chapter 8

Pataasin ang iyong marka sa homework at exams ngayon gamit ang Quizwiz!

The Sarbanes-Oxley Act:

imposes responsibility on companies and management to safeguard the accuracy of financial information.

The HIPAA Act of 1996:

outlines medical security and privacy rules.

________ is malware that hijacks a user's computer and demands payment in return for giving back access.

ransomware

The Gramm-Leach-Bliley Act:

requires financial institutions to ensure the security of customer data

Tricking employees into revealing their passwords by pretending to be a legitimate member of a company is called:

social engineering

All of the following have contributed to an increase in software flaws except:

the increase in malicious intruders seeking system access.

Public key encryption uses two keys.

true

An authentication system in which a user must provide two types of identification, such as a bank card and PIN, is called:

two-factor authentication.

A digital certificate system:

uses third-party CAs to validate a user's identity.

Your company, an online discount pet supply store, has calculated that a loss of Internet connectivity for 3 hours results in a potential loss of $2,000 to $3,000 and that there is a 50% chance of this occurring each year. What is the annual expected loss from this exposure?

1250

________ is malware that logs and transmits everything a user types.

A keylogger

Which of the following statements about passwords is not true?

Authentication cannot be established by the use of a password.

Organizations can use existing network security software to secure mobile devices.

False

________ is a crime in which an imposter obtains key pieces of personal information to impersonate someone else.

Identity Theft

Which of the following refers to policies, procedures, and technical measures used to prevent unauthorized access, alteration, theft, or physical damage to information systems?

Security

Which of the following is the single greatest cause of network security breaches?

User lack of knowledge

All of the following are currently being used as traits that can be profiled by biometric authentication except:

body odor

Evil twins are:

bogus wireless network access points that look legitimate to users.

Which of the following refers to all of the methods, policies, and organizational procedures that ensure the safety of the organization's assets, the accuracy and reliability of its accounting records, and operational adherence to management standards?

controls

In controlling network traffic to minimize slow-downs, a technology called ________ is used to examine data files and sort low-priority data from high-priority data.

deep packet inspection

A computer virus replicates more quickly than a computer worm.

false

Which of the following focuses primarily on the technical issues of keeping systems up and running?

Disaster recovery planning

Application controls:

can be classified as input controls, processing controls, and output controls.

A salesperson clicks repeatedly on the online ads of a competitor in order to drive the competitor's advertising costs up. This is an example of:

click fraud

Computer forensics tasks include all of the following except:

collecting physical evidence on the computer.

The intentional defacement or destruction of a website is called:

cybervandalism

A foreign country attempting to access government networks in order to disable a national power grid is an example of:

cyberwarfare

controls ensure that valuable business data files on either disk or tape are not subject to unauthorized access, change, or destruction while they are in use or in storage.

data security

Which of the following is the most common type of electronic evidence

email

A firewall allows the organization to:

enforce a security policy on data exchanged between its network and the Internet.

Biometric authentication is the use of personal, biographic details such as the high school you attended and the first street you lived on to provide identification.

false

Malicious software programs referred to as spyware include a variety of threats such as computer viruses, worms, and Trojan horses.

false

Smartphones typically feature state-of-the-art encryption and security features, making them highly secure tools for businesses.

false

The Apple iOS platform is the mobile platform most frequently targeted by hackers.

false

Wireless networks are more difficult for hackers to gain access too because radio frequency bands are difficult to scan.

false

A Trojan horse:

is software that appears to be benign but does something other than expected.

Pharming involves:

redirecting users to a fraudulent website even when the user has typed in the correct address in the web browser.

An analysis of an information system that rates the likelihood of a security incident occurring and its cost would be included in which of the following?

risk assessment

Authentication refers to verifying that a person is who he or she claims to be.

true

One form of spoofing involves forging the return address on an e-mail so that the e-mail message appears to come from someone other than the sender.

true

Smartphones have the same security flaws as other Internet-connected devices.

true

Target has had to pay out over $100 million to U.S. banks, credit card companies and consumers as a result of a data breach in 2013.

true

Viruses can be spread through e-mail.

true

When errors are discovered in software programs, the sources of the errors are found and eliminated through a process called debugging.

true

Zero defects cannot be achieved in larger software programs because fully testing programs that contain thousands of choices and millions of paths would require thousands of years.

true


Kaugnay na mga set ng pag-aaral

Science Quiz Chapter 1 - Quizzez

View Set

Intro to UNIX / Linux - Chapter 2

View Set

ENG 4A Cumulative Semester Exam Review

View Set

Quiz #2, MidTerm, SCIENCE: Quiz 3

View Set

Bio 1012 Chapter 4: Integumentary System

View Set