IAS GFORMSV2

0.0(0)
Studied by 0 people
call kaiCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/60

encourage image

There's no tags or description

Looks like no tags are added yet.

Last updated 11:14 AM on 4/21/26
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No analytics yet

Send a link to your students to track their progress

61 Terms

1
New cards

Which specific individual is credited with the founding of the Internet through the development of ARPANET in the 1960s?

Larry Roberts

2
New cards

In the context of power quality, how is a 'surge' distinguished from a 'spike'?

A surge is a long-term increase in power, while a spike is a short-term increase.

3
New cards

Regarding the critical characteristics of information, which statement accurately describes the relationship between 'possession' and 'confidentiality'?

A breach of confidentiality always results in a breach of possession.

4
New cards

During which phase of the Systems Development Life Cycle (SDLC) is a 'make-or-buy' decision typically finalized?

Physical Design

5
New cards
6
New cards

Which security design principle suggests that every access to a resource should be checked for permissions, rather than relying on a single initial check?

Complete mediation

7
New cards

Which professional role is primarily responsible for the strategic planning that affects information management and advises the CEO on technology goals?

Chief Information Officer

8
New cards

How does 'pharming' differ from traditional 'phishing' attacks?

Pharming redirects legitimate traffic to an illegitimate site, often via browser or DNS manipulation.

9
New cards

A system administrator notices that several users are accessing a shared database using the same administrative account. Which software design principle is being violated?

Least common mechanism

10
New cards

Which of the following describes a 'timing attack' in the context of web security?

An attack that measures the response time of a system or explores the browser cache to steal information.

11
New cards

What was the significance of the 'Rand Report R-609' in the history of information security?

It marked the start of information security by defining controls for multi-level computer systems.

12
New cards

Which component of an information system is cited as the most difficult to secure?

People

13
New cards

A security professional is evaluating a vulnerability that occurs when a developer fails to validate user input before passing it to a compiler. What type of problem is this?

Command Injection

14
New cards

What is the primary objective of 'Software Assurance'?

To create software that is securable and more able to be deployed in a secure fashion.

15
New cards

In information security terms, what defines 'exposure'?

A condition where a vulnerability known to an attacker is present.

16
New cards

Which approach to information security implementation involves system administrators attempting to improve security at the local level without broad management support?

Bottom-up approach

17
New cards

Information is said to have 'utility' when it possesses which of the following qualities?

It serves a particular purpose and is in a format meaningful to the end-user.

18
New cards

Which role on the information security project team is primarily responsible for understanding the value of assets and financial assessment techniques?

Risk assessment specialists

19
New cards

What is the primary function of a 'Data Custodian'?

The storage, maintenance, and protection of information assets.

20
New cards

In the SecSDLC, which phase involves the creation of supporting documentation and the training of users?

Implementation

21
New cards

Which term describes a virus or worm that changes its appearance over time to evade signature-based detection?

Polymorphic Threat

22
New cards

An attacker uses social skills to convince an employee to reveal their network credentials. What is the name of this technique?

Social Engineering

23
New cards

Which power condition is defined as a 'long-term decrease in the quality' of electrical power availability?

Brownout

24
New cards

A 'dictionary attack' is a specific variation of which type of broader attack?

Brute Force

25
New cards

In the 'Security as Social Science' view, how can security administrators reduce risk caused by end users?

By understanding behavioral aspects of organizational science and change management.

26
New cards

What occurs during a 'buffer overrun' (or buffer overflow) attack?

More data is sent to a program buffer than it is designed to handle, potentially allowing instruction execution.

27
New cards

The 'Software Assurance Initiative' was launched in 2003 by which organization?

Department of Homeland Security

28
New cards

Which term describes a specific instance of a threat, such as a particular hacker like Kevin Mitnick or a specific lightning strike during a storm?

Threat Agent

29
New cards

In the context of information characteristics, if a user receives information that is available and uncorrupted but is not in a format meaningful to the end-user, which characteristic is missing?

Utility

30
New cards

During which phase of the Security Systems Development Life Cycle (SecSDLC) are the project scope, goals, and feasibility analysis first specified?

Investigation

31
New cards

Which specific form of espionage involves an individual viewing unauthorized information by looking over another person's shoulder in public or semipublic settings?

Shoulder Surfing

32
New cards

What is the primary underlying cause of SQL injection vulnerabilities in software development?

Failure to validate user input

33
New cards

Under the military data classification scheme, which level is defined as information whose unauthorized disclosure could reasonably be expected to cause 'serious damage' to national security?

Secret

34
New cards

Which community of interest is primarily focused on system creation costs, ease of use, timeliness, and transaction response time?

Information Technology Management

35
New cards

What does a 'timing attack' explore within a target's system?

Web Browser Cache

36
New cards

Statement 1: The first mainframes were developed during World War II primarily to facilitate complex computations for ballistic weapon trajectories. Statement 2: Early physical security for sensitive military locations relied on badges, keys, and facial recognition by security guards.

Statement 1 is false and statement 2 is true

37
New cards

Statement 1: Larry Roberts is recognized as the founder of the internet for his development of ARPANET. Statement 2: In December 1973, Robert M. Metcalfe identified fundamental security problems with ARPANET.

Both statements are true

38
New cards

Statement 1: Rand Report R-609 was sponsored by the Department of Commerce to define mechanisms for multi-level computer systems. Statement 2: This report marked the formal beginning of the field of Information Security.

Statement 1 is false and statement 2 is true

39
New cards

Statement 1: A breach of confidentiality always results in a breach of possession. Statement 2: A breach of possession always results in a breach of confidentiality.

Statement 1 is true and statement 2 is false

40
New cards

Statement 1: Risk analysis and the examination of legal issues are primary activities during the Logical Design phase. Statement 2: The Physical Design phase involves designing physical security measures to support technological solution.

Both statements are false

41
New cards

Statement 1: A virus is designed to spread from host to host and possesses the ability to replicate itself. Statement 2: A computer worm requires human interaction or a host file to spread copies of itself between computers.

Statement 1 is true and statement 2 is false

42
New cards

Statement 1: A 'brownout' is characterized as a short-term decrease in the quality of electrical power availability. Statement 2: A 'sag' is defined as a long-term decrease in electrical power availability.

Both statements are false

43
New cards

Statement 1: A Denial-of-Service (DoS) attack is primarily a breach of the integrity characteristic of information. Statement 2: In a Man-in-the-Middle (MITM) attack, the attacker can change, delete, or divert data packets.

Statement 1 is false and statement 2 is true

44
New cards

Statement 1: The 'transfer' control strategy involves shifting the risk to other areas or outside entities, such as through insurance or outsourcing. Statement 2: The 'mitigate' control strategy aims to reduce the impact of a successful attack through planning and preparation.

Both statements are true

45
New cards

Statement 1: For a policy to be legally enforceable, the organization must be able to demonstrate that employees understood its contents. Statement 2: An Issue-Specific Security Policy (ISSP) addresses the particular use of certain systems, such as firewall configurations.

Statement 1 is true and statement 2 is false

46
New cards

Statement 1: The Digital Millennium Copyright Act (DMCA) prohibits the altering of information attached or embedded into copyrighted material. Statement 2: The DMCA makes Internet service providers liable for all forms of copyright infringement committed by their users.

Statement 1 is true and statement 2 is false

47
New cards

Statement 1: Data is considered the 'lifeblood' of an organization and is the most common target of intentional attacks. Statement 2: Procedures are written instructions that, if obtained by unauthorized users, can threaten the integrity of information.

Both statements are true

48
New cards

Statement 1: 'Economy of mechanism' dictates that systems should be kept as simple as possible to minimize potential errors. Statement 2: 'Complete mediation' requires that access permissions are checked only during the initial login session.

Statement 1 is true and statement 2 is false

49
New cards

Statement 1: Pharming exploits the Domain Name System (DNS) to transform a legitimate host name into a fraudulent IP address. Statement 2: Phishing typically involves purely technical methods like Trojans and worms to modify browser address bars.

Statement 1 is true and statement 2 is false

50
New cards

Statement 1: Thou shalt not copy or use proprietary software for which you have not paid. Statement 2: Thou shalt not use other people's computer resources unless you can prove it causes no financial harm to them.

Statement 1 is true and statement 2 is false

51
New cards

Statement 1: Crisis management differs from incident response because it focuses first and foremost on the technology involved. Statement 2: A disaster recovery (DR) plan is used to enable the organization to continue operations with minimal disruption after a catastrophic event.

Statement 1 is false and statement 2 is true

52
New cards

A financial analyst notices that a database record for a client's portfolio shows a value of 1,250,000.50, but based on the daily transactions, the value should be exactly 1,250,000.00. While the data is whole and uncorrupted, which specific characteristic of information has been compromised?

Accuracy

53
New cards

During a hot summer afternoon, a data center experiences a sustained decrease in voltage that lasts for several hours. The equipment continues to run but operates at a lower efficiency, risking long-term hardware damage. How should this condition be classified?

Brownout

54
New cards

An employee's encrypted company laptop is stolen from a locked vehicle. The thief is unable to bypass the encryption to view the files, but the company no longer has physical control of the hardware. Which statement best describes the resulting security state?

A breach of possession has occurred, but confidentiality may remain intact.

55
New cards

A software developer creates an application that allows users to search for books. An attacker enters a specific string into the search bar that forces the application to reveal the entire user database. What type of software development problem does this represent?

SQL Injection

56
New cards

An organization determines that the cost of fully securing a legacy server against a specific vulnerability outweighs the value of the server itself. They decide to purchase a comprehensive cyber-insurance policy to cover potential losses instead. Which risk control strategy are they employing?

Transfer

57
New cards

A company requires all new hires to sign an acknowledgement form after attending a mandatory training session on data protection policies. This session specifically outlines what constitutes acceptable behavior and the penalties for violations. Which concept is the company fulfilling?

Due Care

58
New cards

An attacker notices that a web application creates a temporary file to store session data. By rapidly replacing that file with a malicious version in the milliseconds between the application's 'create' and 'read' commands, the attacker gains system access. What is this attack called?

Race Condition

59
New cards

Which historical development marked the official transition of computer security from simple physical access control to a sophisticated multi-level system involving organization-wide personnel and data safety?

The Rand Report R-609

60
New cards

A hacker uses 'pretexting' to call a help desk clerk, pretending to be a high-ranking executive who has forgotten their password. The clerk, wanting to be helpful to their superior, resets the password over the phone. Which component of the information system was exploited here?

People

61
New cards

An organization issues a new policy regarding the use of personal mobile devices. However, many employees continue to violate the policy because the document used overly technical legal jargon that they could not interpret. Which criteria for policy enforceability has failed?

Comprehension