IS3230 CHAPTER 5 Flashcards

1
Q

A confirmed event that compromises the confidentiality, integrity, or availability of information is called ___.

A

BREACH

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Requires a business operating in California to notify customers when it has reason to believe that personal information has been disclosed through unauthorized access is called ___.

A

CALIFORNIA IDENTITY THEFT STATUTE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

A federal criminal statute designed to protect electronic data from theft is called ___.

A

COMPUTER FRAUD AND ABUSE ACT (CFAA)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

A method of scrambling data for security purposes. Published in 1974, it has since been broken and is no longer considered highly secured is called ___.

A

DATA ENCRYPTION STANDARD (DES) ENCRYPTION

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

A US copyright law that enacts criminal penalties for breaking or distributing technology designed to break digital rights management technologies is called ___.

A

DIGITAL MILLENNIUM COPYRIGHT ACT (DMCA)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Random data that is used as the basis for an encryption algorithm. The randomness of this data provides an additional layer of security to the encryption is called ___.

A

HASH SALT

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

The method used to store passwords up to 15 characters in Windows operating systems prior to Window Vista is called ___.

A

LAN MANAGER (LM) HASH

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

A challenge-response authentication protocol used by NT servers when using the Server Message Block (SMB) protocol is called ___.

A

NTLM HASH

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

A comprehensive process for determining the privacy, confidentiality, and security risks associated with the collection, use, and disclosure of personal information. It also describes the measures used to mitigate, and if possible, eliminate identified risks is called ___.

A

PRIVACY IMPACT ASSESSMENT (PIA)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

An ID badge with an embedded radio frequency identification chip. This chip can store information about the badge holder, such as authentication information and security access levels is called ___.

A

RADIO FREQUENCY IDENTIFICATION (RFID) BADGES

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

An encrypted password database used in Unix and Linus operating systems is called ___.

A

SHADOW PASSWORD

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

A group of 188 nations that have signed treaties to protect intellectual property across national borders is called ___.

A

WORLD INTELLECTUAL PROPERTY ORGANIZATION (WIPO)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q
  1. Information security falls strictly under the jurisdiction of federal law–state law does not restrict information security practices.
    TRUE OR FALSE
A

FALSE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q
  1. The two primary federal law that are concerned with information security are the Digital Millennium copyright Act and the ____.
A

Computer Fraud and Abuse Act

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q
  1. Which federal law discussed in the chapter allows civil actions to be brought against individuals who sell passwords?
  2. CFAA
  3. DMCA
  4. DCMA
  5. CFFA
A

CFAA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q
  1. Which federal law provides penalties for circumventing digital rights management?
  2. CFAA
  3. DMCA
  4. DCMA
  5. CFFA
A

DMCA

17
Q
  1. Which law discussed in the chapter is concerned with preventing identity theft?
  2. California Identity Theft Statute
  3. Federal Identity Theft Statute
  4. Idaho Identity Theft Statute
  5. Colorado Identity Theft Statute
A

California Identity Theft Statute

18
Q
  1. Which of the following are effective physical security policies?
  2. All physical security must comply with all applicable regulations such as building and fire codes.
  3. Access to secure computing facilities will be grand only to individuals with a legitimate business need for access
  4. All secure computing facilities that allow visitors must have an access log
  5. Visitors must be escorted at all times
  6. All the above
A

ALL THE ANSWERS

  1. All physical security must comply with all applicable regulations such as building and fire codes.
  2. Access to secure computing facilities will be grand only to individuals with a legitimate business need for access
  3. All secure computing facilities that allow visitors must have an access log
  4. Visitors must be escorted at all times
19
Q
  1. What are the two primary causes of access control failure discussed in the chapter? (More than one may apply)
  2. People
  3. Planning
  4. Technology
  5. Implementation
  6. Follow-up analysis
A

People.

Technology

20
Q
  1. Which of the following are types of security breaches? (Choose all that apply)
  2. System exploits
  3. DoS attacks
  4. PII
  5. Eavesdropping
  6. Social engineering
A

System exploits
DoS attacks

Eavesdropping
Social engineering

21
Q
  1. Anything from an organization’s operating system to its choice of Web browser or instant messaging client could be an access point for unauthorized access to the systems.
    TRUE OR FALSE
A

TRUE

22
Q
  1. When should a privacy impact assessment be performed?
  2. During the planning stages of a new system
  3. After a new system is designed
  4. After a new system is implemented
  5. After a security breach
A

During the planning stages of a new system

23
Q
  1. The two most common motives for a security breach are monetary gain and gain ____.
A

VANDALISM

24
Q
  1. A security breach can result in criminal penalties as well as financial losses.
    TRUE OR FALSE
A

TRUE