Chapter 8-Securing Information Systems

Pataasin ang iyong marka sa homework at exams ngayon gamit ang Quizwiz!

________ is spyware that logs and transmits everything a user types.

A keylogger

Which of the following statements about wireless security is not true

Bluetooth is the only wireless technology that is not susceptible to hacking by eavesdroppers

refers to all of the methods, policies, and organizational procedures that ensure the safety of the organization's assets, the accuracy and reliability of its accounting records, and operational adherence to management standards?

Controls

What happened when hackers targeted the US presidential election?

Hackers took advantage of uneven security and controls and loose management to attack the Clinton campaign

what are controls?

Methods, Policies, and organizational procures that ensure the safety of the organizations assets, accuracy, and reliability

Internet Vulnerabilities

Network is open to anyone unencrypted VOIP Email, P2P, IM-interception, malware, transmit trade secrets

wireless security challenges

Radio frequencies are easy to intercept ssid- named wifi

________ is malware that hijacks a user's computer and demands payment in return for giving back access.

Ransomware

war driving

Searching for wireless signals from an automobile or on foot using a portable computing device.

Which of the following refers to policies, procedures, and technical measures used to prevent unauthorized access, alteration, theft, or physical damage to information systems

Security

An employee clicks on a link in an email from what looks like a fellow employee and is taken to a fraudulent web site which asks for personal information is an example of:

Spear phishing

A salesperson clicks repeatedly on the online ads of a competitor in order to drive the competitor's advertising costs up. This is an example of

click fraud.

A Trojan horse:

is software that appears to be benign but does something other than expected

Most computer viruses deliver a:

payload

All of the following are specific security challenges that threaten corporate servers in a client/server environment except

sniffing. denial-of-service attacks. malware. vandalism. hacking.


Kaugnay na mga set ng pag-aaral

CompTIA Security+ Certification Exam SY0-601 Midterm 2

View Set

Chapter 16: Adolescence: Psychosocial Development

View Set

Chapter Fifteen -- Commercial Paper

View Set

Cosmetology, Chapter 8, Design Decisions

View Set

PH 506: Eight Prakriti and Organ Systems

View Set

Chapter 21 Earth & Space Science

View Set

Chapter 21: The Child's Experience of Hospitalization

View Set