MIDTERM

Pataasin ang iyong marka sa homework at exams ngayon gamit ang Quizwiz!

A fundamental difference between a BIA and risk management is that risk management focuses on identifying threats, vulnerabilities, and attacks to determine which controls can protect information, while the BIA assumes __________.

All of the above

Management of classified data includes its storage and _________.

All of the above

Which of the following acts defines and formalizes laws to counter threats from computer-related acts and offenses?

All of the above

The CPMT conducts the BIA in three stages. Which of the following is NOT one of those stages?

All of these are BIA stages

__________ law comprises a wide variety of laws that govern a nation or state.

Civil

The National Information Infrastructure Protection Act of 1996 modified which act?

Computer Fraud and Abuse Act

The Council of Europe adopted the Convention of Cybercrime in 2001 to oversee a range of security functions associated with __________ activities.

Internet

The service within Kerberos that generates and issues session keys is known as __________.

KDC

________ controls cover security processes that are designed by strategic planners and implemented by the security administration of the organization.

Managerial

__________ has become a widely accepted evaluation standard for training and education related to the security of information systems.

NSTISSI No. 4011

_________ controls address personnel security, physical security, and the protection of production inputs and outputs.

Operational

In SESAME, the user is first authenticated to an authentication server and receives a token. The token is then presented to a privilege attribute server as proof of identity to gain a(n) __________.

PAC

__________ and TACACS are systems that authenticate the credentials of users who are trying to access an organization's network via a dial-up connection.

RADIUS

The ____________________ data file contains the hashed representation of the user's password.

SAM

________often function as standards or procedures to be used when configuring or maintaining systems.

SysSPs

When BS 7799 first came out, several countries, including the United States, Germany, and Japan, refused to adopt it, claiming that it had fundamental problems. Which of the following is NOT one of those problems?

The global information security community had already defined a justification for a code of practice, such as the one identified in ISO/IEC 17799.

____________________ are malware programs that hide their true nature and reveal their designed behavior only when activated.

Trojan horses

A(n) __________ is a private data network that makes use of the public telecommunication infrastructure, maintaining privacy through the use of a tunneling protocol and security procedures.

VPN

A(n) _________ is a formal access control methodology used to assign a level of confidentiality to an information asset and thus restrict the number of people who can access it.

data classification scheme

Standards may be published, scrutinized, and ratified by a group, as in formal or ________ standards.

de juro

The proxy server is often placed in an unsecured area of the network or is placed in the __________ zone.

demilitarized

A ____________________ is an attack in which a coordinated stream of requests is launched against a target from many locations at the same time.

distributed denial-of-service

Security __________ are the areas of trust within which users can freely communicate.

domains

Some people search trash and recycling bins-a practice known as _________-to retrieve information that could embarrass a company or compromise information security.

dumpster diving

A __________ filtering firewall can react to an emergent event and update or create rules to deal with the event.

dynamic

A short-term interruption in electrical power availability is known as a ____.

fault

As frustrating as viruses and worms are, perhaps more time and money is spent on resolving virus ____________________.

hoaxes

In early 2014, in response to Executive Order 13636, NIST published the Cybersecurity Framework, which intends to allow organizations to __________.

identify and prioritize opportunities for improvement within the context of a continuous and repeatable process

The average amount of time between hardware failures, calculated as the total amount of operation time for a specified number of units divided by the total number of failures, is known as __________.

mean time between failure (MTBF)

Hackers can be generalized into two skill groups: expert and ____________________.

novice

The __________ is the difference between an organization's observed and desired performance.

performance gap

A _________ assigns a status level to employees to designate the maximum level of classified data they may access.

security clearance scheme

The __________ control strategy attempts to shift risk to other assets, other processes, or other organizations.

transference

Acts of ____________________ can lead to unauthorized real or virtual actions that enable information gatherers to enter premises or systems they have not been authorized to enter.

trespass

The famous study entitled "Protection Analysis: Final Report" focused on a project undertaken by ARPA to understand and detect __________ in operating systems security.

vulnerabilities

A type of SDLC in which each phase has results that flow into the next phase is called the __________ model.

waterfall

In a(n) __________, assets or threats can be prioritized by identifying criteria with differing levels of importance, assigning a score for each of the criteria, and then summing and ranking those scores.

weighted factor analysis


Kaugnay na mga set ng pag-aaral

Learning Online - Digital Citizenship

View Set

AP BC Calculus Free Response 2014

View Set

Ch.10 Depressive and Bipolar Disorders

View Set

SIE (Garrity) Test #2 Review: (Part 2)

View Set

4520 test 1 review (TRA/TPB, self-efficacy, personality and exercise)

View Set