暗記メーカー
ログイン
IAS
  • ユーザ名非公開

  • 問題数 97 • 12/17/2024

    記憶度

    完璧

    14

    覚えた

    36

    うろ覚え

    0

    苦手

    0

    未解答

    0

    アカウント登録して、解答結果を保存しよう

    問題一覧

  • 1

    To protect the physical items, objects, ir areas of an organization from unauthorizes access and misuse.

    physical security

  • 2

    To protect the individual or group of individuals who are authorized to access the organization and its operations.

    personal security

  • 3

    To protect the details of a particular operation or series of activities

    operations security

  • 4

    To protect networking components, connections and contents

    network security

  • 5

    A subset of communications security; the protection of voice and data networking

    network security

  • 6

    Protection of the confidentiality, integrity, and availability of information assets, whether in storage, processing, or transmission, via the application of policy, education, training and awareness, and technology. The protection of information and its critical elements, including the systems and hardware that use, store, and transmit the information

    information security

  • 7

    The quality or state of being secure --- to be free from danger

    security

  • 8

    To protect information by putting it into a special code that only some people can read, especially information that is on a computer.

    encrypt

  • 9

    A subject or object's ability to use, manipulate, modify, or affect another subject or object. Authorized users have the legal access to a system. Access controls regulate this ability.

    Access

  • 10

    The organizational resource that is being protected. It can be logical, such as a Web site, software information, or data; or can be physical, such as a person, computer system, hardware, or other tangible object. It particularly information of it , are the focus of what security efforts are attempting to protect.

    asset

  • 11

    An intentional or unintentional act that can damage or otherwise compromise information and the systems that support it.

    attack

  • 12

    Someone who casually reads sensitive information not intended for his or her use.

    passive attack

  • 13

    A hacker attempting to break in to an information.

    intentional attack

  • 14

    Ex. A lightning strike that causes a building fire .

    unintentional attack

  • 15

    Perpetrated by a hacker using a PC to break into a system.

    direct attack

  • 16

    A hacker compromising a system using PC and using it to attack other system.

    indirect attack

  • 17

    It originate from the threat itself

    direct attack

  • 18

    It originate from a compromised system or resource that is malfunctioning or working under the control of a threat

    direct attacks

  • 19

    A technique used to compromise a system.

    exploit

  • 20

    It can be a documented process to take advantage of a vulnerability or exposure, usually in software, that is either inherent in the software or created by the attacker.

    exploit

  • 21

    It make use of existing software tools or custom made software components.

    exploit

  • 22

    A condition or state of being exposed in information security, it exists when a vulnerability is known to an attack.

    exposure

  • 23

    A single instance of an information asset suffering damage or destruction, unintended or unauthorized modification or disclosure, or denial of use when an organization's information is stolen.

    loss

  • 24

    The probability of an unwanted occurrence, such as an adverse event or loss.

    risk

  • 25

    Any event or circumstance that has the potential to adversely affect operations and assets.

    threat

  • 26

    The specific instance or a component of a threat

    threat agent

  • 27

    An occurrence of an event caused by a threat agent.

    threat event

  • 28

    A category of objects, people, or other entities that represents the origin of danger to an asset --- in other words, a category of threat agents.

    threat source

  • 29

    A potential weakness in an asset or its defensive control system.

    vulnerability

  • 30

    Characteristic of information that refers to how up to date information is.

    timeliness

  • 31

    Characteristic of information that refers to an attribute of information that describes how data is genuine or original rather than reproduced or fabricated.

    authenticity

  • 32

    Characteristic of information that refers to an attribute of information that describes how data is accessible and correctly formatted for use without interference or obstruction.

    availability

  • 33

    Characteristic of information that refers to an attribute that describes how data is protected from disclosure or exposure to unauthorized individuals or obstruction.

    confidentiality

  • 34

    Characteristic of information that refers to an attribute of information that describes how data is whole, complete and uncorrupted.

    integrity

  • 35

    Characteristic of information that refers to an attribute of information that describes how the data's ownership or control is legitimate or authorized.

    possession

  • 36

    Characteristic of information that refers to how data value or usefulness for an end purpose.

    utility

  • 37

    Characteristic of information that is free from mistakes or errors and has the value that the end user expects.

    accuracy

  • 38

    Component of information system that includes applications(programs) , OS, and assorted command utilities. Most difficult to secure.

    software

  • 39

    Component of information system that refers to the physical technology that houses and executes the software, stores and transports the data, and provides interfaces for the entry and removal of information from the system

    hardware

  • 40

    Component of information system that refers to what is stored, processed, and transmitted by a computer system must be protected. Often the most valuable asset of an organisation and therefore is the main target of intentional attacks.

    data

  • 41

    The weakiest link in an organisation's information security program.

    people

  • 42

    Component of information system that refers to the written instructions for accomplishing a specific task.

    procedures

  • 43

    Component of information system that created much of the need for increased computer and information security. When information systems are connected to each otherto form LANS

    networks

  • 44

    The protection of information and its critical elements including systems and hardware that use , store, and transmit that information.

    information security

  • 45

    The entire set of controls and safeguards, includ- ing policy, education, training and awareness, and technology, that the organization implements to protect the asset.

    protection profile or security posture

  • 46

    The industry standard for computer security; confidentiality, integrity, and availability.

    C.I. A Triad/ C.I.A Triangle

  • 47

    graphical representation of the architectural approach widely used in computer and information security; commonly shown as a cube composed of 3x3x3 cells, similarto a Rubik's Cube.

    Mc Cumber Cube

  • 48

    A methodology of establishing security policies and/or practices that is initiated by upper management.

    top-down approach

  • 49

    A method of establishing security policies and/or practices that begins as agrassroots effort in which systems administrators attempt to improve the security of their systems.

    bottom-up approach

  • 50

    A methodology for the design and implementation of an information system.

    SDLC

  • 51

    A formal approach to solving a problem based on a structured sequence of procedures.

    methodology

  • 52

    A type of SDLC in which each phase of the process "flows from" the information gained in the previous phase, with multiple opportunities to return to previous phases and make adjustments.

    waterfall model

  • 53

    A methodological approach to the development of software that seeks to build security into the development life cycle rather than address it at later stages. It attempts to intentionally create software free of vulnerabilities and provide effective, efficient software that users can deploy with confidence

    software assurance (SA)

  • 54

    When computer is used as an active tool to conduct attack

    subject

  • 55

    When computer is the entity being attacked.

    object

  • 56

    It is impossible to obtain perfect security

    true

  • 57

    It is a process, not an absolute

    true

  • 58

    Security between protection and availability should not be balanced

    false

  • 59

    To achieve balance, level of security must allow reasonable access

    true

  • 60

    The logical models are converted into Physical models and may include network maps and description of servers and other devices to be used in the system.

    physical design

  • 61

    The team assessess the feasibility of the proposed project and selects a development methodology.

    investigation

  • 62

    The team determines the user requirementfor the new system and develops logical models of the system

    analysis

  • 63

    The logical models developed during the second step are revised the ensure that the ew system will meet the user requirements identified in the first step.

    logical design

  • 64

    Continuously monitor the software for security risks.

    maintenance

  • 65

    Responsible for the security and use of a particular set of information.

    data ownership

  • 66

    Responsible for storage, maintenance, and protection.

    data custodian

  • 67

    End users who work with information and to protect their daily jobs supporting the mission of the organization.

    data users

  • 68

    A type of information security threat that uses social engineering to trick users into giving up confidential information

    Phishing

  • 69

    Malicious software that can steal information, delete files, deny access to data, or replicate itself.

    malware

  • 70

    A cyber security threat where an attacker holds a victim's computer system and data hostage, demanding payment before restoring access.

    ransomware

  • 71

    An object, person, or other entity that represents a constant danger to an asset

    threats

  • 72

    The ownership of ideas and control over the tangible or virtual representation of those idea.

    intellectual property

  • 73

    Attacks occur when an individual or group designs and deoloys software to attack a system.

    deliberate software attacks

  • 74

    Are software program that hide their true nature and reveal their designed behaviour only when activated

    trojan horses

  • 75

    Consists of segments of code that perform malicious actions.

    virus

  • 76

    It allows the attacker to access the system bat will with special privileges.

    backdoor or trap door

  • 77

    Is one that overtime changes the way ir appears to antivirus software programs making it undetectable by techniques that look for the pre-configured signatures.

    polymorphic threats

  • 78

    Situations where products or services are not delivered as expected.

    deviations in quality of service by service providers

  • 79

    A well known and briad category of electronic and human activities that can breach the confidentiality of information when unauthorized individual gains access to the information.

    espionage or trespass

  • 80

    Occurs with very little warning and are beyond control of people.

    forces of nature

  • 81

    Acts done with no malicious intent

    human error or failure

  • 82

    Occurs when an attacker or trusted insider steals information from a computer system and demands compensation for its return or for an agreement not to disclose it.

    information extortion

  • 83

    Destroy an asset or damage the image of an organization.

    sabotage or vandalism

  • 84

    Illegal taking of anothera proerty. Copied withou the owners content.

    theft

  • 85

    Occur when a manufacturer distributes equipment containing a known or unknown flaw.

    technical harware failures or errors

  • 86

    Outdated infrastructure can lead to unreliable and untrustworthy systems.

    technological obsolescene

  • 87

    Take advantage of a vulnerability to compromise a controlled system.

    attacks