• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/20

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

20 Cards in this Set

  • Front
  • Back
Which of the following is NOT an example of input controls?
A.
format
B.
range
C.
validity
D.
consistency


See page 660
validity
CIO is an acronym for
A.
chief of international operations
B.
chief information officer
C.
chief investment officer
D.
chief investigation officer
Chief Information Officer
Authentication systems have ______________ key elements
A.
four
B.
three
C.
five
D.
two
three
An access card is an example of a ____________ token, carried to enter into certain rooms or to gain access to a network.
A.
active
B.
passive
C.
interactive
D.
dynamic


See page 664
passive
When the ISD creates incentives to encourage end-user practices that reduce organizational risks, the approach is often termed the
A.
“let them sink or swim” approach.
B.
“use the stick” approach.
C.
“use the carrot” approach.
D.
“offer support” approach.


See page 636
“use the carrot” approach
Intrusion-detecting systems are especially suitable for local area networks and client/server architectures.
A.
True
B.
False


See page 675
true
Entering false, fabricated, or fraudulent data into the computer or changing or deleting existing data is referred to as
A.
programming fraud.
B.
data tampering.
C.
cracking.
D.
hacking.


See page 649
data tampering
In information systems circles, Michelangelo, Pakistani Brain, and Jerusalem refer to
A.
famous international hackers.
B.
international viruses.
C.
enterprise software applications.
D.
data security software.


See page 650
international viruses
The CIO is never a member of the corporate executive committee, the most important committee in any organization, which has responsibility for strategic business planning.
A.
True
B.
False


See page 639
false
_________________ is a program that replicates itself and penetrates a valid computer system. It may spread within a network, penetrating all connected computers.
A.
Trojan Horse
B.
Salami Slicing
C.
Worm
D.
Virus


See page 649
worm
_________________ is a program that is designed to siphon off small amounts of money from a number of larger transactions, so the quantity taken is not readily apparent.
A.
Trojan Horse
B.
Salami Slicing
C.
Worm
D.
Virus


See page 649
Salami Slicing
Instituting separation of duties, namely dividing sensitive computer duties among as many employees as economically feasible in order to decrease the chance of intentional or unintentional damage, is an example of
A.
physical control
B.
application control
C.
administrative control
D.
access control


See page 659
administrative control
A widely accepted encryption algorithm is the ___________________, produced by the U.S. National Bureau of Standards.
A.
Data Encryption Standard
B.
Data Security Standard
C.
Data Protection Standard
D.
Data Validity Standard


See page 665
Data Encryption Standard
IBM is engaged in a project known as __________________, which aims at making computers more self-sufficient and less fragile.
A.
Self-reliance computing
B.
Extreme computing
C.
Automatic computing
D.
Robust computing


See page 675
automatic computing
_________ encompasses all activities related on the planning, organizing, acquiring, maintaining, securing, and controlling or IT resources.
A.
IRM
B.
ISD
C.
IMP
D.
IBM


See page 634
IRM
This term best describes the linking of corporate strategy with the IT strategy, planning.
A.
Direction Setting
B.
Rationing
C.
Evaluating
D.
Differentiation


See page 637
Direction Setting
A _______ is a state in a computing system allows an attacker to execute commands as another user.
A.
Vulnerability
B.
Exposure
C.
Hacking
D.
Cracking
Vulnerability
A(n) _______ is a state in a computing system that allows an attacker to conduct information gathering activities
A.
Exposure
B.
Vulnerability
C.
Hacker
D.
Cracker


page 645
Exposure
______ is an outside person who penetrates a computer system
A.
Hacker
B.
Cracker
C.
Exposure
D.
Vulnerability


See page 647
Hacker
Corporate spies who build inappropriate relationships with insiders is a strategy called
A.
Social Engineering
B.
Hacking
C.
Cracking
D.
Exposure


See page 647
Social Engineering