Chapter1 Flashcards

1
Q

True or false:
The first step in solving problems is to gather facts and make assumptions.

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

True or False:
Corruption of information can occur only while information is being stored.

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

True/False
The authorization process takes place before the authentication process

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

True/False
A worm may be able to deposit copies of itself onto all Web servers that the infected system can reach, so that users who subsequently visit those sites become infected.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

True/False
DoS attacks cannot be launched against routers.

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

True/False
“Shoulder spying” is used in public or semi-public settings when individuals gather information, they are not authorized to have by looking over another individual’s shoulder or viewing the information from a distance. _________________________

A

Fasle-surfing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

True/False
When voltage levels** lag** (experience a momentary increase), the extra voltage can severely damage or destroy equipment. _________________________

A

False- Spike

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

True/False
The macro virus infects the key operating system files located in a computer’s start up sector. _________________________

A

False- boot

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

True/False
The application of computing and network resources to try every possible combination of options of a password is called a dictionary attack. _________________________

A

False- Bruteforce

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

True/False
The term phreaker is now commonly associated with an individual who cracks or removes software protection that is designed to prevent unauthorized duplication. _________________________

A

False- Cracker

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

True/False
A(n) polymorphic threat is one that over time changes the way it appears to antivirus software programs, making it undetectable by techniques that look for preconfigured signatures. ________________________

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

True/False
The malicious code attack includes the execution of viruses, worms, Trojan horses, and active Web scripts with the intent to destroy or steal information. _________________________

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

True/False
A device (or a software program on a computer) that can monitor data traveling on a network is known as a socket sniffer. ____________

A

False- Packet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

True/False
One form of e-mail attack that is also a DoS attack is called a mail spoof, in which an attacker overwhelms the receiver with excessive quantities of e-mail. _________________________

A

False -Bomb

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Communications security involves the protection of which of the following?
a. radio handsets
b. people, physical assets
c. the IT department
d. media, technology, and content

A

d. Media,technology, and content

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

According to the C.I.A. triad, which of the following is a desirable characteristic for computer security? a. accountability
b. availability
c. authorization
d. authentication

A

b- availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Which of the following is a C.I.A. characteristic that ensures that only those with sufficient privileges and a demonstrated need may access certain information? a. Integrity b. Availability c. Authentication d. Confidentiality

A

d - Confidentiality

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

The use of cryptographic certificates to establish Secure Sockets Layer (SSL) connections is an example of which process?
a. accountability
b. authorization
c. identification
d. authentication

A

d - authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What do audit logs that track user activity on an information system provide?
a. identification
b. authorization
c. accountability
d. authentication

A

c - accountability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Which of the following is the principle of management that develops, creates, and implements strategies for the accomplishment of objectives?
a. leading
b. controlling
c. organizing
d. planning

A

d -Planning

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Which of the following is the principle of management dedicated to the structuring of resources to support the accomplishment of objectives? a. organization b. planning c. controlling d. leading

A

a -organization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

In the ____________________ attack, an attacker monitors (or sniffs) packets from the network, modifies them, and inserts them back into the network. a. zombie-in-the-middle b. sniff-in-the-middle c. server-in-the-middle d. man-in-the-middle

A

d -man-in-the-middle

23
Q

Which of the following is the first step in the problem-solving process? a. Analyze and compare the possible solutions. b. Develop possible solutions. c. Recognize and define the problem. d. Select, implement, and evaluate a solution

A

c -Recognize and define

24
Q

Which of the following is NOT a step in the problem-solving process? a. Select, implement and evaluate a solution b. Analyze and compare possible solutions c. Build support among management for the candidate solution d. Gather facts and make assumptions

A

c - build support among management for the candidate solution

25
Which of the following is NOT a primary function of Information Security Management? a. planning b. protection c. projects d. performance
d -Performance
26
Which of the following functions of Information Security Management seeks to dictate certain behavior within the organization through a set of organizational guidelines? a. planning b. policy c. programs d. people
b. -policy
27
Which function of InfoSec Management encompasses security personnel as well as aspects of the SETA program? a. protection b. people c. projects d. policy
b. -people
28
Acts of ____________________ can lead to unauthorized real or virtual actions that enable information gatherers to enter premises or systems they have not been authorized to enter. a. bypass b. theft c. trespass d. security
c. -trespass
29
____________________ are malware programs that hide their true nature, and revealtheir designed behavior only when activated. a. Viruses b. Worms c. Spam d. Trojan horses
d. -Trojan horse
30
As frustrating as viruses and worms are, perhaps more time and money is spent on resolving virus ____________________. a. false alarms b. polymorphisms c. hoaxes d. urban legends
c. -hoaxes
31
Human error or failure often can be prevented with training, ongoing awareness activities, and ____________________. a. threats b. education c. hugs d. paperwork
b. -education
32
“4-1-9” fraud is an example of a ____________________ attack. a. social engineering b. virus c. worm d. spam
a. -Social Engineering
33
Which type of attack involves sending a large number of connection or information requests to a target? a. malicious code b. denial-of-service (DoS) c. brute force d. spear fishing
b. -denial-of-service(DoS)
34
Which of the following is not among the 'deadly sins of software security'? a. Extortion sins b. Implementation sins c. Web application sins d. Networking sins
a. -Extortion
35
Web hosting services are usually arranged with an agreement defining minimum service levels known as a(n) ____. a. SSL b. SLA c. MSL d. MIN
b. -SLA
36
Blackmail threat of informational disclosure is an example of which threat category? a. Espionage or trespass b. Information extortion c. Sabotage or vandalism d. Compromises of intellectual property
b. -information extortion
37
One form of online vandalism is ____________________ operations, which interfere with or disrupt systems to protest the operations, policies, or actions of an organization or government agency. a. hacktivist b. phreak c. hackcyber d. cyberhack
a. -Hacktivist
38
A ____________________ is an attack in which a coordinated stream of requests is launched against a target from many locations at the same time. a. denial-of-service b. distributed denial-of-service c. virus d. spam
b. - distributed DoS
39
Which of the following is a feature left behind by system designers or maintenance staff that allows quick access to a system at a later time by bypassing access controls? a. brute force b. DoS c. back door d. hoax
c. -back door
40
A short-term interruption in electrical power availability is known as a ____. a. fault b. brownout c. blackout d. lag
a. -fault
41
The three levels of planning are strategic planning, tactical planning, and ____________________ planning.
Operational
42
The set of organizational guidelines that dictates certain behavior within the organization is called ____________________.
Policy
43
Attempting to reverse-calculate a password is called ______________
Cracking
44
ESD is the acronym for ____________________ discharge.
Electrostatic
45
Duplication of software-based intellectual property is more commonly known as software ____________________.
Piracy
46
A(n) ____________________ hacks the public telephone network to make free calls or disrupt services.
Phreaker
47
A momentary low voltage is called a(n) _____________
Sag
48
Some information gathering techniques are quite legal, for example, using a Web browser to perform market research. These legal techniques are called, collectively, competitive ___________________
Intelligence
49
A(n) ____________________ is a potential weakness in an asset or its defensive control(s).
Vulnerability
50
____________________ is unsolicited commercial e-mail
Spam
51
A virus or worm can have a payload that installs a(n) ____________________ door or trap door component in a system, which allows the attacker to access the system at will with special privileges
Back
52
A(n) ____________________ is an act against an asset that could result in a loss
Attack
53
A ____________ overflow is an application error that occurs when the system can’t handle the amount of data that is sent
Buffer
54
Explain the differences between a leader and a manager.
The distinctions between a leader and a manager arise in the execution of organizational tasks. A leader provides purpose, direction, and motivation to those that follow. By comparison, a manager administers the resources of the organization. He or she creates budgets, authorizes expenditures, and hires employees.