18.3 Security Measures and Business Continuity Planning Flashcards
Which of the following is a computer program that appears to be legitimate but performs some illicit activity when it is run?
A. Hoax virus.
B. Web crawler.
C. Trojan horse.
D. Killer application.
C. Trojan horse.
A Trojan horse is a computer program that appears friendly, for example, a game, but that actually contains an application destructive to the computer system.
Which of the following is used for Internet security as opposed to data transmissions over secured transmission lines?
A. Firewalls.
B. Mapping.
C. Parallel simulation.
D. Concurrency controls.
A. Firewalls.
Firewalls separate an internal network from an external network (such as the Internet) and prevent passage of specific types of traffic.
A company’s management is concerned about computer data eavesdropping and wants to maintain the confidentiality of its information as it is transmitted. The company should utilize
A. Data encryption.
B. Dial back systems.
C. Message acknowledgment procedures.
D. Password codes.
A. Data encryption.
The most effective preventive measure against unauthorized interception of data is encryption. Encryption technology converts data into a code. Unauthorized users may still be able to access the data, but without the encryption key, they will be unable to decode the information. Encryption technology may be either hardware or software based.
Which one of the following most compromises file retention as protection against loss or damage of master files?
A. Use of magnetic tape.
B. Inadequate ventilation.
C. Storing of all files in one location.
D. Failure to encrypt data.
C. Storing of all files in one location.
The offsite location where an organization’s computer backup files are kept must be temperature and humidity controlled and guarded against intrusion just as the main processing center is. Just as important, it must be geographically remote enough from the site of the organization’s main operations that it would not be affected by the same natural disaster. It does an organization no good to have sound backup procedures if the files are not accessible or have been destroyed.
A critical aspect of a disaster recovery plan is to be able to regain operational capability as soon as possible. In order to accomplish this, an organization can have an arrangement with its computer hardware vendor to have a fully operational facility available that is configured to the user’s specific needs. This is best known as a(n)
A. Uninterruptible power system.
B. Parallel system.
C. Cold site.
D. Hot site.
D. Hot site.
A disaster recovery plan may include a contract with an external contingency facility vendor. Depending on the organization’s needs, the contingency facility may be a hot site or a cold site. A hot site is an arrangement with a vendor for a fully operational facility that is configured to the user’s specific needs and that will be available within 24 hours. A hot site may also be fixed or portable and is recommended for an organization that cannot afford for its computer system to be down for even one day.
Managers at a consumer products company purchased personal computer software from only recognized vendors, and prohibited employees from installing nonauthorized software on their personal computers. To minimize the likelihood of computer viruses infecting any of its systems, the company should also
A. Restore infected systems with authorized versions.
B. Recompile infected programs from source code backups.
C. Institute program change control procedures.
D. Test all new software on a stand-alone personal computer.
D. Test all new software on a stand-alone personal computer.
Software from recognized sources should be tested in quarantine (for example, in a test/development machine or a stand-alone personal computer) because even vendor-supplied software may be infected with viruses. The software should be run with a vaccine program and tested for the existence of logic bombs, etc.
Spoofing is one type of online activity used to launch malicious attacks. Spoofing is
A. Trying large numbers of letter and number combinations to access a network.
B. Eavesdropping on information sent by a user to the host computer of a website.
C. Accessing packets flowing through a network.
D. Identity misrepresentation in cyberspace.
D. Identity misrepresentation in cyberspace.
Passwords, user account numbers, and other information may be stolen using techniques such as Trojan horses, IP spoofing, and packet sniffers. Spoofing is identity misrepresentation in cyberspace, for example, by using a false website to obtain information about visitors.
Attacks on computer networks may take many forms. Which of the following uses the computers of innocent parties infected with Trojan horse programs?
A. A distributed denial-of-service attack.
B. A man-in-the-middle attack.
C. A brute-force attack.
D. A password-cracking attack.
A. A distributed denial-of-service attack.
A denial-of-service (DoS) attack is an attempt to overload a system (e.g., a network or web server) with false messages so that it cannot function (a system crash). A distributed DoS attack comes from multiple sources, for example, the machines of innocent parties infected by Trojan horses. When activated, these programs send messages to the target and leave the connection open. A DoS may establish as many network connections as possible to exclude other users, overload primary memory, or corrupt file systems.
A company’s IT manager has been asked to ensure that the company’s data is protected in the event it is intercepted during transmission. Which one of the following is the best control to implement from the selection below?
A. Sequencing of messages
B. Encryption
C. Self-checking algorithms
D. Dedicated lines
B. Encryption
The Company, which deals in air travel, is about to create an Internet site to capture flight reservations and ticket payments. Which one of the following best demonstrates the inherent risks of the Internet?
A. Dependency on Internet service providers
B. Confidential information can be intercepted
C. Data formats are not typically standardized
D. The limited controls available to mitigate risks
B. Confidential information can be intercepted
A company is following a plan to continue operations if a place of business is affected by disasters. The plan is most likely called
A. Continuous availability planning
B. Business continuity planning
C. Strategic planning
D. Crisis communication planning
B. Business continuity planning
Business continuity planning is the continuation of business by other means during the period in which computer processing is unavailable or less than normal. A company creates a business continuity plan to prepare for disasters.
An owner of a company has entered into a contract with a hardware vendor ensuring that in the event of a disaster, the vendor would provide the company with computer equipment. The owner has also entered into a lease contract with a building owner ensuring that in the event of a disaster, the company will be provided with an empty floor in the building to allow for the continuation of its business. Which one of the following best describes this disaster recovery plan?
A. Mirrored data center
B. Recovery operations center
C. Cold site
D. Hot site
C. Cold site
A cold site is a shell facility lacking most infrastructure but readily available for the quick installation of hardware. Because the site in this case is empty but is prepared for the installation of new equipment, it is a cold site.
Encoding electronic data through the use of an algorithm to make information unreadable to unauthorized individuals is identified as
A. A firewall
B. A virus
C. A worm
D. Encryption
D. Encryption
Encryption converts data into code so that unauthorized users cannot read the data without using an encryption key.