MIS chapter 8 352

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

According to Ponemon Institute's 2017 Annual Cost of Cyber Crime Study, the average annualized cost of cybercrime for benchmarked companies in seven different countries was approximately: $117,000. $11.7 million. $117 million. $11.7 billion. $117 billion.

$11.7 million.

According to the 2018 Identity Fraud Study by Javelin Strategy & Research, how much did consumers lose to identity fraud in 2017? $1.7 million $17 million $170 million $1.7 billion $17 billion

$17 billion

________ is spyware that logs and transmits everything a user types. Spyware A Trojan horse A keylogger A worm A sniffer

A keylogger

Which of the following statements about wireless security is not true? SSIDs are broadcast multiple times and can be picked up fairly easily by sniffer programs. Radio frequency bands are easy to scan. An intruder who has associated with an access point by using the correct SSID is capable of accessing other resources on the network. Intruders can force a user's NIC to associate with a rogue access point. Bluetooth is the only wireless technology that is not susceptible to hacking by eavesdroppers.

Bluetooth is the only wireless technology that is not susceptible to hacking by eavesdroppers.

Which of the following is a virus that uses flaws in Windows software to take over a computer remotely? Sasser Zeus Cryptolocker ILOVEYOU Conficker

Conficker

Which of the following refers to all of the methods, policies, and organizational procedures that ensure the safety of the organization's assets, the accuracy and reliability of its accounting records, and operational adherence to management standards? Legacy systems SSID standards Vulnerabilities policy Controls

Controls

Using numerous computers to inundate and overwhelm the network from numerous launch points is called a(n) ________ attack. DDoS DoS SQL injection phishing botnet

DDoS

A computer virus replicates more quickly than a computer worm. True False

False

Malicious software programs referred to as spyware include a variety of threats such as computer viruses, worms, and Trojan horses. True False

False

Most IoT devices support sophisticated security approaches. True False

False

Smartphones do not have the same security flaws as other Internet-connected devices. True False

False

Wireless networks are more difficult for hackers to gain access to because radio frequency bands are difficult to scan. True False

False

Which of the following is not an example of a computer used as a target of crime? Knowingly accessing a protected computer to commit fraud Accessing a computer system without authority Illegally accessing stored electronic communication Threatening to cause damage to a protected computer Breaching the confidentiality of protected computerized data

Illegally accessing stored electronic communication

Which of the following statements about botnets is not true? Eighty percent of the world's malware is delivered by botnets. Botnets are often used to perpetrate DDoS attacks. Ninety percent of the world's spam is delivered by botnets. Botnets are often used for click fraud. It is not possible to make a smartphone part of a botnet.

It is not possible to make a smartphone part of a botnet.

Which of the following specifically makes malware distribution and hacker attacks to disable websites a federal crime? Computer Fraud and Abuse Act Economic Espionage Act Electronic Communications Privacy Act Data Security and Breach Notification Act National Information Infrastructure Protection Act

National Information Infrastructure Protection Act

As described in the chapter case, which of the following did hackers use to gain access to the Democratic National Committee (DNC) network? Trojan horse Phishing emails SQL injection attack Computer worm Pharming attack

Phishing emails

CryptoLocker is an example of which of the following? Worm SQL injection attack Sniffer Evil twin Ransomware

Ransomware

________ is malware that hijacks a user's computer and demands payment in return for giving back access. A Trojan horse Ransomware Spyware A virus An evil twin

Ransomware

________ identify the access points in a Wi-Fi network. NICs Mac addresses URLs UTMs SSIDs

SSIDs

Which of the following refers to policies, procedures, and technical measures used to prevent unauthorized access, alteration, theft, or physical damage to information systems? Security Controls Benchmarking Algorithms Identity management

Security

A computer worm is a program that can copy itself to other computers on the network. True False

True

As described in the chapter case, losing smartphones is a common cause of data breaches. True False

True

DoS attacks flood a network server with thousands of requests for service. True False

True

Phishing is a form of spoofing. True False

True

Sniffers enable hackers to steal proprietary information from anywhere on a network, including email messages, company files, and confidential reports. True False

True

The term cracker is used to identify a hacker with criminal or malicious intent. True False

True

Zero defects cannot be achieved in larger software programs because fully testing programs that contain thousands of choices and millions of paths would require thousands of years. True False

True

Which of the following is the single greatest cause of network security breaches? Viruses User lack of knowledge Trojan horses Cyberwarfare Bugs

User lack of knowledge

Which of the following refers to eavesdroppers driving by buildings or parking outside and trying to intercept wireless network traffic? War driving Sniffing Cybervandalism Drive-by tapping Snooping

War driving

Which of the following statements about Internet security is not true? The use of P2P networks can expose a corporate computer to outsiders. A corporate network without access to the Internet is more secure than one that provides access. Wi-Fi networks are not vulnerable to security breaches. Instant messaging can provide hackers access to an otherwise secure network. Smartphones have the same security weaknesses as other Internet devices.

Wi-Fi networks are not vulnerable to security breaches.

Which of the following is an example of a keylogger? Zeus Conficker Sasser ILOVEYOU Cryptolocker

Zeus

Evil twins are: Trojan horses that appear to the user to be a legitimate commercial software application. email messages that mimic the email messages of a legitimate business. fraudulent websites that mimic a legitimate business's website. computers that fraudulently access a website or network using the IP address and identification of an authorized computer. bogus wireless network access points that look legitimate to users.

bogus wireless network access points that look legitimate to users.

A salesperson clicks repeatedly on the online ads of a competitor in order to drive the competitor's advertising costs up. This is an example of: phishing. pharming. spoofing. evil twins. click fraud.

click fraud.

The intentional defacement or destruction of a website is called: spoofing. cybervandalism. cyberwarfare. phishing. pharming.

cybervandalism.

A foreign country attempting to access government networks in order to disable a national power grid is an example of: phishing. denial-of-service attacks. cyberwarfare. cyberterrorism. evil twins.

cyberwarfare.

When hackers gain access to a database containing your personal private information, this is an example of: phishing. spoofing. social engineering. identity theft. pharming.

identity theft.

A Trojan horse: is software that appears to be benign but does something other than expected. is a virus installed as a drive-by download. is malware named for a breed of fast-moving Near-Eastern horses. installs spyware on users' computers. is a type of sniffer used to infiltrate corporate networks.

is software that appears to be benign but does something other than expected.

The HIPAA Act of 1996: requires financial institutions to ensure the security of customer data. specifies best practices in information systems security and control. imposes responsibility on companies and management to safeguard the accuracy of financial information. outlines medical security and privacy rules. identifies computer abuse as a crime and defines abusive activities.

outlines medical security and privacy rules.

Most computer viruses deliver a: worm. Trojan horse. driveby download. keylogger. payload.

payload.

All of the following are specific security challenges that threaten the communications lines in a client/server environment except: phishing tapping. theft and fraud. radiation. sniffing.

phishing

All of the following are specific security challenges that threaten corporate systems in a client/server environment except: theft of data. copying of data. alteration of data. radiation. hardware failure.

radiation.

Pharming involves: redirecting users to a fraudulent website even when the user has typed in the correct address in the web browser. pretending to be a legitimate business's representative in order to garner information about a security system. setting up fake website to ask users for confidential information. using emails for threats or harassment. setting up fake Wi-Fi access points that look as if they are legitimate public networks.

redirecting users to a fraudulent website even when the user has typed in the correct address in the web browser.

The Gramm-Leach-Bliley Act: requires financial institutions to ensure the security of customer data. specifies best practices in information systems security and control. imposes responsibility on companies and management to safeguard the accuracy of financial information. outlines medical security and privacy rules. identifies computer abuse as a crime and defines abusive activities.

requires financial institutions to ensure the security of customer data.

All of the following are specific security challenges that threaten corporate servers in a client/server environment except: hacking. malware. denial-of-service attacks. sniffing. vandalism.

sniffing.

An employee clicks on a link in an email from what looks like a fellow employee and is taken to a fraudulent web site which asks for personal information is an example of: click fraud. DDOS attack. spear phishing. pharming. identity theft.

spear phishing.

All of the following have contributed to an increase in software flaws except: the growing complexity of software programs. the growing size of software programs. demands for timely delivery to markets. the inability to fully test programs. the increase in the number of computer hackers in the world.

the increase in the number of computer hackers in the world.

When a hacker discovers a security hole in software that is unknown to the software vendor, it is an example of: sniffing. social engineering. phishing. zero-day vulnerability. snooping.

zero-day vulnerability.


Ensembles d'études connexes

Chapter 1: The Nurse's Role in Health Assessment

View Set

Chapter 8 International Taxation

View Set

CISA Part 1: Information Systems Auditing Process

View Set

Chapter 45: Assessment and Management of Patients with Endocrine Disorders

View Set

Cleft Lip and Cleft Palate Hesi Case Study

View Set

Piping and Instrumentation Diagrams

View Set

Chapter 3 - Cells & How they Work

View Set