mis 7-10

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

Implementation controls:

Audit the systems development process at various points to ensure that the process is properly controlled and managed.

Which of the following statements about passwords is not true?

Authentication cannot be established by the use of a password

Using numerous computers to inundate and overwhelm the network from numerous launch points is called a(n) ________ attack.

DDoS

Which of the following focuses primarily on the technical issues of keeping systems up and running?

Disaster recovery planning

CryptoLocker is an example of which of the following?

Ransomware

Phishing is a form of spoofing

TRUE

The Sales department believes Company X is a preferred customer based upon the volume of sales made to Company X. The Accounts Receivable department believes Company X is a serious problem because it is so slow to pay for the products it has purchased. How can you explain these two different views existing in the same​ company?

The two departments can only view the data available to them from the workgroup information systems.

Comprehensive security management products, with tools for firewalls, VPNs, intrusion detection systems, and more, are called ________ systems

UTM

Blockchain refers to a technology that:

Uses a distributed ledger system of transactions

Which of the following statements about Internet security is not true?

VoIP is more secure than the switched voice network

Which of the following is an example of a keylogger?

Zeus

Which of the following is a type of ambient data?

a file deleted from a hard disk

________ is spyware that logs and transmits everything a user types.

a keylogger

Two-factor authentication utilizes a(n):

a multistep process of authentication

If an organization has information that is difficult to integrate because it is scattered among a number of different workgroup information​ systems, it is suffering from a problem with​ ___________.

information silos

An important component of an ERP solution is a set of​ ________ procedures that implement standard business processes.

inherent

________ use scanning software to look for known problems such as bad passwords, the removal of important files, security attacks in progress, and system administration errors.

intrustion detection systems

A Trojan horse:

is software that appears to be benign but does something other than expected.

Which of the following statements about botnets is not true?

it is not possible to make a smartphone part of a botnet

Enterprise systems enable organizations to create​ stronger, faster, and more effective​ ________ among value chains.

linkages

In​ 2027, organizations will have to balance the benefits of process improvement with the risks of loss due to the​ ________ factor.

mobility

Which of the following specifically makes malware distribution and hacker attacks to disable websites a federal crime?

national information infrastructure protection act

The HIPPA Act of 1996:

outlines medical security and privacy rules.

Most computer viruses deliver a

payload

The measure of the ratio of process outputs to inputs is known as​ ________.

process efficiency

Assume the process of obtaining a​ driver's license is considered too long because of too few people who can administer the final driving test. One way to resolve this problem is to hire more people who can give the driving test a change in​ __________.

process resources

All of the following are specific security challenges that threaten corporate systems in a client/server environment except:

radiation

________ is malware that hijacks a user's computer and demands payment in return for giving back access.

ransomware

Pharming involves:

redirecting users to a fraudulent website even when the user has typed in the correct address in the web browser.

Fault tolerant information systems offer 100 percent availability because they use:

redundant hardware, software, and power supplies

When the features of an ERP product differ from the​ organization's requirements, the organization must determine how to deal with these​ __________.

requirements gaps

The Gramm-Leach-Billey Act

requires financial institutions to ensure the security of customer data.

All of the following are specific security challenges that threaten corporate servers in a client/server environment except:

sniffing

An employee clicks on a link in an email from what looks like a fellow employee and is taken to a fraudulent web site which asks for personal information is an example of:

spear phishing

An ERP database needs to contain a program that is used to enforce a rule that certain products are never sold at a discounted price. This is accomplished through the use of a​ ___________.

stored procedure

​__________ processes are formally​ defined, standardized processes that involve​ day-to-day activities.

structrued

in which method of encryption is a single encryption key sent to the receiver so both sender and receiver share the same key?

symmetric key encryption

All of the following have contributed to an increase in software flaws except:

the increase in malicious intruders seeking system access

A computer worm is a program that can copy itself to other computers on the network.

true

A firewall is a combination of hardware and software that controls the flow of incoming and outgoing network traffic.

true

An acceptable use policy defines acceptable uses of the firm's information resources and computing equipment.

true

Application proxy filtering examines the application content of packets.

true

Authentication refers to verifying that a person is who he or she claims to be.

true

SSL is a protocol used to establish a secure connection between two computers.

true

Smartphones have the same security flaws as other Internet-connected devices.

true

Sniffers enable hackers to steal proprietary information from anywhere on a network, including email messages, company files, and confidential reports.

true

The term cracker is used to identify a hacker with criminal or malicious intent.

true

Zero defects cannot be achieved in larger software programs because fully testing programs that contain thousands of choices and millions of paths would require thousands of years.

true

in public key encryption the keys are mathematically related so that data encrypted with one key can be decrypted using only the other key.

true

An authentication system in which a user must provide two types of identification, such as a bank card and PIN, is called:

two-factor authentication

Which of the following is the single greatest cause of network security breaches?

user lack of knowledge

WPA2 is a more effective way to secure a wireless network than WEP because it:

uses much longer encryption keys

A digital certificate system:

uses third party CAs to validate a user's identity

Which of the following refers to eavesdroppers driving by buildings or parking outside and trying to intercept wireless network traffic?

war driving

__________ information​ systems, also known as functional information​ systems, exist to support one or more processes within the workgroup.

workgroup

When a hacker discovers a security hole in software that is unknown to the software vendor it is an example of:

zero-day vulnerability

When hackers gain access to a database containing your personal private information, this is an example of:

identity theft

Which of the following is not an example of a computer used as a target of crime?

illegally accessing stroed electronic communication

The Sarbanes-Oxley Act

imposes responsibility on companies and management to safeguard the accuracy of financial information.

According to the 2017 Identity Fraud Study by Javelin Strategy & Research, how much did consumers lose to identity fraud in 2016?

$16 billion

According to Ponemon Institute's 2016 Annual Cost of Cyber Crime Study, the average annualized cost of cybercrime for benchmarked companies in six different countries was approximately:

$9 million

________ controls formalize standards, rules, procedures, and control disciplines to ensure that the organization's general and application controls are properly executed and enforced.

Administrative

Which of the following defines acceptable uses of a firm's information resources and computing equipment?

An AUP

Which of the following statements about wireless security is not true?

Bluetooth is the only wireless technology that is not susceptible to hacking by eavesdroppers

​______ systems encompass all of an​ organization's touchpoints with its customers.

CRM

As described in the chapter case, which of the following did hackers use to gain access to the DNC network?

Phishing emails

An analysis of an information system that rates the likelihood of a security incident occurring and its cost would be included in which of the following?

Risk assessment

________ identify the access points in a Wi-Fi network.

SSIDs

Currently, the protocols used for secure information transfer over the Internet are:

SSL, TLS, and S-HTTP

Which of the following refers to policies, procedures, and technical measures used to prevent unauthorized access, alteration, theft, or physical damage to information systems?

Security

A statement ranking information risks and identifying security goals would be included in which of the following?

Security policy

All of the following are types of information systems general controls except:

application controls

Which of the following techniques stops data packets originating outside the organization, inspects them, and passes the packets to the other side of an organizations firewall?

application proxy filtering

All of the following are currently being used as traits that can be profiled by biometric authentication except:

body odor

Evil twins are:

bogus wireless network access points that look legitimate to users.

A salesperson clicks repeatedly on the online ads of a competitor in order to drive the competitor's advertising costs up. This is an example of:

click fraud

Computer forensics tasks include all of the following except:

collecting physical evidence on the computer

Which of the following is a virus that uses flaws in Windows software to take over a computer remotely?

conficker

Which of the following refers to all of the methods, policies, and organizational procedures that ensure the safety of the organization's assets, the accuracy and reliability of its accounting records, and operational adherence to management standards?

controls

The intentional defacement or destruction of a website is called:

cybervandalism

A foreign country attempting to access government networks in order to disable a national power grid is an example of:

cyberwarfare

In controlling network traffic to minimize slow-downs, a technology called ________ is used to examine data files and sort low-priority data from high-priority data.

deep packet inspection

A manufacturing company would like to allow its employees to access data from a single database using various devices. For​ example, sales people will be using​ smartphones, whereas the warehouse personnel will be using other handheld devices for their purposes. Which of the following accurately describes the type of system this company will​ need?

distributed system

The implementation of ERP systems is a difficult and risky process due to all of the following factors except​ ________.

employee acceptance

A firewall allows the organization to:

enforce a security policy on data exchanged between its network and the Internet.

Which of the following results in a need for​ inter-enterprise systems?

enterprise silos

All of the following are specific security challenges that threaten the communications lines in a client/server environment except:

errors

A computer virus replicates more quickly than a computer worm.

false

As described in the chapter case, losing smartphones is a rare cause of data breaches.

false

DoS attacks are used to destroy information and access restricted areas of a company's information system.

false

In cloud computing, accountability and responsibility for protection of sensitive data is transferred to the cloud provider.

false

Most IoT devices support sophisticated security approaches.

false

Symmetric encryption uses two keys.

false

Wireless networks are more difficult for hackers to gain access to because radio frequency bands are difficult to scan.

false

Biometric authentication is the use of personal, biographic details such as the high school you attended and the first street you lived on to provide identification.

fasle

Malicious software programs referred to as spyware include a variety of threats such as computer viruses, worms, and Trojan horses.

fasle

Organizations can use existing network security software to secure mobile devices.

fasle

Packet filtering catches most types of network attacks

fasle

Smartphones typically feature state-of-the-art encryption and security features, making them highly secure tools for businesses.

fasle

The problems of​ cloud-based ERP are likely to be sorted out in the future through the development of a​ ________ in which most data are stored on​ cloud-based servers and sensitive data is stored on​ in-house managed servers.

hybrid model


Ensembles d'études connexes

Musc/Skel 231 final Saunders Evovle

View Set

Chapter 9: Cellular Respiration, Fermentation, Catabolic Processes

View Set

501-504 Atombau&Bindungslehre 1-4

View Set

Psychology Exam 2: Practice Test

View Set

chapter 4 - local and global opportunities

View Set