Shared Flashcard Set

Details

Chapter 1
Test and Review
40
Computer Networking
06/12/2012

Additional Computer Networking Flashcards

 


 

Cards

Term

 

Access is ____________________.

 

Definition
A) a subject or an object's ability to use, manipulate, modify or affect another subject or object.
Term

A threat is _________________________.

 

Definition

B) a category of objects, persons, or other entities that represents a danger to an asset

Term

Vulnerability is _____________________________.

 

Definition

D) a weekness or fault in a system or protection mechanism

Term

What are the three components of the C.I.A triangle

 

Definition

A) Integrity, Confidentiality, Availability

Term

In Information Security, accuracy is the quality or state of being genuine or original.

 

Definition

B) False

Term

In Information Security, Integrity is when an information is whole, complete, and uncorrupted.

 

Definition

A) True

Term

Each of the following is a component of an Information System except ________________.

 

Definition

C) analysis

Term

Each of the following is a phase of a Security System Development Life Cycle except _________.

 

Definition

D) management

Term

Which one of the following is NOT an advantage of the bottom-up approach of the implementation of Information Security?

 

Definition

B) Participant support

Term

Which one of the following is NOT an advantage of the top-down approach of the implementation of Information Security

 

Definition

D) Technical expertise

Term

Data custidians are responsible for storage, maintenance, and protection of the information.

 

Definition

A) True

Term

Which one of the following is not a member of an Information Security Project Team?

 

Definition

D) Everybody

Term

 

A community of interest is a group of individuals who are united by similar interests or values within an organization.

 

Definition
A) True
Term

Who has primary responsibility for the assessment, management, and implementation of information security in the organization.

 

Definition

B) CISO

Term

Which one of the following sentence is NOT true?

 

Definition

C) Information security is technology only.

Term

Information Security is an art and science.

 

Definition

A) True

Term

Confidentiality is _____________________.

 

Definition

B) when information is protected from disclosure or exposure to unauthorized individuals or systems.

Term

Operations security is used to protect which of the following?

 

Definition

C) The details of a particular operation or series of activities.

Term

Phishing is when an attacker attempts to obtain personal or financial information using fraudulent means, most often by posing as another individual or organization.

 

Definition

A) True

Term

Availability is the quality or state of ownership or control.

 

Definition

B) False

Term

Of the two approaches to information security implementation, the top-down approach has a higher probability of success.

 

Definition

A) True

Term

Information has redundancy when it is free from mistakes or errors and it has the value that the end user expects.

 

Definition

B) False

Term

In information security, salami theft occurs when an employee steals a few pieces of information at a time, knowing that taking more would be noticed — but eventually the employee gets the whole thing.

 

Definition

A) True

Term

The ____ model consists of 6 general phases.

 

Definition

C) waterfall

Term

Hardware is the physical technology that houses and executes the software, stores and carries the data, and provides interfaces for the entry and removal of information from the system.

 

Definition

A) True

Term

Information security can begin as a grassroots effort in which systems administrators attempt to improve the security of their systems. This is often referred to as a bottom-up approach.

 

Definition

A) True

Term

____ of information is the quality or state of being genuine or original.

 

Definition

A) Authenticity

Term

A computer is the ____ of an attack when it is used to conduct the attack.

 

Definition

A) subject

Term

The primary threats to security during the early years of computers were physical theft of equipment, espionage against the products of the systems, and sabotage.

 

Definition

A) True

Term

 

In file hashing, a file is read by a special algorithm that uses the value of the bits in the file to compute a single large number called a(n) ____ value.

 

Definition
B) hash
Term

Which of the following is a valid type of data ownership?

 

Definition

D) All of the above

Term

A methodology increases the probability of success.

 

Definition

A) True

Term

Key end users should be assigned to a developmental team, known as the united application development team.

 

Definition

B) False

Term

Organizations are moving toward more ____-focused development approaches, seeking to improve not only the functionality of the systems they have in place, but the confidence of the consumer in their product.

 

Definition

A) security

Term

Which of the following phases is the longest and most expensive phase of the systems development life cycle?

 

Definition

D) maintenance and change

Term

 

Information security can be an absolute.

 

Definition
B) False
Term

An E-mail virus involves sending an e-mail message with a modified field.

 

Definition

B) False

Term

The value of information comes from the characteristics it possesses.

 

Definition

A) True

Term

A breach of possession always results in a breach of confidentiality.

 

Definition

B) False

Term

____ is the origin of today’s Internet.

 

Definition

B) ARPANET