MINF 3650 Ch.8 Warm up

¡Supera tus tareas y exámenes ahora con Quizwiz!

Which of the following mandates that financial services firms ensure security and confidentiality of customer​ data? A. Gramm-Leach-Bliley Act B. Patriot Act C. FICO Act D. Sarbanes-Oxley Act E. HIPAA Act

A. Gramm-Leach-Bliley Act

Which wireless security concern involves eavesdroppers parking outside buildings to intercept wireless network​ traffic? A. War driving B. Battle driving C. Trojan horse D. Phishing E. Drive listening

A. War driving

Which of the following is used by a computer that reads and interprets fingerprints to grant​ access? A. A token B. Password protection C. Credit authentication D. Biometric authentication E. A smart card

D. Biometric authentication

Which of the following is used by firms to determine the priority of data so that important data is sent more quickly than less important​ data? A. Public key infrastructure B. Managed security service providers C. Cloud coordination D. Deep packet inspections E. Traffic allocation managers

D. Deep packet inspections

If your financial institution shares your financial records without your​ permission, this is considered a​ ________________ violation. A. FERPA B. Fair Information Practice C. HIPAA D. Gramm-Leach-Bliley Act E. Sarbanes-Oxley

D. Gramm-Leach-Bliley Act

Which of the following outlines medical security and privacy rules and procedures for simplifying the administration of health care billing and automating the transfer of health care​ data? A. Patriot Act B. Sarbanes-Oxley Act C. Gramm-Leach-Bliley Act D. HIPAA Act E. FICO Act

D. HIPAA Act

A(n) ______________ specifically addresses plans for power​ outages, floods,​ fire, and other calamities. A. attack plan B. identity management C. acceptable use policy D. disaster recovery plan E. risk assessment

D. disaster recovery plan

One authentication technology that is about the size of a credit card and contains a chip containing access permission is called​ ___________________. A. a smart card B. a token C. a password D. credit authentication E. biometric authentication

A. a smart card

Question Help ​A(n) _________________ policy would indicate if you are able to use your work computer to access social media websites. A. acceptable use B. disaster recovery plan C. security D. risk assessment E. identity management

A. acceptable use

In addition to developing a policy for restoring computer and communication​ services, some companies go a step further with​ _____, which focuses on how to get the business operations up and running again after a disaster. A. business continuity planning B. disaster recovery planning C. a mirror server D. an information system audit E. a hot site

A. business continuity planning

In the 2016 U.S. presidential​ campaign, systems in Hillary​ Clinton's campaign were attacked by hackers who used​ ___________ to obtain passwords. A. phishing B. a sniffing campaign C. viruses D. software patches E. fake servers

A. phishing

Security in an information systems context refers to​ ___________________________, which are used to prevent unauthorized access or theft. A. processing, access, and confidentially B. policies, procedures, and technical measures C. policies and procedures only D. policies only E. hardware, software, and technical measures

B. policies, procedures, and technical measures

According to information provided in this​ video, any business with an online presence is at risk of all of the following EXCEPT​ _____. A. unauthorized data disclosure B. poor customer service C. a​ denial-of-service attack D. exposure to hacker activity E. the loss of customer data

B. poor customer service

In this​ video, Agent Macey explains how a​ _____ pretends to be a legitimate company and sends emails requesting users to update their confidential information such as passwords or account numbers. A. sniffer B. spoofer C. keylogger D. worm E. hacker

B. spoofer

Public key encryption uses​ __________________. A. one public and two private keys B. one key C two public keys D. one public and one private key E. three private keys

D. one public and one private key

What is Secure Hypertext Transfer​ Protocol? A. The transfer of data over secure private lines B. The use of VPN to transfer data between two devices C. A protocol for encrypting individual messages transferred over the Internet D. A protocol for wired data transfer E. A protocol for wireless data transfer

C. A protocol for encrypting individual messages transferred over the Internet

Which of the following involves botnets deliberately moving through online ads and leads to higher marketing​ costs? A. Spoofing B. Ad fad C. Click fraud D. War driving E. Trojan horses

C. Click fraud

If your doctor shares your medical records without your​ permission, this is considered a​ ________________ violation. A. Gramm-Leach-Bliley B. FERPA C. HIPAA D. Sarbanes-Oxley E. S-HTTP

C. HIPAA

​________ check for data entering a system for accuracy and​ completeness, such as when a clerk confirms a telephone number for a new customer. A. Processing controls B. General controls C. Input controls D. Manual controls E. Application controls

C. Input controls

Which of the following best describes​ pharming? A. Hiding program code defects in software B. Flooding a network or web server with thousands of false communication requests C. Redirecting users to a phony web​ page, even when the correct URL is typed in D. Recruiting customers online E. Hacking into an online pharmacy

C. Redirecting users to a phony web​ page, even when the correct URL is typed in

​__________________ was created as a result of financial scandals such as Enron and WorldCom. A. Gramm-Leach-Bliley Act B. FIP C. Sarbanes-Oxley D. HIPAA E. FERPA

C. Sarbanes-Oxley

Using a combination of hardware and​ software, _______ are able to control incoming and outgoing data on a network. A. malware systems B. VPNs C. firewalls D. netbots E. data control sensors

C. firewalls

Application controls can be classified as​ _____ controls,​ _______controls, and​ ________ controls. A. gateway; password; biometric B. password; processing; output C. input; processing; output D. ​password; biometric; digital E. IP​ address; router; password

C. input; processing; output

According to Agent​ Macey, the Secret Service has responded to network intrusions at businesses throughout the United States that have been impacted by​ _____ through their​ point-of-sale systems. A. spam B. data recovery failures C. malware D. spoofers E. unauthorized wireless traffic

C. malware

Based on the information provided in this​ video, which of the following usually happens in a​ denial-of-service attack? A. A hacker deceives a customer by pretending to be a company representative. B. A hacker uses unauthorized programs to break into a computer system and steal data. C. A hacker implements a computer worm to exploit an operating system vulnerability. D.A hacker floods a Web server with so many requests that it becomes unavailable to intended users. E. A hacker monitors and intercepts wireless traffic.

D.A hacker floods a Web server with so many requests that it becomes unavailable to intended users.

Which of the following involves collecting and maintaining data in such a way that the information can be used as evidence in a court of​ law? A. Business intelligence B. Business analytics C. Data warehousing D. Computer analysis E. Computer forensics

E. Computer forensics

Because so many Web pages use​ databases, _____ is a major malware threat since poorly coded Web application software is vulnerable. A. spoofing B. spyware C. war driving D. a Trojan horse E. an SQL injection attack

E. an SQL injection attack

According to Agent​ Macey, the single largest threat to the Internet is​ _____. A. spoofing B. phishing C. malware implemented through fraudulent​ pop-up ads D. sniffing E. denial-of-service attacks

E. denial-of-service attacks

​A(n) _________________ policy identifies and ranks information risks and goals. A. identity management B. business continuity plan C. acceptable use D. risk assessment E. security

E. security

Video Questions

Video Questions


Conjuntos de estudio relacionados

Barron's GRE with sentences - Part 1

View Set

History Final - The First Emperor

View Set

All 46 Presidents of the United States of America

View Set

The Skeletal System Test Study Guide

View Set

Chapter 9 Quiz Computer Networking Fundamentals

View Set