enhance security measures.
A) Modems
B) Firewalls
C) Intrusion detection systems
D) Biometric security measures
A) Modems
B) Firewalls
C) Intrusion detection systems
D) Biometric security measures
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
57
A logic bomb is a type of _____.
A) Trojan program
B) worm
C) blended threat
D) backdoor
A) Trojan program
B) worm
C) blended threat
D) backdoor
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
58
_____ take advantage of the human element of security systems.
A) Denial-of-service attacks
B) Trojan programs
C) Blended threats
D) Social engineering attacks
A) Denial-of-service attacks
B) Trojan programs
C) Blended threats
D) Social engineering attacks
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
59
Which of the following forms of text used in an encryption algorithm is unreadable without a decryption key?
A) Plaintext
B) Cleartext
C) Codetext
D) Ciphertext
A) Plaintext
B) Cleartext
C) Codetext
D) Ciphertext
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
60
Which of the following is a physical security measure?
A) Fitting electronic trackers to a computer
B) Restricting access through passwords
C) Filtering data packets using a firewall
D) Checking a user's signature
A) Fitting electronic trackers to a computer
B) Restricting access through passwords
C) Filtering data packets using a firewall
D) Checking a user's signature
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
61
_____ is software that secretly gathers information about users while they browse the Web.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
62
A(n) _____ is a combination of hardware and software that acts as a filter or barrier between a private network and external computers or networks.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
63
_____ is the unauthorized use of computer data for personal gain,such as transferring money from another's account or charging purchases to someone else's account.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
64
In _____ encryption,the same key is used to encrypt and decrypt a message.
A) symmetric
B) asymmetric
C) synchronous
D) asynchronous
A) symmetric
B) asymmetric
C) synchronous
D) asynchronous
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
65
_____ is sending fraudulent e-mails that seem to come from legitimate sources,such as a bank or university.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
66
A(n) _____ is a security threat that combines the characteristics of computer viruses,worms,and other malicious codes with vulnerabilities found on public and private networks.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
67
When planning a comprehensive security system,the first step is designing _____,which use a combination of hardware and software for improving reliability-a way of ensuring availability in case of a system failure.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
68
_____ outlines procedures for keeping an organization operational in the event of a natural disaster or a network attack or intrusion.
A) Social engineering
B) Business continuity planning
C) An intrusion detection system
D) Terminal resource security
A) Social engineering
B) Business continuity planning
C) An intrusion detection system
D) Terminal resource security
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
69
A(n) _____ consists of self-propagating program code that is triggered by a specified time or event.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
70
_____ is a form of spyware that collects information about a user (without the user's consent) to determine which advertisements to display in the user's Web browser.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
71
_____ is an attempt to gain access to a network by posing as an authorized user in order to find sensitive information,such as passwords and credit card information.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
72
A _____ plan lists the tasks that must be performed to restore damaged data and equipment.
A) risk assessment
B) systems engineering
C) disaster recovery
D) security compliance
A) risk assessment
B) systems engineering
C) disaster recovery
D) security compliance
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
73
The _____ biometric security measure translates words into digital patterns,which are recorded and examined for tone and pitch.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
74
The main function of Cyber Incident Response Capability (CIRT) is to:
A) provide level 1 security.
B) restrict access controls to unauthorized personnel.
C) provide information on security incidents.
D) create backdoors to bypass security protocols.
A) provide level 1 security.
B) restrict access controls to unauthorized personnel.
C) provide information on security incidents.
D) create backdoors to bypass security protocols.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
75
_____ monitor and record the keys pressed on a keyboard and can be software or hardware devices.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
76
_____ are independent programs that can spread themselves without having to be attached to a host program.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
77
In the context of security,_____ means using "people skills"-such as being a good listener and assuming a friendly,unthreatening air-to trick others into revealing private information.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
78
A(n) _____ contains code intended to disrupt a computer,network,or Web site,and it is usually hidden inside a popular program.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
79
A(n) _____ encryption usually works better for public networks,such as the Internet.
A) symmetric
B) asymmetric
C) synchronous
D) asynchronous
A) symmetric
B) asymmetric
C) synchronous
D) asynchronous
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
80
_____ is a software feature that erases the screen and signs the user off automatically after a specified length of inactivity.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck