chapter 8

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

Your company, an online discount pet supply store, has calculated that a loss of Internet connectivity for 3 hours results in a potential loss of $2,000 to $3,000 and that there is a 50% chance of this occurring each year. What is the annual expected loss from this exposure? $1,500 $1,000 $500 $1,250 $2,500

$1,250

According to Ponemon Institute's 2017 Annual Cost of Cyber Crime Study, the average annualized cost of cybercrime for benchmarked companies in seven different countries was approximately: $117 billion. $11.7 million. $117 million. $11.7 billion. $117,000.

$11.7 million.

According to the 2018 Identity Fraud Study by Javelin Strategy & Research, how much did consumers lose to identity fraud in 2017? $1.7 billion $17 billion $1.7 million $170 million $17 million

$17 billion

Which of the following is a type of ambient data? A set of raw data from an environmental sensor A file that contains an application's user settings A file deleted from a hard disk Data that has been recorded over Computer log containing recent system error

A file deleted from a hard disk

________ controls formalize standards, rules, procedures, and control disciplines to ensure that the organization's general and application controls are properly executed and enforced. Data security Administrative Input Implementation Software

Administrative

________ controls formalize standards, rules, procedures, and control disciplines to ensure that the organization's general and application controls are properly executed and enforced. Software Implementation Administrative Data security Input

Administrative

Which of the following defines acceptable uses of a firm's information resources and computing equipment? An AUP A MSSP An information systems audit policy A UTM system A CA policy

An AUP

Which of the following techniques stops data packets originating outside the organization, inspects them, and passes the packets to the other side of an organization's firewall? Deep packet inspection Application proxy filtering Stateful inspection NAT Packet filtering

Application proxy filtering

Which of the following techniques stops data packets originating outside the organization, inspects them, and passes the packets to the other side of an organization's firewall? NAT Packet filtering Deep packet inspection Stateful inspection Application proxy filtering

Application proxy filtering

Which of the following statements about passwords is not true? Password systems that are too rigorous may hinder employee productivity. Passwords are often disregarded by employees. Passwords can be stolen through social engineering. Passwords can be sniffed when being transmitted over a network. Authentication cannot be established by the use of a password.

Authentication cannot be established by the use of a password.

Which of the following statements about wireless security is not true? Radio frequency bands are easy to scan. SSIDs are broadcast multiple times and can be picked up fairly easily by sniffer programs. Bluetooth is the only wireless technology that is not susceptible to hacking by eavesdroppers. Intruders can force a user's NIC to associate with a rogue access point. An intruder who has associated with an access point by using the correct SSID is capable of accessing other resources on the network. 1 points

Bluetooth is the only wireless technology that is not susceptible to hacking by eavesdroppers.

Which of the following is a virus that uses flaws in Windows software to take over a computer remotely? Conficker Sasser Cryptolocker ILOVEYOU Zeus

Conficker looomup zeus

Which of the following refers to all of the methods, policies, and organizational procedures that ensure the safety of the organization's assets, the accuracy and reliability of its accounting records, and operational adherence to management standards? Security policy Controls SSID standards Legacy systems Vulnerabilities

Controls

Which of the following refers to all of the methods, policies, and organizational procedures that ensure the safety of the organization's assets, the accuracy and reliability of its accounting records, and operational adherence to management standards? Security policy SSID standards Legacy systems Vulnerabilities Controls

Controls

Using numerous computers to inundate and overwhelm the network from numerous launch points is called a(n) ________ attack. phishing DoS DDoS botnet SQL injection

DDoS

Which of the following focuses primarily on the technical issues of keeping systems up and running? Security policies Business continuity planning Disaster recovery planning An AUP An information systems audit

Disaster recovery planning

Which of the following is not an example of a computer used as a target of crime? Knowingly accessing a protected computer to commit fraud Threatening to cause damage to a protected computer Accessing a computer system without authority Illegally accessing stored electronic communication Breaching the confidentiality of protected computerized data

Illegally accessing stored electronic communication

________ use scanning software to look for known problems such as bad passwords, the removal of important files, security attacks in progress, and system administration errors. Stateful inspections Packet filtering technologies Firewalls Application proxy filtering technologies Intrusion detection systems

Intrusion detection systems

Which of the following statements about botnets is not true? It is not possible to make a smartphone part of a botnet. Botnets are often used for click fraud. Ninety percent of the world's spam is delivered by botnets. Botnets are often used to perpetrate DDoS attacks. Eighty percent of the world's malware is delivered by botnets.

It is not possible to make a smartphone part of a botnet.

Which of the following specifically makes malware distribution and hacker attacks to disable websites a federal crime? Electronic Communications Privacy Act Data Security and Breach Notification Act National Information Infrastructure Protection Act Computer Fraud and Abuse Act Economic Espionage Act

National Information Infrastructure Protection Act

As described in the chapter case, which of the following did hackers use to gain access to the Democratic National Committee (DNC) network? Computer worm Trojan horse SQL injection attack Phishing emails Pharming attack 1 points

Phishing emails

CryptoLocker is an example of which of the following? Worm Ransomware Evil twin SQL injection attack Sniffer

Ransomware

_______ is malware that hijacks a user's computer and demands payment in return for giving back access. An evil twin A Trojan horse Spyware Ransomware A virus

Ransomware

An analysis of an information system that rates the likelihood of a security incident occurring and its cost would be included in which of the following? Risk assessment AUP Business continuity plan Security policy Business impact analysis

Risk assessment

Currently, the protocols used for secure information transfer over the Internet are: S-HTTP and CA. SSL, TLS, and S-HTTP. S-HTTP and SHTML. HTTP and TCP/IP. TCP/IP and SSL.

SSL, TLS, and S-HTTP.

Which of the following refers to policies, procedures, and technical measures used to prevent unauthorized access, alteration, theft, or physical damage to information systems? Algorithms Identity management Benchmarking Controls Security

Security

A statement ranking information risks and identifying security goals would be included in which of the following? Risk assessment Business continuity plan AUP Business impact analysis Security policy

Security policy

In which method of encryption is a single encryption key sent to the receiver so both sender and receiver share the same key? Distributed encryption SSL/TLS Symmetric key encryption Private key encryption Public key encryption

Symmetric key encryption

Which of the following is the single greatest cause of network security breaches? Viruses Bugs User lack of knowledge Trojan horses Cyberwarfare 1 points

User lack of knowledge

Which of the following statements about Internet security is not true? The use of P2P networks can expose a corporate computer to outsiders. Instant messaging can provide hackers access to an otherwise secure network. A corporate network without access to the Internet is more secure than one that provides access. Smartphones have the same security weaknesses as other Internet devices. Wi-Fi networks are not vulnerable to security breaches.

Wi-Fi networks are not vulnerable to security breaches.

Which of the following is an example of a keylogger? ILOVEYOU Conficker Cryptolocker Zeus Sasser

Zeus

Two-factor authentication utilizes a(n): encrypted connection. unique password. a multistep process of authentication. a digital certificate. a firewall.

a multistep process of authentication.

All of the following are currently being used as traits that can be profiled by biometric authentication except: fingerprints. retinal images. voice. body odor. facial characteristics.

body odor.

Evil twins are: bogus wireless network access points that look legitimate to users. Trojan horses that appear to the user to be a legitimate commercial software application. computers that fraudulently access a website or network using the IP address and identification of an authorized computer. email messages that mimic the email messages of a legitimate business. fraudulent websites that mimic a legitimate business's website.

bogus wireless network access points that look legitimate to users.

Implementation controls: govern the design, security, and use of computer programs and the security of data files in general throughout the organization. can be classified as input controls, processing controls, and output controls. apply to all computerized applications and consist of a combination of hardware, software, and manual procedures that create an overall control environment. include software controls, computer operations controls, and implementation controls. Audit the systems development process at various points to ensure that the process is properly controlled and managed.

can be classified as input controls, processing controls, and output controls.

A salesperson clicks repeatedly on the online ads of a competitor in order to drive the competitor's advertising costs up. This is an example of: phishing. pharming. click fraud. evil twins. spoofing.

click fraud.

A salesperson clicks repeatedly on the online ads of a competitor in order to drive the competitor's advertising costs up. This is an example of: phishing. pharming. evil twins. spoofing. click fraud.

click fraud.

Computer forensics tasks include all of the following except: finding significant information in a large volume of electronic data. presenting collected evidence in a court of law. collecting physical evidence on the computer. recovering data from computers while preserving evidential integrity. securely storing recovered electronic data.

collecting physical evidence on the computer.

A foreign country attempting to access government networks in order to disable a national power grid is an example of: evil twins. cyberwarfare. cyberterrorism. phishing. denial-of-service attacks.

cyberwarfare.

In controlling network traffic to minimize slow-downs, a technology called ________ is used to examine data files and sort low-priority data from high-priority data. deep packet inspection high availability computing stateful inspection application proxy filtering unified threat management

deep packet inspection

A firewall allows the organization to: check the accuracy of all transactions between its network and the Internet. create access rules for a network. create an enterprise system on the Internet. check the content of all incoming and outgoing email messages. enforce a security policy on data exchanged between its network and the Internet.

enforce a security policy on data exchanged between its network and the Internet.

When hackers gain access to a database containing your personal private information, this is an example of: identity theft. phishing. spoofing. pharming. social engineering.

identity theft.

The Sarbanes-Oxley Act: requires financial institutions to ensure the security of customer data. specifies best practices in information systems security and control. imposes responsibility on companies and management to safeguard the accuracy of financial information. identifies computer abuse as a crime and defines abusive activities. outlines medical security and privacy rules.

imposes responsibility on companies and management to safeguard the accuracy of financial information.

A Trojan horse: is a type of sniffer used to infiltrate corporate networks. installs spyware on users' computers. is malware named for a breed of fast-moving Near-Eastern horses. is software that appears to be benign but does something other than expected. is a virus installed as a drive-by download

is software that appears to be benign but does something other than expected.

The HIPAA Act of 1996: outlines medical security and privacy rules. requires financial institutions to ensure the security of customer data. specifies best practices in information systems security and control. identifies computer abuse as a crime and defines abusive activities. imposes responsibility on companies and management to safeguard the accuracy of financial information.

outlines medical security and privacy rules.

Most computer viruses deliver a: driveby download. worm. Trojan horse. payload. keylogger.

payload.

All of the following are specific security challenges that threaten corporate systems in a client/server environment except: radiation. copying of data. theft of data. hardware failure. alteration of data.

radiation.

All of the following are specific security challenges that threaten the communications lines in a client/server environment except: theft and fraud. tapping. sniffing. radiation. phishing

radiation.

Pharming involves: setting up fake Wi-Fi access points that look as if they are legitimate public networks. using emails for threats or harassment. redirecting users to a fraudulent website even when the user has typed in the correct address in the web browser. setting up fake website to ask users for confidential information. pretending to be a legitimate business's representative in order to garner information about a security system. 1 points

redirecting users to a fraudulent website even when the user has typed in the correct address in the web browser.

Fault tolerant information systems offer 100 percent availability because they use: high-capacity storage. dedicated phone lines. a multitier server network. redundant hardware, software, and power supplies. a digital certificate system.

redundant hardware, software, and power supplies.

The Gramm-Leach-Bliley Act: outlines medical security and privacy rules. imposes responsibility on companies and management to safeguard the accuracy of financial information. specifies best practices in information systems security and control. identifies computer abuse as a crime and defines abusive activities. requires financial institutions to ensure the security of customer data.

requires financial institutions to ensure the security of customer data.

All of the following are specific security challenges that threaten corporate servers in a client/server environment except: vandalism. malware. sniffing. hacking. denial-of-service attacks.

sniffing.

An employee clicks on a link in an email from what looks like a fellow employee and is taken to a fraudulent web site which asks for personal information is an example of: identity theft. pharming. click fraud. spear phishing. DDOS attack.

spear phishing.

All of the following have contributed to an increase in software flaws except: the increase in the number of computer hackers in the world. the inability to fully test programs. the growing size of software programs. demands for timely delivery to markets. the growing complexity of software programs.

the increase in the number of computer hackers in the world. nottt

An authentication system in which a user must provide two types of identification, such as a bank card and PIN, is called: two-factor authentication. smart card authentication. biometric authentication. token authentication. symmetric key authorization.

two-factor authentication.

Blockchain refers to a technology that: uses a centralized data store in the cloud. uses existing banking systems to transfer funds. relies on peer-to-peer networks. relies on the Internet to provide secure transactions. uses a distributed ledger system of transactions.

uses a distributed ledger system of transactions.

WPA2 is a more effective way to secure a wireless network than WEP because it: is part of most vendors UTM products. operates on a VPN. uses much longer encryption keys. uses symmetric encryption methods. includes an AUP.

uses much longer encryption keys.

Comprehensive security management products, with tools for firewalls, VPNs, intrusion detection systems, and more, are called ________ systems. MSSP PKI DPI UTM NSP

utm


संबंधित स्टडी सेट्स

Chapter 15 - Anti discrimination Laws and Other Marketing Regulations

View Set

Managerial economics Salvatore 8th Edition, chapter 1

View Set

2. Exercise for Exploring Linux Command-Line Tools, Linux Essentials 010-150 Part 2, Chapter 14, Linux Ch 7, 1.12 Regular Expressions, 211 Final, Quiz 2 (Linux), LINUX TEST 3, Chapter 10: Editing Files (Review Questions), Chapter 9, Liinux Study, Hom...

View Set

A&P Online Exam #2 prep questions

View Set

Ch 1-9 & ch 12 practice question

View Set

Chapters 15 & 16 - Bloodflow and Blood Pressure

View Set

AWS Cloud Practitioner Practice questions

View Set