IS4550 CHAPTER 4 Flashcards

1
Q

Generally any business software that an end user (including customers) touches is considered an application is called ___.

A

APPLICATION SOFTWARE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

A formal program that reduces the likelihood of accidental or malicious loss of data is called ___.

A

DATA LEAKAGE PROTECTION (DLP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

A formal program that reduces the likelihood of accidental or malicious loss of data is called ___.

A

DATA LOSS PROTECTION (DLP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

In the context of workstation central management systems, refers to processes that determine what is installed on a workstation; it could also refer to knowing what information sits on a workstation is called ___.

A

DISCOVERY MANAGEMENT

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

A logical piece of our technology infrastructure with similar risks and business requirements is called ___.

A

DOMAIN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

A policy that discusses what is acceptable when using the company email system is called ___.

A

EMAIL POLICY

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

A protocol used to exchange files over a LAN or WAN is called ___.

A

FILE TRANSFER PROTOCOL (FTP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

A device that filters the traffic in and out of a LAN is called ___.

A

FIREWALL

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

A network with little or no controls that limit network traffic is called ___.

A

FLAT NETWORK

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

In the context of workstation central management systems, provides support to the end user is called ___.

A

HELP DESK MANAGEMENT

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Used to connect multiple devices within a local area network. it has ports and as the traffic flows through the device, the traffic is duplicated so all ports can see the traffic is called ___.

A

HUB

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

In the context of workstation central management systems, refers to tracking what workstation and related network devices exist is called ___.

A

INVENTORY MANAGEMENT

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Refers to the organization’s local area network infrastructure is called ___.

A

LAN DOMAIN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Refers to the technical infrastructure that connects the organization’s local area network to a wide area network is called ___.

A

LAN-TO-WAN DOMAIN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

In the context of workstation central management systems, refers to extracting logs from the workstation is called ___.

A

LOG MANAGEMENT

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Refers to making sure that devices on the network, such as workstations and servers, have current patches from the vendor is called ___.

A

PATCH MANAGEMENT

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Places importance on privacy in the business and discusses the regularity landscape and government mandates and often talks about physical security and the importance of “locking up” sensitive information is called ___.

A

PRIVACY POLICY

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Refers to the technology that controls how end users connect to an organization’s local area network is called ___.

A

REMOTE ACCESS DOMAIN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Enhanced authentication over what’s typically found in the office. Usually requires more than an ID and Password, such as a security token or smart card is called ___.

A

REMOTE AUTHENTICATION

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Connects local area networks to wide area networks is called ___.

A

ROUTER

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Usually refers to IT security, this can include making sure end users have limited rights and access controls are in place, among many other techniques and process is called ___.

A

SECURITY MANAGEMENT

22
Q

A network that limits how computers are able to talk to each other is called ___.

A

SEGMENT NETWORK

23
Q

A network device that can read communications traffic on a LAN is called ___.

A

SNIFFER

24
Q

A type of attack in which the hacker adds SQL code to a Web or application input to gain access to or alter data in the database is called ___.

A

STRUCTURED QUERY LANGUAGE (SQL) Injection

25
Q

A piece of equipment similar to a hub but can filter traffic. It typically routes traffic only to the port where the system is connected. This reduces network traffic, thus reducing the chance of someone intercepting the traffic is called ___.

A

SWITCH

26
Q

Rules of conduct on how and when access to systems is permitted. It covers end user credentials like IDs and passwords is called ___.

A

SYSTEM ACCESS POLICY

27
Q

Software that supports the running of the applications is called ___.

A

SYSTEM SOFTWARE

28
Q

This refers to the technology needed to collect, process, and store the information. It includes controls related to hardware and software is called ___.

A

SYSTEM/APPLICATION DOMAIN

29
Q

Requires end users to authenticate their identity using at least two of three different types of credentials. The three most commonly accepted types are something you know, something you have, and something you are is called ___.

A

TWO-FACTOR AUTHENTICATION

30
Q

This refers to any user accessing information and includes customers, employees, consultants, contractors, or any other third party is called ___.

A

USER DOMAIN

31
Q

This is set up between two devices to create an encrypted tunnel. All communications are protected from eaves dropping and considered highly secure and is called ___.

A

VIRTUAL PRIVATE NETWORK (VPN)

32
Q

This ___ includes wide area networks, which are networks that cover large geographical areas.

A

WAN DOMAIN

33
Q

Alterations to a Web page that result from a site defacement attack is called ___.

A

WEB GRAFFITI

34
Q

An attack on a Web site in which the site’s content is altered, usually in a way that embarrasses the site owner is called ___.

A

WEB SITE DEFACEMENT

35
Q

The refers to any computing device used by end users. This usually means a desktop or laptop that is the main computer for the user is called ___.

A

WORKSTATION DOMAIN

36
Q
  1. Private WANs must be encrypted at all times.

TRUE OR FALSE

A

FALSE

37
Q
  1. Which of the following attempts to identify where sensitive data is currently stored?
  2. Data Leakage Protection Inventory
  3. DLP Encryption Key
  4. Data Loss Protection Perimeter
  5. DLP Trojans
A

Data Leakage Protection Inventory

38
Q
  1. Voice over Internet Protocol (VoIP) can be used over which of the following?
  2. LAN
  3. WAN
  4. Both
  5. Neither
A

LAN

WAN

39
Q
  1. Which of the following is not one of the seven domains of typical IT infrastructure?
  2. Remote Access Domain
  3. LAN Domain
  4. World Area Network Domain
  5. System/Application Domain
A

World Area Network Domain

40
Q
  1. Which of the seven domains refers to the technical infrastructure that connects the organizations’ LAN to WAN and allows end users to surf the Internet?
A

LAN to WAN Domain

41
Q
  1. Many of the business benefits of Internet access over mobile devices include which of the following?
  2. Competitive advantage through real-time data access
  3. Increased customer responsiveness
  4. Prevention of unauthorized access to customer private information
  5. 1 & 2 only
  6. None of the above
A

Competitive advantage through real-time data access

Increased customer responsiveness

42
Q
  1. A ___ is a term that refers to a network that limits what and how computers are able to talk to each other.
A

Segmented network

43
Q
  1. A LAN is efficient for connecting computers within an office or groups of buildings.
    TRUE OR FALSE
A

TRUE

44
Q
  1. What policy generally requires that employees lock up all documents and digital media at the end of a workday and when not in use?
  2. Acceptable use policy
  3. Clean Desk policy
  4. Privacy policy
  5. Walk out policy
A

Clean Desk policy

45
Q
  1. What employees learn in awareness training influences them more than what they see within their department.
    TRUE OR FALSE
A

FALSE

46
Q
  1. What kink of workstation management refers to knowing what software is installed?
  2. Inventory management
  3. Patch management
  4. Security management
  5. Discovery management
A

Discovery management

47
Q
  1. Always applying the most struck authentication method is the best way to protect the business and ensure achievement of goals.
    TRUE OR FALSE
A

FALSE

48
Q
  1. Generally, remote authentication provides which of the following?
  2. Fewer controls than if you were in the office
  3. The same controls than if you were in the office
  4. More controls than if you were in the office
  5. Less need for controls than in the office
A

More controls than if you were in the office

49
Q
  1. Remote access does not have to be encrypted if strong authentication is used.
    TRUE OR FALSE
A

FALSE

50
Q
  1. Where is a DMZ usually located?
  2. Inside the private LAN
  3. Within the WAN
  4. Between the private LAN and public WAN
  5. Within the mail server
A

Between the private LAN and public WAN