MIS chapter 8

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

A salesperson clicks repeatedly on the online ads of a competitor in order to drive the competitor's advertising costs up. This is an example of:

Click Fraud

A virus that uses flaws in Windows software to take over a computer remotely.

Conficker

What refers to all of the methods, policies, and organizational procedures that ensure the safety of the organization's assets, the accuracy and reliability of its accounting records, and operational adherence to management standards?

Controls

Specifically makes malware distribution and hacker attacks to disable websites a federal crime

National Information Infrastructure Protection Act

Which of the following statements about Internet security is not true?A) The use of P2P networks can expose a corporate computer to outsiders. B) A corporate network without access to the Internet is more secure than one that provides access. C) VoIP is more secure than the switched voice network. D) Instant messaging can provide hackers access to an otherwise secure network. E) Smartphones have the same security weaknesses as other Internet devices.

VoIP is more secure than the switched voice network.

sing numerous computers to inundate and overwhelm the network from numerous launch points is called a(n) ________ attack.

DDoS

All of the following are specific security challenges that threaten the communications lines in a client/server environment except: A) errors. B) tapping. C) theft and fraud. D) radiation. E) sniffing.

Errors

The intentional defacement or destruction of a website is called:

bogus wireless network access points that look legitimate to users.

A Trojan horse:

is software that appears to be benign but does something other than expected.

_______ is malware that logs and transmits everything a user types.

A keylogger

Most computer viruses deliver a:

Payload

All of the following are specific security challenges that threaten corporate systems in a client/server environment except: A) theft of data. B) copying of data. C) alteration of data. D) radiation. E) hardware failure.

Radiation

CryptoLocker is an example of

Ransomware

________ is malware that hijacks a user's computer and demands payment in return for giving back access.

Ransomware

What refers to policies, procedures, and technical measures used to prevent unauthorized access, alteration, theft, or physical damage to information systems?

Security

All of the following are specific security challenges that threaten corporate servers in a client/server environment except: A) hacking. B) malware. C) denial-of-service attacks. D) sniffing. E) vandalism.

Sniffing


संबंधित स्टडी सेट्स

Evolution and the Origin of Species (Chapter 18) Questions

View Set

Chapter 1: What is Organizational Behavior?

View Set

Теорія держави та права

View Set

Ch2 - The Research Process and Ethical Concerns

View Set

MGT 3013 Chapter 13, 14, 15, & 16 Multiple Choice Questions

View Set

Rhetorical Devices/Literary Terms

View Set