MSIS 4123 Exam 1 Questions With Correct
Answers
A good hacker is referred to as a _______ hat hacker - answerwhite
A ____ is a counter to a vulnerability that reduces or removes the vulnerability -
answercontrol
A bad hacker is referred to as a _____ hat hacker - answerblack
Burkman breaks up...
A good hacker is referred to as a _______ hat hacker - answer✔✔white
A ____ is a counter to a vulnerability that reduces or removes the vulnerability -
answer✔✔control
A bad hacker is referred to as a _____ hat hacker - answer✔✔black
Burkman breaks up the IA domain into six areas. These are: - answer✔✔(Vulnerability)
controls, (Risk) and management, (Development) making better software, (Core knowledge) and
supporting areas, (Threat detection) and response, (Enforcement) laws
Computer crime is any crime involving or aided by the use of a - answer✔✔computer
The user's perception of how much using a technology will help them in their work is called -
answer✔✔perceived usefulness
The elements of the IA principles of CIA are - answer✔✔Confidentiality, Integrity, Availability
The basic methods of risk management are - answer✔✔Prevent (don't engage in risky behavior),
Deter (sitting on your porch with a gun), Deflect (neighbors house is unguarded), Recover
(insurance)
Part of access control like a username - answer✔✔Identification
Part of access control like a password - answer✔✔Authentication
Detailed instructions to perform a task - answer✔✔Procedure
A broad statement about an organizations view - answer✔✔Policy
IA certification for organizations - answer✔✔iSO 27001:2013
To change something. A verb - answer✔✔Affect
IA certification for individuals - answer✔✔CISSP
Offers education certificates including NSTISSI-4011 - answer✔✔CNSS
Generally tense, unpleasant emotion in anticipation of an uncertain or negative event -
answer✔✔Anxious
EXAM STUDY MATERIALS July 26, 2024 9:30 AM
, The result of a cause; an outcome. A noun - answer✔✔Effect
Part of access control that includes both identification and authentication -
answer✔✔Authenticity
Positive emotion anticipating a good event - answer✔✔Eager
Common amateur criminals who are almost always caught are disguntled - answer✔✔employees
A weakness in a security system is called a - answer✔✔vulnerability
The traditional military domains of warfare (air, land, sea, space) now include _____, which is a
term coined by William Gibson in the novel "Neuromancer" - answer✔✔cyberspace
Exploiting a vulnerability to cause harm or loss is known in IA as an - answer✔✔attack
The elements of an attack can be remembered with the mnemonic MOM. In order, what do these
letters stand for - answer✔✔Method, Opportunity, Motive
Language designed to have a persuasive or impressive effect on its audience, but often regarded
as lacking in sincerity or meaningful content is called _____. This also disguises many logical
fallacies - answer✔✔rhetoric
Computer and network intrusions that are supported by a government are known as ____ hacking
- answer✔✔state-sponsored
Good computer security relies on the concept of _____, which is multiple layers of varying
forms of defense - answer✔✔defense in depth
A well-trained, organized criminal who uses computer technology to perform crimes is a ____
hacker - answer✔✔professional
is an outdated term for "bad" hacker. This originated from the idea of bad guys who illegally
opened safes - answer✔✔Cracker
is a users perceived difficulty of using a technology - answer✔✔Ease of use
Computing system elements include these things: ____ like a computer, ____ like Firefox, _____
like a USB drive, ____ like an mp3, ____ routers, ____ like you and me - answer✔✔Hardware,
Software, Storage Media, Data, Networks/ Network, People
is a negative term for unskilled hackers with no actual skills - answer✔✔Script Kiddies
Electronic commerce relies on ____, where the user cannot deny that they performed a
transaction - answer✔✔non-repudiation
A ____ is a set of circumstances that can lead to loss or harm - answer✔✔threat
EXAM STUDY MATERIALS July 26, 2024 9:30 AM
The benefits of buying summaries with Stuvia:
Guaranteed quality through customer reviews
Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.
Quick and easy check-out
You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.
Focus on what matters
Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!
Frequently asked questions
What do I get when I buy this document?
You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.
Satisfaction guarantee: how does it work?
Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.
Who am I buying these notes from?
Stuvia is a marketplace, so you are not buying this document from us, but from seller Thebright. Stuvia facilitates payment to the seller.
Will I be stuck with a subscription?
No, you only buy these notes for $10.49. You're not tied to anything after your purchase.