







Study with the several resources on Docsity
Earn points by helping other students or get them with a premium plan
Prepare for your exams
Study with the several resources on Docsity
Earn points to download
Earn points by helping other students or get them with a premium plan
Community
Ask the community for help and clear up your study doubts
Discover the best universities in your country according to Docsity users
Free resources
Download our free guides on studying techniques, anxiety management strategies, and thesis advice from Docsity tutors
A range of cybersecurity topics, including malware, denial-of-service attacks, information disclosure, and various security safeguards. It discusses the importance of security policies, employee screening, and technical measures like anti-virus software, firewalls, and encryption. The document also addresses common security threats such as phishing, spoofing, and drive-by sniffing, as well as the responsibilities of senior management in establishing security policies. Overall, this document provides a comprehensive overview of fundamental cybersecurity concepts and best practices for protecting computer systems and networks from various threats.
Typology: Exams
1 / 13
This page cannot be seen from the preview
Don't miss anything!
Enforcement consists of three interdependent factors: (1) responsibility, (2) accountability, and (3) ________. - ANS compliance One aspect of security programs is how an organization establishes ________ that provide checks and balances for the people in charge of sensitive data and applications. - ANS controls ________ programs can be installed on the user's computer without the user's knowledge or permission. - ANS Spyware Some new operating systems offer a feature called ________, which remembers your data once you enter it the first time and authenticates you to other machines in the network. - ANS single sign-on Operating systems today have the capability to ________ users to multiple networks and servers. - ANS authenticate Fingerprints and facial features are used to provide authentication for ________ security devices. - ANS biometric A(n) ________ must be entered when using a smart card in order to provide authentication. - ANS PIN
A(n) ________ has a microchip, which is loaded with authenticating data. - ANS smart card An organization's security ________ has three components: senior management involvement, safeguards, and an incident response. - ANS program A computer ________ is a program that infiltrates networks and generates so much artificial traffic that it virtually shuts down the network for legitimate traffic.
The sources of security problems are human error, malicious activity, and ________. - ANS disasters When an incident is reported, ________ is (are) of the essence. - ANS speed A security incident reporting plan should ________ all incident reports. - ANS centralize A company establishes data rights and responsibilities and educates employees on how to backup and recover the database, but the company still needs to address the ________ safeguards. - ANS technical Hardening is actually a(n) ________ safeguard. - ANS technical Enforcement consists of ________ interdependent factors. - ANS 3 User accounts should be given (the) ________ to perform their jobs. - ANS least possible privileges needed _______ is an organization-wide function that is in charge of developing data policies and enforcing data standards. - ANS data administration
After installing anti-virus and anti-spyware, what is the best way to avoid malware? - ANS Don't open email attachments from unknown sources. Adware is ________ than spyware. - ANS more benign Security policy establishment is the responsibility of - ANS senior management If you suspect an organization has inappropriately disclosed your personal information to a 3rd party, you can lodge a complaint with - ANS Office of Privacy Comissioner of Canada The popularity and efficacy of search engines like Google have created a source of
When an employee notices a virus on his machine, the ________ plan should specify what to do. - ANS incident response A ________ is a remote processing centre run by a commercial disaster-recovery service that provides all the equipment needed to continue operations after a disaster. - ANS hot site Computing infrastructure should be located in ________ buildings designed to house expensive and critical equipment. - ANS fire-resistant Firewalls produce ________ of their activities, which include lists of all dropped packets, and attempts to gain unauthorized access. - ANS logs Because they kept giving out passwords to users who claimed to have forgotten them, ________ were a serious security risk in the organization. - ANS help desks ________ are (is) the primary means of authentication. - ANS passwords The existence of ________ user accounts is a serious security threat. - ANS unused Some of the biggest security threats are from ________ employees. - ANS disgruntled
The best way to safeguard a web site from public users is to ________ the web site against an attack. - ANS harden When an employee is terminated, system administrators should receive advance notice so they can - ANS remove accounts and passwords A company should clearly define the security ________ for each position. - ANS responsibilities ________ considerations should be part of the hiring process. - ANS security In order to prioritize their activities and protect an organization from possible risk and loss, security personnel must document the position ________ of all employees. - ANS sensitivity ________ safeguards involve the people and procedure components of information systems. - ANS human ________ to (for) the physical computers that run the DBMS and all devices that store database data should be carefully controlled. - ANS access Organizations should store at least some of the ________ of the database contents off the premises, possibly in a remote location. - ANS backups
About 90 percent of all viruses are spread via - ANS email Bloggers have not yet had much of an impact on the mainstream media. (T/F) - ANS F Backup and recovery, passwords, and encryption are human safeguards. (T/F) - ANS F Backup and recovery, passwords, and encryption are human safeguards. (t/f) - ANS F Backup and recovery, passwords, and encryption are human safeguards. (t/f) - ANS F The best safeguard against a natural disaster is to have a safe location. (t/f) - ANS T If you ever receive notification that your password has been reset when you did not request a reset, immediately contact your IS department. (t/f) - ANS T Help desks have not been the source of many security problems in the past. (t/f) - ANS F Help desks have not been the source of many security problems in the past. (t/f) - ANS T
Care must be taken when terminating employees because they may take harmful and malicious actions. (t/f) - ANS T Even if a potential new hire will not have access to sensitive data and systems, they should be extensively screened for security purposes. (t/f) - ANS T To protect against lost or sabotaged encryption keys, a trusted party should keep a copy of the key. (t/f) - ANS T Data safeguards are designed to protect computer networks. (t/f) - ANS F Most anti-malware programs check e-mail attachments for malware code. - ANS T Malware is used in denial-of-service attacks. (t/f) - ANS F Encryption is one of several technical safeguards.(t/f) - ANS T Encryption is one of several technical safeguards.(t/f) - ANS T Technical safeguards involve the hardware and software components of an information system. (t/f) - ANS T
People who intentionally gain unauthorized access to computer systems are called hackers. (t/f) - ANS T Spoofing is a technique for intercepting computer communications. (t/f) - ANS F Phishing is when someone sends an email pretending to be a legitimate company and asking for confidential data, such as account numbers.(t/f) - ANS T