• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/20

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

20 Cards in this Set

  • Front
  • Back

When someone pretends to be a legitimate company and sends an email requesting confidential data, such as credit card numbers, this is known as ________.


. hawking


. spoofing


. phishing


. sniffing

phishing

A subversive technique for intercepting computer communications is ________.




. sniffing


. spoofing


. phishing


. pretexting

sniffing

________ is a term for when someone causes deception by pretending to be someone else.




. Hacking


. Pretexting


. Sniffing


. Phishing

Pretexting

________ intercept wireless traffic at will in areas where users are on devices with wireless internet connections on unprotected networks.


. Drive-by spoofers


. Drive-by pretexters


. Drive-by phishers


. Drive-by sniffers

Drive-by sniffers

When a person gains unauthorized access to a computer system, he or she is said to be ________.


. hacking


. phishing


. sniffing


. spoofing

hacking


________ present the largest risk for infrastructure loss.




. Thefts


. Terror attacks


. Human mistakes


. Natural disasters

Natural disasters



Which of the following exemplifies a technical safeguard?




. authentication


. key escrow


. helpdesk policies


. password management





authentication

Which of the following is an example of a human safeguard?




. password management


. digital signatures


. botnets


. authentication



password management

Which of the following is NOT an example of a data safeguard?




. storage in an encrypted form


. SSL


. key escrow


. physical security

SSL

A security policy concerning the use of computers at work for personal business would be an example of a ________.



. system-specific policy


. data policy


. issue-specific policy


. human-resources policy

issue-specific policy

A security policy determining which customer data from the order entry system will be shared with other companies is an example of a ________ policy.


. system-specific


. data


. issue-specific


. human-resources

system-specific

The term ________ refers to threats and consequences that we know about.




. knowledge


. hedge


. risk


. indemnity

risk

________ is the first step in risk management.




. Evaluating the results of the risk management process


. Reducing the likelihood of a threat


. Assessing the threats


. Creating perfect hedges to mitigate the risks

Assessing the threats

________ refers to the probability that a given asset will be compromised by a given threat, despite the safeguards.




. Likelihood


. Uncertainty


. Consequence


. Vulnerability

Likelihood

Which of the following is NOT a reason for public companies to develop and follow a disaster recovery plan?




. requirement to do so


. good management practice


. minimization of organizational interruption


. prevention of data theft

prevention of data theft

Since no safeguard is ironclad, there is always a ________ risk that the safeguard will not protect the assets in all circumstances.




. residual


. diversifiable


. portfolio


. process

residual

________ refers to the recording and analysis of keystrokes.




. Theft


. Eavesdropping


. Hacking


. Sniffing

Eavesdropping

A critical security function that requires the involvement of senior-management is ________.


. safeguarding computer hardware and software


. planning responses to security incidents


. establishing the security policy


. managing the security program on a real-time basis

establishing the security policy

Which of the following is NOT a type of data which should be backed up by IT staff?




. account data


. data on employees' computers


. website resources


. databases

data on employees' computers

Which of the following attitudes about backing up user computers will most often prevent data loss occurrences?


. Backups should be performed right before traveling in case a laptop is stolen or damaged.


. Data should be backed up at the same time each week.


. Backups are most important when you are not planning to use the computer for a few days.


. Users should follow a plan so that in the event of loss or system failure, all critical data are accessible and uncompromised.



. Users should follow a plan so that in the event of loss or system failure, all critical data are accessible and uncompromised.