Ch. 3 Flashcards

1
Q

smishing

A

another variation of phishing that involves the use of texting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

vishing

A

similar to smishing except that the victims receive a voice-mail message telling them to call a phone number or access a website

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

cyberterrorism

A

intimidation of government or civilian population by using information technology to disable critical national infrastructure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

CIA Triad

A

Confidentiality, integrity, and availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

reasonable assurance (in connection with IT security)

A

recognizes that managers must use their judgment to ensure that the cost of control does not exceed the system’s benefits or the risks involved.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

key elements of the network security layer

A

Authentication methods, a firewall, routers, encryption, proxy servers, VPN, and an IDS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

key elements of the application security layer

A

Authentication methods, user roles and accounts, and data encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

key elements of the end-user security layer

A

Security education, authentication methods, antivirus software, and data encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What actions must be taken in the event of a successful security intrusion

A

The response plan should address notification, evidence protection, activity log maintenance, containment, eradication, and follow-up

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

blended threat

A

sophisticated threat that combines the features of a virus, worm, Trojan horse, and other malicious code into a single payload.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

managed security service provider (MSSP)

A

company that monitors, manages, and maintains computer and network security for other organizations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly