*Spillage
Which of the following does NOT constitute spillage?
-Classified information that should be unclassified and is downgraded.
Which of the following is NOT an appropriate way to protect against inadvertent spillage?
-Use the classified network for all work, including unclassified work.
Which of the following should you
NOT do if you find classified information on the internet?
-Download the information.
*Classified Data
Which of the following individuals can access classified data?
-Darryl is managing a project that requires access to classified information. He has the appropriate clearance and a signed approved non-disclosure agreement.
Which of the following is a god practice to protect classified information?
-Ensure proper labeling by appropriately marking all classified
material and, when required, sensitive material.
*Insider Threat
What threat do insiders with authorized access to information or information systems pose?
-They may wittingly or unwittingly use their authorized access to perform actions that result in the loss or degradation of resources or capabilities.
Which type of behavior should you report as a potential threat?
-Hostility or anger toward the United States and its policies.
Which of the following
practices may reduce your appeal as a target for adversaries seeking to exploit you insider status?
-Remove your security badge after leaving your controlled area or office building.
*Social Networking
Your cousin posted a link to an article with an incendiary headline on social media. What action should you take?
-Research the source of the article to evaluate its credibility and reliability.
Which of the following is a security best practice when using
social networking sites?
-Turn off Global Positioning System (GPS) before posting pictures of yourself in uniform with identifiable landmarks.
How should you respond to the theft of your identity?
-Notify law enforcement.
*Malicious Code
What is a possible effect of malicious code?
-Files may be corrupted, erased, or compromised.
*Social Engineering
What action should you take with an e-mail from a friend containing a compressed Uniform Resource
Locator (URL)?
-Investigate the link’s actual destination using the preview feature.
How can you protect yourself from internet hoaxes?
-Use online sites to confirm or expose potential hoaxes.
How can you protect yourself from social engineering?
-Follow instructions given only by verified personnel.
*Travel
What security risk does a public Wi-Fi connection pose?
-It may expose the connected device to malware.
*Use of GFE
When can you
check personal e-mail on your Government-furnished equipment (GFE)?
-If allowed by organizational policy.
*Mobile Devices
What can help to protect data on your personal mobile device?
-Secure it to the same level as Government-issued systems.
Which of the following is an example of near field communication (NFC)?
-A smartphone that transmits credit card payment information when held in proximity to a credit card reader.
*Home Computer Security
Which
of the following is a best practice for securing your home computer?
-Create separate accounts for each user.
Upgrade to remove ads
Only ₩37,125/year
-
Flashcards
-
Learn
-
Test
-
Match
-
Flashcards
-
Learn
-
Test
-
Match
Terms in this set (63)
This is the new Internet Protocol that was recently implemented to identify a much larger population of Internet users
IPv6
The combining of voice, video, and data communications into a single communications interface
Unified
A protocol consists of a URL where a Web page or specific document on the Internet can be readily located
False
The two most popular Web server software products currently in use
Apache HTTP Server, Microsoft Internet Information Services (IIS)
The Internet backbone relies predominantly on __________ for transmitting large volumes of data between major nodes
Fiber-Optic
Which of the following is stored in a root domain name server database for translation and tracking purposes?
Domain names, IP addresses
Data servlets travel over the Internet from router to router until reaching their final destinations.
False
As the amount of Internet _______ continue(s) to increase, streaming video and television are becoming commonplace.
Bandwidth
A distinctive advantage of accessing information on the Web is the ability to conveniently dig deeper into the subject matter at hand.
True
A distinguishing characteristic of cloud computing is to provide users with access to services for free.
False
BitTorrent is an example of which of the following network models?
peer-to-peer
A search engine attempts to catalog every Web page by topic through the use of cookies.
False
Government agencies have been reluctant to embrace cloud computing primarily due to which of the following?
Concerns about data security
Publishers use XML to separate data from the formatting of any given Web page.
True
Which of the following agencies played an important role in the birth of the Internet?
Department of Defense (DoD)
Internet radio is limited to local broadcasting stations that are within the metropolitan area that the receiver is currently located.
False
Wikis encourage the use of _______ to build content that can be constantly added, removed, and edited.
Crowdsourcing
Facebook and MySpace are considered to be which of the following types of Web sites?
Social Networking
Which of the following is generally credited to Tim Berners-Lee?
All of the answers provided are corrected
A Web server responds to Web page requests from client computers via http or https.
True
Wirelessly synchronizing your laptop with your cell phone is one example of the use of a PAN.
True
A mobile networking standard defines the terms of service provided by a cellular carrier
False
The microwave used to heat your food and the cell phones you use are part of the ____.
Electromagnetic Spectrum
A DSL modem is similar to a satellite connection and provides high-speed Internet service via a wireless network.
False
Protocols play a vital role in defining how telecommunications work.
True
Which of the following technologies have become the international industry choice for 4G networks?
GSM
Which of the following is not one of the three primary types of physical cables that can carry a communications signal?
Satellite and Cellular
Many cities have adopted ____ technology to provide faster Internet speed to their users.
WiMAX
Which of the following is not considered to be a cell phone service option?
Electronic Data Interchange
Which of the following networks includes transmission towers that connect to handsets in the nearby vicinity?
Cellular
A personal area network is created when two or more local area networks are connected to share information.
False
A personal area network usually covers a range of around _______ feet.
33
Smart phones like the iPhone and Android-based phones provide access to thousands of apps, many of which are free.
True
Which of the following filters the information coming into a network?
Firewall
Geotagging is the process of adding geographic identification metadata to digital media and messages.
True
Bluetooth is an example of a technology used with a ____ area network.
Personal
Fiber-optic cabling sends signals much more slowly than twisted pair or coaxial cabling.
False
RFID is one example of near field communications (NFC).
True
Analog systems were designed to support voice communications.
True
To connect multiple businesses from different locations, a ____ area network setup could be used.
Wide
Ethernet is the most widely used network standard for private networks.
True
All devices attached to a network are identified as _______.
Nodes
An email with a subject heading "Urgent Security Update" that requests a username and password followed by a link to "re-login and resolve the issue" is a good example of which of the following?
Phishing
Which of the following refers to an individual who illegally downloads copyright-protected software?
Pirate
An identity thief could steal your credit card number by using a special device known as a skimmer when processing a payment using your card.
True
Assume that while you're surfin' da Net, a window "pops up" on your PC, appearing to originate with your local bank. Upon reading it, you discover that it asks for you to validate your personal identification information to ensure proper delivery of digital bank statements. You should immediately fill in the requested information because it is from a trusted source.
False
A Guest account is for someone who does not have a permanent account and needs to temporarily access computer or network resources.
True
Which of the following are realistic ways to promote Internet security?
Install antivirus software and enable automatic updates; Select strong passwords and change them regularly
You can protect yourself from identity theft by using ____ when transmitting information over network connections.
Encryption
Malware is periodically spread through music-sharing P2P networks.
True
In addition to Blackboard, which of the following software products are being used at UofL to facilitate distance learning activities in some online and even more traditional courses?
Tegrity; Wimba
Which of the following is not an example of malware?
Patches
Which of the following refers to a practice by which someone may manipulate people into performing actions or divulging confidential information?
Social Engineering
Which of the following companies provide digital certifications for Web transactions?
VeriSign
A ____ allows hackers to gain access to important code or information in a software program.
Security Hole
An IP address identifies you by name as a user on the Internet.
False
A firewall is network hardware or software that examines data packets flowing into and sometimes out of a network or computer in order to filter out packets that are potentially dangerous.
True
Employers are legally allowed to monitor employee email or Web activity without first notifying the employee of this practice through network usage policies.
True
By default, wireless access points are set to broadcast their presence so others can easily detect the wireless signal.
True
To limit the spread of computer viruses, most organizations allow users to install their own software on the corporate PC installed in their office space.
False
Which of the following refers to a PC that is remotely controlled by a hacker to damage or corrupt a computer resource?
Zombie
Once installed, antivirus software is effective for the life of the computer.
False
Which of the following can be used to filter data that may be undesirable?
Firewall
Sets with similar termsIS Chapter 6 MC
54 terms
bbalsam
CGS 2060 Chapter 10
37 terms
abwesthofen
Information Systems
50 terms
quinn_dumais
Chapter 10- Computer
50 terms
Christopher_Weaver
Sets found in the same folderM1U5.2
20 terms
emily_bond5
M1U5.3
20 terms
emily_bond5
M4U6
20 terms
emily_bond5
M3U2 (EC)
8 terms
emily_bond5
Other sets by this creatorCPCU 530 Important Concepts
216 terms
nick_stoeckle
GARS NH Form Numbers (Primary)
26 terms
nick_stoeckle
EQIN 101 Test 3
37 terms
nick_stoeckle
Updated EQIN 101 Test 2
33 terms
nick_stoeckle
Verified questions
COMPUTER SCIENCE
A Turing machine with stay put instead of left is similar to an ordinary Turing machine, but the transition function has the form $\delta: Q \times \Gamma \longrightarrow Q \times \Gamma \times\{\mathrm{R}, \mathrm{S}\}$. At each point, the machine can move its head right or let it stay in the same position. Show that this Turing machine variant is not equivalent to the usual version. What class of languages do these machines recognize?
Verified answer
COMPUTER SCIENCE
What does the following code display? $$ \begin{matrix} \text{numbers = [1, 2, 3, 4, 5, 6, 7, 8]}\\ \text{print(numbers[-4:])}\\ \end{matrix} $$
Verified answer
COMPUTER SCIENCE
As written, each loop iteration in the LIST-SEARCH' procedure requires two tests: one for x ≠ L.nil and one for x.key ≠ k. Show how to eliminate the test for x ≠ L.nil in each iteration.
Verified answer
COMPUTER SCIENCE
Modify the statistics package so that client programs have more flexibility in computing the mean and/or standard deviation. Specifically, redesign the library to have the following functions: mean(nums) Returns the mean of numbers in nums. stdDev(nums) Returns the standard deviation of nums. meanstdDev(nums) Returns both the mean and standard deviation of nums.
Verified answer
Recommended textbook solutionsInformation Technology Project Management: Providing Measurable Organizational Value
5th EditionJack T. Marchewka
346 solutions
Computer Organization and Design MIPS Edition: The Hardware/Software Interface
5th EditionDavid A. Patterson, John L. Hennessy
220 solutions
Service Management: Operations, Strategy, and Information Technology
7th EditionJames Fitzsimmons, Mona Fitzsimmons
103 solutions
Operating System Concepts
9th EditionAbraham Silberschatz, Greg Gagne, Peter B. Galvin
489 solutions
Other Quizlet setsMINS 346 Final 2018
27 terms
MissShortyx46
Unit 8 Study guilde
51 terms
Zac_C2
CGS quiz 8
15 terms
sfiocchi
MIT FINAL EXAM
150 terms
kelsey2696
Related questionsQUESTION
Lightweight Directory Access Protocol (LDAP) uses an encryption certificate to avoid transmitting passwords over a network in cleartext. True or False?
2 answers
QUESTION
When you digitize a sound wave, you measure and record its amplitude at regular time intervals called
2 answers
QUESTION
Suppose you have an application running on a Windows virtual machine in Azure. What is the best-practice guidance on where the app should store data files?
9 answers
QUESTION
Sampling rate is important when creating an analog signal from a digital source. (T or F)
8 answers