Info Systems - Chapter 8

¡Supera tus tareas y exámenes ahora con Quizwiz!

The Sarbanes-Oxley Act: A) requires financial institutions to ensure the security of customer data. B) specifies best practices in information systems security and control. C) imposes responsibility on companies and management to safeguard the accuracy of financial information. D) outlines medical security and privacy rules. E) identifies computer abuse as a crime and defines abusive activities.

C) imposes responsibility on companies and management to safeguard the accuracy of financial information.

An authentication system in which a user must provide two types of identification, such as a bank card and PIN, is called: A) smart card authentication. B) biometric authentication. C) two-factor authentication. D) symmetric key authorization. E) token authentication.

C) two-factor authentication.

Hackers create a botnet by A) infecting Web search bots with malware. B) using Web search bots to infect other computers. C) causing other people's computers to become "zombie" PCs following a master computer. D) infecting corporate servers with "zombie" Trojan horses that allow undetected access through a back door.

C) causing other people's computers to become "zombie" PCs following a master computer.

Computer forensics tasks include all of the following except: A) presenting collected evidence in a court of law. B) securely storing recovered electronic data. C) collecting physical evidence on the computer. D) finding significant information in a large volume of electronic data.

C) collecting physical evidence on the computer.

A foreign country attempting to access government networks in order to disable a national power grid is an example of: A) phishing. B) denial-of-service attacks. C) cyberwarfare. D) cyberterrorism. E) evil twins.

C) cyberwarfare.

For 100-percent availability, online transaction processing requires: A) high-capacity storage. B) a multi-tier server network. C) fault-tolerant computer systems. D) dedicated phone lines. E) a digital certificate system.

C) fault-tolerant computer systems.

An authentication token is a(n): A) device the size of a credit card that contains access permission data. B) type of smart card. C) gadget that displays passcodes. D) electronic marker attached to a digital authorization file.

C) gadget that displays passcodes.

Which of the following is not an example of a computer used as an instrument of crime? A) Theft of trade secrets B) Intentionally attempting to intercept electronic communication C) Unauthorized copying of software D) Breaching the confidentiality of protected computerized data E) Schemes to defraud

D) Breaching the confidentiality of protected computerized data

Which of the following is the most common type of electronic evidence? A) Voice-mail B) Spreadsheets C) Instant messages D) E-mail E) VOIP data

D) E-mail

Which of the following provides additional security by determining whether packets are part of an ongoing dialogue between a sender and receiver? A) NAT B) Packet filtering C) Deep packet inspection D) Stateful inspection E) Application proxy filtering

D) Stateful inspection

Which of the following specifications replaced WEP with a stronger security standard that features changing encryption keys? A) TLS B) AUP C) VPN D) WPA2 E) UTM

D) WPA2

The HIPAA Act of 1996: A) requires financial institutions to ensure the security of customer data. B) specifies best practices in information systems security and control. C) imposes responsibility on companies and management to safeguard the accuracy of financial information. D) outlines medical security and privacy rules. E) identifies computer abuse as a crime and defines abusive activities.

D) outlines medical security and privacy rules.

All of the following are specific security challenges that threaten corporate systems in a client/server environment except: A) theft of data. B) copying of data. C) alteration of data. D) radiation. E) hardware failure.

D) radiation.

Which of the following is not one of the main firewall screening techniques? A) application proxy filtering B) static packet filtering C) NAT D) secure socket filtering

D) secure socket filtering

All of the following are specific security challenges that threaten corporate servers in a client/server environment except: A) hacking. B) malware. C) denial-of-service attacks. D) sniffing. E) vandalism.

D) sniffing.

Which of the following refers to eavesdroppers driving by buildings or parking outside and trying to intercept wireless network traffic? A) War driving B) Sniffing C) Cybervandalism D) Drive-by tapping E) Snooping

A) War driving

Which of the following is an example of a keylogger? A) Zeus B) Conficker C) Sasser D) ILOVEYOU E) Cryptolocker

A) Zeus

All of the following are types of information systems general controls except: A) application controls. B) computer operations controls. C) physical hardware controls. D) software controls. E) administrative controls

A) application controls.

Application controls: A) can be classified as input controls, processing controls, and output controls. B) govern the design, security, and use of computer programs and the security of data files in general throughout the organization. C) apply to all computerized applications and consist of a combination of hardware, software, and manual procedures that create an overall control environment. D) include software controls, computer operations controls, and implementation controls. E) monitor the use of system software and prevent unauthorized access to software and programs.

A) can be classified as input controls, processing controls, and output controls

A firewall allows the organization to: A) enforce a security policy on data exchanged between its network and the Internet. B) check the accuracy of all transactions between its network and the Internet. C) create an enterprise system on the Internet. D) check the content of all incoming and outgoing e-mail messages. E) create access rules for a network.

A) enforce a security policy on data exchanged between its network and the Internet.

All of the following are specific security challenges that threaten the communications lines in a client/server environment except: A) errors. B) tapping. C) theft and fraud. D) radiation. E) sniffing.

A) errors.

A(n) ________ system is used to identify and authorize different categories of system users and specify which portions of the organization's systems each user can access. A) identity management B) AUP C) authentication D) firewall

A) identity management

A Trojan horse: A) is software that appears to be benign but does something other than expected. B) is a virus that replicates quickly. C) is malware named for a breed of fast-moving Near-Eastern horses. D) installs spyware on users' computers. E) is a type of sniffer used to infiltrate corporate networks.

A) is software that appears to be benign but does something other than expected.

The Internet poses specific security problems because A) it was designed to be easily accessible. B) Internet data is not run over secure lines. C) Internet standards are universal. D) it changes so rapidly.

A) it was designed to be easily accessible.

According to the 2016 Identity Fraud Study by Javelin Strategy & Research, how much did consumers lose to identity fraud in 2015? A) $1.5 million B) $15 million C) $150 million D) $1.5 billion E) $15 billion

E) $15 billion

Which of the following defines acceptable uses of a firm's information resources and computing equipment? A) An information systems audit policy B) A CA policy C) A MSSP D) A UTM system E) An AUP

E) An AUP

Which of the following statements about wireless security is not true? A) SSIDs are broadcast multiple times and can be picked up fairly easily by sniffer programs. B) Radio frequency bands are easy to scan. C) An intruder who has associated with an access point by using the correct SSID is capable of accessing other resources on the network, D) Intruders can force a user's NIC to associate with a rogue access point. E) Bluetooth is the only wireless technology that is not susceptible to hacking by eavesdroppers.

E) Bluetooth is the only wireless technology that is not susceptible to hacking by eavesdroppers.

Which of the following is a virus that uses flaws in Windows software to take over a computer remotely? A) Sasser B) Zeus C) Cryptolocker D) ILOVEYOU E) Conficker

E) Conficker

Which of the following refers to all of the methods, policies, and organizational procedures that ensure the safety of the organization's assets, the accuracy and reliability of its accounting records, and operational adherence to management standards? A) Legacy systems B) SSID standards C) Vulnerabilities D) Security policy E) Controls

E) Controls

Which of the following statements about botnets is not true? A) Eighty percent of the world's malware is delivered by botnets.. B) Botnets are often used to perpetrate DDoS attacks. C) Ninety percent of the world's spam is delivered by botnets. D) Botnets are often used for click fraud. E) It is not possible to make a smartphone part of a botnet.

E) It is not possible to make a smartphone part of a botnet.

Which of the following specifically makes malware distribution and hacker attacks to disable websites a federal crime? A) Computer Fraud and Abuse Act B) Economic Espionage Act C) Electronic Communications Privacy Act D) Data Security and Breach Notification Act E) National Information Infrastructure Protection Act

E) National Information Infrastructure Protection Act

CryptoLocker is an example of which of the following? A) Worm B) SQL injection attack C) Sniffer D) Evil twin E) Ransomware

E) Ransomware

________ identify the access points in a Wi-Fi network. A) NICs B) Mac addresses C) URLs D) UTMs E) SSIDs

E) SSIDs

Currently, the protocols used for secure information transfer over the Internet are: A) TCP/IP and SSL. B) S-HTTP and CA. C) HTTP and TCP/IP. D) S-HTTP and SHTML. E) SSL, TLS, and S-HTTP.

E) SSL, TLS, and S-HTTP.

Comprehensive security management products, with tools for firewalls, VPNs, intrusion detection systems, and more, are called ________ systems. A) DPI B) MSSP C) NSP D) PKI E) UTM

E) UTM

Evil twins are: A) Trojan horses that appears to the user to be a legitimate commercial software application. B) e-mail messages that mimic the e-mail messages of a legitimate business. C) fraudulent websites that mimic a legitimate business's website. D) computers that fraudulently access a website or network using the IP address and identification of an authorized computer. E) bogus wireless network access points that look legitimate to users.

E) bogus wireless network access points that look legitimate to users.

A salesperson clicks repeatedly on the online ads of a competitor's in order to drive the competitor's advertising costs up. This is an example of: A) phishing. B) pharming. C) spoofing. D) evil twins. E) click fraud

E) click fraud

Most computer viruses deliver a: A) worm. B) Trojan horse. C) driveby download. D) keylogger. E) payload.

E) payload.

All of the following have contributed to an increase in software flaws except: A) the growing complexity of software programs. B) the growing size of software programs. C) demands for timely delivery to markets, D) the inability to fully test programs. E) the increase in malicious intruders seeking system access.

E) the increase in malicious intruders seeking system access.

A computer virus replicates more quickly than a computer worm.

False

An acceptable use policy defines the acceptable level of access to information assets for different users.

False

Biometric authentication is the use of personal, biographic details such as the high school you attended and the first street you lived on to provide identification.

False

DoS attacks are used to destroy information and access restricted areas of a company's information system.

False

High-availability computing is also referred to as fault tolerance.

False

Malicious software programs referred to as spyware include a variety of threats such as computer viruses, worms, and Trojan horses.

False

Most IoT devices support sophisticated security approaches

False

Organizations can use existing network security software to secure mobile devices.

False

Packet filtering catches most types of network attacks.

False

Smartphones typically feature state-of-the-art encryption and security features, making them highly secure tools for businesses.

False

The Apple iOS platform is mobile platform most frequently targeted by hackers.

False

The term cracker is used to identify a hacker whose specialty is breaking open security systems.

False

Wireless networks are more difficult for hackers to gain access too because radio frequency bands are difficult to scan.

False

The dispersed nature of cloud computing makes it difficult to track unauthorized access.

True

Viruses can be spread through e-mail.

True

When errors are discovered in software programs, the sources of the errors are found and eliminated through a process called debugging

True

You can test software before it is even written by conducting a walkthrough.

True

Zero defects cannot be achieved in larger software programs because fully testing programs that contain thousands of choices and millions of paths would require thousands of years.

True

arget has had to pay out over $100 million to U.S. banks, credit card companies and consumers as a result of a data breach in 2013.

True

Which of the following refers to policies, procedures, and technical measures used to prevent unauthorized access, alteration, theft, or physical damage to information systems? A) Security B) Controls C) Benchmarking D) Algorithms E) Identity management

A) Security

A statements ranking information risks and identifying security goals would be included in which of the following? A) Security policy B) AUP C) Risk assessment D) Business impact analysis E) Business continuity plan

A) Security policy

Using numerous computers to inundate and overwhelm the network from numerous launch points is called a(n) ________ attack. A) DDoS B) DoS C) SQL injection D) phishing E) botnet

A) DDoS

________ is a crime in which an imposter obtains key pieces of personal information to impersonate someone else. A) Identity theft B) Spoofing C) Social engineering D) Evil twins E) Pharming

A) Identity theft

Tricking employees into revealing their passwords by pretending to be a legitimate member of a company is called: A) sniffing. B) social engineering. C) phishing. D) pharming. E) snooping

B) social engineering.

Which of the following statements about passwords is not true? A) Authentication cannot be established by the use of a password B) Password systems that are too rigorous may hinder employee productivity. C) Passwords can be stolen through social engineering. D) Passwords are often disregarded by employees. E) Passwords can be sniffed when being transmitted over a network.

A) Authentication cannot be established by the use of a password

Pharming involves: A) redirecting users to a fraudulent website even when the user has typed in the correct address in the web browser. B) pretending to be a legitimate business's representative in order to garner information about a security system. C) setting up fake website to ask users for confidential information. D) using e-mails for threats or harassment. E) setting up fake Wi-Fi access points that look as if they are legitimate public networks.

A) redirecting users to a fraudulent website even when the user has typed in the correct address in the web browser.

The Gramm-Leach-Bliley Act: A) requires financial institutions to ensure the security of customer data. B) specifies best practices in information systems security and control. C) imposes responsibility on companies and management to safeguard the accuracy of financial information. D) outlines medical security and privacy rules. E) identifies computer abuse as a crime and defines abusive activities.

A) requires financial institutions to ensure the security of customer data.

A digital certificate system: A) uses third-party CAs to validate a user's identity. B) uses digital signatures to validate a user's identity. C) uses tokens to validate a user's identity. D) is used primarily by individuals for personal correspondence. E) protects a user's identity by substituting a certificate in place of identifiable traits.

A) uses third-party CAs to validate a user's identity.

According to Ponemon Institute's 2015 Annual Cost of Cyber Crime Study, the average annualized cost of cybercrime for companies in the United States was approximately: A) $1.5 million. B) $15 million. C) $150 million. D) $1.5 billion. E) $15 billion.

B) $15 million.

Which of the following is a type of ambient data? A) Computer log containing recent system errors B) A file deleted from a hard disk C) A file that contains an application's user settings D) A set of raw data from an environmental sensor E) Data that has been recorded over

B) A file deleted from a hard disk

________ use scanning software to look for known problems such as bad passwords, the removal of important files, security attacks in progress, and system administration errors. A) Stateful inspections B) Intrusion detection systems C) Application proxy filtering technologies D) Packet filtering technologies E) Firewalls

B) Intrusion detection systems

________ is malware that hijacks a user's computer and demands payment in return for giving back access. A) A Trojan horse B) Ransomware C) Spyware D) A virus E) An evil twin

B) Ransomware

In which method of encryption is a single encryption key sent to the receiver so both sender and receiver share the same key? A) SSL/TLS B) Symmetric key encryption C) Public key encryption D) Private key encryption E) Distributed encryption

B) Symmetric key encryption

Which of the following is the single greatest cause of network security breaches? A) Viruses B) User lack of knowledge C) Trojan horses D) Cyberwarfare E) Bugs

B) User lack of knowledge

Inputting data into a poorly programmed Web form in order to disrupt a company's systems and networks is called A) a Trojan horse. B) an SQL injection attack. C) key logging. D) a DDoS attack.

B) an SQL injection attack.

The intentional defacement or destruction of a website is called: A) spoofing. B) cybervandalism. C) cyberwarfare. D) phishing. E) pharming.

B) cybervandalism.

In controlling network traffic to minimize slow-downs, a technology called ________ is used to examine data files and sort low-priority data from high-priority data. A) high availability computing B) deep-packet inspection C) application proxy filtering D) stateful inspection E) unified threat management

B) deep-packet inspection

Your company, an online discount pet supply store, has calculated that a loss of Internet connectivity for 3 hours results in a potential loss of $2,000 to $3,000 and that there is a 50% chance of this occurring each year. What is the annual expected loss from this exposure? A) $500 B) $1,000 C) $1,250 D) $1,500 E) $2,500

C) $1,250

________ is malware that logs and transmits everything a user types. A) Spyware B) A Trojan horse C) A keylogger D) A worm E) A sniffer

C) A keylogger

________ controls ensure that valuable business data files on either disk or tape are not subject to unauthorized access, change, or destruction while they are in use or in storage. A) Software B) Administrative C) Data security D) Implementation E) Input

C) Data security

Which of the following focuses primarily on the technical issues of keeping systems up and running? A) Business continuity planning B) Security policies C) Disaster recovery planning D) An AUP E) An information systems audit

C) Disaster recovery planning

Which of the following is not an example of a computer used as a target of crime? A) Knowingly accessing a protected computer to commit fraud B) Accessing a computer system without authority C) Illegally accessing stored electronic communication D) Threatening to cause damage to a protected computer E) Breaching the confidentiality of protected computerized data

C) Illegally accessing stored electronic communication

An analysis of an information system that rates the likelihood of a security incident occurring and its cost would be included in which of the following? A) Security policy B) AUP C) Risk assessment D) Business impact analysis E) Business continuity plan

C) Risk assessment

Which of the following is not one of the challenges in securing wireless networks? A) broadcasted SSIDs B) scannability of radio frequency bands C) SQL injection attacks D) geographic range of wireless signals

C) SQL injection attacks

Which of the following statements about the Internet security is not true? A) The use of P2P networks can expose a corporate computer to outsiders. B) A corporate network without access to the Internet is more secure than one that provides access. C) VoIP is more secure than the switched voice network. D) Instant messaging can provide hackers access to an otherwise secure network. E) Smartphones have the same security weaknesses as other Internet devices.

C) VoIP is more secure than the switched voice network.

All of the following are currently being used as traits that can be profiled by biometric authentication except: A) fingerprints. B) facial characteristics. C) body odor. D) retinal images. E) voice.

C) body odor.

Authentication refers to verifying that a person is who he or she claims to be.

True

Computers using cable modems to connect to the Internet are more open to penetration than those connecting via dial-up.

True

Mobile devices are not targeted as extensively by malware as traditional computers.

True

NAT conceals the IP addresses of the organization's internal host computers to deter sniffer programs.

True

One form of spoofing involves forging the return address on an e-mail so that the e-mail message appears to come from someone other than the sender.

True

Public key encryption uses two keys.

True

SSL is a protocol used to establish a secure connection between two computers.

True

Smartphones have the same security flaws as other Internet-connected devices.

True

Sniffers enable hackers to steal proprietary information from anywhere on a network, including e-mail messages, company files, and confidential reports.

True


Conjuntos de estudio relacionados

EXP 4604- Chapter 3 Test: Visual Perception

View Set

Mod 12: Sex, Gender, and Sexuality

View Set

Chapter 22: Seizing an American Empire

View Set