chapter 8 BCIS

¡Supera tus tareas y exámenes ahora con Quizwiz!

Which of the following defines acceptable uses of a firm's information resources and computing equipment?

An AUP

All of the following countries are popular sources of malware attacks except:

Mexico

Which of the following specifications replaced WEP with a stronger security standard that features changing encryption keys?

WPA2

Conficker (also known as Downadup or Downup) is an example of which of the following?

Worm

All of the following are types of information systems general controls except:

application controls

Evil twins are:

bogus wireless network access points that look legitimate to users.

Which of the following is not an example of a computer used as an instrument of crime?

breaching the confidentiality of protected computerized data

Application controls:

can be classified as input controls, processing controls, and output controls

A salesperson clicks repeatedly on the online ads of a competitor's in order to drive the competitor's advertising costs up. This is an example of:

click fraud

the most common type of electronic evidence is:

email

A firewall allows the organization to:

enforce a security policy on data exchanged between its network and the Internet

Viruses cannot be spread through email

false

the term cracker is used to identify a hacker whose specialty is breaking open security systems.

false

For 100 percent availability, online transaction processing requires:

fault-tolerant computer systems

The HIPAA Act of 1996:

outlines medical security and privacy rules

Pharming involves;

redirecting users to a fraudulent website even when the user has typed in the correct address in the web browser.

Analysis of an information system that rates the likelihood of a security incident occurring and its cost is included in a(n):

risk assessment

statements ranking information risks and identifying security goals are included in a(n):

security policy

An example of phishing is:

setting up a fake medical website that asks users for confidential information.

Redirecting a web link to a different address is a form of:

spoofing

All of the following have contributed to an increase in software flaws except:

the increase in malicious intruders seeking system access.

According to IT security experts, mobile devices pose greater security risks than larger computers.

true

Biometric authentication is the use of physical characteristics such as retinal images to provide identification.

true

SSL is a protocol used to establish a secure connection between two computers.

true

Smartphones have the same security flaws as other Internet-connected devices

true

To secure mobile devices, a company will need to implement special mobile device management software.

true

When errors are discovered in software programs, the sources of the errors are found and eliminated through a process called debugging.

true

computer worms spread much more rapidly than computer viruses.

true

malicious software programs referred to as malware include a variety of threats such as computer viruses, worms, and Trojan horses.

true

A practice in which eavesdroppers drive by buildings or park outside and try to intercept wireless network traffic is referred to as:

war driving


Conjuntos de estudio relacionados

finance chapter 11,12,13---wrong dont look at

View Set

Fund CH 4, PREPU health of individual, family, & community

View Set

Chapter 2: Chemistry Comes Alive

View Set

Who is being described? -Character/Quote ID- Block 2

View Set

Test 1 - Chromosome Abnormalities

View Set