• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/10

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

10 Cards in this Set

  • Front
  • Back
What best describes a scenario when an employee has been shaving off pennies from multiple accounts and depositing the funds
into his own bank account?

A. Data fiddling
B. Data diddling
C. Salami techniques
D. Trojan horses
Salami techniques
What is the act of willfully changing data, using fraudulent input or removal of controls called?

A. Data diddling
B. Data contaminating
C. Data capturing
D. Data trashing
Data diddling
In the context of computer security, scavenging refers to searching

A. A user list to find a name.
B. Through storage to acquire information.
C. Through data for information content.
D. Through log files for trusted path information.
Through data for information content.
Which security program exists if a user accessing low-level data is able to draw conclusions about high-level information?

A. Interference
B. Inference
C. Polyinstatiation
D. Under-classification
Inference
Which of the following is not a form of a passive attack?

A. Scavenging
B. Data diddling
C. Shoulder surfing
D. Sniffing
Data diddling
An example of an individual point of verification in a computerized application is

A. An inference check.
B. A boundary protection.
C. A sensitive transaction.
D. A check digit.
A check digit.
Data inference violations can be reduced using

A. Polyinstantiation technique.
B. Rules based meditation.
C. Multi-level data classification.
D. Correct-state transformation.
Polyinstantiation technique.
What is it called when a computer uses more than one CPU in parallel to execute instructions?

A. Multiprocessing
B. Multitasking
C. Multithreading
D. Parallel running
Multiprocessing
What is the main purpose of undertaking a parallel run of a new system?

A. Resolve any errors in the program and file interfaces
B. Verify that the system provides required business functionality
C. Validate the operation of the new system against its predecessor
D. Provide a backup of the old system
Verify that the system provides required business functionality
Which of the following provide network redundancy in a local network environment?

A. Mirroring
B. Shadowing
C. Dual backbones
D. Duplexing
Dual backbones