Security Information
Is a respected professional society that was established in 1947 as "the world's first educational and scientific computing society?
ACM
A subject or object's ability to use, manipulate, modify, or affect another subject or object is known as?
Access
What is a network project that preceded the Internet?
Arpanet
An organizational resource that is being protected is sometimes logical, such as a Web site, software information, or data. Sometimes the resource is physical, such as a person, computer system, hardware, or other tangible object. Either way, the resource is known as a(n)?
Asset
Is an act against an asset that could result in a loss?
Attack
A long-term interruption (outage) in electrical power availability is known as a(n)?
Blackout
Is an application error that occurs when more data is sent to a program than it is designed to handle?
Buffer overflow
What type of law comprises a wide variety of laws that govern a nation or state?
Civil Law
The protection of all communications media, technology, and content is known as?
Communications Security
Attempting to reverse-calculate a password is called?
Cracking
Which are the fixed moral attitudes or customs of a particular group.
Cultural Mores
What is the premeditated, politically motivated attacks against information, computer systems, computer programs, and data that result in violence against noncombatant targets by subnational groups or clandestine agents?
Cyberterrorism
An emerging methodology to integrate the effort of the development team and the operations team to improve the functionality and security of applications is known as?
DevOps
Is a collection of statutes that regulate the interception of wire, electronic, and oral communications?
Electronic Communications Privacy Act
Is also widely known as the Gramm-Leach-Bliley Act?
Financial Services Modernization
As frustrating as viruses and worms are, perhaps more time and money is spent on resolving virus?
Hoaxes
Is a professional association that focuses on auditing, control, and security and whose membership comprises both technical and managerial professionals?
ISACA
What actions are performed in a computer that is infected with a virus?
Malicious
What has become a widely accepted evaluation standard for training and education related to the security of information systems?
NSTISSI No. 4011
Which security addresses the issues necessary to protect the tangible items, objects, or areas of an organization from unauthorized access and misuse?
Physical
. A short-term decrease in electrical power availability is known as a(n)?
SAG
Which data file contains the hashed representation of the user's password?
SAM
Web hosting services are usually arranged with an agreement defining minimum service levels known as a(n)?
SLA
What program can reveal data transmitted on a network segment, including passwords, the embedded and attached files—such as word-processing documents—and sensitive data transmitted to or from applications?
Sniffer program
Is a technique used to gain unauthorized access to computers, wherein the intruder sends messages with a source IP address that has been forged to indicate that the messages are coming from a trusted host?
Spoofing
Are malware programs that hide their true nature and reveal their designed behavior only when activated?
Trojan Horse
What was detected in the famous study entitled "Protection Analysis: Final Report" regarding OS security?
Vulnerabilities
Is a form of collective data that relates to a group or category of people and that has been altered to remove characteristics or components that make it possible to identify individuals within the group?
Aggregate Information
What type of attack a server would experience when a hacker compromises it to acquire information via a remote location using a network connection?
Direct
Is the unauthorized taking of personally identifiable information with the intent of committing fraud or another illegal or unethical purpose?
Identity Theft
The protection of the confidentiality, integrity, and availability of information assets, whether in storage, processing, or transmission, via the application of policy, education, training and awareness, and technology is known as?
Information Security
The Health Insurance Portability and Accountability Act of 1996 was also know as?
Kennedy-Kessebaum Act
Which are the rules that mandate or prohibit certain behavior and are enforced by the government?
Laws
The protection of tangible items, objects, or areas from unauthorized access and misuse is known as?
Physical Security
Guidelines that dictate certain behavior within an organization are known as?
Policies
A table of hash values and their corresponding plaintext values that can be used to look up password values if an attacker is able to steal a system's encrypted password file is known as a(n)?
Rainbow table
Is any technology that aids in gathering information about a person or organization without their knowledge?
Spyware
A methodology and formal development strategy for the design and implementation of an information system is referred to as a?
System development life cycle
What is a potential risk to an information asset?
Threat
What is a potential weakness in an asset or its defensive control(s)?
Vulnerability
What threat may be able to deposit copies of itself onto all Web servers that the infected system can reach, so that users who subsequently visit those sites become infected.?
Worm