BCIS ex 3 ch 10 – Flashcards
Unlock all answers in this set
Unlock answersquestion
_____ is a broad category of software that includes viruses, worms, Trojan horses, spyware and adware.
answer
Malware
question
Every information system today should require users to sign on with a username and a password. In this case, which of the following functions is performed by the user's password?
answer
Authentication
question
The procedure of entrusting a party with a copy of an encryption key that can be used in case the actual key is lost or destroyed is called _______.
answer
key escrow
question
To safeguard data against security threats, every information system today requires a username and password. In this case, which of the following functions is performed by the user name?
answer
identification
question
_______ is a technique for intercepting computer communications.
answer
sniffing
question
Which of the following is a human safeguard against security threats?
answer
procedure design
question
A ____ is a plastic card that has a microchip loaded with identifying data
answer
smart card
question
________ occurs when computer criminals invade a computer system and replace legitimate programs with their own unauthorized ones.
answer
Usurpation
question
______ is the process of transforming clear text into coded, unintelligible text for secure storage or communication
answer
encryption
question
In terms of password management, when an account is created, users should _______.
answer
immediately change the password they are given to a password of their own
question
Which of the following is considered a personal security safeguard?
answer
removing high-value assets from computers
question
A(n) _____ is a computer program that senses when another computer is attempting to scan a disk or access a computer.
answer
intrusion detection system
question
Mark receives an email from his bank asking him to update and verify his credit card details. Mark later learns that the mail was not actually sent by his bank and that the information he had shared has been misused. Mark is a victim of _____.
answer
phishing
question
A(n) ______ includes how employees should react to security problems, whom they should contact, the reports they should make, and steps they can take to reduce further loss.
answer
incident response plan
question
Which of the following is a synonym for phishing?
answer
email spoofing
question
______ are viruses that masquerade as useful programs like a computer game, an MP3 file, or some other useful innocuous program.
answer
Trojan horses
question
Which of the following are three independent factors that constitute the enforcement of security procedures and policies?
answer
responsibility, accountability, and compliance
question
Most secure communications over the Internet use a protocol called _____.
answer
https