• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/50

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

50 Cards in this Set

  • Front
  • Back
..... is the origin of today's internet

nist
arpanet
fips
des
arpanet
during the early years, information security was a straightforward process composed prediminantly of ... security and simple document classification schemes

a. logical
b. network
c. software
d. physical
physical
..... of information is the quality or state of being genuine of original

a. authenticity
b. spoofing
c. confidentiality
d. authorization
authenticity
.... was the first and only operating system created with security as its primary goal

a. unitx
b dos
c multics
d arpanet
multics
the NSTISSC Model of information security evolved from a concept develoleped by the computer security industry known as.... triangle

a. CIA
b. Bermuda
C. A.B.C
d. Morris
CIA
....... ensures authorized users- persons or computer systems- can access information without interference or obstruction, and in the required format

a. utility
b. availability
c. confidentiality
d. Authorization
availability
information has ..... when its whole, complete, and uncorrupted

a. utility
b. availability
c. confidentiality
d. integrity
integrity
a.... attack is when a hacker uses his or personal computer to break into a system

a. indirect
b. direct
c. software
d. hardware
direct
the most successful kind of top down approach involves a formal development stratergy referred to as a....

a. systems design
b. developing life project
c.systems development life cycle
d. systems schema
systems development life cycle
The .... is the individual primarily responsible for the assessment, management, and implementation of information security in the organization

a. ISO
b. CIO
C. CISO
D. CTO
CISO
A computer is the .... of an attack when it is used to conduct

a. subject
b. object
c. target
d. faciliatator
subject
the .... of information is defined as having ownership or control of some object or item

a. utility
b. possession
c. availability
d. authorization
possession
An .... information security policy outlines the implementation of a security program within the organization
enterprise
a .... is a group of individuals who are united by similar interests or values withing an organization and who share a common goal of making the organization function to meet its objectives

a. department
b. cohort
c. posse
d. community of interest
community of interest
In an organization, the value of .... of information is especially high when it involves personal information about employees, customers, or patients

a.utility
b. availability
c. confidentiality
d. authorization
confidentiality
The ...... consists of 27 cells representing areas that must be addressed to secure today's infomration system. the first axis consists of confidentiality, integriy, and availability. the second contains policy, education, and technology. the final axis consists of storage, processing, and trasnmission

a. wopr matrix
b. socratic
c. mccumber cube
d. rubik's cube
mccumber cube
A frequently overlooked component of information systems, ..... are written instructions for accomplishing a specific task

a. viruses
b. procedures
c. plans
d. objectives
procedures
in the movie, wargames, david lightman gains acecess to the WOPR games flies through the ....

a. air conditioning vent
b. emergency exit
c. Back door
d. Buffer overflow
back door
a .... is a identified weakness in a controlled system, where controls are not present or no longer affective

a. vulnerability
b. threat
c. exploit
d. risk
vulnerability
which of the following functions does information security perform for an organization?

a. protects the organization's ability to function
b. enables the safe operation of applications implemented on the organization's IT systems.
c. Protects the data the organization collects and uses
d. All of the above
All of the above
acts of .... can lead to unauthorized real or virtual actions that enable information gatherers to enter premises or systems they have not been authorized to enter.

a. bypass
b. nature
c. trespass
d. security
trespass
there are generally two skill levels amoung hackers: expert and ...

a. novice
b. journeyman
c. packet monkey
d. professional
novice
One form of online vandalism is ... operations,w hich interfere with or disrupt systems to protest the operations, policies, or actions of organization or government agency

a. hacktivist
b. phv ist
c. hackcyber
d. cyberhack
hacktivist
....... is the premediated, politcally motivated attacks against information, computer systems, computer programs, and data which result in violence against noncombatant targets by subnationsal groups or clandestine agents

a. infoterroris
b. cyber terrorism
c. hacking
d. cracking
cyber terrorism
deliberate software attacks are referred to as ...

a. malicious code
b. malicious software
c. malware
d. all of the above
all of the above
..... are software programs that hide their true nature, and reveal their designed behavior only when activated

a. viruses
b. worms
c. spam
d. trojan horses
trojan horses
as frustrating as viruses and worms are, perhaps more time and money is spent on resolving ....

a. false alarms
b. power faults
c. hoaxes
d. urban legends
hoaxes
web hosting services are usually arranged with an agreement providing minimum service levels known as

a. SSL
b. SLA
c. MSL
d. MIN
SLA
complete loss of power for a moment is known as

a. surge
b. fault
c. brownout
d. blackout
fault
in a ... attack, the attacker sends a large number of connection or information requests to a targer.

a. denial of service
b. distributed denial of service
c. virus
d. spam
denial of service
a ..... is an attack in which a coordinated stream of requests is launched against a target from many locations at the same time

a. denial of service
b. distributed denial os service
c. virus
d. spam
distributed denial of service
..... are machines tha are directed remotely by the attacker to participate in an attack

a. drones
b. helpers
c. zombies
d. servants
zombies
In th well known .... attack, an attacker monitors packets from the network, modifies them, and inserts them back into the network

a. zombie in the middle
b. sniff in the middle
c. server in the midle
d. man in the middle
man in the middle
the .... hijacking attack uses IP spoofing to enable an attacker to impersonate another entity on the network

a. www
b. tcp
c. ftp
d. http
TCP
..... requires that an organization make a valid effort to protect others, and to continually maintain this level of effort

a. constitutional law
b. civil law
c. due care
d. due dilligence
due dilligence
...... law represents a wide variety of laws that govern a nation or state

a. criminal
b. civil
c. public
d. private
civil
.... law regulate the structure and administration of government agencies and their relationships with citizens, employees, and other governments, providing carefull checks and balances

a. public
b. private
c. civil
d. criminal
public
the computer... and abuse act of 1986 is the cornerstone of many computer related federal laws and enforcement efforts

a. violence
b. fraud
c. theft
d. usage
fraud
the ... portability and accountability act of 1996, also known as the kennedy kassebaum act, is an attempt to protect the confientiality and security of health care data by establishing and enforcing standards and by standardizing electronic data interchange

a. custome
b. health insurance
c. computer
d. telecommunication
health insurance
which of the following acts is widely known as the gram leach bliley act?

a. financial services modernization act
b. communications act
c. computer security act
d. economic espionage act
financial services modernization act
....... is designed to prevent abuse of information gained by an individual working in one company and employed by another

a. electronic communications privacy act
b. sarbanes oxley act
c. financial services modernization act
d. economic espionage act
economic esionage act
which of the following acts is a collection of statutes that regulate the interception of wire, electronic, and oral communications?

a. electronic communications privacy act
b. sarbanes oxley act
c. financial services modernization act
d. economic espionage act
electronic communications privacy act
what is the subject of the sarbanes oxley act?

a. banking
b. financial reporting
c. privacy
d. trade secrets
financial reporting
the .... of 1999 clarifies the use of encryption for people in the united states and permits all person in the US to buy or sell any encryption product

a. sarbanes oxley act
b. gramm leach bliley act
c. USA patriot act
d. Security and freedom through encryption act
Security and freedom through encryption act
.... defines stiffer penalties for prosecution of terrorist crimes

a. usa patriot act
b. sarbanes oxley acc
c. gram leach bliley act
d. economic espionage act
usa patriot act
information .... involves the use of information technology by a sovereign state to conduct organized and lawful military operation

a. charter
b. warfare
c. union
d. directive
warfare
Criminal or unethical ... goes to the state of mind and the individual performing the act

a. attitude
b. intent
c. accident
d. ignorance
intent
laws and policies and their associated penalites only deter if which of the following conditions is present?

a. fear of penalty
b. probability of being caught
c. probability of penalty being administered
d. all of the above
all of the above
the ....., created in 2003, carries out its mission of protecting the people as well as the physical and informational assets of the united states

a. national infragard program
b. department of homeland secuirty
c. us secret service
d. information assurance directorate
department of homeland secuirty
Which of the following countries reported generally intolerant attitudes toward personal use of organizational computing resources?

a. australia
b. US
c. Singapore
d. Sweden
singapore