Week one Flashcards

(55 cards)

1
Q

A process for testing skills and knowledge; successful completion of a certification exam results in an endorsement by the certifying authority that an individual is capable of performing particular tasks or jobs.

A

Certification

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

A set of interrelated components that work together to support fundamental business operations, data reporting and visualization, data analysis, decision making, communications, and coordination within an organization.

A

Information system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

A set of steps that need to be followed to achieve a specific end result, such as entering a customer order, paying a supplier invoice, or requesting a current inventory report.

A

Procedure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

A structured set of related activities that takes input, adds value, and creates an output for the customer of that process.

A

process

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

A series (or chain) of activities that an organization performs to transform inputs into outputs in such a way that the value of the input is increased.

A

value chain

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Software that should be installed on each user’s personal computer to scan a computer’s memory and disk drives regularly for viruses.

A

antivirus software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

The process of verifying your identity using your physiological measurements (fingerprint, shape of your face, shape of your hand, vein pattern, your iris, or retina) or behavioral measurements (voice recognition, gait, gesture, or other unique behaviors).

A

biometric authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

A document that includes an organization’s disaster recovery plan, occupant emergency evacuation plan, continuity of operations plan, and incident management plan.

A

business continuity plan

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

A security concept based on confidentiality, integrity, and availability

A

CIA security triad

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

The unintended release of sensitive data or the access of sensitive data by unauthorized individuals.

A

data breach

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

A large federal agency with more than 240,000 employees and a budget of almost $65 billion whose goal is to provide for a “safer, more secure America, which is resilient against terrorism and other potential threats.

A

Department of Homeland Security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

A cyberattack in which a malicious hacker takes over computers via the Internet and causes them to flood a target site with demands for data and other small tasks.

A

distributed denial-of-service (DDoS) attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

An attack on an information system that takes advantage of a particular system vulnerability.

A

exploit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

A backup approach that occurs when a key component is no longer functioning. Applications and other programs are automatically switched over to a redundant server, network, or database to prevent an interruption of service.

A

failover

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

The recognition that managers must use their judgment to ensure that the cost of control does not exceed the system’s benefits or the risks involved.

A

reasonable assurance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

A process that enables the organization to identify its potential threats, establish a benchmark of where it is, determine where it needs to be, and develop a plan to meet those needs.

A

security audit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

An attack that takes place before the security community becomes aware of and fixes a security vulnerability.

A

zero-day attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Which professional often specializes in a particular functional area?

A

Business analyst

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

True or False:

True or False: The role of the chief information officer (CIO) is to employ an IS department’s equipment and personnel to help the organization attain its goals.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Which professional designs and maintains Web sites, including site layout and function, to meet the client’s requirements?

A

Web developer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Which term is used to describe the information systems and solutions built and deployed by departments other than the information systems department?

A

Shadow IT

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Which term refers to an attack that takes place before the security community becomes aware of and fixes a security vulnerability?

A

Zero-day attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Which term describes a large group of computers that are controlled from one or more remote locations by hackers without the knowledge or consent of their legitimate owners?

24
Q

Which term refers to the deployment of malware that secretly steals data in the computer systems of organizations?

A

Cyberespionage

25
Which term refers to the unintended release of sensitive data or the access of sensitive data by unauthorized individuals, often resulting in identify theft?
Data breach
26
Which type of information system supports teamwork and enables people to work together effectively, whether team members are in the same location or dispersed around the world?
Workgroup information system
27
# True or False: An enterprise system is a model that states an organization’s information systems operate within a context of people, technology infrastructure, processes, and structure The technology infrastructure forms the foundation of every computer-based information system.
False
28
# True or False: Computer intelligence is a discipline that combines elements of law and computer science to identify, collect, examine, and preserve data from computer systems, networks, and storage devices in a manner that preserves the integrity of the data gathered so that it is admissible as evidence in a court of law.
False
29
# True or False: True or False: Shadow IT is a definition of the relationships among the members of an organization including their roles, responsibilities, and lines of authority necessary to complete various activities.
False
30
Which type of information system enables the sharing of information across organizational boundaries?
Interorganizational IS
31
# True or False: Integrity refers to the assurance that data can be accessed when and where needed, including during times of disaster recovery operations.
False
32
# True or False: Computer forensics is a discipline that combines elements of law and computer science to identify, collect, examine, and preserve data from computer systems, networks, and storage devices in a manner that preserves the integrity of the data gathered so that it is admissible as evidence in a court of law.
True
33
# True or False: Cyberterrorism is the deployment of malware that secretly steals data in the computer systems of organizations.
False
34
# True or False: Strategic planning is a process that helps managers identify initiatives and projects that will achieve organizational objectives.
True
35
# True or False: In a security incident, the primary goal must be to regain control and limit damage, not to attempt to monitor or catch an intruder.
True
36
# True or False: Enterprise information systems are also known as collaborative systems.
False
37
# True or False: BYOD is a business policy that permits, and in some cases encourages, employees to use their own mobile devices (smartphones, tablets, or laptops) to access company computing resources and applications.
True
38
Electronic data interchange (EDI) is an example of which type of information system?
Interorganizational IS
39
# True or False: Symmetric encryption algorithms use the same key for both encryption and decryption.
True
40
# True or False: A security policy outlines how to achieve an organization’s strategic initiatives.
False
41
# True or False: The supply chain is a key value chain whose primary processes include inbound logistics, operations, outbound logistics, marketing and sales, and service.
True
42
# True or False: Structure is used to define the information systems and solutions built and deployed by departments other than the information systems department. In many cases, the information systems department may not even be aware of these efforts infrastructure forms the foundation of every computer-based information system.
False
43
# True or False: Cyberespionage is the intimidation of a government or civilian population by using information technology to disable critical national infrastructure (e.g., energy, transportation, financial, law enforcement, emergency response) to achieve political, religious, or ideological goals.
False
44
# True or False: An encryption key is the process of scrambling messages or data in such a way that only authorized parties can read it.
False
45
# True or False: The technology infrastructure forms the foundation of every computer-based information system.
True
46
Which three terms are referenced in the CIA security triad?
Confidentiality, integrity, and availability
47
Which term describes an organizational change model that organizations use to introduce new systems into the workplace in a manner that lowers stress, encourages teamwork, and increases the probability of a successful implementation?
Leavitt’s Diamond
48
Which term refers to software and/or hardware that monitors system and network resources and activities and notifies network security personnel when it detects network traffic that attempts to circumvent the security measures of a networked computer environment?
Intrusion detection system (IDS)
49
Which term refers to an organization’s business processes that are essential to continued operations and goal attainment within the organization?
Mission critical processes
50
Which term refers to the process of assessing security-related risks to an organization’s computers and networks from both internal and external threats?
Risk assessment planning
51
Which term describes a set of interrelated components that work together to support fundamental business operations, data reporting and visualization, data analysis, decision making, communications, and coordination within an organization?
Information system
52
Which term describes a series of activities that an organization performs to transform inputs into outputs in such a way that the value of the input is increased?
Value chain
53
Which term refers to a system of software, hardware, or a combination of both that stands guard between an organization’s internal network and the Internet, and limits network access based on the organization’s access policy?
Firewall
54
Which term describes a structured set of related activities that takes input, adds value, and creates an output for the customer of that process?
Process
55
Which term describes a definition of the relationships among the members of an organization including their roles, responsibilities, and lines of authority necessary to complete various activities?
Structure