IS 201 4.5 Reading Quiz
Phishing
Phishing is a fraudulent technique for obtaining a person's private information through an email. Phishing emails typically ask you to provide personal information (usernames, passwords, credit card numbers, government IDs, etc.). They may also ask you to click on a link that will lead to a website that asks for personal information or is infected with malware.
The 3 forms of Identity theft
1. Financial Identity Theft: stealing another person's credit card or bank account number. This may also include using a stolen identity (social security number, address, name, etc.) to apply for a credit card or loan that may impact credit ratings or cause unmerited financial obligations. 2. Medical Identity Theft: stealing another person's personal information to obtain medical care, buy drugs, or submit fake billings to an insurance company. Aside from its financial consequences, this form of identity theft could be life-threatening if incorrect information is inserted into one's medical records and the wrong medical decisions are made based on these records. 3. Criminal Identity Theft: giving another person's name, date of birth, driver's license number, etc., to a law enforcement officer during an investigation or upon arrest. This identity theft may result in false criminal records, fines, or other legal actions.
What's the difference between a Virus, Worm, and Trojan Horse?
A virus refers to a malicious program that attaches itself to another program or file. It spreads from one computer to another as users share programs or files. A worm is similar to a virus, except that it can spread from computer to computer by itself (without requiring users to share the virus). A Trojan horse is a malicious program that is disguised as a legitimate, useful program. However, when you open the Trojan horse, it may consume the resources of your computer, cause damage to your computer (e.g., delete files), steal information, or create a backdoor that allows someone to take control of your computer. Trojan horses do not self-replicate or infect files like worms or viruses do
In creating a strong password, which of the following should you avoid? A. Using names of family members, pets, sports teams, etc. B. Using letters, numbers, and special characters C. Creating unique passwords for different accounts D. Using a phrase or sentence (modified by inserting special characters, numbers, or random capitalization) that you can easily remember
A. Using names of family members, pets, sports teams, etc.
Which of the following is an example of something-you-are-based authentication? A. Voice B. Smart Card C. User ID D. None of these
A. Voice
Which of the following are reasons for committing identity theft? A. To apply for a credit card or loan in another person's name B. To obtain medical care, buy drugs, or submit fake billings to an insurance company in another person's name C. To give another person's name, driver's license number, or contact information to a law enforcement officer upon arrest D. Both a and b E. All of the above
All of the above
Tom keeps his computer in his front room. He has lots of friends who frequently come by unannounced (his door is normally unlocked), and he loves to show them YouTube videos. Tom is very busy finishing school and feels like he doesn't have time to back up his data himself. However, he wants to back up his homework as quickly and frequently as possible. He would like to have the option of restoring previous versions of his documents if something accidentally gets deleted or modified.Which of the following backup plans would be most secure in the above scenario? A. A hard drive that sits on the desk next to his computer and that he will enable to automatically perform backups B. A hard drive or an online backup account because either one works and it really doesn't matter in this instance C. An online backup system (e.g., Mozy, Carbonite, or even Dropbox) that automatically backs up data on his computer D. CDs that are burned once a week and relocated to the Granite Mountain Vault
C. An online backup system (e.g., Mozy, Carbonite, or even Dropbox) that automatically backs up data on his computer
What is true of the Hypertext Transfer Protocol Secure (https) protocol? A. It securely backs up your data. B. It encrypts data located on your hard drive. C. It can help protect against network sniffing (people intercepting your information over a wireless network). D. It is always used when websites request sensitive information (e.g., user's names and passwords).
C. It can help protect against network sniffing (people intercepting your information over a wireless network).
In the CIA triad, integrity is defined as ________. A. Restricting access to information and resources to those who are authorized to use them B. Ensuring that authorized users are able to access information and resources when they need to C. Protecting data from unauthorized modification or deletion D. None of the above
C. Protecting data from unauthorized modification or deletion
This type of malware is disguised to be a legitimate, useful program. However, when you install the software, it may consume the resources of your computer, cause damage to your computer, steal information, or create a backdoor that allows someone to take control of your computer. A. Virus B. Worm C. Trojan horse D. All of the above
C. Trojan horse
CIA Triad
Confidentiality, Integrity, Availability
Which of the following does a firewall perform? A. Limits the number of ways an attack can come in B. Blocks unauthorized packets from entering or exiting the network C. Detects computers communicating with the Internet without approval D. All of the above
D. All of the above
Why might an ordinary person be a target of a security breach? A. Ordinary people have identities that can be stolen. B. Ordinary people have computers that can be turned into zombies. C. Hackers can impersonate a normal person and attack that person's acquaintances. D. Both a and b E. All of the above
E. All of the above
Which of the following is not a real information system security threat or vulnerability? A. Hackers B. Weak passwords C. Severe weather (fire, floods, etc.) D. New or temp employees E. All of the above are real threats
E. All of the above are real threats