Chapter 11 Flashcards
(185 cards)
Security on a network not only means being able to prevent a hacker from breaking
into your computer but also includes being able to recover from temporary service
problems or from natural disasters.
T
The rise of the Internet has increased significantly the potential vulnerability of an
organization’s assets
T
The CERT ( Computer Emergency Response Team) was established at MIT
F. Carnegie Mellon University
Confidentiality refers to the protection of the organizational data from unauthorized
disclosure of customer and proprietary data.
T
Maintaining data integrity is not a primary goal of security.
F
According to Symantec, more than 50% of all targeted companies had fewer than
2,500 employees because they
a. often have weaker security.
b. have more assets.
c. are more likely to have credit card numbers available.
d. are likely off-shore.
e. have lower bandwidth
A
Why are smaller organizations often targeted by cyberattacks?
a) Due to their larger financial reserves
b) Because they have weaker security measures
c) They are less likely to hold valuable data
d) Their employees are more knowledgeable about cybersecurity
B
In the context of transnational cybercrime, what does the text suggest about the effectiveness of enforcement measures?
a) Enforcement efforts have significantly reduced cybercrime rates.
b) Laws are well-established, but enforcement is slow.
c) International collaboration has streamlined enforcement processes.
d) Cybercriminals often face severe penalties, deterring further criminal activity.
B
According to the text, what is the legal status of unauthorized computer access in the United States?
a) It is not considered a crime.
b) It is only a crime if done for malicious purposes.
c) It is a federal crime.
d) It is regulated at the state level.
B
Which of the following entities is mentioned as focusing on combating cybercriminal activities?
a) CERT
b) IETF
c) IEEE
d) ISO
A
What is one of the primary objectives of CERT, APWG, Kaspersky Lab, McAfee, and Symantec?
a) Promoting cybercriminal activities
b) Assisting individuals, organizations, and governments in combating cybercrime
c) Developing new cyber weapons
d) Hacking into government database
B
How has the perception of hacking evolved over time, according to the text?
a) Hacking is no longer practiced.
b) Hacking is now considered a hobby.
c) Hacking has transitioned into a profession.
d) Hacking is exclusively conducted by amateurs.
C
What can professional organizations be hired to do, according to the text?
a) Develop cybersecurity software
b) Break into specific networks to steal valuable information
c) Provide cybersecurity training to individuals
d) Assist law enforcement in apprehending cybercriminals
B
What type of information do cybercriminals often target when breaking into networks?
a) Weather forecasts
b) Celebrity gossip
c) Credit card details, personal data, intellectual property, or computer code
d) Historical events
C
How do cybercriminals often attempt to deceive individuals into revealing sensitive information?
a) By sending physical letters
b) Through social engineering, such as phishing emails
c) By making phone calls
d) By posting on social media
B
The use of hacking techniques to bring attention to a larger political or social goal is
referred to as _____.
a. cracking
b. ethical politics
c. hacktivism
d. social engineering
e. brute force attacks
C
Why has network security gained emphasis, according to the text?
a) Decreased reliance on digital technology
b) High-profile security breaches and government regulatory pronouncements
c) Rise of amateur hacking communities
d) Decreased interest in cyber activities
b
In addition to financial losses, what else can result from security breaches?
a) Increased consumer confidence
b) Expansion of business operations
c) Reduced consumer confidence
d) Decreased reliance on computer networks
C
What factor contributes to the loss of income for organizations during security breaches?
a) Increased consumer spending
b) Systems being offline, especially if they are “mission-critical”
c) Enhanced cybersecurity measures
d) Improved employee productivity
B
According to the text, what are some potential consequences of the disruption of application systems that rely on computer networks?
a) Increased consumer confidence
b) Expansion of business operations
c) Financial losses
d) Reduced operational efficiency
C
What does the term “mission-critical” refer to in the context of computer networks?
a) Systems that are not important for organizational survival
b) Systems that are critical to the survival of an organization
c) Systems that are rarely used by organizations
d) Systems that are easily replaceable
B
what exceeds the cost of networks themselves?
a) The value of data stored on organizations’ networks
b) The cost of cybersecurity measures
c) The maintenance expenses of networks
d) The cost of network hardware
A
What is highlighted as the primary objective of network security?
a) Protecting the physical infrastructure of networks
b) Safeguarding organizations’ data and application software
c) Securing the connections between different networks
d) Ensuring uninterrupted network access
B
what are the three primary goals of security?
a) Confirmation, Indemnification, Authentication
b) Confidentiality, Intimacy, Authentication
c) Confidentiality, Integrity, Availability
d) Confidentiality, Intrusion, Authentication
C