Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
15 Cards in this Set
- Front
- Back
As problems caused by human error are accidental and not malicious, they are not considered as security threats to the IS system. T/F |
False |
|
Phishing is a technique for intercepting computer communications. T/F |
False |
|
Faulty service includes incorrectly billing customers or sending the wrong information to employees, but not incorrect data modification. T/F |
False |
|
In context of information security, safeguards increase work efficiency by making common tasks easier. T/F |
False |
|
An intrusion detection system (IDS) is a computer program that senses when another computer is attempting to scan the disk or otherwise access a computer. T/F |
True |
|
Brute force requires only 2 days to crack a password having a mixture of upper and lower case letters, numbers, and special characters. T/F |
False |
|
Security policies must not depend on whether the organization is government or nongovernmental, or whether it is publicly held or private. T/F |
False |
|
A _________ is a person or organization that seeks to obtain data or other assets illegally, without the owners permission an often without the owners knowledge. |
Threat |
|
When referring to security threats, pretexting, sniffing, spoofing, and phishing are all examples of _________. |
Unauthorized data disclosure |
|
_________ take computers with wireless connections through an area and search for unprotected wireless networks and then monitor and intercept wireless traffic at will. |
Drive-by sniffers |
|
___________ occurs through human error when employees do not follow proper procedures or when procedures have not been well designed. |
Incorrect data modification |
|
A(n) ___________ is a computer program that senses when another computer is attempting to scan the disk or otherwise access a computer. |
IDS Intrusion detection system |
|
Which of the following is a critical security function of senior management in an organization? |
Establishing the security policy and managing risk |
|
A(n) __________ has a microchip in it to hold data. |
Smart Card |
|
A __________ is a number used to encrypt the data. |
Key |