暗記メーカー
ログイン
Information Assurance and Security
  • Cristy Vega

  • 問題数 51 • 10/11/2023

    記憶度

    完璧

    7

    覚えた

    20

    うろ覚え

    0

    苦手

    0

    未解答

    0

    アカウント登録して、解答結果を保存しよう

    問題一覧

  • 1

    It is the quality or state of being secure-to be free from danger.

    Security

  • 2

    layers of security that protect physical items, objects, or areas from unauthorized access and misuse.

    Physical Security

  • 3

    To protect the individual or group of individuals who are authorized to access the organization and its operations

    Personnel Security

  • 4

    To protect the details of a particular operation or series of activities

    Operations Security

  • 5

    to protect communications media, technology, and content

    Communications Security

  • 6

    to protect networking components, connections, and contents

    Network Security

  • 7

    to protect the confidentiality, integrity and availability of information assets, whether in storage, processing, or transmission.

    Information Security

  • 8

    Meaning of CNSS

    Committee on National Security Systems

  • 9

    Provides a graphical representation of the architectural approach widely used in computer and information security, it is known as the _______.

    McCumber Cube

  • 10

    It is much more than computer hardware; it is the entire set of software, hardware, data, people, procedures, and networks that make possible the use of information resources in the organization.

    Information System

  • 11

    A component of the IS comprises applications, operating systems, and assorted command utilities. ______ is perhaps the most difficult IS component to secure.

    Software

  • 12

    The physical technology that houses and executes the software, stores and transports the data, and provides interfaces for the entry and removal of information from the system.

    Hardware

  • 13

    Data stored, processed, and transmitted by a computer system must be protected. ______ is often the most valuable asset possessed by an organization and it is the main target of intentional attacks.

    Data

  • 14

    Though often overlooked in computer security considerations, _____ have always been a threat to information security. ______ can be the weakest link in an organization’s information security program.

    People

  • 15

    _______ are written instructions for accomplishing a specific task. When an unauthorized user obtains an organization’s procedures, this poses a threat to the integrity of the information.

    Procedures

  • 16

    The IS component that created much of the need for increased computer and information security is networking. When information systems are connected to each other to form local area networks (LANs), and these LANs are connected to other networks such as the Internet, new security challenges rapidly emerge.

    Networks

  • 17

    SDLC range from having phases?

    3 to 12

  • 18

    It illustrates that each phase begins with the results and information gained from the previous stage.

    Waterfall model

  • 19

    Information security can begin as a grassroots effort in which systems administrators attempt to improve the security of their systems. This is often referred to as a _______.

    bottom-up approach

  • 20

    The _____________ —in which the project is initiated by upper-level managers who issue policy, procedures and processes, dictate the goals and expected outcomes, and determine accountability for each required action—has a higher probability of success.

    top-down approach

  • 21

    The first phase, _________, is the most important. What problem is the system being developed to solve? The _______ phase begins with an examination of the event or plan that initiates the process.

    investigation

  • 22

    begins with the information gained during the investigation phase. This phase consists primarily of assessments of the organization, its current systems, and its capability to support the proposed systems.

    Analysis

  • 23

    the information gained from the analysis phase is used to begin creating a systems solution for a business problem. In any systems solution, it is imperative that the first and driving factor is the business need.

    Logical Design

  • 24

    specific technologies are selected to support the alternatives identified and evaluated in the logical design. The selected components are evaluated based on a make-or-buy decision (develop the components in-house or purchase them from a vendor).

    physical design

  • 25

    any needed software is created. Components are ordered, received, and tested. Afterward, users are trained and supporting documentation created.

    Implementation

  • 26

    The _________is the longest and most expensive phase of the process. This phase consists of the tasks necessary to support and modify the system for the remainder of its useful life cycle.

    maintenance and change

  • 27

    It is an object, person, or other entity that presents an ongoing danger to an asset.

    threat

  • 28

    It is an act that takes advantage of a vulnerability to compromise a controlled system.

    Attack

  • 29

    It is an identified weakness in a controlled system, where controls are not present or are no longer effective.

    vulnerability

  • 30

    It includes the execution of viruses, worms, Trojan horses, and active Web scripts with the intent to destroy or steal information.

    malicious code

  • 31

    A more devious attack on computer systems is the transmission of a virus hoax with a real virus attached.

    Hoaxes

  • 32

    Using a known or previously unknown and newly discovered access mechanism, an attacker can gain access to a system or network resource through a back door

    Back Doors

  • 33

    Attempting to reverse-calculate a password is often called cracking. A cracking attack is a component of many dictionary attacks (to be covered shortly). It is used when a copy of the Security Account Manager (SAM) data file, which contains hashed representation of the user’s password, can be obtained.

    Password Crack

  • 34

    The application of computing and network resources to try every possible password combination is called a ________attack. Since the ______attack is often used to obtain passwords to commonly used accounts, it is sometimes called a password attack.

    Brute Force

  • 35

    The ______is a variation of the brute force attack which narrows the field by selecting specific target accounts and using a list of commonly used passwords (the dictionary) instead of random combinations.

    Dictionary

  • 36

    In a ________ attack, the attacker sends a large number of connection or information requests to a target. So many requests are made that the target system becomes overloaded and cannot respond to legitimate requests for service. The system may crash or simply become unable to perform ordinary functions.

    denial-of-service (DoS)

  • 37

    A _________ is an attack in which a coordinated stream of requests is launched against a target from many locations at the same time. Most DDoS attacks are preceded by a preparation phase in which many systems, perhaps thousands, are compromised.

    distributed denial-of-service (DDoS)

  • 38

    In the well-known _______ or TCP hijacking attack, an attacker monitors (or sniffs) packets from the network, modifies them, and inserts them back into the network. This type of attack uses IP spoofing to enable an attacker to impersonate another entity on the network.

    man-in-the-middle

  • 39

    ______ is unsolicited commercial e-mail. While many consider spam a trivial nuisance rather than an attack, it has been used as a means of enhancing malicious code attacks.

    Spam

  • 40

    Another form of e-mail attack that is also a DoS is called a_____, in which an attacker routes large quantities of e-mail to the target.

    mail bomb

  • 41

    A ______ is a program or device that can monitor data traveling over a network. _______ can be used both for legitimate network management functions and for stealing information.

    Sniffer

  • 42

    It is the process of using social skills to convince people to reveal access credentials or other valuable information to the attacker.

    social engineering

  • 43

    It is an attempt to gain personal or financial information from an individual, usually by posing as a legitimate entity. ______ attacks use three primary techniques, often in combination with one another: URL manipulation, Web site forgery, and phone phishing.

    Phishing

  • 44

    _______ is “the redirection of legitimate Web traffic (e.g., browser requests) to an illegitimate site for the purpose of obtaining private information. _______ often uses Trojans, worms, or other virus technologies to attack the Internet browser’s address bar so that the valid URL typed by the user is modified to that of the illegitimate Web site.

    Pharming

  • 45

    A _______explores the contents of a Web browser’s cache and stores a malicious cookie on the client’s system.

    timing attack

  • 46

    : Keep the design as simple and small as possible.

    Economy of mechanism

  • 47

    : Base access decisions on permission rather than exclusion.

    Fail-safe defaults

  • 48

    : Every access to every object must be checked for authority.

    Complete mediation

  • 49

    : The design should not be secret, but rather depend on the possession of keys or passwords.

    Open design

  • 50

    : Where feasible, a protection mechanism should require two keys to unlock, rather than one.

    Separation of privilege

  • 51

    : Every program and every user of the system should operate using the least set of privileges necessary to complete the job.

    Least privilege