Information Security Chapter 04
40 Questions
3 Views

Information Security Chapter 04

Created by
@ComplimentaryLobster

Questions and Answers

What does Business Impact Analysis primarily identify?

  • The efficiency of current operations
  • Critical business functions and impact of disasters (correct)
  • Recent technology risks
  • All available software solutions
  • What is an emergency notification service used for?

  • For delivering marketing messages
  • To recover data after loss
  • To analyze business risk
  • For notifying people during emergencies (correct)
  • What can typically result from technology failure?

  • Destruction of vital data (correct)
  • Improved operational efficiency
  • Enhanced system reliability
  • Successful disaster recovery
  • What is the focus of technology recovery strategies?

    <p>Prioritizing the order for restoring technology</p> Signup and view all the answers

    What is the term for the period during which a system is unavailable?

    <p>Downtime</p> Signup and view all the answers

    Which of the following is NOT a characteristic of Agile MIS Infrastructure?

    <p>Profitability</p> Signup and view all the answers

    Which of the following is NOT a consequence of downtime?

    <p>Software updates</p> Signup and view all the answers

    What does the term 'cybersecurity' refer to?

    <p>The prevention, detection, and response to cyberattacks</p> Signup and view all the answers

    What does maintainability in MIS Infrastructure refer to?

    <p>The system's ability to support environmental changes</p> Signup and view all the answers

    Which element is included in the technology recovery strategies?

    <p>Data center recovery</p> Signup and view all the answers

    What is a 'botnet'?

    <p>Malware that controls a network of devices</p> Signup and view all the answers

    Which of the following best defines networking in the context of technology recovery strategies?

    <p>Connectivity through various technologies</p> Signup and view all the answers

    Which of the following best describes hackers?

    <p>Those who break into systems for profit or challenge</p> Signup and view all the answers

    Which of the following is a type of software intended to cause damage?

    <p>Virus</p> Signup and view all the answers

    What is the main purpose of information security?

    <p>To protect information from misuse</p> Signup and view all the answers

    What does drive-by hacking involve?

    <p>Accessing a network without permission</p> Signup and view all the answers

    What is the primary purpose of authorization in a system?

    <p>To grant permissions and access levels</p> Signup and view all the answers

    Which of the following is NOT a category of authentication techniques?

    <p>Something the user sees</p> Signup and view all the answers

    What is an example of something the user has for authentication?

    <p>Smart card</p> Signup and view all the answers

    What defines biometrics in the context of authentication?

    <p>Identifying users based on physical characteristics</p> Signup and view all the answers

    What is a limitation of biometric authentication techniques like voiceprints?

    <p>They can be intrusive and costly</p> Signup and view all the answers

    What is the goal of implementing multiple levels of authentication?

    <p>To inhibit unauthorized access effectively</p> Signup and view all the answers

    Which type of authentication is characterized by requiring only a username and password?

    <p>Single-factor authentication</p> Signup and view all the answers

    Which of the following statements about tokens is accurate?

    <p>They automatically change user passwords</p> Signup and view all the answers

    What is one advantage of blockchain technology?

    <p>Immutability</p> Signup and view all the answers

    Which term refers to the first block created in a blockchain?

    <p>Genesis block</p> Signup and view all the answers

    What does proof-of-work involve?

    <p>Mining and complex computations</p> Signup and view all the answers

    What do the hashes in a blockchain represent?

    <p>Encrypted links connecting blocks</p> Signup and view all the answers

    What is a primary function of a network?

    <p>Providing shared resources</p> Signup and view all the answers

    Which of the following best describes proof-of-stake?

    <p>An algorithm that has a different approach than proof-of-work</p> Signup and view all the answers

    Which digital currency operates independently of a central bank?

    <p>Bitcoin</p> Signup and view all the answers

    What type of graphs and charts goes beyond basic Excel tools for data visualization?

    <p>Pie charts, controls, and time-series graphs</p> Signup and view all the answers

    What does a local area network (LAN) connect?

    <p>Computers in close proximity, such as in an office or home</p> Signup and view all the answers

    Which of the following characterizes a wide area network (WAN)?

    <p>Spans a large geographic area like a province or country</p> Signup and view all the answers

    What technology allows devices to connect wirelessly to a local area network?

    <p>Wi-Fi</p> Signup and view all the answers

    What is the bit rate?

    <p>The number of bits transferred or received per unit of time</p> Signup and view all the answers

    What does Bluetooth technology enable?

    <p>Wireless PAN communication over short distances</p> Signup and view all the answers

    In wireless networks, what is referred to as bandwidth?

    <p>The maximum amount of data that can pass in a unit of time</p> Signup and view all the answers

    Which of the following describes a personal area network (PAN)?

    <p>A network that provides communication over a short distance for a single user</p> Signup and view all the answers

    What does a WLAN stand for?

    <p>Wireless Local Area Network</p> Signup and view all the answers

    Study Notes

    Information Security Overview

    • Downtime refers to periods when a system is unavailable, affecting financial performance, revenue, reputation, and incurring other expenses.
    • Cybersecurity involves prevention, detection, and response to cyberattacks, which can impact individuals, organizations, and nations.
    • Cyberattacks are malicious attempts to access or harm computer systems.

    Types of Cyber Threats

    • Hackers use their technical expertise to break into systems for profit or challenge.
    • Malware includes any software designed to damage or disable systems.
    • Drive-by hacking targets unsecured wireless networks for unauthorized access.
    • Botnets refer to networks of infected devices controlled by a hacker.

    Authentication and Authorization

    • Authorization grants users permission and access levels within a system.
    • Three categories of authentication:
      • Something the user knows (e.g., passwords).
      • Something the user has (e.g., smart cards, tokens).
      • Something that is part of the user (e.g., biometrics like fingerprints or voiceprints).
    • Voiceprints are unique measurable characteristics of a voice but can be costly and intrusive.

    Security Strategies and Impact Analysis

    • Single-factor authentication relies solely on user ID and passwords.
    • Business Impact Analysis identifies critical functions and potential disaster effects.
    • Technology recovery strategies prioritize restoring hardware, software, and data post-disruption.

    Agile MIS Infrastructure Characteristics

    • Accessibility, availability, maintainability, portability, reliability, and scalability are essential attributes for an effective MIS.

    Blockchain and Distributed Ledger Technology

    • Blockchain is a tamper-proof distributed ledger technology.
    • Advantages include immutability, digital trust, and integration with the Internet of Things.
    • Proof-of-work refers to computational challenges to add transactions to the blockchain.
    • Bitcoin operates independently of central banks; Ethereum offers smart contract capabilities.

    Connectivity Fundamentals

    • Networks enhance communication and sharing resources.
    • Types of networks:
      • Local Area Network (LAN): connects devices in close proximity.
      • Wide Area Network (WAN): spans large geographic areas.
      • Metropolitan Area Network (MAN): typically covers a city.
    • Mobile technology allows users to access information on portable devices.

    Wireless Communication

    • Wi-Fi enables wireless connections between devices via radio waves, supported by infrastructure like transmitters and access points.
    • Key wireless performance metrics include bandwidth (data transfer capabilities) and bit rate (data per unit time), measured in kilobits (Kb), megabits (Mb), and gigabits (Gb).

    Personal Area Networks

    • Personal Area Networks (PANs) facilitate short-distance communication for devices owned by a single user.
    • Bluetooth technology is commonly used for wireless communication between devices over short distances.

    Studying That Suits You

    Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

    Quiz Team

    Description

    This quiz explores the critical aspects of Information Security, specifically focusing on the impact of system downtime. It covers the financial implications, revenue loss, and reputational damage associated with downtime in organizations. Test your understanding of how these factors affect an organization's performance.

    More Quizzes Like This

    Information Security Flashcards
    24 questions
    Use Quizgecko on...
    Browser
    Browser