Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
10 Cards in this Set
- Front
- Back
What best describes a scenario when an employee has been shaving off pennies from multiple accounts and depositing the funds
into his own bank account? A. Data fiddling B. Data diddling C. Salami techniques D. Trojan horses |
Salami techniques
|
|
What is the act of willfully changing data, using fraudulent input or removal of controls called?
A. Data diddling B. Data contaminating C. Data capturing D. Data trashing |
Data diddling
|
|
In the context of computer security, scavenging refers to searching
A. A user list to find a name. B. Through storage to acquire information. C. Through data for information content. D. Through log files for trusted path information. |
Through data for information content.
|
|
Which security program exists if a user accessing low-level data is able to draw conclusions about high-level information?
A. Interference B. Inference C. Polyinstatiation D. Under-classification |
Inference
|
|
Which of the following is not a form of a passive attack?
A. Scavenging B. Data diddling C. Shoulder surfing D. Sniffing |
Data diddling
|
|
An example of an individual point of verification in a computerized application is
A. An inference check. B. A boundary protection. C. A sensitive transaction. D. A check digit. |
A check digit.
|
|
Data inference violations can be reduced using
A. Polyinstantiation technique. B. Rules based meditation. C. Multi-level data classification. D. Correct-state transformation. |
Polyinstantiation technique.
|
|
What is it called when a computer uses more than one CPU in parallel to execute instructions?
A. Multiprocessing B. Multitasking C. Multithreading D. Parallel running |
Multiprocessing
|
|
What is the main purpose of undertaking a parallel run of a new system?
A. Resolve any errors in the program and file interfaces B. Verify that the system provides required business functionality C. Validate the operation of the new system against its predecessor D. Provide a backup of the old system |
Verify that the system provides required business functionality
|
|
Which of the following provide network redundancy in a local network environment?
A. Mirroring B. Shadowing C. Dual backbones D. Duplexing |
Dual backbones
|