• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/15

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

15 Cards in this Set

  • Front
  • Back

As problems caused by human error are accidental and not malicious, they are not considered as security threats to the IS system.




T/F

False

Phishing is a technique for intercepting computer communications.




T/F

False

Faulty service includes incorrectly billing customers or sending the wrong information to employees, but not incorrect data modification.




T/F

False

In context of information security, safeguards increase work efficiency by making common tasks easier.




T/F

False

An intrusion detection system (IDS) is a computer program that senses when another computer is attempting to scan the disk or otherwise access a computer.




T/F

True

Brute force requires only 2 days to crack a password having a mixture of upper and lower case letters, numbers, and special characters.




T/F

False

Security policies must not depend on whether the organization is government or nongovernmental, or whether it is publicly held or private.




T/F

False

A _________ is a person or organization that seeks to obtain data or other assets illegally, without the owners permission an often without the owners knowledge.

Threat

When referring to security threats, pretexting, sniffing, spoofing, and phishing are all examples of _________.

Unauthorized data disclosure

_________ take computers with wireless connections through an area and search for unprotected wireless networks and then monitor and intercept wireless traffic at will.

Drive-by sniffers

___________ occurs through human error when employees do not follow proper procedures or when procedures have not been well designed.

Incorrect data modification

A(n) ___________ is a computer program that senses when another computer is attempting to scan the disk or otherwise access a computer.

IDS




Intrusion detection system

Which of the following is a critical security function of senior management in an organization?

Establishing the security policy and managing risk

A(n) __________ has a microchip in it to hold data.

Smart Card

A __________ is a number used to encrypt the data.

Key