Security Information

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

Is a respected professional society that was established in 1947 as "the world's first educational and scientific computing society?

ACM

A subject or object's ability to use, manipulate, modify, or affect another subject or object is known as?

Access

What is a network project that preceded the Internet?

Arpanet

An organizational resource that is being protected is sometimes logical, such as a Web site, software information, or data. Sometimes the resource is physical, such as a person, computer system, hardware, or other tangible object. Either way, the resource is known as a(n)?

Asset

Is an act against an asset that could result in a loss?

Attack

A long-term interruption (outage) in electrical power availability is known as a(n)?

Blackout

Is an application error that occurs when more data is sent to a program than it is designed to handle?

Buffer overflow

What type of law comprises a wide variety of laws that govern a nation or state?

Civil Law

The protection of all communications media, technology, and content is known as?

Communications Security

Attempting to reverse-calculate a password is called?

Cracking

Which are the fixed moral attitudes or customs of a particular group.

Cultural Mores

What is the premeditated, politically motivated attacks against information, computer systems, computer programs, and data that result in violence against noncombatant targets by subnational groups or clandestine agents?

Cyberterrorism

An emerging methodology to integrate the effort of the development team and the operations team to improve the functionality and security of applications is known as?

DevOps

Is a collection of statutes that regulate the interception of wire, electronic, and oral communications?

Electronic Communications Privacy Act

Is also widely known as the Gramm-Leach-Bliley Act?

Financial Services Modernization

As frustrating as viruses and worms are, perhaps more time and money is spent on resolving virus?

Hoaxes

Is a professional association that focuses on auditing, control, and security and whose membership comprises both technical and managerial professionals?

ISACA

What actions are performed in a computer that is infected with a virus?

Malicious

What has become a widely accepted evaluation standard for training and education related to the security of information systems?

NSTISSI No. 4011

Which security addresses the issues necessary to protect the tangible items, objects, or areas of an organization from unauthorized access and misuse?

Physical

. A short-term decrease in electrical power availability is known as a(n)?

SAG

Which data file contains the hashed representation of the user's password?

SAM

Web hosting services are usually arranged with an agreement defining minimum service levels known as a(n)?

SLA

What program can reveal data transmitted on a network segment, including passwords, the embedded and attached files—such as word-processing documents—and sensitive data transmitted to or from applications?

Sniffer program

Is a technique used to gain unauthorized access to computers, wherein the intruder sends messages with a source IP address that has been forged to indicate that the messages are coming from a trusted host?

Spoofing

Are malware programs that hide their true nature and reveal their designed behavior only when activated?

Trojan Horse

What was detected in the famous study entitled "Protection Analysis: Final Report" regarding OS security?

Vulnerabilities

Is a form of collective data that relates to a group or category of people and that has been altered to remove characteristics or components that make it possible to identify individuals within the group?

Aggregate Information

What type of attack a server would experience when a hacker compromises it to acquire information via a remote location using a network connection?

Direct

Is the unauthorized taking of personally identifiable information with the intent of committing fraud or another illegal or unethical purpose?

Identity Theft

The protection of the confidentiality, integrity, and availability of information assets, whether in storage, processing, or transmission, via the application of policy, education, training and awareness, and technology is known as?

Information Security

The Health Insurance Portability and Accountability Act of 1996 was also know as?

Kennedy-Kessebaum Act

Which are the rules that mandate or prohibit certain behavior and are enforced by the government?

Laws

The protection of tangible items, objects, or areas from unauthorized access and misuse is known as?

Physical Security

Guidelines that dictate certain behavior within an organization are known as?

Policies

A table of hash values and their corresponding plaintext values that can be used to look up password values if an attacker is able to steal a system's encrypted password file is known as a(n)?

Rainbow table

Is any technology that aids in gathering information about a person or organization without their knowledge?

Spyware

A methodology and formal development strategy for the design and implementation of an information system is referred to as a?

System development life cycle

What is a potential risk to an information asset?

Threat

What is a potential weakness in an asset or its defensive control(s)?

Vulnerability

What threat may be able to deposit copies of itself onto all Web servers that the infected system can reach, so that users who subsequently visit those sites become infected.?

Worm


Set pelajaran terkait

Udvariassági kifejezések - orosz

View Set

Blood Administration NCLEX Practice Questions, NUR 211 Blood Transfusion NCLEX Questions, 1- blood nclex, 6-NCLEX Medication/IV Calculations, 5-Part 1: Medications/Blood IV therapy PN NCLEX Oct, 4-Module 8: Pharmacology and Intravenous Therapies, 3-S...

View Set

Kansas Property and Casualty Laws

View Set

Anthropology 101 2002 CSN Essentials of Cultural Anthropology Chapter 3

View Set