• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/80

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

80 Cards in this Set

  • Front
  • Back

____ are individuals who want to attack computers yet they lack the knowledge of computers and networks needed to do so.

Hacker

Grouping individuals and organizations into clusters or groups based on their likes and interests is called ____.

social networking

A ____ is a collection of requirements specific to the system or procedure that must be met by everyone.

standard

AV software on a computer must have its ____ files regularly updated by downloads from the Internet.

signature

As a means of simplifying turning on WPA2 Personal, many devices now support ____ as an optional means of configuring security.

Wi-Fi Protected Setup (WPS)

Cryptography can also be applied to entire disks. This is known as ____ encryption and protects all data on a hard drive.

whole disk

A ____ self-replicates between computers (from one computer to another).

worm

In a well-run information security program, attacks will never get through security perimeters and local defenses.

False

Financial cybercrime is often divided into two categories. The first category focuses on individuals and businesses.

True

____ is the process of setting a user’s account to expire.

Account expiration

An attacker must be highly skilled in technical knowledge and abilities in order to be successful in a Social Engineering attack.

False

____ is sending an e-mail or displaying a Web announcement that falsely claims to be from a legitimate enterprise, in an attempt to trick the user into surrendering private information.

Phishing

A(n) ____ infection injects portions of the code throughout the program’s executable code instead of only at the end of the file (any overwritten original code is transferred and stored inside the virus code for proper execution of the host program after the infection).

Swiss cheese

To address the vulnerabilities in operating systems that are uncovered after the software has been released, software vendors usually deploy a software “fix” to address the vulnerabilities.

True

The ____ in a Wi-Fi network serves as the network name identifier.

SSID

Social engineering ____ means to create a fictitious character and then play out the role of that person on a victim.

impersonation

The two types of malware that have the primary objective of infecting a computer system are ____.

viruses and worms

Spyware usually performs one of the following functions on a user’s computer: ____, collecting personal information, or changing computer configurations.

advertising

A(n) ____ is a written document that states how an organization plans to protect the company’s information technology assets.

security policy

What is curently the best option for Wi-Fi security?

WPA2

Bruce Shneier suggest which password generation method?

Combine a personally memorable sentence with some memorable tricks to modify that sentence into a password

There is a straightforward and easy solution to securing computers.

False

A(n) ____ is a person or element that has the power to carry out a threat.

threat agent

____ is a nontoxic petroleum gel-based paint that is thickly applied and does not harden, making any coated surface very difficult to climb.

Anti-climb paint

Unless remote management is essential, it is recommended that this feature be disabled with a wireless router.

True

You should always be truthful when answering "secret questions" so that you have a way to reset your passwords should you forget them.

False

____ identify individuals within the organization who are in positions of authority.

Organizational charts

Virtually anyone could type in a person’s username and pretend to be that person.

True

Under____, healthcare enterprises must guard protected health information and implement policies and procedures to safeguard it, whether it be in paper or electronic format.

HIPAA

IEEE ____ combines the best features of 802.11b and 802.11a and is still used today.

802.11g

A ____ is essentially a duplicate of the organization’s main production site and has all the equipment needed for it to continue running, including office space and furniture, telephone jacks, computer equipment, and a live telecommunications link.

hot site

____ may reveal the true level of security within the organization.

Policy manuals

____ is defined as the ability of an organization to maintain its operations and services in the face of a disruptive event.

Business continuity

____ ensures that information is correct and no unauthorized person or malicious software has altered that data.

Integrity

From January 2005 through July 2012, over ____ electronic data records in the United States were breached, exposing to attackers a range of personal electronic data, such as address, Social Security numbers, health records, and credit card numbers.

562 million

One of the first software security applications is ____ software.

antivirus

Whereas tablets are designed for performance, laptops are focused on ease of use.

False

Which of the following is NOT generally a good method to be successful in a Social Engineering attack?

Quickly getting the information from the victim

____ attacks are often the means by which an attacker will perform an arbitrary code execution.

Buffer overflow

The ____ team is contacted whenever digital evidence needs to be preserved and serve as first responders.

computer forensics response

On tablets and smartphones, users should enable ____, which password-protects the device when it has not been used for a set period of time.

auto-lock

____ involves using someone’s personal information, such as a Social Security number, to establish bank or credit card accounts that are then left unpaid, leaving the victim with the debts and ruining their credit rating.

Identity theft

____ policy is a Microsoft Windows feature that provides centralized management and configuration of computers and remote users using the Microsoft directory service Active Directory (AD).

Group

Which of the following is NOT an example of an authorization technique or device?

A survey on your political beliefs based on what you think

Whereas phishing involves sending millions of generic e-mail messages to users, ____ targets only specific users.

spear phishing

____ ensures that data is accessible when needed to authorized users.

Availability

____ policy creates standards for using corporate e-mail.

E-mail

The best approach to establishing strong security with passwords is to use a ____.

password management tool

Most viruses can spread to other computers by themselves.

False

Which of the following is NOT a valid method of authentication?

What you think

In the field of computer networking and wireless communications, the most widely known and influential organization is the ____.

IEEE

Attackers today use common Internet ____ and applications to perform attacks, making it difficult to distinguish an attack from legitimate traffic.

protocols

A ____ silently captures and stores each keystroke that a user types on the computer’s keyboard.

keylogger

____ is software that displays a fictitious warning to the user in the attempt to “scare” the user into an action, such as purchasing additional software online to fix a problem that in fact does not exist.

Scareware

FACTA grants consumers free access to their credit score.

False

A ____ is a collection of suggestions that should be implemented.

guideline

One of the best defenses against attacks is to create ____ on a regular basis.

data backups

If a consumer finds a problem on her credit report, she must first send a letter to the credit-reporting agency. Under federal law, the agency has ____ days to investigate and respond to the alleged inaccuracy and issue a corrected report.

30

____ requires banks and financial institutions to alert customers of their policies and practices in disclosing customer information.

GLBA

Information (contained on the devices) is protected by three layers: products, ____, and policies and procedures.

people

A computer ____ is a person who has been hired to break into a computer and steal information.

spy

A(n) ____ address is a unique hardware number that is “burned in” to each wireless network interface card adapter.

MAC

The FBI defines ____ as any “premeditated, politically motivated attack against information, computer systems, computer programs, and data which results in violence against non-combatant targets by sub-national groups or clandestine agents.”

cyberterrorism

On tablets and smartphones, it is recommended to download and install a(n) ____ app that can erase the contents of the device if lost or stolen.

remote wipe

A(n) ____ is a type of action that has the potential to cause harm.

threat

The ____ of 2003 contains rules regarding consumer privacy.

Fair and Accurate Credit Transactions Act

A ____ is a program designed to take advantage of a vulnerability in an application or an operating system in order to enter a computer.

worm

The term ____ is frequently used to describe the tasks of securing information that is in a digital format.

information security

Attack tools can initiate new attacks without any human participation, thus increasing the speed at which systems are attacked.

True

“____” involves breaking into a car’s electronic system.

Car hacking

A(n) ____ is a flaw or weakness that allows a threat agent to bypass security.

vulnerability

A ____ is created when hundreds, thousands, or even tens of thousands of zombie computers are manipulated under remote control.

botnet

A ____ attack begins with the attacker creating digests of common dictionary words, and then comparing those in a stolen password file.

dictionary

The Web sites that facilitate linking individuals with common interests and function as an online community of users are called ____.

social networking sites

____ is the application of science to questions that are of interest to the legal profession.

Forensics

The weakness of passwords centers on human memory.

True

Instead of asking the user to visit a fraudulent Web site, ____ automatically redirects the user to the fake site.

pharming

Terrorists who turn their attacks to the network and computer infrastructure to cause panic among citizens are known as ____.

cyberterrorists

Because a wireless signal can only be transmitted for several hundred feet, multiple APs are used to provide “cells” or areas of coverage.

True

____ are independently rotating large cups (in diameter of 5 inches or 115 millimeters) affixed to the top of a fence to prevent the hands of intruders from gripping the top of a fence to climb over it.

Roller barriers