chapter 4

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

You leave your laptop at your desk while you go to the restroom. This is _________ and is an _________ mistake.

a human error; unintentional

It is always safe to open e-mails and click on links from your friends

false

Keystroke loggers and screen scrapers are examples of

spyware

_______ controls restrict unauthorized individuals from using information resources

Access

______ controls secure the movement of data across networks

Communications

Jim finds out that someone accessed his bank account pretending to be him and stole thousands of dollars. This is an example of ____________.

Identity theft

If a hacker takes control of equipment such as power grids or nuclear power plants, this is an example of a(n) _________ attack.

SCADA (Supervisory control and data aquisition)

If you accept the potential risk, continue operating with no controls, and absorb any damages that occur, you have adopted a risk _________ strategy.

acceptance

The entire basis of a whaling attack is to ________.

appear as authentic as possible

Auditing _________ the computer means verifying processing by checking for known outputs using specific inputs.

around

Consumers ______ put a freeze on their credit with the three credit bureaus; this is _______

can; not an appealing fix

A _____ site is the least expensive option

cold

The ______ of an information resource is the harm, loss, or damage that can result if a threat compromises that resource

exposure

Which of the following does NOT contribute to the increasing vulnerability of organizational information resources?

increasing skills necessary to be a hacker

Sarah received an email that claimed to be from her bank. The email asked her to provide her password. Sarah later found out that the email was not from her bank and that she had given sensitive information to someone who gained access to her accounts. This is an example of a ____________.

phishing attack

You purchased a copy of Microsoft Office and give a copy to a friend so he/she doesn't have to buy it too. This is _________ and is _________.

piracy; illegal

In public-key encryption, the _____ key is used for locking and the ______ key is used for unlocking

public;private

_____________________ is an attack in which the perpetrator uses social skills to trick or manipulate legitimate employees into providing confidential company information such as passwords.

social engineering

_________ is pestware that users your computer as a launch pad for unsolicited e-mail, usually advertising for products and services.

spamware

Auditing ______ the computer means auditors check inputs, outputs and processing

through

Blacklisting allows everything to run unless it is on the list

true

Cybercrime is typically nonviolent but lucrative.

true

Government systems typically lack resources and IT expertise and operate on outdated hardware and software. this makes them particularly vulnerable to ransomware attacks

true

IT security is the business of everyone in an organization

true

A _____ site typically does not include the actual application the company needs to get the business back up and running immediately

warm


Ensembles d'études connexes

Module 9 - Tax Characteristics of Entities

View Set

AP Psych Unit 5: Cognition - Review Questions

View Set

Microbiology Chapter 2: Microscopy

View Set