BCIS4720/5680 test 2
Which of the following statements about data breaches in 2019 is not true?
According to the Identity Theft Resource Center, employee error was the leading cause of data breaches.
Which of the following did the Internet Advertising Bureau urge advertisers to abandon?
Adobe Flash
Which of the following is an example of an integrity violation of e-commerce security?
An unauthorized person intercepts an online communication and changes its contents.
________ is the ability to identify the person or entity with whom you are dealing on the Internet.
Authenticity
________ is the ability to ensure that an e-commerce site continues to function as intended.
Availability
The attack against Dyn servers is an example of a(n):
DDoS attack.
Which of the following technologies is aimed at reducing e-mail address spoofing and phishing?
DMARC
What is not a piece of information stored in the SQLData Source?
DataReader Command
When does a master page load?
Every time a form loads Every time a button is pushed Every time a form with a master page loads
Exploit kits can be purchased by users to protect their computers from malware.(T/F)
False
If you are not reading from the database, you still seed a DataReader.
False
Phishing attacks rely on browser parasites.(T/F)
False
Why is it difficult to accurately estimate the actual amount of cybercrime?
It is difficult to accurately estimate the actual amount of cybercrime in part because many companies are hesitant to report it due to a fear of losing the trust of their customers, and because even if crime is reported, it may be difficult to quantify the actual dollar amount of the loss.
Which of the following is the leading cause of data breaches?
hackers
Which dimensions of security is spoofing a threat to?
integrity and authenticity
Automatically redirecting a web link to a different address is an example of which of the following?
pharming
Which of the following is not an example of malicious code?
sniffer
What is the most frequent cause of stolen credit cards and card information today?
the hacking and looting of corporate servers storing credit card information
Conficker is an example of a:
worm.
Which of the following is an example of an online privacy violation?
your online purchasing history being sold to other merchants without your consent
Confidentiality is sometimes confused with:
privacy.
Which of the following types of attacks enabled hackers to take control of the Twitter accounts of dozens of America's most prominent political, entertainment and technology leaders?
social engineering
Software that is used to obtain private user information such as a user's keystrokes or copies of e-mail is referred to as:
spyware.
A Trojan horse appears to be benign, but then does something other than expected.(T/F)
True
A drive-by download is malware that comes with a downloaded file that a user intentionally or unintentionally requests.
True
FREAK is an example of a software vulnerability.(T/F)
True
Spoofing is the attempt to hide a hacker's true identity by using someone else's e-mail or IP address.
True
Beebone is an example of which of the following?
botnet
According to Ponemon Institute's 2019 survey, which of the following was not among the causes of the costliest cybercrimes?
botnets
Accessing data without authorization on Dropbox is an example of a:
cloud security issue.
Which of the following is a brute force attack which hackers launch via botnets and automated tools using known user name and password combinations
credential stuffing
Which of the following is not a key factor for establishing e-commerce security?
data integrity
Which of the following is not an example of a potentially unwanted program (PUP)?
drive-by download
Malware that comes with a downloaded file requested by a user is called a:
drive-by download.
________ is the ability to ensure that messages and data are only available to those authorized to view them.
Confidentiality
What piece of information is needed by the SQLCommand?
ConnectionString
What are the three pieces of information needed by an SQLCommand?
Parameters, Connection, and CommandText
________ typically attack governments, organizations, and sometimes individuals for political purposes.
Hacktivists
________ is the ability to ensure that e-commerce participants do not deny their online actions.
Nonrepudiation
What event executes every time a page is loaded?
Page_Load
Which of the following was designed to cripple Iranian nuclear centrifuges?
Stuxnet
Which is not a library we need to add to work with databases in C#?
System.UI
The SQLDataSource will automatically build INSERT, UPDATE, AND DELETE commands.(T/F)
True
Typically, the more security measures added to an e-commerce site, the slower and more difficult it becomes to use. (T/F)
True
WannaCry is an example of ransomware.(T/F)
True