ITC 4600 Quiz #1

Ace your homework & exams now with Quizwiz!

List the steps that can be used as a basic blueprint for solving organizational problems.

1, Recognize and define the problem. 2. Gather facts and make assumptions. 3. Develop possible solutions. 4. Analyze and compare possible solutions. 5. Select, implement, and evaluate a solution.

A(n) _______ is an act against an asset that could result in a loss.

Attack

What is authentication? Provide some examples.

Authentication is the process by which a control establishes whether a user (or system) has the identity it claims to have. Examples include the use of cryptographic certificates to establish Secure Sockets Layer (SSL) connections as well as the use of cryptographic hardware devices—for example, hardware tokens such as RSA's SecurID. Individual users may disclose a personal identification number (PIN) or a password to authenticate their identities to a computer system.

A _________ overflow is an application error that occurs when the system can't handle the amount of data that is sent.

Buffer

Some information gathering techniques are quite legal—for example, using a Web browser to perform market research. These legal techniques are called, collectively, __________.

Competitive Intelligence

There are 12 general categories of threat to an organization's people, information, and systems. List at least six of the general categories of threat and identify at least one example of those listed.

Compromises to intellectual property Software attacks Deviations in quality of service Espionage or trespass Forces of nature Human error or failure Information extortion Sabotage or vandalism Theft Technical hardware failures or errors Technical software failures or errors Technological obsolescence

List and explain the critical characteristics of information as defined by the C.I.A. triad.

Confidentiality of information ensures that only those with sufficient privileges and a demonstrated need may access certain information. When unauthorized individuals or systems can view information, confidentiality is breached. Integrity is the quality or state of being whole, complete, and uncorrupted. The integrity of information is threatened when it is exposed to corruption, damage, destruction, or other disruption of its authentic state. Availability is the characteristic of information that enables user access to information without interference or obstruction and in a usable format.

Attempting to reverse-calculate a password or bypass encryption is called _________.

Cracking

ESD is the acronym for __________.

Electronic Discharge

Corruption of information can occur only while information is being stored. TRUE FALSE

FALSE

DoS attacks cannot be launched against routers TRUE FALSE

FALSE

The application of computing and network resources to try every possible combination of options of a password is called a dictionary attack. __________ TRUE FALSE

FALSE

"Shoulder spying" is used in public or semi-public settings when individuals gather information they are not authorized to have by looking over another individual's shoulder or viewing the information from a distance. TRUE FALSE

False

A device (or a software program on a computer) that can monitor data traveling on a network is known as a socket sniffer. TRUE FALSE

False

One form of e-mail attack that is also a DoS attack is called a mail spoof, in which an attacker overwhelms the receiver with excessive quantities of email. True False

False

The authorization process takes place before the authentication process. TRUE FALSE

False

The first step in solving problems is to gather facts and make assumptions TRUE FALSE

False

The macro virus infects the key operating system files located in a computer's start-up sector. __________ TRUE FALSE

False

The term phreaker is now commonly associated with an individual who cracks or removes software protection that is designed to prevent unauthorized duplication. __________ TRUE FALSE

False

When voltage levels lag (experience a momentary increase), the extra voltage can severely damage or destroy equipment. __________ TRUE FALSE

False

List the measures that are commonly used to protect the confidentiality of information.

Information classification Secure document (and data) storage Application of general security policies Education of information custodians and end users Cryptography (encryption)

In the __________ attack, an attacker monitors (or sniffs) packets from the network, modifies them, and inserts them back into the network.

Man-In-The-Middle Attack

What are the three distinct groups of decision makers or communities of interest on an information security team?

Managers and professionals in the field of information security Managers and professionals in the field of IT Managers and professionals from the rest of the organization

The three levels of planning are strategic planning, tactical planning, and __________ planning.

Operational

A(n) ______ hacks the public telephone network to make free calls or disrupt services.

Phreaker

List the specialized areas of security.

Physical security Operations security Communications security Network security

Duplication of software-based intellectual property is more commonly known as software ______.

Piracy

Discuss the planning element of information security.

Planning in InfoSec management is an extension of the basic planning model. Included in the InfoSec planning model are activities necessary to support the design, creation, and implementation of InfoSec strategies within the IT planning environment. The business strategy is translated into the IT strategy. Both the business strategy and the IT strategy are then used to develop the InfoSec strategy. For example, the CIO uses the IT objectives gleaned from the business unit plans to create the organization's IT strategy.

The set of organizational guidelines that dictates certain behavior within the organization is called __________.

Policy

List and explain the four principles of management under the contemporary or popular management theory. Briefly define each.

Popular management theory categorizes the principles of management into planning, organizing, leading, and controlling (POLC). The process that develops, creates, and implements strategies for the accomplishment of objectives is called planning. The management function dedicated to the structuring of resources to support the accomplishment of objectives is called organization. Leadership includes supervising employee behavior, performance, attendance, and attitude. Leadership generally addresses the direction and motivation of the human resource. Monitoring progress toward completion, and making necessary adjustments to achieve desired objectives, requires the exercise of control.

A momentary low voltage is called a(n)________.

Sag

_________ is unsolicited commercial email

Spam

Explain the differences between a leader and a manager.

The distinctions between a leader and a manager arise in the execution of organizational tasks. A leader provides purpose, direction, and motivation to those that follow. By comparison, a manager administers the resources of the organization. He or she creates budgets, authorizes expenditures, and hires employees.

A worm may be able to deposit copies of itself onto all Web servers that the infected system can reach, so that users who subsequently visit those sites become infected. TRUE FALSE

True

A(n) polymorphic threat is one that over time changes the way it appears to antivirus software programs, making it undetectable by techniques that look for pre-configured signatures. TRUE FALSE

True

The malicious code attack includes the execution of viruses, worms, Trojan horses, and active Web scripts with the intent to destroy or steal information. __________ TRUE FALSE

True

The use of cryptographic certificates to establish Secure Sockets Layer (SSL) connections is an example of which process? a.) Authentication b.) Authorization c.) Identification d.) Accountability

a.) Authentication

A process that defines what the user is permitted to do is known as _________. a.) Authorization b.) Identification c.) Authentication d.) Accountability

a.) Authorization

Which of the following is NOT a step in the problem-solving process? a.) Build support amongst management for the candidate solution b.) Analyze and compare possible solutions c.) Select, implement, and evaluate a solution d.) Gather facts and make assumptions

a.) Build support amongst management for the candidate solution

A technique used to compromise a system is known as a(n) ________. a.) Exploit b.) Threat c.) Vulnerability d.) Attack

a.) Exploit

As frustrating as viruses and worms are, perhaps more time and money is spent on resolving virus ______. a.) Hoaxes b.) Polymorphisms c.) Urban Legends d.) False Alarms

a.) Hoaxes

The protection of confidentiality, integrity, and availability of data regardless of its location is known as __________ security. a.) Information b.) Cyber c.) Network d.) Operational

a.) Information

The protection of voice and data components, connections, and content is known as __________ security. a.) Network b.) Cyber c.) National d.) Operational

a.) Network

The hash values for a wide variety of passwords can be stored in a database known as a(n) __________, which can be indexed and quickly searched using the hash value, allowing the corresponding plaintext password to be determined. a.) Rainbow Table b.) Rainbow Matrix c.) Poison Box d.) Unicorn Table

a.) Rainbow Table

Which of the following is NOT an approach to password cracking? a.) Ransomware b.) Dictionary attacks c.) Brute force d.) Social engineering attacks

a.) Ransomware

"4-1-9" fraud is an example of a _____ attack. a.) Social Engineering b.) Virus c.) Spam d.) Worm

a.) Social Engineering

The unauthorized duplication, installation, or distribution of copyrighted computer software, which is a violation of intellectual property, is called __________. a.) Software piracy b.) Data hijacking c.) Trademark violation d.) Copyright infringement

a.) Software piracy

__________ are malware programs that hide their true nature and reveal their designed behavior only when activated. a.) Trojan horses b.) Viruses c.) Worms d.) Spam

a.) Trojan Horses

A model of InfoSec that offers a comprehensive view of security for data while being stored, processed, or transmitted is the __________ security model. a.) USNA b.) CNSS c.) NPC d.) USMC

b.) CNSS

Which of the following is a C.I.A. triad characteristic that ensures only those with sufficient privileges and a demonstrated need may access certain information? a.) Authentication b.) Confidentiality c.) Availability d.) Authentication

b.) Confidentiality

Which of the following is not among the "deadly sins of software security"? a.) Networking sins b.) Extortion sins c.) Web Application sins d.) Implementation sins

b.) Extortion sins

A short-term interruption in electrical power availability is known as a __________. a.) Lag b.) Fault c.) Brownout d.) Blackout

b.) Fault

__________ is the collection and analysis of information about an organization's business competitors, often through illegal or unethical means, to gain an unfair edge over them. a.) Competitive advantage b.) Industrial espionage c.) Packet sniffing d.) Dumpster diving

b.) Industrial espionage

Which of the following is a C.I.A. triad characteristic that addresses the threat from corruption, damage, destruction, or other disruption of its authentic state? a.) Accountability b.) Integrity c.) Availability d.) Authentication

b.) Integrity

Which of the following is the first step in the problem-solving process? a.) Develop possible solutions. b.) Recognize and define the problem c.) Analyze and compare the possible solutions d.) Select, implement, and evaluate a solution

b.) Recognize and define the problem

Technology services are usually arranged with an agreement defining minimum service levels known as a(n) __________. a.) MLN b.) SLA c.) MSL d.) SSL

b.) SLA

Human error or failure often can be prevented with training and awareness programs, policy, and ________. a.) Outsourcing b.) Technical controls c.) ISO 27000 d.) Hugs

b.) Technical controls

Any event or circumstance that has the potential to adversely affect operations and assets is known as a(n) __________ a.) Exploit b.) Threat c.) Vulnerability d.) Attack

b.) Threat

Acts of _________ can lead to unauthorized real or virtual actions that enable information gatherers to enter premises or systems they have not be authorized to access. a.) Bypass b.) Trespass c.) Theft d.) Security

b.) Trespass

A ______ is an attack in which a coordinated stream of requests is launched against a target from many locations at the same time. a.) Spam b.) DDoS c.) Virus d.) Denial of Service

b.)DDos (Distributed Denial of Service)

A virus or worm can have a payload that installs a(n) _______ door or trap-door component in a system, which allows the attacker to access the system at will with special privileges

back

A hacker who intentionally removes or bypasses software copyright protection designed to prevent unauthorized duplication or use is known as a(n) _________. a.) Penetration Tester b.) Expert Hacker c.) Cracker d.) Phreaker

c.) Cracker

__________ is the set of responsibilities and practices exercised by the board and executive management with the goal of providing strategic direction, ensuring that objectives are achieved, ascertaining that risks are managed appropriately, and verifying that the enterprise's resources are used responsibly. a.) Leading b.) Controlling c.) Governance d.) Strategy

c.) Governance

Blackmail threat of informational disclosure is an example of which threat category? a.) Compromises of intellectual property b.) Sabotage or vandalism c.) Information extortion d.) Espionage or trespass

c.) Information extortion

An information security professional with authorization to attempt to gain system access in an effort to identify and recommend resolutions for vulnerabilities in those system is known as a(n) _______. a.) Phreaker b.) Expert Hacker c.) Penetration Tester d.) Cracker

c.) Penetration Tester

Which function of InfoSec management encompasses security personnel as well as aspects of the SETA program? a.) Projects b.) Protection c.) People d.) Policy

c.) People

Which of the following is the principle of management that develops, creates, and implements strategies for the accomplishment of objectives? a.) Organizing b.) Leading c.) Planning d.) Controlling

c.) Planning

Which of the following functions of information security management seeks to dictate certain behavior within the organization through a set of organizational guidelines? a.) People b.) Planning c.) Policy d.) Programs

c.) Policy

An attack that uses phishing techniques along with specialized forms of malware to encrypt the vitim's data files is known as ________. a.) Jailbreaking b.) Spam c.) Ransomware d.) Crypto Locking

c.) Ransomware

What do audit logs that track user activity on an information system provide? a.) Authorization b.) Authentication c.) Identification d.) Accountability

d.) Accountability

Force majeure includes all of the following EXCEPT: a.) Forces of nature b.) Acts of war c.) Civil disorder d.) Armed robbery

d.) Armed robbery

An intentional or unintentional act that can cause damage or otherwise compromise information and the systems that support it is known as a(n) _________. a.) Exploit b.) Threat c.) Vulnerability d.) Attack

d.) Attack

Which of the following is a feature left behind by system designers or maintenance staff that allows quick access to a system at a later time by bypassing access controls? a.) Hoax b.) Brute Force c.)DoS d.) Back Door

d.) Back door

According to the C.I.A. tria, which of the following is the most desirable characteristic for privacy? a.) Accountability b.) Integrity c.) Availability d.) Confidentiality

d.) Confidentiality

Which type of attack involves sending a large number of connection or information requests to a target? a.) Malicioius code b.) Brute force c.) Spear fishing d.) Denial of service(Dos)

d.) DoS

One form of online vandalism is __________, in which individuals interfere with or disrupt systems to protest the operations, policies, or actions of an organization or government agency. a.) Phreaking b.) Cyberhacking c.) Red Teaming d.) Hacktivism

d.) Hacktivism

Communications security involves the protection of which of the following? a.) The IT department b.) Radio handsets c.) People, physical assets d.) Media, technology, and content

d.) Media, technology, and content

Which of the following is the principle of management dedicated to the structuring of resources to support the accomplishment of objectives? a.) Controlling b.) Leading c.) Planning d.) Organization

d.) Organization

Which of the following is NOT a primary function of information security management? a.) Planning b.) Projects c.) Protection d.) Performance

d.) Performance

Which of the following is recognition that data used by an organization should only be used for the purposes stated by the information owner at the time it was collected? a.) Confidentiality b.) Availability c.) Accountability d.) Privacy

d.) Privacy

Which of the 12 categories of threats best describes a situation where the adversary removes data from a victim's computer? a.) Espionage or trespass b.) Sabotage or vandalism c.) Information extortion d.) Theft

d.) Theft

A potential weakness in an asset or ites defensive control system(s) is known as a(n)________. a.) Exploit b.) Threat c.) Attack d.) Vulnerability

d.) Vulnerability

Which statement defines the differences between a computer virus and a computer worm? a.) Worms and viruses are the same b.) Worms can make copies all by themselves on one kind of computer but viruses can make copies all by themselves on any kind of computer c.) Worms can copy themselves to computers and viruses can copy themselves to smartphones d.) Worms can make copies all by themselves but viruses need to attach to an existing program on the host computer to replicate

d.) Worms can make copies all by themselves but viruses need to attach to an existing program on the host computer to replicate


Related study sets

accounting 201 chapter nine smartbook

View Set

English-Literature, Reading Processes, and Skills, Questions

View Set

ES 342 Practice Test & Practice Questions Review

View Set

Latijn SPQR les 17 woorden (dikgedrukt)

View Set

Economics Chapter 11 Vocabulary: Dave Ramsey - Careers and Taxes

View Set