Busy. Please wait.
Log in with Clever
or

show password
Forgot Password?

Don't have an account?  Sign up 
Sign up using Clever
or

Username is available taken
show password

Your email address is only used to allow you to reset your password. See our Privacy Policy and Terms of Service.


Already a StudyStack user? Log In

Reset Password
Enter the associated with your account, and we'll email you a link to reset your password.

Information Security Test

Enter the letter for the matching Definition
incorrect
1.
The Security and Freedom through Encryption Act of 1999
incorrect
2.
identity theft
incorrect
3.
1. Protecting the organization’s ability to function 2. Enabling the safe operation of applications running on the organization’s IT systems 3. Protecting the data the organization collects and uses 4. Safeguarding the organization’s technology assets
incorrect
4.
open design
incorrect
5.
availability
incorrect
6.
bot
incorrect
7.
The Sarbanes-Oxley Act of 2002
incorrect
8.
information leakage
incorrect
9.
economy of mechanism
incorrect
10.
compliance
incorrect
11.
separation of privilege
incorrect
12.
exploit
incorrect
13.
vulnerability
incorrect
14.
Computer Security Act of 1987
incorrect
15.
Economic Espionage Act in 1996
incorrect
16.
email spoofing
incorrect
17.
logical design
incorrect
18.
software assurance
incorrect
19.
size and scope
incorrect
20.
physical design
A.
_____ is when an organization must be able to demonstrate that the employee agreed to comply with the policy through act or affirmation. Common techniques include logon banners or signed document indicating agreement to comply with policy.
B.
An attempt on a system or other information asset by using it illegally for their personal gain or a documented process to take advantage of a vulnerability or exposure, usually in software
C.
_____ provides guidance on the use of encryption and provides protection from government intervention.
D.
_____ is one of the most common methods of obtaining inside and classified information is directly or indirectly from an individual, usually an employee.
E.
____ is the act of sending an e-mail message with a modified field and is a problem for many people today because often the modified field is the address of the originator
F.
To protect American ingenuity, intellectual property, and competitive advantage, Congress passed the _____. This law attempts to prevent trade secrets from being illegally shared.
G.
An approach to software development that includes planning for security objectives in the systems development lifecyle used to create systems with procedures and software deployed in a secure fashion is called _____.
H.
_____ enables authorized users—persons or computer systems—to access information without interference or obstruction and to receive it in the required format
I.
Commonplace security principle that says: where feasible a protection mechanism should require two keys to unlock, rather than one
J.
_____ was one of the first attempts to protect federal computer systems by establishing minimum acceptable security practices.
K.
The Federal Trade Commission (FTC) describes _____ is “occurring when someone uses your personally identifying information, like your name, Social Security number, or credit card number, without your permission, to commit fraud or other crimes.”
L.
To perform effectively, organizations must employ secure infrastructure services appropriate to the _____ of the enterprise.
M.
_____ affects the executive management of publicly traded corporations and public accounting firms. This law seeks to improve the reliability and accuracy of financial reporting.
N.
A weaknesses or fault in a system or protection mechanism that opens it to attack or damage.
O.
Commonplace security principle that says: Keep the design as simple and small as possible
P.
A ____ is an automated software program that executes certain commands when it receives a specific input.
Q.
Commonplace security principle that says: the design should not be secret but rather dependent on the possession of keys or passwords
R.
Information security performs four important functions for an organization. They are:
S.
During the _____ phase, specific technologies are selected to support the alternatives identified and evaluated in the logical design. This phase integrates various components and technologies.
T.
In the _____ phase, the information gained from the analysis phase is used to begin creating a systems solution for a business problem.
Type the Term that corresponds to the displayed Definition.
incorrect
21.
An intentional or unintentional act that can cause damage to or otherwise compromise information and/or the systems that support it
incorrect
22.
Commonplace security principle that says: minimize shared variables common to more than one user and depended on by all users
incorrect
23.
When an attacker changes the expected location of a file by intercepting and modifying a program code call, the attacker can force a program to use files other than the ones the program is supposed to use. This is called ______.
incorrect
24.
A computer _____ consists of segments of code that perform malicious actions. The code attaches itself to an existing program and takes control of that program’s access to the targeted computer.
incorrect
25.
The specific instance or a component of a threat. All hackers in the world present a collective threat but one single hacker is a _____.
incorrect
26.
_____ comprises a wide variety of laws that govern a nation or state and deal with the relationships and conflicts between organizational entities and people.
incorrect
27.
_____ is the process of using social skills to convince people to reveal access credentials or other valuable information to the attacker.
incorrect
28.
The classic perpetrator of espionage or trespass is the _____. They are “people who use and create computer software [to] gain access to information illegally.”
incorrect
29.
To achieve balance and to operate an information system that satisfies the user and the security professional, the security level must allow _____, yet protect against threats
incorrect
30.
_____ are irregularities in Internet service, communications, and power supplies that can dramatically affect the accessibility of information and systems.

Embed Code - If you would like this activity on your web page, copy the script below and paste it into your web page.

  Normal Size     Small Size show me how
Created by: kimberjingle
Popular Computers sets