IS data analysis chpt 8

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

Which of the following is a type of ambient data? A file that contains an application's user settings An email file A file deleted from a hard disk Computer log containing recent system errors A set of raw data from an environmental sensor

A file deleted from a hard disk.

Conficker (also known as Downadup or Downup) is an example of which of the following? SQL injection attack Script virus Worm Browser parasite Ransomware

Correct SQL injection attack

Which of the following statements about Internet security is not true? Selected Answer: Instant messaging can provide hackers access to an otherwise secure network. The use of P2P networks can expose a computer to outsiders. A corporate network without access to the Internet is more secure than one that provides access. Most VoIP traffic is not encrypted. VoIP is more secure than the switched voice network.

Correct VoIP is more secure than the switched voice network. Answers:

All of the following are types of information systems general controls except: Selected Answer: data security controls. physical hardware controls. implementation controls. application controls. administrative controls.

Correct application controls

The Sarbanes-Oxley Act: Selected Answer: specifies best practices in information systems security and control. outlines medical security and privacy rules. imposes responsibility on companies and management to safeguard the accuracy of financial information. requires financial institutions to ensure the security of customer data. requires that companies retain electronic records for at least 10 years.

Correct imposes responsibility on companies and management to safeguard the accuracy of financial information. Answers:

An authentication token: Selected Answer: is a device the size of a credit card that contains access permission data. is a device that displays passcodes. is a type of smart card. compares a person's unique characteristics against a stored profile of these characteristics to determine any differences between these characteristics and the stored profile. is an electronic marker attached to a digital authorization file.

Correct is a device that displays passcodes. Answers:

________ use scanning software to look for known problems such as bad passwords, the removal of important files, security attacks in progress, and system administration errors. Firewalls Application proxy filtering technologies Stateful inspections Intrusion detection systems Packet filtering technologies

Intrusion detection systems

Which of the following statements about botnets is not true? Botnets are often used to perpetrate DDoS attacks. Ninety percent of the world's spam is delivered by botnets. It is not possible to make a smartphone part of a botnet. Eighty percent of the world's malware is delivered by botnets. Botnets are often used for click fraud.

It is not possible to make a smartphone part of a botnet.

________ identify the access points in a Wi-Fi network. CAs SSIDs Mac addresses NICs URLs

SSID

According to Ponemon Institute's 2014 Annual Cost of Cyber Crime Study, the average annualized cost of cybercrime for companies in the United States was approximately: $1.27 million. $1.27 billion. $12.7 billion. $12.7 million. $127 million.

Selected Answer: Correct $12.7 million. Answers:

Which of the following is not an example of a computer used as an instrument of crime? Illegally accessing stored electronic communications Theft of trade secrets Unauthorized copying of software Intentionally attempting to intercept electronic communication Breaching the confidentiality of protected computerized data

Selected Answer: Correct Breaching the confidentiality of protected computerized data Answers:

Analysis of an information system that rates the likelihood of a security incident occurring and its cost is included in a(n): AUP. What-if analysis. risk assessment. security policy. business impact analysis.

Selected Answer: Correct risk assessment. Answers:

Phishing is a form of: logging. sniffing. ransomware. spoofing. war driving.

Selected Answer: Correct spoofing. Answers:

Most computer viruses deliver a: Trojan horse. driveby download. payload. keylogger. worm.

Selected Answer: Payload Answers:

All of the following are currently being used as traits that can be profiled by biometric authentication except: retinal images. facial characteristics. voice. fingerprints. body odor.

body odor.

The most common type of electronic evidence is: Selected Answer: spreadsheets. email. e-commerce transactions over the Internet. instant messages. voice-mail.

email

For 100 percent availability, online transaction processing requires: high-capacity storage. dedicated phone lines. fault-tolerant computer systems. deep packet inspection. a multi-tier server network.

fault-tolerant computer systems.

Pharming involves: pretending to be a legitimate business's representative in order to garner information about a security system. malware that displays annoying pop-up messages. using emails for threats or harassment. setting up fake websites to ask users for confidential information. redirecting users to a fraudulent website even when the user has typed in the correct address in the web browser.

redirecting users to a fraudulent website even when the user has typed in the correct address in the web browser.

The Gramm-Leach-Bliley Act: requires financial institutions to ensure the security of customer data. specifies best practices in information systems security and control. imposes responsibility on companies and management to safeguard the accuracy of financial information. outlines medical security and privacy rules. requires that companies retain electronic records for at least 10 years.

requires financial institutions to ensure the security of customer data.

An example of phishing is: sending bulk email that asks for financial aid under a false pretext. setting up a fake medical website that asks users for confidential information. malware that displays annoying pop-up messages. flooding a web server with thousands of requests for service. a program that records the keystrokes on a computer

setting up a fake medical website that asks users for confidential information.


Ensembles d'études connexes

peds oncologic disorders prepu questions

View Set

ثقافة علمية الطب البديل

View Set

unit 1: the declaration of independence and the articles of confederation

View Set

Which of the following is true regarding the moderate view of corporation social responsibility (CSR?)

View Set

Chapter 52: Antiemetic and antinausea drugs

View Set

Sergeant's course - 5120BA Communication 2021

View Set

Intro to philosophy modules 6-10

View Set

Chapter 54 - NCLEX® Review Questions Module 9 Neuro

View Set