1-8 Flashcards

1
Q

has become the most common form of attack besides viruses

A

blocking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

first risk factor of an attack

A

the attractiveness of a target

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

second risk factor of an attack

A

the nature of the information on a system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

third risk factor of an attack

A

the traffic on a system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

a numerical system from 1-10 that factors attractiveness, info content, and security devices present. the first 2 are added together and the last is subtracted. the best score one could achieve is

A

1 attractiveness // 1 info content // 10 security devices present

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

an organization’s security approach is rarely completely one paradigm or another. it can be primarily perrimiter but still proactive. Or it can be predominately pasive but layered. this is called a

A

hybrid security approach

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

one of the oldest pieces of legislation regarding computer security is

A

computer security act of 1987

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

this act requires government agencies to id sensitive systems, conduct computer security training, and developed computer security plans

A

computer security act of 1987

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

any information, the loss, misuse, or unauthorized access to or modification of which can adversely affect the natural interest or conduct of federal programs or the privacy to which individuals are entitled under section 552a of title 5 US code

A

sensitive information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

this document describes requirements for developing standards for computer systems and for records held by the government

A

OMB Circular A-130

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

irongeek.com has a list of

A

computer crime laws by state

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

the law that governs how publically traded companies store and report on financial data

A

SOX

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Sponsored by Carnegie Mellon University, it was the first computer incident response team and is still one of the most respected in the industry

A

CERT

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

This site is particularly useful since most computers run on Windows OS

A

Microsoft security tech center

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

a repository for detailed information on viral outbreaks

A

F-Secure Corporation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

the site provides detailed documentation on virtually every aspect of computer security

A

Sans institute