CIS 761 Test 8 – Flashcards
Unlock all answers in this set
Unlock answersquestion
            Large amounts of data stored in electronic form are ________ than the same data in manual form.
answer
        more
question
            Statements ranking information risks and identifying security goals are included in a(n)
answer
        security policy.
question
            In which method of encryption is a single encryption key sent to the receiver so both sender and receiver share the same key?
answer
        symmetric key encryption
question
            Which of the following is a type of ambient data?
answer
        data deleted from a hard drive
question
            Malicious software programs referred to as spyware include a variety of threats such as computer viruses, worms, and Trojan horses.
answer
        False
question
            Smartphones typically feature state-of-the-art encryption and security features, making them highly secure tools for businesses.
answer
        false
question
            A foreign country attempting to access government networks in order to disable a national power grid would be an example of
answer
        cyber warfare
question
            Currently, the protocols used for secure information transfer over the Internet are
answer
        SSL, TLS, and S-HTTP.
question
            For 100-percent availability, online transaction processing requires
answer
        fault-tolerant computer systems.
question
            Packet filtering catches most types of network attacks.
answer
        False
question
            In a client/server environment, corporate servers are specifically vulnerable to
answer
        malware
question
            An authentication system in which a user must provide two types of identification, such as a bank card and PIN, is called
answer
        two-factor authentication.
question
            All of the following are types of information systems general controls except
answer
        application controls
question
            ________ is a crime in which an imposter obtains key pieces of personal information to impersonate someone else.
answer
        identity theft
question
            Which of the following is a virus that uses flaws in Windows software to take over a computer remotely?
answer
        conflicter
question
            biometric authentication
answer
        an use a person's voice as a unique, measurable trait
question
            ________ is malware that logs and transmits everything a user types.
answer
        keylogger
question
            A digital certificate system
answer
        uses third-party CAs to validate a user's identity.
question
            You can test software before it is even written by conducting a walkthrough.
answer
        true
question
            ________ identify the access points in a Wi-Fi network.
answer
        SSIDs
question
            Which of the following specifications replaces WEP with a stronger security standard that features changing encryption keys?
answer
        WPA2
question
            ________ controls ensure that valuable business data files on either disk or tape are not subject to unauthorized access, change, or destruction while they are in use or in storage.
answer
        Data security
question
            Client software in a client/server environment is specifically vulnerable to
answer
        unauthorized access
question
            Social networking sites have become a new conduit for malware because
answer
        they allow users to post software code.
question
            When errors are discovered in software programs, the sources of the errors are found and eliminated through a process called debugging.
answer
        TRUE
question
            The term cracker is used to identify a hacker whose specialty is breaking open security systems.
answer
        FALSE
question
            In 2013, Panda Security reported approximately 30 million new kinds of malware strains.
answer
        True
question
            ________ use scanning software to look for known problems such as bad passwords, the removal of important files, security attacks in progress, and system administration errors.
answer
        Intrusion detection systems
question
            As discussed in the chapter opening case, magnetic stripes are an old technology that is vulnerable to counterfeit and theft.
answer
        True
question
            The dispersed nature of cloud computing makes it difficult to track unauthorized access.
answer
        True
question
            A firewall allows the organization to
answer
        enforce a security policy on traffic between its network and the Internet.
question
            Trojan horse n
answer
        is software that appears to be benign but does something other than expected.
question
            Your company, an online discount stationers, has calculated that a loss of Internet connectivity for 3 hours results in a potential loss of $2,000 to $3,000 and that there is a 50% chance of this occurring each year. What is the annual expected loss from this exposure?
answer
        1250
question
            Smartphones have the same security flaws as other Internet-connected devices.
answer
        True
question
            ________ is malware that hijacks a user's computer and demands payment in return for giving back access.
answer
        Ransomware
question
            Computer forensics tasks include all of the following except
answer
        collecting physical evidence on the computer.
question
            Organizations can use existing network security software to secure mobile devices.
answer
        False
question
            Comprehensive security management products, with tools for firewalls, VPNs, intrusion detection systems, and more, are called ________ systems.
answer
        UTM
question
            Using numerous computers to inundate and overwhelm the network from numerous launch points is called a(n) ________ attack.
answer
        DDOs