Which of the following is the first step in risk management?
Assess what the threats are.
A ________ is a company that can take over another company’s processing with no forewarning.
________ is the term used to denote viruses, worms, Trojan horses, spyware and adware.
Maintaining the DBMS on computers in a locked room is part of the ________.
_______ is when someone deceives by pretending to be someone else.
About 90 per cent of all viruses are spread via ________.
________ refers to things we do not know that we do not know.
Organisations should protect sensitive data by storing it in ________ form
Independent third-party companies that validate public keys are known as ________.
Which of the following is an example of a human safeguard?
________ a site means to take extraordinary measures to reduce a system’s vulnerability.
________ take computers with wireless connections through an area, search for unprotected wireless networks and then monitor and intercept wireless traffic at will.
Which of the following is an example of a data safeguard?
Which of the following is a technique used to ensure that plaintext messages are received without alteration?
Because encryption keys can be lost or destroyed, a copy of the key should be stored with a trusted third party. This procedure is called ________.
Which of the following is used to counter spoofing?
________ is defined as any action, device, procedure, technique or other measure that reduces a system’s vulnerability to a threat.
Which of the following is an example of a technical safeguard?
Which element of the security policy specifies how the organisation will ensure enforcement of security programmes and policies?
general statement of the security programme
Which of the following is an example of an intangible consequence?
loss of customer goodwill due to an outage
The ________ pretends to be a legitimate company and sends an email trying to obtain confidential data, such as account numbers, IRD numbers, account passwords and so forth.
________ refers to threats and consequences that we know about.
Which of the following is a critical security function of senior-management involvement?
establishing the security policy
________ encryption uses the same key for both parties.
________ is a virus that masquerades as a useful program or file.
A Trojan horse
Which of the following observations is true of a cold site?
Customers will have to install and manage systems themselves.
Users should scan their computers with anti-malware programs at least ________.
once a week
The ________ plan should specify what to do when an employee notices a virus on their machine.
________ is a virus that propagates with no user involvement, using the Internet or other computer networks.
No safeguard is ironclad; there is always a ________ that the safeguard will not protect the assets under some circumstances.