MIS chapter 8
A salesperson clicks repeatedly on the online ads of a competitor in order to drive the competitor's advertising costs up. This is an example of:
Click Fraud
A virus that uses flaws in Windows software to take over a computer remotely.
Conficker
What refers to all of the methods, policies, and organizational procedures that ensure the safety of the organization's assets, the accuracy and reliability of its accounting records, and operational adherence to management standards?
Controls
Specifically makes malware distribution and hacker attacks to disable websites a federal crime
National Information Infrastructure Protection Act
Which of the following statements about Internet security is not true?A) The use of P2P networks can expose a corporate computer to outsiders. B) A corporate network without access to the Internet is more secure than one that provides access. C) VoIP is more secure than the switched voice network. D) Instant messaging can provide hackers access to an otherwise secure network. E) Smartphones have the same security weaknesses as other Internet devices.
VoIP is more secure than the switched voice network.
sing numerous computers to inundate and overwhelm the network from numerous launch points is called a(n) ________ attack.
DDoS
All of the following are specific security challenges that threaten the communications lines in a client/server environment except: A) errors. B) tapping. C) theft and fraud. D) radiation. E) sniffing.
Errors
The intentional defacement or destruction of a website is called:
bogus wireless network access points that look legitimate to users.
A Trojan horse:
is software that appears to be benign but does something other than expected.
_______ is malware that logs and transmits everything a user types.
A keylogger
Most computer viruses deliver a:
Payload
All of the following are specific security challenges that threaten corporate systems in a client/server environment except: A) theft of data. B) copying of data. C) alteration of data. D) radiation. E) hardware failure.
Radiation
CryptoLocker is an example of
Ransomware
________ is malware that hijacks a user's computer and demands payment in return for giving back access.
Ransomware
What refers to policies, procedures, and technical measures used to prevent unauthorized access, alteration, theft, or physical damage to information systems?
Security
All of the following are specific security challenges that threaten corporate servers in a client/server environment except: A) hacking. B) malware. C) denial-of-service attacks. D) sniffing. E) vandalism.
Sniffing