Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
20 Cards in this Set
- Front
- Back
Which of the following is NOT an example of input controls?
A. format B. range C. validity D. consistency See page 660 |
validity
|
|
CIO is an acronym for
A. chief of international operations B. chief information officer C. chief investment officer D. chief investigation officer |
Chief Information Officer
|
|
Authentication systems have ______________ key elements
A. four B. three C. five D. two |
three
|
|
An access card is an example of a ____________ token, carried to enter into certain rooms or to gain access to a network.
A. active B. passive C. interactive D. dynamic See page 664 |
passive
|
|
When the ISD creates incentives to encourage end-user practices that reduce organizational risks, the approach is often termed the
A. “let them sink or swim” approach. B. “use the stick” approach. C. “use the carrot” approach. D. “offer support” approach. See page 636 |
“use the carrot” approach
|
|
Intrusion-detecting systems are especially suitable for local area networks and client/server architectures.
A. True B. False See page 675 |
true
|
|
Entering false, fabricated, or fraudulent data into the computer or changing or deleting existing data is referred to as
A. programming fraud. B. data tampering. C. cracking. D. hacking. See page 649 |
data tampering
|
|
In information systems circles, Michelangelo, Pakistani Brain, and Jerusalem refer to
A. famous international hackers. B. international viruses. C. enterprise software applications. D. data security software. See page 650 |
international viruses
|
|
The CIO is never a member of the corporate executive committee, the most important committee in any organization, which has responsibility for strategic business planning.
A. True B. False See page 639 |
false
|
|
_________________ is a program that replicates itself and penetrates a valid computer system. It may spread within a network, penetrating all connected computers.
A. Trojan Horse B. Salami Slicing C. Worm D. Virus See page 649 |
worm
|
|
_________________ is a program that is designed to siphon off small amounts of money from a number of larger transactions, so the quantity taken is not readily apparent.
A. Trojan Horse B. Salami Slicing C. Worm D. Virus See page 649 |
Salami Slicing
|
|
Instituting separation of duties, namely dividing sensitive computer duties among as many employees as economically feasible in order to decrease the chance of intentional or unintentional damage, is an example of
A. physical control B. application control C. administrative control D. access control See page 659 |
administrative control
|
|
A widely accepted encryption algorithm is the ___________________, produced by the U.S. National Bureau of Standards.
A. Data Encryption Standard B. Data Security Standard C. Data Protection Standard D. Data Validity Standard See page 665 |
Data Encryption Standard
|
|
IBM is engaged in a project known as __________________, which aims at making computers more self-sufficient and less fragile.
A. Self-reliance computing B. Extreme computing C. Automatic computing D. Robust computing See page 675 |
automatic computing
|
|
_________ encompasses all activities related on the planning, organizing, acquiring, maintaining, securing, and controlling or IT resources.
A. IRM B. ISD C. IMP D. IBM See page 634 |
IRM
|
|
This term best describes the linking of corporate strategy with the IT strategy, planning.
A. Direction Setting B. Rationing C. Evaluating D. Differentiation See page 637 |
Direction Setting
|
|
A _______ is a state in a computing system allows an attacker to execute commands as another user.
A. Vulnerability B. Exposure C. Hacking D. Cracking |
Vulnerability
|
|
A(n) _______ is a state in a computing system that allows an attacker to conduct information gathering activities
A. Exposure B. Vulnerability C. Hacker D. Cracker page 645 |
Exposure
|
|
______ is an outside person who penetrates a computer system
A. Hacker B. Cracker C. Exposure D. Vulnerability See page 647 |
Hacker
|
|
Corporate spies who build inappropriate relationships with insiders is a strategy called
A. Social Engineering B. Hacking C. Cracking D. Exposure See page 647 |
Social Engineering
|