Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
20 Cards in this Set
- Front
- Back
Unit 4- Computer Security
The use of a computer user's unique physical characteristics- such as voice, fingerprints or facial geometry- to identify a user is known as: a. Biometrics b. Encryption c. Digital security d. Phreaking |
a. Biometrics
p. 108 |
|
Unit 4- Computer Security
What type of attack causes the targeted system to be unable to fulfill its intended function? a. Covert b. Denial of service (DOS) c. Encrypted d. Modem assult |
b. Denial of service (DOS)
p. 108 |
|
Unit 4- Computer Security
"IT" stands for: a. Information technology b. Interactive technology c. Intelligent translation d. Internet technology |
a. Information technology
p. 104 |
|
Unit 4- Computer Security
In recent years, computer security has been expanded to include issues such as: a. Privacy b. Information integrity c. Confidentiality d. All of the above |
d. All of the above
p. 104 |
|
Unit 4- Computer Security
Measures designed to protect information should consist of three components. Which of the following is not one of these components? a. Prevention b. Reaction c. Retention d. Detection |
c. Retention
p. 105 |
|
Unit 4- Computer Security
This is the prevention of unauthorized disclosure of information. It can be lost as a result of poor security measures or information leaks by personnel. a. Integrity b. Confidentiality c. Availability d. Liability |
b. Confidentiality
p. 105 |
|
Unit 4- Computer Security
This includes the prevention of unauthorized withholding of information or computer resources. a. Confidentiality b. Availability c. Integrity d. Compatibility |
b. Availability
p. 105 |
|
Unit 4- Computer Security
A malicious attacker uses a method to exploit _______ in order to achieve a goal. a. Back doors b. Vulnerabilities c. People d. Software |
b. Vulnerabilities
p. 105 |
|
Unit 4- Computer Security
The correct term to use for someone who breaks into a system is a: a. "Cracker" b. "Hacker" c. Administrator d. "User" |
b. "Hacker"
p. 106 |
|
Unit 4- Computer Security
These are malicious programs or software code hidden inside what looks like a normal program. a. Malicious e-mail b. Virus c. Biometrics d. Trojan horse |
d. Trojan horse
p. 106 |
|
Unit 4- Information Security
Trade Secret status expires after 7 years. True or False |
False
p. 113 |
|
Unit 4- Information Security
Anything that is of value to one company is probaly of value to its competitors True or False. |
False
p. 114 |
|
Unit 4- Information Security
Disgruntled employees pose little threat because they are easy to identify and control. True or False |
False
p. 114 |
|
Unit 4- Information Security
Limiting the number of people who have access to information generally reduces the chances of it being compromised. True or False |
True
p. 112 |
|
Unit 4- Information Security
Some information that could be considered critical would include: a. Design plans b. Product formulae c. Client lists d. All of the above |
d. All of the above
p. 112 |
|
Unit 4- Information Security
When securing electronic information, some points to consider might be: a. Communication lines b. Wireless transmission and reception c. Internal network access d. All of the above |
d. All of the above
p. 113 |
|
Unit 4- Information Security
When securing paper documents, some points of consideration might be: a. Magnetic field effects on ink b. Fire protection c. Inordinately low temperatures d. None of the above |
b. Fire pertection
p. 112 - 113 |
|
Unit 4- Information Security
Physical security concepts will aide and support: a. Paper document protection b. Electronic media protection c. Area surveillance prevention d. All of the above |
d. All of the above
p. 113 |
|
Unit 4- Information Security
A form that states that a person will protect the information made known to them for business purposes, would be called a "_______ _______" |
Confidentiality agreements
p. 113 - 114 |
|
Unit 4- Information Security
One company obtaining information owned by another company through unauthorized means is generally referred to as "_______ _______" |
Corporate espionage
p. 114 |