CIS 761 Test 8 – Flashcards

Unlock all answers in this set

Unlock answers
question
Large amounts of data stored in electronic form are ________ than the same data in manual form.
answer
more
question
Statements ranking information risks and identifying security goals are included in a(n)
answer
security policy.
question
In which method of encryption is a single encryption key sent to the receiver so both sender and receiver share the same key?
answer
symmetric key encryption
question
Which of the following is a type of ambient data?
answer
data deleted from a hard drive
question
Malicious software programs referred to as spyware include a variety of threats such as computer viruses, worms, and Trojan horses.
answer
False
question
Smartphones typically feature state-of-the-art encryption and security features, making them highly secure tools for businesses.
answer
false
question
A foreign country attempting to access government networks in order to disable a national power grid would be an example of
answer
cyber warfare
question
Currently, the protocols used for secure information transfer over the Internet are
answer
SSL, TLS, and S-HTTP.
question
For 100-percent availability, online transaction processing requires
answer
fault-tolerant computer systems.
question
Packet filtering catches most types of network attacks.
answer
False
question
In a client/server environment, corporate servers are specifically vulnerable to
answer
malware
question
An authentication system in which a user must provide two types of identification, such as a bank card and PIN, is called
answer
two-factor authentication.
question
All of the following are types of information systems general controls except
answer
application controls
question
________ is a crime in which an imposter obtains key pieces of personal information to impersonate someone else.
answer
identity theft
question
Which of the following is a virus that uses flaws in Windows software to take over a computer remotely?
answer
conflicter
question
biometric authentication
answer
an use a person's voice as a unique, measurable trait
question
________ is malware that logs and transmits everything a user types.
answer
keylogger
question
A digital certificate system
answer
uses third-party CAs to validate a user's identity.
question
You can test software before it is even written by conducting a walkthrough.
answer
true
question
________ identify the access points in a Wi-Fi network.
answer
SSIDs
question
Which of the following specifications replaces WEP with a stronger security standard that features changing encryption keys?
answer
WPA2
question
________ controls ensure that valuable business data files on either disk or tape are not subject to unauthorized access, change, or destruction while they are in use or in storage.
answer
Data security
question
Client software in a client/server environment is specifically vulnerable to
answer
unauthorized access
question
Social networking sites have become a new conduit for malware because
answer
they allow users to post software code.
question
When errors are discovered in software programs, the sources of the errors are found and eliminated through a process called debugging.
answer
TRUE
question
The term cracker is used to identify a hacker whose specialty is breaking open security systems.
answer
FALSE
question
In 2013, Panda Security reported approximately 30 million new kinds of malware strains.
answer
True
question
________ use scanning software to look for known problems such as bad passwords, the removal of important files, security attacks in progress, and system administration errors.
answer
Intrusion detection systems
question
As discussed in the chapter opening case, magnetic stripes are an old technology that is vulnerable to counterfeit and theft.
answer
True
question
The dispersed nature of cloud computing makes it difficult to track unauthorized access.
answer
True
question
A firewall allows the organization to
answer
enforce a security policy on traffic between its network and the Internet.
question
Trojan horse n
answer
is software that appears to be benign but does something other than expected.
question
Your company, an online discount stationers, has calculated that a loss of Internet connectivity for 3 hours results in a potential loss of $2,000 to $3,000 and that there is a 50% chance of this occurring each year. What is the annual expected loss from this exposure?
answer
1250
question
Smartphones have the same security flaws as other Internet-connected devices.
answer
True
question
________ is malware that hijacks a user's computer and demands payment in return for giving back access.
answer
Ransomware
question
Computer forensics tasks include all of the following except
answer
collecting physical evidence on the computer.
question
Organizations can use existing network security software to secure mobile devices.
answer
False
question
Comprehensive security management products, with tools for firewalls, VPNs, intrusion detection systems, and more, are called ________ systems.
answer
UTM
question
Using numerous computers to inundate and overwhelm the network from numerous launch points is called a(n) ________ attack.
answer
DDOs
Get an explanation on any task
Get unstuck with the help of our AI assistant in seconds
New