100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.2 TrustPilot
logo-home
Exam (elaborations)

Information Security Midterm Exam (ISM 4323) 119 Questions with Verified Answers,100% CORRECT

Rating
-
Sold
-
Pages
11
Grade
A+
Uploaded on
26-03-2024
Written in
2023/2024

Information Security Midterm Exam (ISM 4323) 119 Questions with Verified Answers Information Security is becoming increasingly important because of - CORRECT ANSWER The increasing criticality of information to individuals and organizations Many users are vulnerable to - CORRECT ANSWER Stolen usernames and passwords from a compromised site being used to compromise their bank accounts The biggest time-consuming activity for most information security professionals is - CORRECT ANSWER Researching new technologies Desired competencies for information security professionals include all of the following except - CORRECT ANSWER Marketing A desired competency for information security professionals is - CORRECT ANSWER End user awareness As the use of personal devices for work has increased, the work of information security professionals has - CORRECT ANSWER Increased Information security professional report spending a lot of time on - CORRECT ANSWER Researching new technologies The Internet is relevant for information security because - CORRECT ANSWER It exposed computers to attacks from around the world The gang of 414 is famous in the information security literature for - CORRECT ANSWER Intruding into a number of high profile computer installations Windows 95 is important to information security for - CORRECT ANSWER Popularizing computers among the masses HIPAA is important to information security for - CORRECT ANSWER Driving demand for information security in a large sector of the U.S economy The ILOVEYOU virus is important to information security for - CORRECT ANSWER Exposing the implications of international differences in cyber-law Albert Gonzales and TJ Maxx are well known in the information security literature for - CORRECT ANSWER Stealing commercial information by exploiting weakness in wireless networks Information security is defined as - CORRECT ANSWER Protecting information and information systems from unauthorized access, use, disclosure, disruption, modification, or destruction in order to provide integrity, confidentiality and availability Confidentiality is - CORRECT ANSWER Preserving authorized restrictions on access and disclosure, including means for protecting personal privacy and proprietary information Choices Integrity is - CORRECT ANSWER Guarding against improper information modification or destruction, and includes ensuring information non-repudiation and authenticity Availability is - CORRECT ANSWER Ensuring timely and reliable access to and use of information Of the measures you can take to improve your personal security, the least important is - CORRECT ANSWER Spending a lot of money The Sarbanes-Oxley act was enacted in 2002 to prevent - CORRECT ANSWER Falsification of financial records at publicly traded companies The system administrator is the person responsible for - CORRECT ANSWER Day-to-day operation of a technology system The system security officer is the person responsible for - CORRECT ANSWER Writing, enforcing, and reviewing security-operating procedures Common system administration tasks include - CORRECT ANSWER Updating software System administration provides all of the following except - CORRECT ANSWER Project management Cloud computing models include all of the following except - CORRECT ANSWER Revenue as a service A virtual machine - CORRECT ANSWER Is a software container into which an operating system and applications can be installed Writing the necessary data in the appropriate locations on a computer's hard drive for running software program is called - CORRECT ANSWER Installation Selecting one among many possible combinations of features of a system is called - CORRECT ANSWER Configuration Limiting access to information system resources only to authorized users, programs, processes, or other systems is called - CORRECT ANSWER Access control Defining the rights of organizational members to information in the organization is called - CORRECT ANSWER User management Listening and/or recording the activities of a system to maintain performance and security is called - CORRECT ANSWER Monitoring The types of monitoring include - CORRECT ANSWER Reactive monitoring and pro-active testing A part of a system whose failure will stop the entire system from working is a - CORRECT ANSWER Single point of failure A hot spare is a - CORRECT ANSWER Redundant component that can replace a failed component with no downtime A cold spare is a - CORRECT ANSWER Spare components used to replace failed components as quickly as possible Common functions offered by system utilities in the Windows world include - CORRECT ANSWER Automating and auditing the installation and maintenance of software Redundancy is - CORRECT ANSWER Surplus capacity, used to improve the reliability of a system The domain controller in Active Directory - CORRECT ANSWER Implements the active directory rules in the domain Active Directory - CORRECT ANSWER Provides centralized user management and access control for computers A Linux Distribution is - CORRECT ANSWER A collection of open source utilities and software packaged with the Linux OS In the context of system administration, the operating system is - CORRECT ANSWER Software that manages computer hardware and provides common services to user applications In the context of system administration, the kernel is - CORRECT ANSWER Software which controls hardware devices, manages memory, and hides underlying physical hardware from user applications Common shell programs include - CORRECT ANSWER Bourne shell, C shell, Bourne-again shell The filesystem root is represented in Linux by - CORRECT ANSWER Answer - / The current folder is represented in Linux by - CORRECT ANSWER Answer - . The parent folder of the current folder is represented in Linux by - CORRECT ANSWER Answer - .. The default shell prompt for a regular user in the bash shell is - CORRECT ANSWER Answer - $ The default shell prompt for the root user in the bash shell is - CORRECT ANSWER Answer - # An example of an absolute path is - CORRECT ANSWER Answer - / An example of a relative path is - CORRECT ANSWER Answer - ~/ To navigate to a specific folder, we can use the command - CORRECT ANSWER Answer - cd To view the contents of a folder, we can use the command - CORRECT ANSWER Answer - Is When using a shell program, command arguments are - CORRECT ANSWER Data provided to a command to use as input When using a shell program, command options (also called flags or switches) are - CORRECT ANSWER Single letters of full words that modify the behavior of the command in a pre-determined way To view the contents of a file, we can used the command cat more less All of the above - CORRECT ANSWER Answer - All of the above The command used to copy files in Unix/Linux is - CORRECT ANSWER Answer - cp The command used to delete files and folders in Unix/Linux is - CORRECT ANSWER Answer - rm To find the location of a file named somewhere within the /usr folder, we can use the command - CORRECT ANSWER Answer - find/usr ~name In the Unix/Linux World, yum is used to - CORRECT ANSWER Install and update packages, and track dependencies among packages Assets are - CORRECT ANSWER Resources or information that is to be protected Threats are - CORRECT ANSWER Capabilities, intentions and attack methods of adversaries to cause harm to assets Relative to physical security, information security is challenging because Most assets are easily duplicated Assets are largely invisible Both the above None of the above - CORRECT ANSWER Both the above Vulnerabilities are - CORRECT ANSWER Weaknesses in an information system that can lead to a compromise of an asset Controls are - CORRECT ANSWER Safeguards used to minimize the impact of threats Vulnerabilities in IT systems can be eliminated through secure coding practices True or False - CORRECT ANSWER Answer - True Models are useful because - CORRECT ANSWER They draw attention to the essential details of a problem As reported in the chapter, recent trends in vulnerabilities and threats indicate that - CORRECT ANSWER Decreasing numbers of new vulnerabilities are being discovered, but the number of attacks is going up A lack of input validation vulnerability refers to a situation where - CORRECT ANSWER User input is used without confirming its validity An unrestricted uploads vulnerability refers to a situation where - CORRECT ANSWER Files are accepted as input without verifying their specifications A cross-site scripting vulnerability can occur when - CORRECT ANSWER Input from other users is supplied as output to other users A buffer overflow vulnerability refers to a situation where - CORRECT ANSWER A program puts more data into a storage location that it can hold A SWL injection vulnerability is an example of a - CORRECT ANSWER Lack of input validation vulnerability A missing authorization vulnerability refers to a situation where - CORRECT ANSWER Users are allowed access to privileged parts of a program without verification of credentials Denial of services refers to - CORRECT ANSWER Unauthorized prevention of access to resources Phishing refers to - CORRECT ANSWER Attempting to compromise a user by masquerading as a trustworthy entity in electronic communication Malware refers to - CORRECT ANSWER Code specifically designed to exploit a computer or data, without the user's consent Rootkits are - CORRECT ANSWER Software used to hide the existence of malicious software on computer systems Zero-day exploits are - CORRECT ANSWER Exploits that compromise a previously unknown software vulnerability Social engineering is - CORRECT ANSWER Manipulating people into performing desired actions The majority of information security incidents are identified by - CORRECT ANSWER Organizations other than the affected organization Checklist based approaches can be used to identify - CORRECT ANSWER General assets Bottom-up and top down approaches are needed to identify - CORRECT ANSWER Idiosyncratic assets An example of a top-down approach to asset identification is - CORRECT ANSWER Reading the mission statement of the organization Information assets are - CORRECT ANSWER Digitally stored content owned by an individual or organization Personnel assets are - CORRECT ANSWER Employees whose departure could adversely affect the organization Hardware assets are - CORRECT ANSWER Machinery involved in supporting the business Software assets are - CORRECT ANSWER Software tools needed to accomplish the organization's mission In most organizations, the most important assets from the perspective of information security are - CORRECT ANSWER Information assets Tracking attributes are used for - CORRECT ANSWER Hardware assets Methods of hardware asset discovery include: Network scanning Asset reviews All of the above Purchase reviews - CORRECT ANSWER Answer - All of the above The parameters used to characterize assets are - CORRECT ANSWER Asset sensitivity and asset criticality Based on sensitivity, assets are classified as - CORRECT ANSWER Restricted, unrestricted Asset sensitivity refers to - CORRECT ANSWER The damage caused to an organization from a breach of confidentiality or integrity of an asset Restricted assets are - CORRECT ANSWER Assets whose disclosure or alteration would have adverse consequences for the organization Asset criticality refers to - CORRECT ANSWER A measure of the importance of an asset to the immediate survival of an organization. Based on criticality, assets are classified as - CORRECT ANSWER Essential, required, deferrable Asset criticality is usually associated with the impact of an asset on - CORRECT ANSWER Availability Essential assets are those whose loss of availability - CORRECT ANSWER Would cause immediate severe repercussions to the organization Required assets are those whose loss of availability - CORRECT ANSWER Could be tolerated for a short period of time The Morris worm is well known in the information security literature for - CORRECT ANSWER Causing one of the most significant Internet outages ever Threats are - CORRECT ANSWER Capabilities, intentions, and attack methods of adversaries Threat models are - CORRECT ANSWER Interactions between relevant agents, actions The threat model includes - CORRECT ANSWER Agents, actions, and assets Threat agents are - CORRECT ANSWER Individuals, organizations or groups that originate a particular threat action Threat agents are typically classified as - CORRECT ANSWER External agents, internal agents and partners Most attacks on organizations originate from - CORRECT ANSWER External agents The goal of agents running a 419 Nigerian scam is to - CORRECT ANSWER Steal money The 419 Nigerian scam is an example of a(n) - CORRECT ANSWER Cybercrime Natural causes include all of the following except - CORRECT ANSWER Arson External threats agents include - CORRECT ANSWER Activist groups and competitors Internal threat agents include - CORRECT ANSWER Help desk and janitorial services Help desk staff can be a threat due to Lack of training Abuse of privileges Human errors All of the above - CORRECT ANSWER Answer - All of the above Internal auditors can be a threat agent by - CORRECT ANSWER Excessive adherence to compliance Partner threat agents include - CORRECT ANSWER Consultants, cloud service providers and suppliers In the context of internal security, partners are - CORRECT ANSWER Third parties sharing a business relationship with the organization Threat actions are - CORRECT ANSWER Activities performed by agents to compromise assets In the context of information security, worms are - CORRECT ANSWER Malicious software that uses operating system or application vulnerabilities for propagation In the context of information security, bots are - CORRECT ANSWER Software that performs simple tasks automatically and repetitively, usually at the direction of another software In the context of information security, cross-site scripting attacks are - CORRECT ANSWER Malicious content entered by an end user on a web-based system Unapproved software can be a threat action because - CORRECT ANSWER The software may be exploited by hackers

Show more Read less
Institution
Information Security
Course
Information Security









Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
Information Security
Course
Information Security

Document information

Uploaded on
March 26, 2024
Number of pages
11
Written in
2023/2024
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
SuperGrade Chamberlain College Of Nursing
View profile
Follow You need to be logged in order to follow users or courses
Sold
32
Member since
2 year
Number of followers
11
Documents
2218
Last sold
2 months ago
Excellent Academic Material ,test, assignment, summary ,study Guide and test bank

Am best tutor in different course and assisting student is my first priority by providing them with quality work to enable them to success in their career chose my work for excellent grade, all the best

4.4

5 reviews

5
3
4
1
3
1
2
0
1
0

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions