Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
25 Cards in this Set
- Front
- Back
In recent years, identity theft has been more prevalent as part of phishing.
|
True
|
|
Intentional damage to software occurs because of poor training, lack of adherence to simple backup procedures, or simple human error.
|
False
|
|
Controls translate business policies into system features.
|
True
|
|
Several manufacturers of computer equipment offer individual keyboard-embedded and mouse-embedded fingerprint devices.
|
True
|
|
With encryption, the original message is called plaintext.
|
True
|
|
Symmetric encryption is also called “public-key” encryption.
|
False
|
|
A protocol called Transport Layer Security (TLS) is used for transactions on the Web.
|
True
|
|
The recipient of an encrypted message uses the certificate authority’s private key to decode the digital certificate attached to the message.
|
False
(Public key) |
|
Redundancies increase expected downtime.
|
False
|
|
The greater the number of interdependent systems, the greater the expected downtime
|
True
|
|
____ software records individual keystrokes.
|
Keystroke Logging
|
|
Con artists use tricks known as ____.
|
Socail engineering
|
|
A ____ is a server that contains a mirrored copy of a production database (a database that is used for business operations), or one with invalid records
|
honeypot
|
|
____ are usually planted by insiders, that is, employees of the victimized organization.
|
Logic bombs
that goes off some time later |
|
Hijacking is carried out by surreptitiously installing a small program called a ____ on a computer
|
bot
|
|
____ is a set of disks that is programmed to replicate stored data to provide a higher degree of reliability.
|
RAID
|
|
A(n) ____ is a set of indivisible transactions that are either all executed or none are—never only some.
|
atomic transaction
|
|
To increase security, some companies implement the ____ approach.
|
DMZ (Demilitarized zone)
|
|
A ____ “represents” another server for all information requests from resources inside the trusted network.
Answer |
proxy server
|
|
The ____, as it is popularly known, gives law enforcement agencies surveillance and wiretapping rights they did not have before 2001.
|
Patriot Act
|
|
When tapping communications, law enforcement agencies need the cooperation of a third party, such as a telephone company or a(n) ____.
|
ISP
|
|
Experts are usually employed to estimate the cost and ____ of damages, as well as the cost of security measures.
|
probabilities
|
|
Managers should focus on the asset they must protect, which in most cases is ____, not applications.
|
information
|
|
Experience in ____ certain systems, such as ERP and SCM systems, can teach the IT staff for how many minutes or seconds per year the system is likely to fail.
|
operating
|
|
CIOs often cite ____ as an effective way to bring down the amount of work their subordinates must do.
|
SSO
|