Deck 14: Risks, security, and Disaster Recovery
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/75
Play
Full screen (f)
Deck 14: Risks, security, and Disaster Recovery
1
Bots are implemented not only for access but also to implement policies and ensure that nonsensical data is not entered into corporate databases.
False
2
A digital certificate contains its holder's name,a serial number,expiration dates,and a copy of the certificate holder's public key (used to encrypt messages and digital signatures).
True
3
Computer "infections" are so named because they act on programs and data in a fashion similar to the way viruses act on living tissue.
False
4
Intentional damage to software occurs because of poor training,lack of adherence to simple backup procedures,or simple human error.
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
5
Blackout units are a solution to extreme changes in voltage,and can provide several minutes to several hours of backup battery power.
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
6
Companies that choose not to fully develop their own recovery plan can outsource it to companies that specialize in either disaster recovery planning or provision of alternative sites.
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
7
In recent years,identity theft has been more prevalent as part of phishing.
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
8
A protocol called Transport Layer Security (TLS)is used for transactions on the Web.
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
9
Symmetric encryption is also called "public-key" encryption.
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
10
Redundancies increase expected downtime.
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
11
IS managers encourage users to change their user IDs frequently.
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
12
Atomic transactions ensure encrypting of all appropriate files.
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
13
The recipient of an encrypted message uses the certificate authority's private key to decode the digital certificate attached to the message.
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
14
Controls translate business policies into system features.
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
15
Encryption slows down communication because the software must encrypt and decrypt every message.
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
16
Several manufacturers of computer equipment offer individual keyboard-embedded and mouse-embedded fingerprint devices.
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
17
With encryption,the original message is called plaintext.
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
18
Copies of applications are usually kept in a safe place to replace those that get damaged.
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
19
The greater the number of interdependent systems,the greater the expected downtime.
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
20
The best defense against unauthorized access to systems over the Internet is a firewall,which is hardware and software that blocks access to computing resources.
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
21
A ____ is a server that contains a mirrored copy of a production database (a database that is used for business operations),or one with invalid records.
A) honeytoken
B) phish
C) bogus server
D) honeypot
A) honeytoken
B) phish
C) bogus server
D) honeypot
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
22
____ a computer means using some or all of the resources of a computer linked to a public network without the consent of its owner.
A) Hijacking
B) Attacking
C) Phishing
D) Sequestering
A) Hijacking
B) Attacking
C) Phishing
D) Sequestering
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
23
____ are usually planted by insiders,that is,employees of the victimized organization.
A) Spams
B) Logic bombs
C) Phishes
D) Flames
A) Spams
B) Logic bombs
C) Phishes
D) Flames
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
24
With encryption,the coded message is called ____.
A) plaintext
B) privatetext
C) ciphertext
D) publictext
A) plaintext
B) privatetext
C) ciphertext
D) publictext
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
25
In ____,the voltage of the power decreases,or there are very short interruptions in the flow of power.
A) brownouts
B) blackouts
C) keystroke logging
D) UPSs
A) brownouts
B) blackouts
C) keystroke logging
D) UPSs
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
26
A ____ "represents" another server for all information requests from resources inside the trusted network.
A) proxy server
B) honeypot server
C) DNS server
D) secure server
A) proxy server
B) honeypot server
C) DNS server
D) secure server
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
27
One way to protect against viruses is to use ____,which is readily available on the market from companies that specialize in developing this kind of software,such as Symantec and McAfee.
A) antiphish software
B) security worms
C) antivirus software
D) secure viruses
A) antiphish software
B) security worms
C) antivirus software
D) secure viruses
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
28
____ encryption comprises two keys: one is public,and the other is private.
A) Parallel
B) Asymmetric
C) Symmetric
D) Double
A) Parallel
B) Asymmetric
C) Symmetric
D) Double
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
29
A(n)____ is a set of indivisible transactions that are either all executed or none are-never only some.
A) biometric
B) a-transaction
C) biometric measurement
D) atomic transaction
A) biometric
B) a-transaction
C) biometric measurement
D) atomic transaction
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
30
____ occurs when a Web site receives an overwhelming number of information requests,such as merely logging on to a site.
A) Denial-of-service (DoS)
B) Global denial-of-service (GDoS)
C) Global attack
D) Full denial-of-service (FDoS)
A) Denial-of-service (DoS)
B) Global denial-of-service (GDoS)
C) Global attack
D) Full denial-of-service (FDoS)
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
31
____ is a set of disks that is programmed to replicate stored data to provide a higher degree of reliability.
A) SSP
B) RAI
C) RAID
D) SAN
A) SSP
B) RAI
C) RAID
D) SAN
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
32
Hijacking is carried out by surreptitiously installing a small program called a ____ on a computer.
A) mine
B) bot
C) spot
D) robot
A) mine
B) bot
C) spot
D) robot
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
33
____ software records individual keystrokes.
A) Clickstream
B) Keystroke logging
C) Virus
D) Remote access
A) Clickstream
B) Keystroke logging
C) Virus
D) Remote access
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
34
____ are measures taken to ensure that only those who are authorized have access to a computer or network or to certain applications or data.
A) Boarding keys
B) Encrypted passes
C) Boarding passes
D) Access controls
A) Boarding keys
B) Encrypted passes
C) Boarding passes
D) Access controls
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
35
A ____ is a bogus record in a networked database that neither employees nor business partners would ever access for legitimate purposes.
A) honeypot
B) phish
C) flame
D) honeytoken
A) honeypot
B) phish
C) flame
D) honeytoken
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
36
Sometimes a(n)____ is automatically created using data,such as the date and time of a transaction or the name or password of the user updating the file.
A) atomic transaction
B) audit trail
C) denial of service
D) global transaction
A) atomic transaction
B) audit trail
C) denial of service
D) global transaction
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
37
____ is the secure version of HTTP.
A) SHTTP
B) HTMLSec
C) HTTPS
D) HTMLS
A) SHTTP
B) HTMLSec
C) HTTPS
D) HTMLS
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
38
Coding a message into a form unreadable to an interceptor is called ____.
A) classification
B) encryption
C) modulation
D) demodulation
A) classification
B) encryption
C) modulation
D) demodulation
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
39
Con artists use tricks known as ____.
A) social pathology
B) knowledge theft
C) social engineering
D) data mining
A) social pathology
B) knowledge theft
C) social engineering
D) data mining
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
40
To increase security,some companies implement the ____ approach.
A) DMZ (demilitarized zone)
B) denial of service (DoS)
C) atomic transaction
D) boarding key
A) DMZ (demilitarized zone)
B) denial of service (DoS)
C) atomic transaction
D) boarding key
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
41
A(n)____________________ is software that is programmed to cause damage at a specified time to specific applications and data files.
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
42
____________________ are constraints and other restrictions imposed on a user or a system,and they can be used to secure systems against risks or to reduce damage caused to systems,applications,and data.
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
43
Managers should focus on the asset they must protect,which in most cases is ____,not applications.
A) hardware
B) software
C) information
D) systems
A) hardware
B) software
C) information
D) systems
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
44
When tapping communications,law enforcement agencies need the cooperation of a third party,such as a telephone company or a(n)____.
A) ISP
B) SSP
C) Web site
D) systems developer
A) ISP
B) SSP
C) Web site
D) systems developer
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
45
CIOs often find the tasks of earmarking funds for ____ difficult because they cannot show the return on investment (ROI)of such planning.
A) backup programs
B) disaster recovery programs
C) archival programs
D) database security programs
A) backup programs
B) disaster recovery programs
C) archival programs
D) database security programs
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
46
____________________ occurs when a Web site receives an overwhelming number of information requests,such as merely logging on to a site.
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
47
____________________,the time during which ISs or data are not available in the course of conducting business,has become a dreaded situation for almost every business worldwide.
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
48
Employees are especially annoyed when they have to remember a different password for every system they use,a simpler solution is an approach called ____.
A) one-ID
B) SP (single password)
C) multiple encryption
D) SSO (single sign-on)
A) one-ID
B) SP (single password)
C) multiple encryption
D) SSO (single sign-on)
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
49
____,those without which the business cannot conduct its operations,are given the highest priority by the disaster recovery coordinator.
A) Backup applications
B) Up applications
C) Mission-critical applications
D) Recovery applications
A) Backup applications
B) Up applications
C) Mission-critical applications
D) Recovery applications
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
50
The ____,as it is popularly known,gives law enforcement agencies surveillance and wiretapping rights they did not have before 2001.
A) PATRIOT Act
B) 9/11 Decree
C) 9/11 Act
D) PATRIOT Manifesto
A) PATRIOT Act
B) 9/11 Decree
C) 9/11 Act
D) PATRIOT Manifesto
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
51
CIOs often cite ____ as an effective way to bring down the amount of work their subordinates must do.
A) SSL
B) SDLC
C) DoS
D) SSO
A) SSL
B) SDLC
C) DoS
D) SSO
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
52
Some viruses are called ____________________,analogous to the destructive gift given to the ancient Trojans.
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
53
____________________ are total losses of electrical power.
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
54
Once criminals have a person's identifying details,such as a Social Security number,driver's license number,or credit-card number,they can pretend to be this person,which is a crime called ____________________.
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
55
Experience in ____ certain systems,such as ERP and SCM systems,can teach the IT staff for how many minutes or seconds per year the system is likely to fail.
A) operating
B) developing
C) maintaining
D) archiving
A) operating
B) developing
C) maintaining
D) archiving
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
56
Probably the easiest way to protect against loss of data is to automatically duplicate all data periodically,a process referred to as data ____________________.
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
57
An issuer of digital certificates is called a ____.
A) certificate dealer (CD)
B) certificate bank (CB)
C) certificate authority (CA)
D) certificate warehouse (CW)
A) certificate dealer (CD)
B) certificate bank (CB)
C) certificate authority (CA)
D) certificate warehouse (CW)
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
58
A(n)____________________ characteristic is a unique physical,measurable characteristic of a human being that is used to identify a person.
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
59
Experts are usually employed to estimate the cost and ____ of damages,as well as the cost of security measures.
A) impact
B) probabilities
C) effect
D) causes
A) impact
B) probabilities
C) effect
D) causes
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
60
To ensure against interruptions in power supply,organizations use ____________________ systems,which provide an alternative power supply for a short time,as soon as a power network fails.
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
61
What are honeytokens?
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
62
The cost of damage is the aggregate of all the potential damages multiplied by their respective ____________________.
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
63
A(n)____________________ is a way to authenticate online messages,analogous to a physical signature on a piece of paper,but implemented with public-key cryptography.
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
64
What is a Trojan horse?
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
65
____________________ is the process of ensuring that the person who sends a message to or receives a message from you is indeed that person.
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
66
When both the sender and recipient use the same secret key,the technique is called ____________________.
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
67
The audit trail is the most important tool of the ____________________,the professional whose job it is to find erroneous or fraudulent cases and investigate them.
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
68
What are the main goals of information security?
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
69
To prepare for mishaps,either natural or malicious,many organizations have well-planned programs in place,called ____________________.
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
70
There might be no point in spending much money to increase the "____________________" of uptime for every system.
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
71
Discuss natural disasters that pose a risk to ISs.
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
72
____________________ provide backup and operation facilities to which a client's employees can move and continue operations in case of a disaster.
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
73
List common controls to protect systems from risks.
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
74
One popular tracking tool is the ____________________: a series of documented facts that help detect who recorded which transactions,at what time,and under whose approval.
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
75
____________________ are computer files that serve as the equivalent of ID cards by associating one's identity with one's public key.
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck