MNGT 220 chapter 8 review

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

using numerous computers to inundate and overwhelm the network from numerous launch point is called

DDoS

true of false DoS attacks flood a network server with thousands of requests for service

TRUE

true or false a computer worm is a program that can copy itself to other computers on a network

TRUE

true or false legislation requiring private or governmental entities to notify individuals of security breaches involving personally identifiable information has been enacted in all 50 states

TRUE

true or false phishing is a form of spoofing

TRUE

an AUP

acceptable uses of a firms information resources and computing equipment

evil twins are

bogus wireless network access points that look legitimate

what are the security challenges faced by wireless networks?

both bluetooth and wifi networks are susceptible to hacking by eavesdroppers. local area networks (LANs) using 802.11 standard can be easily penetrated by outsiders armed with laptops, wireless cards, external antennae and hacking software.

the international defacement or destruction of a website is called

cyber vandalism

a foreign company attempting to access government networks in order to disable a power grid is

cyberwarfare

focuses primarily on the technical issues of keeping systems up and running

disaster recovery planning

true or false mobile devices typically feature state of the art encryption and security features making them highly secure tools for businesses and therefor do not require any special protections

false

true or false most IoT devices support sophisticated security approaches

false

the gramm- leach- bliley act says

financial institutions are to ensure the security of customer data

the sarbanes oxley act

imposes responsibility on companies and management to safeguard the accuracy of financial information

does not contribute to an increase to software flaws

increase in the number of computer hackers in the world

a tool used for scanning software to look for known problems such as bad passwords, the removal of important files, security attacks in progress, and system administration errors

intrusion detection systems

spyware that logs and transmits everything a user types

keylogger

what is not true about internet security vulnerabilities

large public networks, such as the internet, are less vulnerable than internal networks

HIPPA act of 1966 says

outlines medical security and privacy rules

a firewall allows an organization to

prevent unauthorized communication into and out of its network

risk assessment

ranking information risk and identifying security goals

malware that hijacks a users computer and demands payment

ransomware

what uses policies, procedures, and technical measures to prevent unauthorized access to information

security

what about blockchians is not true

the data represented in a blockchain is maintained in a central database

is the cloud a safer and more secure computing environment than an in house network? why or why not

the safety of cloud computing as compared to in house network computing depends on the implications both at the corporation and the service provider. the company will need to make ensure procedures and make sure that employees have secure passwords and access levels.

true or false biometric authentication uses systems that read and interpret individual human traits

true

true or false a firewall is a combination or hardware and software the controls the flow of incoming and outgoing network traffic

true

true or false an acceptable use policy defines acceptable uses of the firms information resources and computing equipment

true

true or false authentication refers to verifying that people are who they claim to be

true

true or false in cloud computing, accountability and responsibility for protection of sensitive data resides within the company owning the data

true

true or false zero defects cannot be achieved in larger software programs because fully testing programs that contain thousands of choices and millions of paths would require thousands of years

true

explain how two factor authentication increases security

two factor authentication increases security by validating the user through a multistep process. to be properly identified, the user must provide a physical token as well as data

blockchain refers to a technology that

uses a chain of digital blocks that that contain records of transactions

a digital certificate system

uses third party CAs to validate a users identity


Ensembles d'études connexes

Ball Ole miss MIS 309 Final Review

View Set

Chapter 1 - Strategic Management: Creating Competitive Advantages

View Set

EPS 7 HW (1,2,4,5,6,7,8,9,10,11,12,13,14)

View Set

windows Server 2008 Active Directory Domain Services Lesson 1

View Set