暗記メーカー
ログイン
IAS
  • ユーザ名非公開

  • 問題数 97 • 12/17/2024

    記憶度

    完璧

    14

    覚えた

    36

    うろ覚え

    0

    苦手

    0

    未解答

    0

    アカウント登録して、解答結果を保存しよう

    問題一覧

  • 1

    A methodology of establishing security policies and/or practices that is initiated by upper management.

    top-down approach

  • 2

    Any event or circumstance that has the potential to adversely affect operations and assets.

    threat

  • 3

    The object, person, or other entity that represents a constant danger to an assets

    threats

  • 4

    The quality or state of being secure --- to be free from danger

    security

  • 5

    Characteristic of information that refers to how up to date information is.

    timeliness

  • 6

    The logical models developed during the second step are revised the ensure that the ew system will meet the user requirements identified in the first step.

    logical design

  • 7

    Attacks occur when an individual or group designs and deoloys software to attack a system.

    deliberate software attacks

  • 8

    An object, person, or other entity that represents a constant danger to an asset

    threats

  • 9

    Continuously monitor the software for security risks.

    maintenance

  • 10

    It can be a documented process to take advantage of a vulnerability or exposure, usually in software, that is either inherent in the software or created by the attacker.

    exploit

  • 11

    Attack includes the execution of viruses, worms, trojans horses, and active web scriptswith the intent yo destroy or steal information

    malicious code

  • 12

    A condition or state of being exposed in information security, it exists when a vulnerability is known to an attack.

    exposure

  • 13

    The team assessess the feasibility of the proposed project and selects a development methodology.

    investigation

  • 14

    A type of SDLC in which each phase of the process "flows from" the information gained in the previous phase, with multiple opportunities to return to previous phases and make adjustments.

    waterfall model

  • 15

    The specific instance or a component of a threat

    threat agent

  • 16

    A technique used to compromise a system.

    exploit

  • 17

    Responsible for storage, maintenance, and protection.

    data custodian

  • 18

    Hacks the public telephone network

    phreaker

  • 19

    The entire set of controls and safeguards, includ- ing policy, education, training and awareness, and technology, that the organization implements to protect the asset.

    protection profile or security posture

  • 20

    Component of information system that refers to the written instructions for accomplishing a specific task.

    procedures

  • 21

    It exists when a vulnerability is known to an attack.

    exposure

  • 22

    Malicious software that can steal information, delete files, deny access to data, or replicate itself.

    malware

  • 23

    It originate from a compromised system or resource that is malfunctioning or working under the control of a threat

    direct attacks

  • 24

    Using social skills to convince people to reveal access credentials or other valuable info to the attacker.

    social engineering

  • 25

    End users who work with information and to protect their daily jobs supporting the mission of the organization.

    data users

  • 26

    A hacker that develops software scripts and codes. Usually a master of many skills. Often create attack software and share with others.

    expert

  • 27

    A subject or object's ability to use, manipulate, modify, or affect another subject or object. Authorized users have the legal access to a system. Access controls regulate this ability.

    Access

  • 28

    Occur when a manufacturer distributes equipment containing a known or unknown flaw.

    technical harware failures or errors

  • 29

    Component of information system that created much of the need for increased computer and information security. When information systems are connected to each otherto form LANS

    networks

  • 30

    Characteristic of information that refers to an attribute of information that describes how the data's ownership or control is legitimate or authorized.

    possession

  • 31

    When computer is used as an active tool to conduct attack

    subject

  • 32

    Characteristic of information that refers to an attribute of information that describes how data is whole, complete and uncorrupted.

    integrity

  • 33

    A hacker attempting to break in to an information.

    intentional attack

  • 34

    Illegal taking of anothera proerty. Copied withou the owners content.

    theft

  • 35

    The weakiest link in an organisation's information security program.

    people

  • 36

    A well known and briad category of electronic and human activities that can breach the confidentiality of information when unauthorized individual gains access to the information.

    espionage or trespass

  • 37

    A method of establishing security policies and/or practices that begins as agrassroots effort in which systems administrators attempt to improve the security of their systems.

    bottom-up approach

  • 38

    A hacker compromising a system using PC and using it to attack other system.

    indirect attack

  • 39

    Characteristic of information that refers to an attribute of information that describes how data is accessible and correctly formatted for use without interference or obstruction.

    availability

  • 40

    A methodological approach to the development of software that seeks to build security into the development life cycle rather than address it at later stages. It attempts to intentionally create software free of vulnerabilities and provide effective, efficient software that users can deploy with confidence

    software assurance (SA)

  • 41

    An intentional or unintentional act that can damage or otherwise compromise information and the systems that support it.

    attack

  • 42

    The team determines the user requirementfor the new system and develops logical models of the system

    analysis

  • 43

    To protect information by putting it into a special code that only some people can read, especially information that is on a computer.

    encrypt

  • 44

    To protect networking components, connections and contents

    network security

  • 45

    The probability of an unwanted occurrence, such as an adverse event or loss.

    risk

  • 46

    Characteristic of information that refers to how data value or usefulness for an end purpose.

    utility

  • 47

    A type of information security threat that uses social engineering to trick users into giving up confidential information

    Phishing

  • 48

    Characteristic of information that refers to an attribute that describes how data is protected from disclosure or exposure to unauthorized individuals or obstruction.

    confidentiality

  • 49

    A subset of communications security; the protection of voice and data networking

    network security

  • 50

    Component of information system that includes applications(programs) , OS, and assorted command utilities. Most difficult to secure.

    software

  • 51

    A single instance of an information asset suffering damage or destruction, unintended or unauthorized modification or disclosure, or denial of use when an organization's information is stolen.

    loss

  • 52

    When computer is the entity being attacked.

    object

  • 53

    Component of information system that refers to the physical technology that houses and executes the software, stores and transports the data, and provides interfaces for the entry and removal of information from the system

    hardware

  • 54

    Is one that overtime changes the way ir appears to antivirus software programs making it undetectable by techniques that look for the pre-configured signatures.

    polymorphic threats

  • 55

    To protect the individual or group of individuals who are authorized to access the organization and its operations.

    personal security

  • 56

    Protection of the confidentiality, integrity, and availability of information assets, whether in storage, processing, or transmission, via the application of policy, education, training and awareness, and technology. The protection of information and its critical elements, including the systems and hardware that use, store, and transmit the information

    information security

  • 57

    A potential weakness in an asset or its defensive control system.

    vulnerability

  • 58

    A cyber security threat where an attacker holds a victim's computer system and data hostage, demanding payment before restoring access.

    ransomware

  • 59

    The ownership of ideas and control over the tangible or virtual representation of those idea.

    intellectual property

  • 60

    A formal approach to solving a problem based on a structured sequence of procedures.

    methodology

  • 61

    Someone who casually reads sensitive information not intended for his or her use.

    passive attack

  • 62

    Perpetrated by a hacker using a PC to break into a system.

    direct attack

  • 63

    An individual who cracks or removes protected design to prevent unauthorized duplication

    cracker

  • 64

    Consists of segments of code that perform malicious actions.

    virus

  • 65

    It make use of existing software tools or custom made software components.

    exploit

  • 66

    Outdated infrastructure can lead to unreliable and untrustworthy systems.

    technological obsolescene

  • 67

    The logical models are converted into Physical models and may include network maps and description of servers and other devices to be used in the system.

    physical design

  • 68

    An occurrence of an event caused by a threat agent.

    threat event

  • 69

    Occurs with very little warning and are beyond control of people.

    forces of nature

  • 70

    graphical representation of the architectural approach widely used in computer and information security; commonly shown as a cube composed of 3x3x3 cells, similarto a Rubik's Cube.

    Mc Cumber Cube

  • 71

    It allows the attacker to access the system bat will with special privileges.

    backdoor or trap door

  • 72

    Hackers of limited skills. Use expert written software to exploit a system. Do not usually fully understand the systems they hack.

    script kiddies

  • 73

    The organizational resource that is being protected. It can be logical, such as a Web site, software information, or data; or can be physical, such as a person, computer system, hardware, or other tangible object. It particularly information of it , are the focus of what security efforts are attempting to protect.

    asset

  • 74

    Ex. A lightning strike that causes a building fire .

    unintentional attack

  • 75

    A category of objects, people, or other entities that represents the origin of danger to an asset --- in other words, a category of threat agents.

    threat source

  • 76

    Situations where products or services are not delivered as expected.

    deviations in quality of service by service providers

  • 77

    To achieve balance, level of security must allow reasonable access

    true

  • 78

    It is impossible to obtain perfect security

    true

  • 79

    Occurs when an attacker or trusted insider steals information from a computer system and demands compensation for its return or for an agreement not to disclose it.

    information extortion

  • 80

    Security between protection and availability should not be balanced

    false

  • 81

    To protect the details of a particular operation or series of activities

    operations security

  • 82

    Are software program that hide their true nature and reveal their designed behaviour only when activated

    trojan horses

  • 83

    To protect the physical items, objects, ir areas of an organization from unauthorizes access and misuse.

    physical security

  • 84

    Acts done with no malicious intent

    human error or failure

  • 85

    Component of information system that refers to what is stored, processed, and transmitted by a computer system must be protected. Often the most valuable asset of an organisation and therefore is the main target of intentional attacks.

    data

  • 86

    Explores the contents of a web browser's cache and store

    timing attack

  • 87

    The industry standard for computer security; confidentiality, integrity, and availability.

    C.I. A Triad/ C.I.A Triangle