CH 5 Flashcards

1
Q

Define spoofing.

A

An attempt to gain access to a network by posing as an authorized user in order to find sensitive information, such as passwords or credit card information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is the CIA triangle?

A

The three important aspects of computer and network security: confidentiality, integrity and availability.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are 3 examples of intentional computer and network threats?

A
  • Viruses
  • Worms
  • Trojan horse
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Define a Denial-of-Service (DoS) attack.

A

DoS floods a network or server with service requests to prevent legitimate users’ access to the system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are 3 recommendations in order to guard against social engineering threats?

A
  • Be careful with unsolicited emails and do not click on attachments
  • Be careful of requests for confidential information
  • Be cautious about requests that require prompt action
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are 5 examples of biometric devices and measures?

A
  • Facial recognition (only one that you do not have to opt-in)
  • Fingerprints
  • Iris analysis
  • Palm prints
  • Retinal scanning
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are 5 recommendations for establishing a comprehensive security system?

A
  • Set up a security committee with representatives from all departments as well as upper management.
  • Post the security policy in a visible place, or post copies next to all workstations.
  • Use physical security measures, such as corner bolts on workstations, ID badges and door locks.
  • Raise employees’ awareness of security problems.
  • Keep sensitive data, software, and printouts locked in secure locations.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is business continuity planning?

A

Outlines procedures for keeping an organization operational in the event of a natural disaster or network attack.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly