CIST 1602 Module 1 Study Set

¡Supera tus tareas y exámenes ahora con Quizwiz!

The Council of Europe adopted the Convention of Cybercrime in ____.

2001

____________________ information is created by combining pieces of non-private data—often collected during software updates, and via cookies—that when combined may violate privacy.

Aggregate

The ___________ is a respected professional society that was established in 1947 as "the world's first educational and scientific computing society."

Association of Computing Machinery

____ law comprises a wide variety of laws that govern a nation or state.

Civil

The _________ is the American contribution to an international effort to reduce the impact of copyright, trademark, and privacy infringement, especially when accomplished via the removal of technological copyright protection measures.

DMCA or Digital Millennium Copyright Act

2. Legal assessment for the implementation of the information security program is almost always done by the information security or IT departments. a. True b. False

False

3. The authorization process takes place before the authentication process. a. True b. False

False

4. Rule-based policies are less specific to the operation of a system than access control lists. a. True b. False

False

Chapter 2 1. Ethics carry the sanction of a governing authority. a. True b. False

False

Every state has implemented uniform laws and regulations placed on organizational use of computer technology.

False

The Department of Homeland Security was created in 1999.

False

The difference between a policy and a law is that ignorance of a law is an acceptable defense.

False

7. An approach to combining risk identification, risk assessment, and risk appetite into a single strategy. is known as risk protection. ___________

False - analysis

7. A benchmark is derived by comparing measured actual performance against established standards for the measured category. ____________

False - baseline

8. The macro virus infects the key operating system files located in a computer's start up sector. _________________________

False - boot

9. The application of computing and network resources to try every possible combination of options of a password is called a dictionary attack. _________________________

False - brute force

11. A formal access control methodology used to assign a level of confidentiality to an information asset and thus restrict the number of people who can access it is known as a data categorization scheme. ____________

False - classification

10. The term phreaker is now commonly associated with an individual who cracks or removes software protection that is designed to prevent unauthorized duplication. _________________________

False - cracker

The ____________________ Act seeks to improve the reliability and accuracy of financial reporting, as well as increase the accountability of corporate governance, in publicly traded companies.

Sarbanes-Oxley

1. Risks can be avoided by countering the threats facing an asset or by eliminating the exposure of an asset. a. True b. False

True

10. Each organization has to determine its own project management methodology for IT and information security projects. a. True b. False

True

11. A(n) polymorphic threat is one that over time changes the way it appears to antivirus software programs, making it undetectable by techniques that look for pre-configured signatures. _________________________

True

12. Also known as an economic feasibility study, the formal assessment and presentation of the economic expenditures needed for a particular security control, contrasted with its projected value to the organization is known as cost-benefit analysis (CBA). ____________

True

2. One of the goals of an issue-specific security policy is to indemnify the organization against liability for an employee's inappropriate or illegal use of the system. a. True b. False

True

4. A worm may be able to deposit copies of itself onto all Web servers that the infected system can reach, so that users who subsequently visit those sites become infected. a. True b. False

True

4. Unlike other risk management frameworks, FAIR relies on the qualitative assessment of many risk components using scales with value ranges. a. True b. False

True

5. On-the-job training can result in substandard work performance while the trainee gets up to speed. a. True b. False

True

5. Penetration testing is often conducted by penetration testers—consultants or outsourced contractors who might be referred to as red teams. a. True b. False

True

5. Some threats can manifest in multiple ways, yielding multiple vulnerabilities for an asset-threat pair. a. True b. False

True

7. Information security policies are designed to provide structure in the workplace and explain the will of the organization's management. ____________

True

7. Planners need to estimate the effort required to complete each task, subtask, or action step. a. True b. False

True

Deterrence can prevent an illegal or unethical activity from occurring.

True

Established in January 2001, the National InfraGard Program began as a cooperative effort between the FBI's Cleveland Field Office and local technology professionals.

True

In 1995 the Directive 95/46/EC was adopted by the European Union.

True

Individuals with authorization and privileges to manage information within the organization are most likely to cause harm or damage by accident.

True

Studies have reported that the Pacific Rim countries of Singapore and Hong Kong are hotbeds of software piracy.

True

Studies on ethics and computer use reveal that people of different nationalities have different perspectives; difficulties arise when one nationality's ethical behavior violates the ethics of another national group.

True

The Clipper Chip can be used to monitor or track private communications.

True

According to the National Information Infrastructure Protection Act of 1996, the severity of the penalty for computer crimes depends on the value of the information obtained and whether the offense is judged to have been committed for each of the following except ____.

To Harass

3. The criterion most commonly used when evaluating a strategy to implement InfoSec controls and safeguards is economic feasibility. a. True b. False

True

5. Due diligence requires that an organization make a valid and ongoing effort to protect others. ____________

True

Ethics define socially acceptable behaviors.

True

Privacy is not absolute freedom from observation, but rather is a more precise "state of being free from unsanctioned intrusion."

True

The Economic Espionage Act of 1996 protects American ingenuity, intellectual property, and competitive advantage.

True

The Federal Bureau of Investigation's National InfraGard Program serves its members in four basic ways: Maintains an intrusion alert network using encrypted e-mail; Maintains a secure Web site for communication about suspicious activity or intrusions; Sponsors local chapter activities; Operates a help desk for questions.

True

The NSA is responsible for signal intelligence and information system security.

True

Individuals with authorization and privileges to manage information within the organization are most likely to cause harm or damage ____.

By accident

The ____________________ Act of 1996 attempts to prevent trade secrets from being illegally shared.

Economic Espionage

1. Having an established risk management program means that an organization's assets are completely protected. a. True b. False

False

2. Corruption of information can occur only while information is being stored. a. True b. False

False

2. The defense risk control strategy may be accomplished by outsourcing to other organizations. a. True b. False

False

Chapter 1 1. The first step in solving problems is to gather facts and make assumptions. a. True b. False

False

Civil law addresses activities and conduct harmful to society and is actively enforced by the state.

False

The Association for Computing Machinery and the Information Systems Security Association have the authority to banish violators of their ethical standards from practicing their trade.

False

The Department of Homeland Security is the only U.S. federal agency charged with the protection of American information resources and the investigation of threats to, or attacks on, the resources.

False

The Federal Privacy Act of 1974 regulates government agencies and holds them accountable if they release information about national security.

False

The Graham-Leach-Bliley Act is a critical piece of legislation that affects the executive management of publicly traded corporations and public accounting firms.

False

The U.S. Secret Service is a department within the Department of the Interior.

False

The key difference between laws and ethics is that ethics carry the authority of a governing body and laws do not.

False

13. The information technology management community of interest often takes on the leadership role in addressing risk. ____________

False - infosec, information security

12. Most information security projects require a trained project developer. _________________________

False - manager

11. In the early stages of planning, the project planner should attempt to specify completion dates only for major employees within the project. _________________________

False - milestones

9. Examples of actions that illustrate compliance with policies are known as laws.

False - practices

15. In a cost-benefit analysis, the expected frequency of an attack, expressed on a per-year basis is known as the annualized risk of occurrence. ____________

False - rate

7. When voltage levels lag (experience a momentary increase), the extra voltage can severely damage or destroy equipment. _________________________

False - spike

7. A person or organization that has a vested interest in a particular aspect of the planning or operation of the organization is a stockbroker.

False - stakeholder

10. An examination of how well a particular solution is supportable given the organization's current technological infrastructure and resources, which include hardware, software, networking, and personnel is known as operational feasibility. ____________

False - technical

What is the subject of the Computer Security Act?

Federal Agency Information Security

Criminal or unethical ____ goes to the state of mind of the individual performing the act.

Intent

The _______________ manages a body of knowledge on information security and administers and evaluates examinations for information security certifications.

International Information Systems Security Certification Consortium, Inc. (ISC)

Family law, commercial law, and labor law are all encompassed by ____________________ law.

Private

Laws and policies and their associated penalties only deter if which of the following conditions is present?

Probability of penalty being administered, Probability of being caught, and Fear of penalty

____________________ are the fixed moral attitudes or customs of a particular group.

Cultural Mores

____ attempts to prevent trade secrets from being illegally shared.

Economic Espionage Act

Key studies reveal that the overriding factor in leveling the ethical perceptions within a small population is ____________________.

Education

The ____________ Act of 1986 is a collection of statutes that regulates the interception of wire, electronic, and oral communications.

Electronic Communications Privacy

Which of the following acts is a collection of statutes that regulate the interception of wire, electronic, and oral communications?

Electronic Communications Privacy Act

3. MAC addresses are considered a reliable identifier for devices with network interfaces, since they are essentially foolproof. a. True b. False

False

3. The 'Authorized Uses' section of an ISSP specifies what the identified technology cannot be used for. a. True b. False

False

3. The primary goal of external monitoring is to maintain an informed awareness of the state of all of the organization's networks, information systems, and information security defenses. a. True b. False

False

3. Threats from insiders are more likely in a small organization than in a large one. a. True b. False

False

4. A top-down approach to information security usually begins with a systems administrator's attempt to improve the security of their systems. a. True b. False

False

4. The security education, training, and awareness (SETA) program is designed to reduce the occurence of external security attacks. a. True b. False

False

5. DoS attacks cannot be launched against routers. a. True b. False

False

5. Since most policies are drafted by a single person and then reviewed by a higher-level manager, employee input should not be considered since it makes the process too complex. a. True b. False

False

6. The first step in the work breakdown structure (WBS) approach encompasses activities, but not deliverables. a. True b. False

False

8. The work breakdown structure (WBS) can only be prepared with a complex specialized desktop PC application. a. True b. False

False

Chapter 3 1. Because it sets out general business intentions, a mission statement does not need to be concise. a. True b. False

False

Cultural differences can make it easy to determine what is and is not ethical—especially when it comes to the use of computers.

False

DHS is made up of three directorates.

False

Due care requires that an organization make a valid effort to protect others and continually maintain this level of effort.

False

HIPAA specifies particular security technologies for each of the security requirements to ensure the privacy of the health-care information.

False

In a study on software licence infringement, those from United States were significantly more permissive.

False

Intellectual privacy is recognized as a protected asset in the United States.

False

The United States has implemented a version of the DMCA law called the Database Right, in order to comply with Directive 95/46/EC.

False

There are four general causes of unethical and illegal behavior.

False

Thirty-four countries have ratified the European Council Cyber-Crime Convention as of April 2010.

False

10. To protect intellectual property and competitive advantage, Congress passed the Entrepreneur Espionage Act (EEA) in 1996. ___________

False - Economic

6. The secretarial community often takes on the leadership role in addressing risk. ____________

False - InfoSec, infosec, Information Security, information security

6. Technology is the essential foundation of an effective information security program. _____________

False - Policy

6. Values statements should therefore be ambiguous; after all, they are meant to express the aspirations of the organization.

False - Vision, vision

11. The risk control strategy that indicates the organization is willing to accept the current level of risk. As a result, the organization makes a conscious decision to do nothing to protect an information asset from risk and to accept the outcome from any resulting exploitation is known as the termination risk control strategy.

False - acceptance

9. Information ambiguation occurs when pieces of non-private data are combined to create information that violates privacy. _________________________

False - aggregation

4. ISACA is a professional association with a focus on authorization, control, and security. ___________

False - auditing

14. One form of e-mail attack that is also a DoS attack is called a mail spoof, in which an attacker overwhelms the receiver with excessive quantities of e-mail. _________________________

False - bomb

11. A signaling law specifies a requirement for organizations to notify affected parties when they have experienced a specified type of loss of information. ____________

False - breach

2. The InfoSec community often takes on the leadership role in addressing risk. a. True b. False

True

2. The Secret Service is charged with the detection and arrest of any person committing a U.S. federal offense relating to computer fraud, as well as false identification crimes. a. True b. False

True

3. Deterrence is the best method for preventing an illegal or unethical activity. ____________

True

4. The Australian and New Zealand Risk Management Standard 4360 uses qualitative methods to determine risk based on a threat's probability of occurrence and expected results of a successful attack. a. True b. False

True

5. The ISO 27005 Standard for InfoSec Risk Management includes a five-stage management methodology; among them are risk treatment and risk communication. a. True b. False

True

6. The Gramm-Leach-Bliley (GLB) Act (also known as the Financial Services Modernization Act of 1999) contains a number of provisions that affect banks, securities firms, and insurance companies. ___________

True

6. The risk control strategy that attempts to eliminate or reduce any remaining uncontrolled risk through the application of additional controls and safeguards is the protect risk control strategy, also known as the avoidance strategy. ____________

False - defense

13. A device (or a software program on a computer) that can monitor data traveling on a network is known as a socket sniffer. _________________________

False - packet

15. An asset valuation approach that uses categorical or nonnumeric values rather than absolute numerical measures is known as numberless assessment. ____________

False - qualitative

7. It is the responsibility of InfoSec professionals to understand state laws and standards. ____________

False - regulations

10. The need for effective policy management has led to the emergence of a class of hardware tools that supports policy development, implementation, and maintenance.

False - software

The ______________________________ contains a number of provisions focusing on facilitating affiliation among banks, securities firms, and insurance companies.

Financial Services Modernization or Gramm-Leach-Bliley Act of 1999)

The Computer ____ and Abuse Act of 1986 is the cornerstone of many computer-related federal laws and enforcement efforts.

Fraud

The _________ Act of 1966 allows any person to request access to federal agency records or information not determined to be a matter of national security.

Freedom of Information

The ____ Portability and Accountability Act Of 1996, also known as the Kennedy-Kassebaum Act, protects the confidentiality and security of health care data by establishing and enforcing standards and by standardizing electronic data interchange.

Health Insurance

The low overall degree of tolerance for ____________________ system use may be a function of the easy association between the common crimes of breaking and entering, trespassing, theft, and destruction of property to their computer-related counterparts.

Illicit

The _____________Association is a professional association that focuses on auditing, control, and security and whose membership comprises both technical and managerial professionals.

Information Systems Audit and Control or ISACA

"Long arm ____________________" refers to the long arm of the law reaching across the country or around the world to draw an accused individual into its court systems.

Jurisdiction

____________________ are rules that mandate or prohibit certain behavior in society.

Laws

____________________ is the legal obligation of an entity that extends beyond criminal or contract law.

Liability

The Privacy of Customer Information Section of the common carrier regulation states that any proprietary information shall be used explicitly for providing services, and not for any ____ purposes.

Marketing

What is the subject of the Sarbanes-Oxley Act?

Financial Reporting

Which of the following acts is also widely known as the Gramm-Leach-Bliley Act?

Financial Services Modernization Act

The National Information Infrastructure Protection Act of 1996 modified which Act?

Computer Fraud and Abuse Act

Which of the following acts defines and formalizes laws to counter threats from computer related acts and offenses?

Computer Fraud and Abuse Act

8. The ISA 27014:2013 standard promotes five risk management processes, which should be adopted by the organization's executive management and its governing board.

False - governance

8. Non mandatory recommendations that the employee may use as a reference in complying with a policy.are known as regulations. ____________

False - guidelines

9. The recognition, enumeration, and documentation of risks to an organization's information assets. is known as risk control. ____________

False - identification

12. The probability that a specific vulnerability within an organization will be the target of an attack is known as risk. ____________

False - likelihood

12. Most information security projects require a trained project developer. _________________________

False - manager Chapter 5 1. Small organizations spend more per user on security than medium- and large-sized organizations. a. True b. False ANSWER: True

6. "Shoulder spying" is used in public or semi-public settings when individuals gather information they are not authorized to have by looking over another individual's shoulder or viewing the information from a distance. _________________________

False - surfing

8. InfraGard began as a cooperative effort between the FBI's Cleveland field office and local intelligence professionals. ___________

False - technology

10. An evaluation of the threats to information assets, including a determination of their potential to endanger the organization is known as exploit assessment. ____________

False - threat

9. The risk control strategy that attempts to shift risk to other assets, other processes, or other organizations is known as the defense risk control strategy. ___________

False - transference

14. A prioritized lists of assets and threats can be combined with exploit information into a specialized report known as a TVA worksheet. ____________

False - vulnerabilities

8. Some threats can manifest in multiple ways, yielding multiple exploits for an asset-threat pair. ____________

False - vulnerabilities

Software license infringement is also often called software ____________________.

Piracy

Guidelines that describe acceptable and unacceptable employee behaviors in the workplace are known as ____________________.

Policies

____ law regulates the structure and administration of government agencies and their relationships with citizens, employees, and other governments.

Public

The ____ of 1999 provides guidance on the use of encryption and provides protection from government intervention.

Security and Freedom through Encryption Act

Which of the following countries reported generally intolerant attitudes toward personal use of organizational computing resources?

Singapore

12. The malicious code attack includes the execution of viruses, worms, Trojan horses, and active Web scripts with the intent to destroy or steal information. _________________________

True

13. The risk control strategy that eliminates all risk associated with an information asset by removing it from service is known as the termination risk control strategy.

True

14. Due care and due diligence occur when an organization adopts a certain minimum level of security—that is, what any prudent organization would do in similar circumstances. ____________

True

2. A clearly directed strategy flows from top to bottom rather than from bottom to top. a. True b. False

True

8. The risk control strategy that attempts to reduce the impact of the loss caused by a realized incident, disaster, or attack through effective contingency planning and preparation is known as the mitigation risk control strategy. ____________

True

9. A task or subtask becomes a(n) action step when it can be completed by one individual or skill set and when it includes a single deliverable. _________________________

True

9. Enterprise risk management is a valuable approach that can better align security functions with the business mission while offering opportunities to lower costs.

True

Chapter 4 1. Policies must specify penalties for unacceptable behavior and define an appeals process. a. True b. False

True

Chapter 5 1. Small organizations spend more per user on security than medium- and large-sized organizations. a. True b. False

True

The Information Systems Security Association (ISSA) is a nonprofit society of information security professionals whose primary mission is to bring together qualified information security practitioners for information exchange and educational development.

True

The Secret Service is charged with the detection and arrest of any person committing a United States federal offense relating to computer fraud and false identification crimes.

True

The code of ethics put forth by (ISC)2 focuses on four mandatory canons: "Protect society, the commonwealth, and the infrastructure; act honorably, honestly, justly, responsibly, and legally; provide diligent and competent service to principals; and advance and protect the profession.".

True

The communications networks of the United States carry more funds than all of the armored cars in the world combined.

True

____ defines stiffer penalties for prosecution of terrorist crimes.

USA Patriot Act

The ____________________ Act of 2001 provides law enforcement agencies with broader latitude in order to combat terrorism-related activities.

USA Patriot or U.S.A Patriot


Conjuntos de estudio relacionados

#3: MALAY UNIT 1: Gaya Remaja (Youth Style)

View Set

Qatar History- The Qatari British Relations (Treaty of 1916-1935)

View Set

Scientific Theory, Scientific Theory, Scientific Law

View Set

Chapter 17 function of the heart

View Set

Humanbiologie - Kapitel 7: Nervensystem

View Set

Intro Supply Chain Management Chapter 1: Introduction to Supply Chain Management

View Set

MGT 3121- Midterm Review Questions

View Set