Exam 2 Flashcards

1
Q

What is a type of law that represents all that apply to a citizen (or subject) of a jurisdiction? (Single Choice) *
* criminal law
* private law
* civil law
* public law

A
  • civil law
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is the type of law that addresses violations harmful to society and that is enforced by prosecution by the state? (Single Choice) *
* criminal law
* private law
* public law
* civil law

A
  • criminal law
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which law regulates the role of the healthcare industry in protecting the privacy of individuals? (Single Choice) *
* Gramm-Leach-Bliley Act of 1999 (GLB or GLBA)
* Freedom of Information Act of 1966 (FOIA)
* Health Insurance Portability and Accountability Act of 1996 (HIPAA)
* Computer Fraud and Abuse Act of 1986 (CFAA)

A
  • Health Insurance Portability and Accountability Act of 1996 (HIPAA)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

The generally recognized term for the government protection afforded to intellectual property (written and electronic) is called which of the following?(Single Choice) *
* computer security law
* copyright law
* aggregate information
* data security standards

A
  • copyright law
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

The cornerstone of many current federal computer-related criminal laws is the Computer Fraud and Abuse Act of 1986? (Single Choice) *
* True
* False

A
  • True
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Regardless of what information a company manages, it is shielded from local and state laws and regulations because the federal laws supersede them? (Single Choice) *
* True
* False

A
  • False
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Which of the following is an American contribution to an effort to improve copyright protection internationally? (Single Choice) *
* Agreement on Trade-Related Aspects of Intellectual Property Rights (TRIPS)
* Digital Millennium Copyright Act (DMCA)
* Privacy and Electronic Communications Regulations of 2003
* Telecommunications Act of 1997

A
  • Digital Millennium Copyright Act (DMCA)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Payment Card Industry ______ Standards are designed to enhance the security of customers’ payment card account data? (Single Choice) *
* data safety
* data security
* data practices
* account security

A
  • data security
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

The ______ attempts to prevent trade secrets from being illegally shared?(Single Choice) *
* Electronic Communications Privacy Act
* Financial Services Modernization Act
* Sarbanes-Oxley Act
* Economic Espionage Act

A
  • Economic Espionage Act
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

According to the National Information Infrastructure Act of 1996, the severity of the penalty for computer crimes depends on the value of the information obtained and whether the offense is judged to have been committed for each of the following except? (Single Choice) *
* for purposes of commercial advantage
* for private financial gain
* to harass
* in furtherance of a criminal act

A
  • to harass
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

The method by which systems determine whether and how to admit users into a trusted area of the organization is known as which of the following? (Single Choice) *
* attribute
* accountability
* access control
* auditability

A
  • access control
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Which term is used to describe the process of validating a supplicant’s purported identity? (Single Choice) *
* accountability
* authentication
* authorization
* biometrics

A
  • authentication
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

The authentication factor “something a supplicant has” relies upon individual characteristics, such as fingerprints, palm prints, hand topography, hand geometry, or retina and iris scans? (Single Choice) *
* True
* False

A
  • False
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

The biometric technology criteria that describes the number of legitimate users who are denied access because of a failure in the biometric device is known as which of the following? (Single Choice) *
* false reject rate
* false accept rate
* crossover error rate
* accountability rate

A
  • false reject rate
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What type of firewall examines every incoming packet header and can selectively filter packets based on header information, such as destination address, source address, packet type, and other key information? (Single Choice)*
* packet filtering
* proxy server
* media access control (MAC) layer
* application

A
  • packet filtering
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Which type of firewall filtering allows the firewall to react to an emergent event and update or create rules to deal with the event? (Single Choice) *
* static
* stable
* unstable
* dynamic

A
  • dynamic
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

All traffic exiting from the trusted network should be filtered? (Single Choice) *
* True
* False

A
  • False
18
Q

A network filter that allows administrators to restrict access to external content from within a network is known as which of the following? (Single Choice)*
* content filter
* dynamic filter
* static filter
* stateful filter

A
  • content filter
19
Q

Which VPN technology uses circuits from a service provider and conducts packet switching over these leased circuits? (Single Choice) *
* secure VPN
* hybrid VPN
* trusted VPN
* transport VPN

A
  • trusted VPN
20
Q

What is used to dial every number in a configured range and checks to see if a person, answering machine, or modem picks up? (Single Choice) *
* war dialer
* number redialer
* modem redialer
* incident redialer

A
  • war dialer
21
Q

Which of the following is an event that triggers alarms when no actual attacks are in progress? (Single Choice) *
* evasion
* false positive
* false attack stimulus
* false negative

A
  • false attack stimulus
22
Q

The process of adjusting an IDPS to maximize its efficiency in detecting true positives while minimizing false positives and false negatives is known as which of the following? (Single Choice) *
* tuning
* filtering
* clustering
* footprinting

A
  • tuning
23
Q

In which IDPS control strategy are all IDPSs control functions implemented and managed in a central location? (Single Choice) *
* centralized control strategy
* fully distributed control strategy
* partially distributed control strategy
* network-based control strategy

A
  • centralized control strategy
24
Q

What term is used to describe decoy systems designed to lure potential attackers away from critical systems? (Single Choice) *
* trap
* honeypot
* trace
* sniffer

A
  • honeypot
25
Q

A wireless security toolkit should include the ability to sniff wireless traffic, scan wireless hosts, and assess the level of privacy or confidentiality afforded on the wireless network? (Single Choice) *
* True
* False

A
  • True
26
Q

What is a network tool that collects copies of packets from the network and analyzes them? (Single Choice) *
* footprint
* router
* network trap
* packet sniffer

A
  • packet sniffer
27
Q

A scanner that listens in on a network and identifies vulnerable versions of both server and client software is known as which of the following? (Single Choice) *
* port scanner
* active vulnerability scanner
* sniffer
* passive vulnerability scanner

A
  • passive vulnerability scanner
28
Q

Which of the following terms are used to describe organized research of the internet addresses owned or controlled by the target organization? (Single Choice) *
* fingerprinting
* trapping
* tracing
* footprinting

A
  • footprinting
29
Q

Which type of IDPS resides on a computer or appliance connected to a segment of an organization’s network and monitors traffic on that segment looking for indications of on-going or successful attacks? (Single Choice) *
* network-based IDPS
* host-based IDPS
* wireless NIDPs
* attack surface IDPS

A

network-based IDPS

30
Q

What detection method examines the system or network data for patterns that match known attack signatures? (Single Choice) *
* anomaly-based detection
* knowledge-based detection
* protocol stack verification
* log file monitor (LFM)

A
  • knowledge-based detection
31
Q

Which step of the systems development life cycle (SDLC) reviews issues with a current system and establishes the requirements of the new system being created?
a. maintenance and change
b. investigation
c. analysis
d. physical design

A

c. analysis

32
Q

When reviewing the Microsoft SDL (System Development Lifecycle), what is the final phase of their plan where an incident response plan is executed?
a. response
b. verification
c. design
d. training

A

a. response

33
Q

What is the situation called when a project manager spends more time adjusting a project management software file than focusing on the project itself?
a. project creep
b. projectitis
c. task delegation
d. strategic project management

A

b. projectitis

34
Q

When changing a security blueprint, training employees is not included as part of the process.
A. True
B. False

A

B. False

35
Q

Major tasks that are part of a work breakdown structure (WBS) are known as subtasks.
A. True
B. False

A

A. True

36
Q

Which layer of the bulls-eye model should information security projects focus the most on?
a. networks
b. policies
c. systems
d. applications

A

a. networks

37
Q

Which changeover strategy should be used when transitioning from an old system to a new system gradually?
a. direct
b. pilot
c. phased
d. parallel

A

c. phased

38
Q

Which consideration is focused on the selection of equipment and services for a project?
a. staffing
b. organizational feasibility
c. procurement
d. scope

A

c. procurement

39
Q

The parallel operations conversion strategy often involves running two systems concurrently.
a. True
b. False

A

a. True

40
Q

The Center for Internet Security (CIS) outlines three categories of control to detect, prevent, respond to, and mitigate damage from attacks: Basic, Foundational, and Organizational.
a. True
b. False

A

a. True