Whitelisting and Encryption: True or False?

Unlock all answers in this set

Unlock answers
question
all organizations should have a business continuity plan?
answer
true
question
The most expensive backup strategy is
answer
Hot site
question
Communications controls secure the movement of data across a network
answer
True
question
Whitelisting is more restrictive than blacklisting
answer
true
question
Encryption is the process of converting an original message into a form that cannot be read by anyone except the intended receiver
answer
true
question
Browsers usually provide a visual confirmation of a secure connection
answer
True
question
Competitive intelligence is legal, where industrial espionage is illegal
answer
True
question
There are comparatively few ways in which you can have your identity stolen
answer
True
question
___ attacks use deception to acquire sensitive information by masquerading as official emails
answer
Phishing
question
Zombies and botnets are associated with:
answer
Distributed denial-of-service attack
question
SCADA systems provide link the physical and electronic worlds
answer
true
question
SCADA attacks can cause severe damage to a nation's physical infrastructure, such as its power grid
answer
True
question
Authorization must precede authentication
answer
False
question
Your fingerprint is an example of:
answer
Something you are
question
Verifying processing by checking for known outputs using specific inputs is
answer
Auditing around the computer
question
Using live data is associated most closely with:
answer
Auditing with the computer
question
A(n)___ is the possibility that a system will be harmed by a threat
answer
Vulnerability
question
Today, the skills needed to become a hacker are:
answer
Decreasing
question
MIS and Hr employees pose little threat to information security in a firm
answer
False
question
in a(n) __ attack, the perpetrator tricks an employee into divulging confidential information
answer
Social engineering
question
Organizations perform ____ to ensure that their security programs are cost effective:
answer
Risk analysis
question
Buying insurance would be a form of:
answer
Risk transference
question
The intangible property created by individuals or corporations, which is protected under trade secret, patent, and copyright laws
answer
intellectual property
question
Systems that monitor employees' computers, e-mail activities, and Internet surfing activities
answer
employee monitoring systems
question
Copying a software program (other than freeware, demo software, etc.) without making payment to the owner
answer
piracy
question
The possibility that an information resource will be harmed by a threat.
answer
vulnerability
question
A fully configured computer facility, with all information resources and services, communications links, and physical plant operations, that duplicates your company's computing resources and provides near-real-time recovery of IT operations
answer
hot sites
question
The science and technology of authentication (i.e., establishing the identity of an individual) by measuring the subject's physiologic or behavioral characteristics.
answer
biometrics
question
Alien software that uses your computer as a launch platform for spammers
answer
spamware
question
A process in which a company identifies certain types of software that are not allowed to run in the company environment.
answer
blacklisting
question
The degree of protection against criminal activity, danger, damage, and/or loss.
answer
security
question
War in which a country's information systems could be paralyzed from a massive attack by destructive software.
answer
cyberwarfare
question
Controls that restrict unauthorized individuals from using information resources and are concerned with user identification.
answer
access controls
question
Crime in which someone uses the personal information of others to create a false identity and then uses it for some fraud.
answer
identity theft
question
A backup location that provides only rudimentary services and facilities
answer
cold site
question
A network of computers that have been compromised by, and under control of a hacker, who is called the botmaster.
answer
botnet
question
A process whereby the organization takes concrete actions against risks, such as implementing controls and developing a disaster recovery plan.
answer
risk mitigation
question
Malicious software such as viruses and worms.
answer
malware
question
Clandestine software that is installed on your computer through duplicitous methods.
answer
alien software
question
(see back door)
answer
trap doors
question
The intangible property created by individuals or corporations, which is protected under trade secret, patent, and copyright laws.
answer
intellectual property
question
Alien software that can record your keystrokes and/or capture your passwords.
answer
spyware
question
A process that identifies, controls, and minimizes the impact of threats, in an effort to reduce risk to manageable levels.
answer
risk management
question
A process that encrypts each data packet to be sent and places each encrypted packet inside another packet.
answer
tunneling
question
Defense mechanisms (also called countermeasures).
answer
Controls
question
Alien software designed to help pop-up advertisements appear on your screen.
answer
adware
question
The harm, loss, or damage that can result if a threat compromises an information resource.
answer
exposure
question
Copying a software program (other than freeware, demo software, etc.) without making payment to the owner.
answer
piracy
question
A process that determines which actions, rights, or privileges the person has, based on verified identity
answer
authorization
question
(also called asymmetric encryption) A type of encryption that uses two different keys, a public key and a private key.
answer
public-key encryption
question
Malicious software that can attach itself to (or \"infect\") other computer programs without the owner of the program being aware of the infection.
answer
viruses
question
An examination of information systems, their inputs, outputs, and processing.
answer
audit
question
Systems that monitor employees' computers, e-mail activities, and Internet surfing activities.
answer
employee monitoring systems
question
Controls that deal with the movement of data across networks.
answer
communications controls (also network controls)
question
A software program containing a hidden function that presents a security risk.
answer
Trojan Horse
question
A system (either hardware, software, or a combination of both) that prevents a specific type of information from moving between untrusted networks, such as the Internet, and private networks, such as your company's network.
answer
Firewall
question
A grant that provides the creator of intellectual property with ownership of it for a specified period of time, currently the life of the creator plus 70 years.
answer
copyright
question
A grant that provides the creator of intellectual property with ownership of it for a specified period of time, currently the life of the creator plus 70 years.
answer
authentication
question
Can be defined as a premeditated, politically motivated attack against information, computer systems, computer programs, and data that results in violence against noncombatant targets by subnational groups or clandestine agents.
answer
cyberterrorism
question
Getting around security systems by tricking computer users inside a company into revealing sensitive information or gaining unauthorized access privileges.
answer
Social Engeneering
question
A separate organizational local area network that is located between an organization's internal network and an external network, usually the Internet.
answer
demilitarized zone (DMZ)
question
Controls that restrict unauthorized individuals from gaining access to a company's computer facilities.
answer
physical controls
question
A document that grants the holder exclusive rights on an invention or process for a specified period of time, currently 20 years.
answer
patent
question
Intellectual work, such as a business plan, that is a company secret and is not based on public information.
answer
Trade secret
question
A strategy in which the organization limits its risk by implementing controls that minimize the impact of a threat.
answer
risk limitation
question
Software packages that attempt to identify and eliminate viruses, worms, and other malicious software.
answer
anti-malware systems (antivirus software)
question
An electronic document attached to a file certifying that this file is from the organization it claims to be from and has not been modified from its original format or content.
answer
digital certificate
question
A third party that acts as a trusted intermediary between computers (and companies) by issuing digital certificates and verifying the worth and integrity of the certificates.
answer
certificate authority
question
A denial-of-service attack that sends a flood of data packets from many compromised computers simultaneously.
answer
distributed denial-of-service (DDoS) attack
question
Protecting an organization's information and information systems from unauthorized access, use, disclosure, disruption, modification, or destruction.
answer
information security
question
A strategy in which the organization accepts the potential risk, continues to operate with no controls, and absorbs any damages that occur.
answer
risk acceptance
question
A site that provides many of the same services and options of the hot site, but does not include the company's applications.
answer
Warm site
question
A process in which a company identifies acceptable software and permits it to run, and either prevents anything else from running or lets new software run in a quarantined environment until the company can verify its validity.
answer
Whitelisting
question
(see communications controls)
answer
network controls
question
Typically a password, known only to the attacker, that allows the attacker to access the system without having to go through any security procedures.
answer
back door
question
Illegal activities executed on the Internet.
answer
cybercrime
question
Small amounts of information that Web sites store on your computer, temporarily or more or less permanently.
answer
cookie
question
A private network that uses a public network (usually the Internet) to securely connect users by using encryption
answer
virtual private network (VPN)
question
(see secure socket layer)
answer
Transport Layer Security (TLS)
question
Destructive programs that replicate themselves without requiring another program to provide a safe environment for replication.
answer
worms
question
A principle that users be granted the privilege for some activity only if there is a justifiable need to grant this authorization.
answer
Least Privilege
question
A computer that has been compromised by, and under the control of, a hacker.
answer
bot
question
(also known as transport layer security) An encryption standard used for secure transactions such as credit card purchases and online banking.
answer
Secure Socket Layer (SSL)
question
A cyber attack in which an attacker sends a flood of data packets to the target computer, with the aim of overloading its resources.
answer
denial-of-service attack
question
The process by which an organization assesses the value of each asset being protected, estimates the probability that each asset might be compromised, and compares the probable costs of each being compromised with the costs of protecting it.
answer
risk analysis
question
Segments of computer code embedded within an organization's existing computer programs.
answer
logic bombs
question
A collection of related computer system operations that can be performed by users of the system.
answer
privilege
question
An attack that uses deception to fraudulently acquire sensitive personal information by masquerading as an official-looking e-mail.
answer
Phishing
question
What is a benefit of backing up data?
answer
It makes restoring data easier
question
A computer threat happens when
answer
a system is exposed in any way.
question
What increases the vulnerability of information?
answer
businesses are more connected
question
What type of network is the Internet considered to be?
answer
untrusted
question
Which employees in a company pose the greatest threat to information security?
answer
IT personnel
question
A human error is described as
answer
a mistake by employees
question
Losing the password to a computer is an example of
answer
human error
question
Social engineering usually involves a(n) _____ act on the part of an attacker.
answer
intentional
question
Identity theft is the main purpose of
answer
Phishing
question
Copyright protection lasts for the life of the creator plus
answer
70 years
question
Unlike a virus, a(n) __________ spreads by itself, without the help of another program.
answer
worm
question
What type of software records continuous monitoring of screen activity?
answer
Screen Scrapor
question
SCADA systems are vulnerable to Stuxnet, which is a type of
answer
worm
question
In what process would a company compare the probable cost of a computer attack to the cost of protecting the system?
answer
Risk analysis
question
What is the first step in any risk analysis process?
answer
calculate the value of what needs protection
question
Minimizing the impact of a computer threat refers to risk _____
answer
limitation
question
Which is an example of an access control?
answer
eye scans
question
Where is a DMZ located?
answer
Between two firewalls
question
_______ identifies a person, but does not determine the person's level of access.
answer
Authentication
question
A(n) ______ information system audit is generally performed by accountants and is the first step in a company's auditing process.
answer
Internal
question
Backup and recovery procedures are recommended only to safeguard against hardware/software failures
answer
False
question
An information systems ____ is the likelihood that the system or resource will be compromised by a ____ that will result in its ____ to further attacks
answer
Vulnerability, threat, exposure
question
Which of the following factors that make information resources more vulnerable to attack can be most easily remedied?
answer
Lack of management control
question
which of the following can be classified as unintentional threats to information systems caused by human errors
answer
Selecting a weak password
question
An unintentional attack in which the perpetrator uses social skills to trick or manipulate a legitimate employee into providing confidential company information is known as:
answer
Social engineering
question
Making and distributing information goods to which you do not own the ___ is referred to as ____
answer
copyright, piracy
question
Whereas phishing attacks are ____, the denial of service attacks are ____.
answer
remote attacks requiring user action, remote attacks requiring no user action
question
Computer programs like CAPTCHA are used to counter
answer
Hackers using key loggers
question
Buying health insurance is an example of risk _____, whereas going without it is an example of Risk ______.
answer
Transference, acceptance
question
Implementing controls to prevent threats from occurring and developing a recovery plan should the threats occur are two broad functions of ____.
answer
Risk mitigation
question
Access controls consist of ____, which confirms user identity, and ______, which determines user access levels.
answer
Authentication, authorization
question
_____ can be used to create strong passwords that are easy to remember
answer
Passphrases
question
The threats to information security are _____, and the greatest threat is ____.
answer
Increasing, human
question
Which of the following employees typically poses the most significant threat to information security
answer
IS employees
question
Which of the following is not a social engineering technique?
answer
Careless internet surfing
question
Which type of remote software attack does not require user action?
answer
Denial-of service attack
question
Which type of alien software uses your computer to send emails that look like they came from you to all the people in your address book?
answer
Spamware
question
Which of the following would be an example of a SCADA attack?
answer
Computer viruses are introduced into the electrical company's systems resulting in a shutdown of the power plant
question
which of the following is not a common risk mitigation strategy?
answer
Risk analysis
question
A password system on a computer network is an example of which type of information security control?
answer
Access
question
Which of the following statements is true?
answer
Multifactor authentication systems are more reliable and more expensive than singlefactor
question
_______ is an encryption standard used for secure transactions such as credit card processing and online banking
answer
TLS
question
A(n) ____ is the possibility that a system will be harmed by a threat
answer
vulnerability
question
Organizations perform ___ to ensure that their security programs are cost effective?
answer
Risk analysis
Get an explanation on any task
Get unstuck with the help of our AI assistant in seconds
New