Add to folder Introducing jonathanlewisforcongress.com Folders! Find out how you can intelligently organize your Flashcards.

You are watching: ________ is a technique for intercepting computer communications.

Flag





Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;


*
*

When someone pretends to be a legitimate company and sends an email requesting confidential data, such as credit card numbers, this is known as ________.

. hawking

. spoofing

. phishing

. sniffing


A subversive technique for intercepting computer communications is ________.

. sniffing

. spoofing

. phishing

. pretexting


________ is a term for when someone causes deception by pretending to be someone else.

. Hacking

. Pretexting

. Sniffing

. Phishing


________ intercept wireless traffic at will in areas where users are on devices with wireless internet connections on unprotected networks.

. Drive-by spoofers

. Drive-by pretexters

. Drive-by phishers

. Drive-by sniffers


When a person gains unauthorized access to a computer system, he or she is said to be ________.

. hacking

. phishing

. sniffing

. spoofing


________ present the largest risk for infrastructure loss.

. Thefts

. Terror attacks

. Human mistakes

. Natural disasters


Which of the following exemplifies a technical safeguard?

. authentication

. key escrow

. helpdesk policies

. password management


Which of the following is an example of a human safeguard?

. password management

. digital signatures

. botnets

. authentication


Which of the following is NOT an example of a data safeguard?

. storage in an encrypted form

. SSL

. key escrow

. physical security


A security policy concerning the use of computers at work for personal business would be an example of a ________.

. system-specific policy

. data policy

. issue-specific policy

. human-resources policy


A security policy determining which customer data from the order entry system will be shared with other companies is an example of a ________ policy.

. system-specific

. data

. issue-specific

. human-resources


The term ________ refers to threats and consequences that we know about.

. knowledge

. hedge

. risk

. indemnity


________ is the first step in risk management.

. Evaluating the results of the risk management process

. Reducing the likelihood of a threat

. Assessing the threats

. Creating perfect hedges to mitigate the risks


________ refers to the probability that a given asset will be compromised by a given threat, despite the safeguards.

. Likelihood

. Uncertainty

. Consequence

. Vulnerability


Which of the following is NOT a reason for public companies to develop and follow a disaster recovery plan?

. requirement to do so

. good management practice

. minimization of organizational interruption

. prevention of data theft


Since no safeguard is ironclad, there is always a ________ risk that the safeguard will not protect the assets in all circumstances.

. residual

. diversifiable

. portfolio

. process


________ refers to the recording and analysis of keystrokes.

. Theft

. Eavesdropping

. Hacking

. Sniffing


A critical security function that requires the involvement of senior-management is ________.

. safeguarding computer hardware and software

. planning responses to security incidents

. establishing the security policy

. managing the security program on a real-time basis


Which of the following is NOT a type of data which should be backed up by IT staff?

. account data

. data on employees" computers

. website resources

. databases


Which of the following attitudes about backing up user computers will most often prevent data loss occurrences?

. Backups should be performed right before traveling in case a laptop is stolen or damaged.

. Data should be backed up at the same time each week.

. Backups are most important when you are not planning to use the computer for a few days.

. Users should follow a plan so that in the event of loss or system failure, all critical data are accessible and uncompromised.

See more: I Miss My Ex So Much It Hurts, How To Tell Your Ex You Miss Her ?


. Users should follow a plan so that in the event of loss or system failure, all critical data are accessible and uncompromised.


*
jonathanlewisforcongress.com has partnered with the National Tutoring Associatitop top Claim your access
"cdnAssetsUrl":"","site_dot_caption":"jonathanlewisforcongress.com","premium_user":false,"premium_set":true,"payreferer":"clone_set","payreferer_set_title":"Quiz 12","payreferer_url":"/flashcards/copy/quiz-12-7421055","isGuest":true,"ga_id":"UA-272909-1","facebook":"clientId":"363499237066029","version":"v2.9","language":"en_US"