• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/25

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

25 Cards in this Set

  • Front
  • Back
In recent years, identity theft has been more prevalent as part of phishing.
True
Intentional damage to software occurs because of poor training, lack of adherence to simple backup procedures, or simple human error.
False
Controls translate business policies into system features.
True
Several manufacturers of computer equipment offer individual keyboard-embedded and mouse-embedded fingerprint devices.
True
With encryption, the original message is called plaintext.
True
Symmetric encryption is also called “public-key” encryption.
False
A protocol called Transport Layer Security (TLS) is used for transactions on the Web.
True
The recipient of an encrypted message uses the certificate authority’s private key to decode the digital certificate attached to the message.
False

(Public key)
Redundancies increase expected downtime.
False
The greater the number of interdependent systems, the greater the expected downtime
True
____ software records individual keystrokes.
Keystroke Logging
Con artists use tricks known as ____.
Socail engineering
A ____ is a server that contains a mirrored copy of a production database (a database that is used for business operations), or one with invalid records
honeypot
____ are usually planted by insiders, that is, employees of the victimized organization.
Logic bombs
that goes off some time later
Hijacking is carried out by surreptitiously installing a small program called a ____ on a computer
bot
____ is a set of disks that is programmed to replicate stored data to provide a higher degree of reliability.
RAID
A(n) ____ is a set of indivisible transactions that are either all executed or none are—never only some.
atomic transaction
To increase security, some companies implement the ____ approach.
DMZ (Demilitarized zone)
A ____ “represents” another server for all information requests from resources inside the trusted network.
Answer
proxy server
The ____, as it is popularly known, gives law enforcement agencies surveillance and wiretapping rights they did not have before 2001.
Patriot Act
When tapping communications, law enforcement agencies need the cooperation of a third party, such as a telephone company or a(n) ____.
ISP
Experts are usually employed to estimate the cost and ____ of damages, as well as the cost of security measures.
probabilities
Managers should focus on the asset they must protect, which in most cases is ____, not applications.
information
Experience in ____ certain systems, such as ERP and SCM systems, can teach the IT staff for how many minutes or seconds per year the system is likely to fail.
operating
CIOs often cite ____ as an effective way to bring down the amount of work their subordinates must do.
SSO