IS3340 CHAPTER 1 Flashcards

1
Q

A management action, written policy, procedure, guideline, regulation, law, or rule of any kind is called ___?

A

ADMINISTRATIVE CONTROL

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Availability, Integrity, Confidentiality – goals of information security is called ___?

A

A-I-C TRIAD

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Any person or program that attempts to interact with a computer information system in an unauthorized manner is called ___?

A

ATTACKER

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Any person or program that possesses permission to access a resource is called ___?

A

AUTHORIZED USER

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

The assurance that requested information is available to authorized uses upon request is called?

A

AVAILABILITY

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

A collection of computer and network devices connected to one or more networks, generally for the purpose of fulfilling business functions is called ___?

A

COMPUTER ENVIRONMENT

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

The assurance that information can only be accessed and viewed by authorized users is called ___?

A

CONFIDENTIALITY

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

A control that repairs the effects of damage from an attack. This includes virus removal procedures, firewall table updates, and user authorization database updates and is called ___?

A

CORRECTIVE CONTROL

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

A security strategy that relies on multiple layers of security that require attackers to defeat multiple controls to access any protected resource is called ___?

A

DEFENSE IN DEPTH

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

A control that detects when an action has occurred. This includes smoke detectors, log monitors, and system audits and is called ___?

A

DETECTIVE CONTROL

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

An agreement between the software producer and the end user. It addresses issues regarding approved use and liability. This is called ___?

A

END USER LICENSE AGREEMENT (EULA)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

The practice of ensuring electronic information is safe from unauthorized use and accessible for authorized use is called ___?

A

INFORMATION SYSTEMS SECURITY

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

The assurance that information can be modified only by authorized users is called ___?

A

INTEGRITY

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

An alternate term for technical control is called ___?

A

LOGICAL CONTROL

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Software that is designed to infiltrate a target computer and make it do something the attacker has instructed it to do is called ___?

A

MALICIOUS SOFTWARE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

A device that limits access or otherwise protects a resource, such as a fence, door, lock, or fire extinguisher is called ___?

A

PHYSICAL CONTROL

17
Q

A control that stops an action before it occurs and includes locked doors, firewall rules, and user passwords is called ___?

A

PREVENTATIVE CONTROL

18
Q

Any exposure to a threat is called a ___?

A

RISK

19
Q

A mechanism used to protect information and related assets is called ___?

A

SECURITY CONTROL

20
Q

A device or process that limits access to a resource. Examples would be user authentication, antivirus software, and firewalls. This is called ___?

A

TECHNICAL CONTROL

21
Q

Any action that could lead to damage or loss is called ___?

A

THREAT

22
Q

Any person or program that does not possess permission to access a resource is called ___?

A

UNAUTHORIZED USER

23
Q

Any weakness that could allow a threat to be realized is called ___?

A

VULNERABILITY

24
Q

Standalone malicious software programs that actively transmit themselves, generally over networks, to infect other computers is called ___?

A

WORMS

25
Q
  1. Which of the following is the best description of the defense in depth strategy?
  2. Hiding protected resources behind multiple firewalls
  3. Using multiple layers of security controls to protect resources
  4. Fully securing the most important resources first
  5. Staying current on as many known attacks as possible
A

Using multiple layers of security controls to protect resources

26
Q
  1. What is the main goal of information security ?
  2. Protect information from unauthorized use
  3. Catch as many unauthorized uses as possible
  4. Protect information from unauthorized modification
  5. Stop anonymous users from accessing information
A

Protect information from unauthorized use

27
Q
  1. Does turning off a computer make the information it contains secure?
  2. Yes, because no unauthorized user can access information on a computer that is turned off
  3. No, because the information might be copied somewhere else
  4. Yes, because aggressive actions always result in more secure systems
  5. No, because secure data must still be available to authorized users
A

No, because secure data must still be available to authorized users

28
Q
  1. Which of the following is the best description of a security control?
  2. A mechanism to stop attacks before they occur
  3. A rule that defines acceptable use of a computer
  4. A mechanism that protects a resource
  5. A device that detects unusual activity
A

A mechanism that protects a resource

29
Q
  1. Which of the following could be classified as a logical control?
  2. Firewall
  3. Fence
  4. Acceptable use policy
  5. Smoke detector
A

Firewall

30
Q
  1. Which of the following could be classified as a detective control?
  2. Password
  3. Door
  4. Acceptable use policy
  5. Log monitor
A

Log monitor

31
Q
  1. Which of the tenets of information security must directly serves the needs of authorized users?
  2. Availability
  3. Integrity
  4. Confidentiality
  5. None of the above
A

Availability

32
Q
  1. Which of the tenets of information security is most related to the “need to know” property?
  2. Availability
  3. Integrity
  4. Confidentiality
  5. None of the above
A

Confidentiality

33
Q
  1. Where is the most likely place a database management system would run?
  2. Network device
  3. Server
  4. Thin client
  5. Thick client
A

Server

34
Q
  1. Which Microsoft Windows Server 2008 R2 edition would be most appropriate for large-scale deployment using extensive virtualization?
  2. Datacenter
  3. HPC
  4. Enterprise
  5. Web
A

Datacenter

35
Q
  1. According to the Microsoft EULA, what is the extent of the damages that can be recovered due to a Windows fault?
  2. Nothing
  3. The price paid for the software license
  4. Actual damages incurred
  5. Actual damages incurred plus the cost of the software license
A

The price paid for the software license

36
Q
  1. Which of the following is the best definition of a threat?
  2. Any exposure to damage
  3. A weakness that allow damage to occur
  4. An action that exploits a weakness
  5. Any action that could lead to damage
A

Any action that could lead to damage

37
Q
  1. What worm was released in 2001 and primarily defaced Web sites?
  2. SQL Slammer
  3. Conficker
  4. Code Red
  5. Melissa
A

Code Red

38
Q
  1. What term describes a malicious software program that users are tricked into running?
  2. Trojan horse
  3. Worm
  4. Virus
  5. Phishing message
A

Trojan horse

39
Q
  1. Which of the following defines the cycle used to address Window threats and vulnerabilities?
  2. Plan-do-review
  3. Discovery-analyze-remediation
  4. Design-implementation-verificatoin
  5. Detection-containment-eradication
A

Discovery-analyze-remediation