Info Security Midterm

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

__________ law comprises a wide variety of laws that govern a nation or state.

Civil

The National Information Infrastructure Protection Act of 1996 modified which act?

Computer Fraud and Abuse Act

The __________ is an intermediate area between a trusted network and an untrusted network.

DMZ

A(n) _________ is an authorization issued by an organization for the repair, modification, or update of a piece of equipment.

FCO

The Computer __________ and Abuse Act of 1986 is the cornerstone of many computer-related federal laws and enforcement efforts.

Fraud

__________ firewalls examine every incoming packet header and can selectively filter packets based on header information such as destination address, source address, packet type, and other key information.

Packet-filtering

__________ security addresses the issues necessary to protect the tangible items, objects, or areas of an organization from unauthorized access and misuse.

Physical

Which of the following is not a major processing mode category for firewalls?

Router passthru

The ____________________ data file contains the hashed representation of the user's password.

SAM

Web hosting services are usually arranged with an agreement defining minimum service levels known as a(n) ____.

SLA

__________ inspection firewalls keep track of each network connection between internal and external systems.

Stateful

__________ filtering requires that the firewall's filtering rules for allowing and denying packets are developed and installed with the firewall.

Static

________often function as standards or procedures to be used when configuring or maintaining systems.

SysSPs

When BS 7799 first came out, several countries, including the United States, Germany, and Japan, refused to adopt it, claiming that it had fundamental problems. Which of the following is NOT one of those problems?

The global information security community had already defined a justification for a code of practice, such as the one identified in ISO/IEC 17799.

A short-term interruption in electrical power availability is known as a ____.

fault

An information security ________ is a specification of a model to be followed during the design, selection, and initial and ongoing implementation of all subsequent security controls, including information security policies, security education, and training.

framework

The Privacy of Customer Information Section of the common carrier regulation states that any proprietary information shall be used explicitly for providing services, and not for any __________ purposes.

marketing

Hackers can be generalized into two skill groups: expert and ____________________.

novice

The first phase of risk management is _________.

risk identification

"4-1-9" fraud is an example of a ____________________ attack.

social engineering

A server would experience a(n) __________ attack when a hacker compromises it to acquire information via a remote location using a network connection.

direct

The concept of competitive _________ refers to falling behind the competition.

disadvantage

A __________ filtering firewall can react to an emergent event and update or create rules to deal with the event.

dynamic

Human error or failure often can be prevented with training, ongoing awareness activities, and ____________________.

education

A(n) ________ plan is a plan for the organization's intended strategic efforts over the next several years.

strategic

A computer is the __________ of an attack when it is used to conduct an attack against another computer.

subject

The restrictions most commonly implemented in packet-filtering firewalls are based on __________.

All of the above: IP source and destination address, Direction (inbound or outbound), and TCP or UDP source and destination port requests.

Which of the following functions does information security perform for an organization?

All of the above: Protecting the organization's ability to function, Protecting the data the organization collects and uses, and Enabling the safe operation of applications implemented on the organization's IT systems.

__________ of information is the quality or state of being genuine or original.

Authenticity

A(n) _________ is a formal access control methodology used to assign a level of confidentiality to an information asset and thus restrict the number of people who can access it.

Data classification scheme

The ________is the high-level information security policy that sets the strategic direction, scope, and tone for all of an organization's security efforts.

EISP

Which of the following acts is a collection of statutes that regulate the interception of wire, electronic, and oral communications?

Electronic Communications Privacy Act

_________ addresses are sometimes called electronic serial numbers or hardware addresses.

MAC

__________ was the first operating system to integrate security as one of its core functions.

MULTICS

__________ has become a widely accepted evaluation standard for training and education related to the security of information systems.

NSTISSI No. 4011

__________ law regulates the structure and administration of government agencies and their relationships with citizens, employees, and other governments.

Public

​The goals of information security governance include all but which of the following?

Regulatory compliance by using information security knowledge and infrastructure to support minimum standards of due care

The application layer proxy firewall is also known as a(n) __________.

application firewall

Risk _________ defines the quantity and nature of risk that organizations are willing to accept as they evaluate the trade-offs between perfect security and unlimited accessibility.

appetite

Risk _________ is the application of security mechanisms to reduce the risks to an organization's data and information systems.

control

Standards may be published, scrutinized, and ratified by a group, as in formal or ________ standards.

de jure

The proxy server is often placed in an unsecured area of the network or is placed in the __________ zone.

demilitarized

In file hashing, a file is read by a special algorithm that uses the value of the bits in the file to compute a single number called the __________ value.

hash

The Health Insurance Portability and Accountability Act of 1996, also known as the __________ Act, protects the confidentiality and security of health-care data by establishing and enforcing standards and by standardizing electronic data interchange.

kennedy-Kessebaum

__________ access control is a form of __________ access control in which users are assigned a matrix of authorizations for particular areas of access.

lattice-based, nondiscretionary

The stated purpose of ISO/IEC 27002 is to "offer guidelines and voluntary directions for information security __________."

management

According to the National Information Infrastructure Protection Act of 1996, the severity of the penalty for computer crimes depends on the value of the information obtained and whether the offense is judged to have been committed for each of the following except __________.

to harass

Acts of ____________________ can lead to unauthorized real or virtual actions that enable information gatherers to enter premises or systems they have not been authorized to enter.

trespass

Federal agencies such as the NSA, FBI, and CIA use specialty classification schemes. For materials that are not considered "National Security Information," __________ data is the lowest-level classification.

unclassified

The famous study entitled "Protection Analysis: Final Report" focused on a project undertaken by ARPA to understand and detect __________ in operating systems security.

vulnerabilities


संबंधित स्टडी सेट्स

Midterm 6,7,8,10 Extra Review Questions

View Set

Macroeconomics: Chapter 6 Launchpad

View Set

Microbiology - Ch 13 (Microbe-Human interaction Infection and Disease)

View Set

SBOK Guide Certified Scrum Master

View Set