Chapter 8

¡Supera tus tareas y exámenes ahora con Quizwiz!

Which of the following outlines medical security and privacy rules and procedures for simplifying the administration of health care billing and automating the transfer of health care​ data?

HIIPA Act

If your doctor shares your medical records without your​ permission, this is considered a​ ________________ violation.

HIPAA

Which of the following mandates that financial services firms ensure security and confidentiality of customer​ data?

Sarbanes-Oxley Act

In this​ video, Agent Macey explains how a​ _____ pretends to be a legitimate company and sends emails requesting users to update their confidential information such as passwords or account numbers.

spoofer

According to information provided in this​ video, any business with an online presence is at risk of all of the following EXCEPT​ _____.

poor customer service

What is Secure Hypertext Transfer​ Protocol?

A protocol for encrypting data individual messages transferred over the internet

Which of the following best describes​ pharming?

redirecting users to a phony webpage, even when the correct URL is typed in

According to Agent​ Macey, the single largest threat to the Internet is​ _____.

denial-of-service-attacks

Which of the following involves botnets deliberately moving through online ads and leads to higher marketing​ costs?

Click Fraud

Based on the information provided in this​ video, which of the following usually happens in a​ denial-of-service attack?

a hacker floods a web server with so many requests that it becomes unavailable to intended users

Using a combination of hardware and​ software, _______ are able to control incoming and outgoing data on a network.

firewalls

​________ check for data entering a system for accuracy and​ completeness, such as when a clerk confirms a telephone number for a new customer.

input controls

Application controls can be classified as​ _____ controls,​ _______controls, and​ ________ controls.

input; processing; output

According to Agent​ Macey, the Secret Service has responded to network intrusions at businesses throughout the United States that have been impacted by​ _____ through their​ point-of-sale systems.

malware


Conjuntos de estudio relacionados

Intro to Business - Chapter 4 - small business and entrepreneurship

View Set

Matter that can be classified as two ways

View Set

Chapter 3 Introduction to Probability

View Set

Module 4 - Real Estate Practices

View Set

GIU4 - 1 - 11.08.2020 - (NA DYSKU)

View Set

Completing the Application, Underwriting, and Delivering the Policy

View Set