Chapter 8

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

according to the 2018 identity fraud study by Javelin strategy and research how much did consumers lose to identify fraud in 2017

$17 Billion

which of the following statements about wireless security is not true

Bluetooth is only wireless technology that is not susceptible to hacking

A salesperson clicks repeatedly on the online ads of a competitor's in order to drive the competitor's advertising costs up. This is an example of:

Click Fraud

Which of the following is a virus that uses flaws in windows software to take over a computer remotely

Conficker

Which of the following specifically makes malware distrbution and hacker attacks to disable websites a federal crime

National Information Infrastructure Protection Act

CryptoLocker is an example of which of the following?

Ransomware

_______ identify the access points in a Wi-Fi network

SSIDs

A statement ranking information risks and identifying security goals would be included in which of the following

Security policy

Phishing is a form of spoofing

True

Symmetric encryption uses on key

True

Comprehensive security management products, with tools for firewalls, VPNs, intrusion detection systems, and more, are called ________ systems

UTM

Which of the following is a type of ambient data

a file deleted from a hard disk

Which of the following defines acceptable uses of a firm's information resources and computing equipment

an AUP

Pharming involves:

redirecting users to a fraudulent Web site even when the user has typed in the correct address in the Web browser.

All of the following are specific security challenges that threaten corporate servers in a client/server environment except

sniffing

In public key encryption, the keys are mathematically related so that data encrypted with one key can be decrypted suing only the other key

true

an authentication system in which a user must provide two types of identification, such as a bank card and PIN is called

two-factor authentication

Blockchain refers to a technology that

uses a distributed ledger system of transaction

WPA2 is more effective way to secure a wireless network than WEP because is

uses much longer encryption keys

a digital certificate system

uses third-party CAs to validate a user's identity.

Your company, an online discount stationers, has calculated that a loss of Internet connectivity for 3 hours results in a potential loss of $2,000 to $3,000 and that there is a 50% chance of this occurring each year. What is the annual expected loss from this exposure? $1,500 $500 $2,500 $1,000 $1,250

$1,250

According to Ponemon Institute's 2017 annual cost of cyber crime study, the average annualized cost of cybercrime for benchmarked companies in seven different countries was approximately

$11.7 million

________ is spyware that logs and transmit everything a user types

A keylogger

_______ controls formalize standards, rules, procedures, and control disciplines to ensure that the organization's general and application controls are properly executed and enforced

Administrative

All of the following are types of information systems general controls except

Application controls

Implementations controls

Audit the systems development process at various points to ensure that the process is properly controlled and managed

Which of the following refers to all methods, policies, and organizational procedures that ensure the safety of the organizations assets, the accuracy and reliability of its accounting records, and operational adherence to management standards

Controls

Using numerous computers to inundate and overwhelm the network from numerous launch points is called a(n) ________ attack.

DDoS

In controlling network traffic to minimize slow downs, a technology called ________ is used to examine data files and sort low priority data from high- priority data

Deep packet inspection

A computer virus replicates more quickly than a computer worm

False

Malicious software programs refereed to as spyware include a variety of threats such as computer viruses, worms, and trojan horses

False

Most IoT devices support sophisticated security approaches

False

Organizations can use existing network security software to secure mobile devices

False

Packet filtering catches most types of network attacks.

False

Smartphones do not have the same security flaws as other internet-connected devices

False

Smartphones typically feature state-of-the-art encryption and security features, making them highly secure tools for businesses.

False

Wireless networks are more difficult for hackers to gain access to because radio frequency bands are difficult to scan

False

which of the following is not an example of a computer used as target of crime

Illegally accessing stored electronic communication

_________ use scanning software to look for known problems such as bad passwords, the removal of important files, security attacks in progress, and system administration errors

Intrusion detection systems

Which of the following statements about botnets is not true

It is not possible to make a smartphone part of a botnet

HIPPA Act of 1996

Outlines medical security and privacy rules

An employee clicks in a link in an email from what looks like a fellow employee and is taken to a fraudulent web site which asks for personal info is an example of

Spear phishing

In which method of encryption is a single encryption key sent tot he receiver so both sender and receiver share the same key

Symmetric key encryption

A computer worm is a program that can copy itself to other computers on the network

True

A firewall is a combination of hardware and software that controls the flow of incoming and outgoing networkk traffic

True

An acceptable use policy defines the acceptable use of the firm's information resources and computing equipment

True

Application proxy filtering examines the application content of packets

True

As described in the chapter case, losing smartphones is a common cause of data breaches

True

Biometric authentication use systems that read and interpret individual human traits

True

Dos attacks flood a network server with thousands of requests for service

True

SSL is a protocol used to establish a secure connection between two computers.

True

Sniffers enable hackers to steal proprietary information from anywhere on a network, including e-mail messages, company files, and confidential reports.

True

The term cracker is used to identify a hacker with criminal or malicious intent

True

Zero defects cannot be achieved in a larger software programs because fully testing programs that contain thousands of choices and millions of paths would require thousands of years

True

in cloud computing, accountability and responsibility for protection of sensitive data resides with the company owning the data

True

which of the following is the single greatest cause of network security breaches

User lack of knowledge

Which of the following refers to eavesdroppers driving by buildings or parking outside trying to intercept wireless network traffic

War driving

Which of the following statements about Internet security is not true

Wi-Fi networks are vulnerable to security breaches

When a hacker discovers a security hole in software that is unknown to the software vendor, it is an example of

Zero-day vulnerability

Which of the following is an example of a keylogger

Zeus

two-factor authentication utilizes a

a multistep process of authentication

Which of the following techniques stops data packets originating out side the organization inspects them, and passes the packets to the other side of an organizations firewall

application proxy filtering

Which of the following statements about passwords is not true

authentication cannot be established by the sue of a password

All of the following are currently being used as traits that can be profiled by biometric

body odor

Evil twins are

bogus wireless network access points that look legitimate to users.

computer forensics tasks include all of the following except

collecting physical evidence on the computer

The international defacement or destruction of a website is called

cybervandalism

A foreign country attempting to access government networks in order to disable a national power grid is an example of

cyberwarfare

Which of the following focuses primarily on the technical issues of keeping systems up and running

disaster recovery planning

A firewall allows the organization to

enforce a security policy on data exchanged between its networks and the internet

When hackers gain access to aa database containing your personal private information, this is an example of

identity theft

the Sarbanes-Oxley act

imposes responsibility on companies and their management to safeguard the accuracy of financial infromation

A trojan horse

is software that appears to be benign but does something other than expected

Most computer viruses deliver a:

payload

________ is malware that hijacks a users computer and demands payment in return for giving back access

ransomware

Gramm-Leach-Bliley Act

requires financial institutions to ensure the security and confidentiality of customer data

All of the following have contributed to an increase in software flaws except

the increase in the number of computer hackers in the world

As described in the chapter case, which of the following did hackers use to gain access to the Democratic National Committee network

Phishing emails

All of the following are specific challenges that threaten the communications lines in a client/server environment except

Phising

All of the following are specific security challenges that threaten corporate system in a client/server environment except

Radiation

Fault tolerant information systems offer 100 percent availability because they use

Redundant hardware, software, and power supplies

An analysis of an information system that rates the likelihood of security incident occurring and its cost would be included in which of the following

Risk assesment

Currently, the protocols used for secure information transfer over the Internet are:

SSS, TLS and S-HTTP

Which of the following refers to policies, procedures and technical measures used to prevent unauthorized access, alteration, theft, or physical damage to information systems

Security


Ensembles d'études connexes

Music 237 Midterm (Cuesta Johnson)

View Set

Melody, Rhythm, Meter, Harmony, Texture, Form , Tempo, Dynamics

View Set

Challenge and Change, Grade 12, Exam

View Set

32: Fluids, Electrolytes, and Acid-Base

View Set

APUSH Time Period 4: Chapters 11-17

View Set

3.2.4 HIV AS AN EXAMPLE OF A HUMAN DISEASE CAUSED BY A VIRUS

View Set