Prelim Exam Flashcards

ewan

1
Q

Accepted from an Authority, usually cultural ore religious.

A

MORAL

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Is easier and conflicts are limited when people share convictions

A

Cooperation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Provides the framework in which company’s employees are to act in response to various:

A

Policy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Is a separate matter from ethics.

A

LAW

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Are an integral part of any culture:

A

Standards and values

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Positive or Negative Leadership:

A

Ethical Leadership

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Keep system away from the intruders:

A

Motivation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Opinion or perceptions officially written and share among employees.

A

Formal Ethics

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

All companies should have this to drive the policies it sets

A

ETHICS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Describe a body of information that is either not written down or poorly documented.

A

INFORMAL ETHICS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Responsibility for Vulnerability Reproduction.

A

VENDOR COORDINATION

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Product reviews from programmers of the vendor.

A

AWARE POTENTIAL VICTIMS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Detecting and Fixing product vulnerabilities.

A

PATCH DEVELOPMENT

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

The Black Hat community.

A

VULNERABILITY ISSUES AND ORGANIZATIONS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Instilling public fear with full disclosure.

A

ETHICAL DUTY TO WARN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

To allow customers of a vendor product ample time to protect their systems from exploitation and attack.

A

RESPONSIBLE DISCLOSURE

17
Q

Is the use of electronic messaging system to send unsolicited messages.

A

SPAMMING

18
Q

A business policy that permits employees to use their mobile devices.

A

BRING YOUR OWN
DEVICE (BYOD)

19
Q

is one in which a malicious hacker takes over computers via the internet and causes them to flood a target site.

A

DISTRIBUTED DENIAL-OF-SERVICE (DDoS) ATTACK

20
Q

The primary goal is to minimize that period of time to reduce the occurrence of attack.

A

GOVERNMENT DISCLOSURE

21
Q

ENUMERATION:
SPAM EMAIL HACKING VIRUS WORMS TROJAN_HORSE DISTRIBUTED DENIAL OF SERVICE_DDoS
ROOTKIT PHISHING MALWARE SPYWARE SPOOFING ADWARE PASSWORD_ATTACK
CRYPTO_JACKING INSIDER_THREAT SMISHING VISHING

A

spam
hacking
virus
worms
trojans horse
ddos
rootkit
malware
phishing
smishing
vishing

22
Q

DISADVANTEGES OF VULNERABILITY NON-DISCLOSURE

  • LEAKED OR SIMULTANEOUSLY DISCOVERED
  • NO PRESSURE FOR S/W VENDORS
  • CROSSING THE AUDIT LINE TOO FAR
  • DISCLOSURE REFERRAL FEES
  • RECEIVING GIFTS AS AN AUDITOR
  • NOT DISCOVERED PUBLICLY ADMINS DO NOT HAVE OPPORTUNITY
  • RELATIONSHIPS WITH MANAGEMENT
  • DIVULGING AUDIT INFORMATION TO THE COMPETITION
  • DIFFICULTY OF SELECTING TRUSTED INDIVIDUALS
A
  • LEAKED OR SIMULTANEOUSLY DISCOVERED
  • NOT DISCOVERED PUBLICY ADMINS DO NOT HAVE OPPORTUNITY
  • NO PRESSURE FOR S/W VENDORS
  • DIFFICULTY OF SELECTING TRUSTED INDIVIDUALS