Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
18 Cards in this Set
- Front
- Back
Business losses that are a result of computer crime are difficult to estimpat for which of the following reasons?
|
Companies are sometimes reluctant to report computer crime because it is bad advertising.`
|
|
According to a 2004 Computer Security Institute CSI/FBI Computer Crime and Security Survey, what percentage of organizations experiencing computer attacks reported them to law enforcement agencies?
|
20 percent
|
|
The CISSP categorizes computer attacks by type. Which of the following is not one of the categories identified by the CISSP?
|
a) terrorist attack b)thrill attack C) SUBTERFUGE ATTACK d) business attack
|
|
What type of individual is most likely to perform a "grudge attack?"
|
an employee who feels he has been mistreated by his employer.
|
|
Computer crime is generally made possible by which of the following?
|
system design flaws
|
|
Which of the following computer crimes involves overtaxing a computer's resources until it is no longer functional?
|
Denial of Service (DoS)
|
|
The computer criminal who calls a help desk trying to obtain another user's password is most likely a:
|
social engineer
|
|
We inherited which of out legal systems from England?
|
Common law
|
|
Computer laws have become incresingly difficult to enforce for which of the following reasons?
|
the inability of legislation in the United States to keep pace with technological advances
|
|
"Natural justice" is
|
primitive and thus "natural."
|
|
The Patent and Trademark Office (PTO) resisted patenting software for years for what primary reason?
|
Software was too intangible.
|
|
Which of the following statements is true about a "trade secret"?
|
It is a patent "in the works."
|
|
Which of the following is not one of the FTC's four Fair Informatio Practices?
|
Web sites must have 100 percent availabity in case the user wishes to change his personal information.
|
|
What can be said about the European Union Data Protection Directive of 1998?
|
It resulted in the "Safe Harbor Privacy Principles" that allowed the United States to meet minimum privacy controls in the European Union.
|
|
Which of the following definitions best describes "computer forensics"?
|
investigating crimes committed using computers
|
|
The ISC2 Code of Ethics is intended to
|
provide guidance on encouraging good behavior.
|
|
What bearing does ethics have on the information security specialist?
|
All
Ethical coduct is expected of all IS specialists. It helps define a high moral code of professional behavior It speaks to the credibility of the individual. |
|
Which of the following is not one of the provisions of the ISC2 Code of Ethics?
|
a) Act honorably, responsibly, and legally.
b)Provide thoroug and competent service to your customers and peers. C) JUDGE NOT LEST YOU BE JUDGED d) Strive to protect society and its components. |