CIS 377 MIDTERM
cold
A ___________ site provides only rudimentary services and facilities.
security clearance scheme
A ____________________ assigns a status level to employees to designate the maximum level of classified data they may access.
True
A firewall can be configured to disallow certain types of incoming traffic that may be attacking.
vulnerability
A potential weakness in an asset or its defensive control system(s) is known as a(n) ____________________.
expectancy
A single loss _______________ is the calculation of the value associated with the most likely loss from an attack.
exploit
A technique used to compromise a system is known as a(n) __________________.
True
A worm may be able to deposit copies of itself onto all Web servers that the infected system can reach, so that users who subsequently visit those sites become infected.
False
A worm requires that another program is running before it can begin functioning.
worm
A(n) _____________ is a malicious program that replicates itself constantly without requiring another program environment.
threat
A(n) _____________ is a potential risk to an information asset.
polymorphic
A(n) ________________ threat is one that over time changes the way it appears to antivirus software programs, making it undetectable by techniques that look for preconfigured signatures
hot
A(n) __________________ site is a fully configured computer facility with all services, communications links, and physical plant operations provided, including heating and air conditioning.
vulnerability
A(n) ____________________ is a potential weakness in an asset or its defensive control(s).
attack
A(n) _____________________ is an act against an asset that could result in a loss.
information
A(n) _______________________ system is the entire set of people, procedures, and technology that enable business to use information
support the mission of the organization, require a comprehensive and integrated approach, and be cost effective
According to NIST SP 800-14's security principles, security should _______________________________________________________________________.
ethical
An organization may hire a _____________ hacker to find all the vulnerabilities in their system so that it can be patched before someone takes advantage of it
asset
An organizational resource that is being protected is sometimes logical, such as a Web site, software information, or data. Sometimes the resource is physical, such as a person, computer system, hardware, or other tangible object. Either way, the resource is known as a(n) ________________________.
threat
Any event or circumstance that has the potential to adversely affect operations and assets is known as a(n) _____________________.
True
As an organization grows, it must often use more robust technology to replace the security technologies it may have outgrown.
forensics
Computer _________________ is the process of collecting, analyzing, and preserving computer-related evidence.
everyone in the organization
Computer security is generally considered to be the responsibility of...?
True
Confidentiality ensures that only those with the rights and privileges to access information are able to do so
False
Digital evidence is not volatile.
True
During the early years of computing, the primary threats to security were physical theft of equipment, espionage against the products of the systems, and sabotage
True
Experts consider Romania the country with the strictest cybercrime laws
True
False Blocking ICMP packets may help prevent denial-of-service attacks.
False
Frequently the first responder to a computer crime is the network administrator.
education
Human error or failure often can be prevented with training, ongoing awareness activities, and ______________________________.
black hat
If you use public WIFI and someone gets your email password and logs into your email. That individual is a ____________________Hacker
denial-of-service
In a ____________________ attack, the attacker sends a large number of connection or information requests to disrupt a target from a small number of sources.
Chain of custody
In a computer forensics investigation, what describes the route that evidence takes from the time you find it until the case is closed or goes to court?
True
In the U.S. no providers of critical infrastructures have sustained a cyber-attack.
man-in-the-middle
In the ____________________ attack, an attacker monitors (or sniffs) packets from the network, modifies them, and inserts them back into the network.
True
In the attack on the US Power grid in 2017, malware was planted, fake resumes with tainted attachments were used.
social engineering
In the context of information security, _______________________ is the process of using social skills to convince people to reveal access credentials or other valuable information to the attacker.
True
In the early years of computing, if security was addressed at all, it dealt only with the physical security of the computers themselves and not the data or connections between the computers.
integrity
Information has __________________ when it is whole, complete, and uncorrupted.
False
Information security can be an absolute
True
Malware is a generic term for software that has a malicious purpose
True
Most computer criminals are not really "criminals".
Business Continuity
Of the various types of mitigation plans, the ___________________________ plan is the most strategic and long-term, as it focuses on the steps to ensure the continuation of the organization
top-down
Of various approaches to information security implementation, the _________________ approach has a higher probability of success.
True
One form of e-mail attack that is also a DoS attack is called a mail bomb, in which an attacker overwhelms the receiver with excessive quantities of e-mail.
hacktivist
One form of online vandalism is ___________________ operations, which interfere with or disrupt systems to protest the operations, policies, or actions of an organization or government agency
True
Power grids are a major target for foreign actors.
control
Risk _____________ is the application of security mechanisms to reduce the risks to an organization's data and information systems.
True
Risk control is the application of controls that reduce the risks to an organization's information assets to an acceptable level.
insurance premiums
Risk management helps you do all of the following except:
cookie
Software code known as a(n) ____________ can allow an attacker to track a victim's activity on Web sites.
False
The Health Insurance Portability and Accountability Act of 1996 requires government agencies to identify sensitive systems, conduct computer security training, and develop computer security plans
IR
The __________ plan specifies the actions an organization can and should take while an adverse event is in progress. An adverse event could result in loss of an information asset or assets, but it does not currently threaten the viability of the entire organization.
boot
The __________________ virus infects the key operating system files located in a computer's start-up sector.
Chief Information Security Officer (CISO)
The _____________________ is the individual primarily responsible for the assessment, management, and implementation of information security in the organization.
risk identification
The first phase of risk management is ____________________.
the people
The most valuable organizational asset is ___________________________.
physical security
The protection of tangible items, objects, or areas from unauthorized access and misuse is known as _____________________________.
pharming
The redirection of legitimate user Web traffic to illegitimate Web sites with the intent to collect personal information is known as _________________________.
People
The weakest link in a security chain is:
Black hat hackers
These individuals hack for malicious reasons or personal gain. They do not have permission from the entity.
Grey Hat
These individuals hack without permission but not for malicious reasons.
True
To achieve balance—that is, to operate an information system that satisfies the user and the security professional—the security level must allow reasonable access, yet protect against threats
True
To achieve defense in depth, an organization must establish multiple layers of security controls and safeguards.
True
To determine if the risk to an information asset is acceptable or not, you estimate the expected loss the organization will incur if the risk is exploited.
investigate allegations of digital malfeasance and perform root cause analysis
Two purposes of digital forensics:
mitigating damage
What are the objectives of emergency actions taken at the beginning stage of a disaster? Preventing injuries, loss of life, and ....
Name, social security number, data and place of birth, mother's maiden name
What is an example of Personal Identifiable Information (PII)?
False
When electronic information is stolen, the crime is readily apparent.
standards of due care
When organizations adopt security measures for a legal defense, they may need to show that they have done what any prudent organization would do in similar circumstances. This is referred to as _________________________.
Confidentiality
When unauthorized individuals or systems can view information, ______________ is breached.
DR
_________ plans usually include all preparations for the recovery process, strategies to limit losses during the disaster, and detailed steps to follow when the smoke clears, the dust settles, or the flood waters recede.
Hardware
________________ is the physical technology that houses and executes the software, stores and transports the data, and provides interfaces for the entry and removal of information from the system
Availability
____________________ enables authorized users—people or computer systems—to access information without interference or obstruction and to receive it in the required format.
Risk Management
_____________________ involves three major undertakings: risk identification, risk assessment, and risk control.
Spyware
_____________________ is any technology that aids in gathering information about a person or organization without their knowledge.
Shoulder surfing
_______________________ is used in public or semi-public settings when individuals gather information they are not authorized to have by looking over another individual's shoulder or viewing the information from a distance.
Trojan Horses
______________________________ are malware programs that hide their true nature and reveal their designed behavior only when activated.
Cyberterrorism
______________________________ is the premeditated, politically motivated attacks against information, computer systems, computer programs, and data that result in violence against noncombatant targets by subnational groups or clandestine agents.