CIS 377 MIDTERM

Ace your homework & exams now with Quizwiz!

cold

A ___________ site provides only rudimentary services and facilities.

security clearance scheme

A ____________________ assigns a status level to employees to designate the maximum level of classified data they may access.

True

A firewall can be configured to disallow certain types of incoming traffic that may be attacking.

vulnerability

A potential weakness in an asset or its defensive control system(s) is known as a(n) ____________________.

expectancy

A single loss _______________ is the calculation of the value associated with the most likely loss from an attack.

exploit

A technique used to compromise a system is known as a(n) __________________.

True

A worm may be able to deposit copies of itself onto all Web servers that the infected system can reach, so that users who subsequently visit those sites become infected.

False

A worm requires that another program is running before it can begin functioning.

worm

A(n) _____________ is a malicious program that replicates itself constantly without requiring another program environment.

threat

A(n) _____________ is a potential risk to an information asset.

polymorphic

A(n) ________________ threat is one that over time changes the way it appears to antivirus software programs, making it undetectable by techniques that look for preconfigured signatures

hot

A(n) __________________ site is a fully configured computer facility with all services, communications links, and physical plant operations provided, including heating and air conditioning.

vulnerability

A(n) ____________________ is a potential weakness in an asset or its defensive control(s).

attack

A(n) _____________________ is an act against an asset that could result in a loss.

information

A(n) _______________________ system is the entire set of people, procedures, and technology that enable business to use information

support the mission of the organization, require a comprehensive and integrated approach, and be cost effective

According to NIST SP 800-14's security principles, security should _______________________________________________________________________.

ethical

An organization may hire a _____________ hacker to find all the vulnerabilities in their system so that it can be patched before someone takes advantage of it

asset

An organizational resource that is being protected is sometimes logical, such as a Web site, software information, or data. Sometimes the resource is physical, such as a person, computer system, hardware, or other tangible object. Either way, the resource is known as a(n) ________________________.

threat

Any event or circumstance that has the potential to adversely affect operations and assets is known as a(n) _____________________.

True

As an organization grows, it must often use more robust technology to replace the security technologies it may have outgrown.

forensics

Computer _________________ is the process of collecting, analyzing, and preserving computer-related evidence.

everyone in the organization

Computer security is generally considered to be the responsibility of...?

True

Confidentiality ensures that only those with the rights and privileges to access information are able to do so

False

Digital evidence is not volatile.

True

During the early years of computing, the primary threats to security were physical theft of equipment, espionage against the products of the systems, and sabotage

True

Experts consider Romania the country with the strictest cybercrime laws

True

False Blocking ICMP packets may help prevent denial-of-service attacks.

False

Frequently the first responder to a computer crime is the network administrator.

education

Human error or failure often can be prevented with training, ongoing awareness activities, and ______________________________.

black hat

If you use public WIFI and someone gets your email password and logs into your email. That individual is a ____________________Hacker

denial-of-service

In a ____________________ attack, the attacker sends a large number of connection or information requests to disrupt a target from a small number of sources.

Chain of custody

In a computer forensics investigation, what describes the route that evidence takes from the time you find it until the case is closed or goes to court?

True

In the U.S. no providers of critical infrastructures have sustained a cyber-attack.

man-in-the-middle

In the ____________________ attack, an attacker monitors (or sniffs) packets from the network, modifies them, and inserts them back into the network.

True

In the attack on the US Power grid in 2017, malware was planted, fake resumes with tainted attachments were used.

social engineering

In the context of information security, _______________________ is the process of using social skills to convince people to reveal access credentials or other valuable information to the attacker.

True

In the early years of computing, if security was addressed at all, it dealt only with the physical security of the computers themselves and not the data or connections between the computers.

integrity

Information has __________________ when it is whole, complete, and uncorrupted.

False

Information security can be an absolute

True

Malware is a generic term for software that has a malicious purpose

True

Most computer criminals are not really "criminals".

Business Continuity

Of the various types of mitigation plans, the ___________________________ plan is the most strategic and long-term, as it focuses on the steps to ensure the continuation of the organization

top-down

Of various approaches to information security implementation, the _________________ approach has a higher probability of success.

True

One form of e-mail attack that is also a DoS attack is called a mail bomb, in which an attacker overwhelms the receiver with excessive quantities of e-mail.

hacktivist

One form of online vandalism is ___________________ operations, which interfere with or disrupt systems to protest the operations, policies, or actions of an organization or government agency

True

Power grids are a major target for foreign actors.

control

Risk _____________ is the application of security mechanisms to reduce the risks to an organization's data and information systems.

True

Risk control is the application of controls that reduce the risks to an organization's information assets to an acceptable level.

insurance premiums

Risk management helps you do all of the following except:

cookie

Software code known as a(n) ____________ can allow an attacker to track a victim's activity on Web sites.

False

The Health Insurance Portability and Accountability Act of 1996 requires government agencies to identify sensitive systems, conduct computer security training, and develop computer security plans

IR

The __________ plan specifies the actions an organization can and should take while an adverse event is in progress. An adverse event could result in loss of an information asset or assets, but it does not currently threaten the viability of the entire organization.

boot

The __________________ virus infects the key operating system files located in a computer's start-up sector.

Chief Information Security Officer (CISO)

The _____________________ is the individual primarily responsible for the assessment, management, and implementation of information security in the organization.

risk identification

The first phase of risk management is ____________________.

the people

The most valuable organizational asset is ___________________________.

physical security

The protection of tangible items, objects, or areas from unauthorized access and misuse is known as _____________________________.

pharming

The redirection of legitimate user Web traffic to illegitimate Web sites with the intent to collect personal information is known as _________________________.

People

The weakest link in a security chain is:

Black hat hackers

These individuals hack for malicious reasons or personal gain. They do not have permission from the entity.

Grey Hat

These individuals hack without permission but not for malicious reasons.

True

To achieve balance—that is, to operate an information system that satisfies the user and the security professional—the security level must allow reasonable access, yet protect against threats

True

To achieve defense in depth, an organization must establish multiple layers of security controls and safeguards.

True

To determine if the risk to an information asset is acceptable or not, you estimate the expected loss the organization will incur if the risk is exploited.

investigate allegations of digital malfeasance and perform root cause analysis

Two purposes of digital forensics:

mitigating damage

What are the objectives of emergency actions taken at the beginning stage of a disaster? Preventing injuries, loss of life, and ....

Name, social security number, data and place of birth, mother's maiden name

What is an example of Personal Identifiable Information (PII)?

False

When electronic information is stolen, the crime is readily apparent.

standards of due care

When organizations adopt security measures for a legal defense, they may need to show that they have done what any prudent organization would do in similar circumstances. This is referred to as _________________________.

Confidentiality

When unauthorized individuals or systems can view information, ______________ is breached.

DR

_________ plans usually include all preparations for the recovery process, strategies to limit losses during the disaster, and detailed steps to follow when the smoke clears, the dust settles, or the flood waters recede.

Hardware

________________ is the physical technology that houses and executes the software, stores and transports the data, and provides interfaces for the entry and removal of information from the system

Availability

____________________ enables authorized users—people or computer systems—to access information without interference or obstruction and to receive it in the required format.

Risk Management

_____________________ involves three major undertakings: risk identification, risk assessment, and risk control.

Spyware

_____________________ is any technology that aids in gathering information about a person or organization without their knowledge.

Shoulder surfing

_______________________ is used in public or semi-public settings when individuals gather information they are not authorized to have by looking over another individual's shoulder or viewing the information from a distance.

Trojan Horses

______________________________ are malware programs that hide their true nature and reveal their designed behavior only when activated.

Cyberterrorism

______________________________ is the premeditated, politically motivated attacks against information, computer systems, computer programs, and data that result in violence against noncombatant targets by subnational groups or clandestine agents.


Related study sets

POPLHLTH 206 L9 - Nutrition in Infancy

View Set

Romanticism, Victorianism, and Modernism Test

View Set

week 3 Sherpath: Female Reproductive System

View Set

Chapter 48: Caring for Clients with Ostomies

View Set

Grade 10 - Chemistry - Atomic Structure Basic

View Set