• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/20

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

20 Cards in this Set

  • Front
  • Back
Unit 4- Computer Security

The use of a computer user's unique physical characteristics- such as voice, fingerprints or facial geometry- to identify a user is known as:

a. Biometrics
b. Encryption
c. Digital security
d. Phreaking
a. Biometrics

p. 108
Unit 4- Computer Security

What type of attack causes the targeted system to be unable to fulfill its intended function?

a. Covert
b. Denial of service (DOS)
c. Encrypted
d. Modem assult
b. Denial of service (DOS)

p. 108
Unit 4- Computer Security

"IT" stands for:

a. Information technology
b. Interactive technology
c. Intelligent translation
d. Internet technology
a. Information technology

p. 104
Unit 4- Computer Security

In recent years, computer security has been expanded to include issues such as:

a. Privacy
b. Information integrity
c. Confidentiality
d. All of the above
d. All of the above

p. 104
Unit 4- Computer Security

Measures designed to protect information should consist of three components. Which of the following is not one of these components?

a. Prevention
b. Reaction
c. Retention
d. Detection
c. Retention

p. 105
Unit 4- Computer Security

This is the prevention of unauthorized disclosure of information. It can be lost as a result of poor security measures or information leaks by personnel.

a. Integrity
b. Confidentiality
c. Availability
d. Liability
b. Confidentiality

p. 105
Unit 4- Computer Security

This includes the prevention of unauthorized withholding of information or computer resources.

a. Confidentiality
b. Availability
c. Integrity
d. Compatibility
b. Availability

p. 105
Unit 4- Computer Security

A malicious attacker uses a method to exploit _______ in order to achieve a goal.

a. Back doors
b. Vulnerabilities
c. People
d. Software
b. Vulnerabilities

p. 105
Unit 4- Computer Security

The correct term to use for someone who breaks into a system is a:

a. "Cracker"
b. "Hacker"
c. Administrator
d. "User"
b. "Hacker"

p. 106
Unit 4- Computer Security

These are malicious programs or software code hidden inside what looks like a normal program.

a. Malicious e-mail
b. Virus
c. Biometrics
d. Trojan horse
d. Trojan horse

p. 106
Unit 4- Information Security

Trade Secret status expires after 7 years.

True or False
False

p. 113
Unit 4- Information Security

Anything that is of value to one company is probaly of value to its competitors

True or False.
False

p. 114
Unit 4- Information Security

Disgruntled employees pose little threat because they are easy to identify and control.

True or False
False

p. 114
Unit 4- Information Security

Limiting the number of people who have access to information generally reduces the chances of it being compromised.

True or False
True

p. 112
Unit 4- Information Security

Some information that could be considered critical would include:

a. Design plans
b. Product formulae
c. Client lists
d. All of the above
d. All of the above

p. 112
Unit 4- Information Security

When securing electronic information, some points to consider might be:

a. Communication lines
b. Wireless transmission and reception
c. Internal network access
d. All of the above
d. All of the above

p. 113
Unit 4- Information Security

When securing paper documents, some points of consideration might be:

a. Magnetic field effects on ink
b. Fire protection
c. Inordinately low temperatures
d. None of the above
b. Fire pertection

p. 112 - 113
Unit 4- Information Security

Physical security concepts will aide and support:

a. Paper document protection
b. Electronic media protection
c. Area surveillance prevention
d. All of the above
d. All of the above

p. 113
Unit 4- Information Security

A form that states that a person will protect the information made known to them for business purposes, would be called a "_______ _______"
Confidentiality agreements

p. 113 - 114
Unit 4- Information Security

One company obtaining information owned by another company through unauthorized means is generally referred to as "_______ _______"
Corporate espionage

p. 114