Quiz Chapter 8 IS290

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

Most computer viruses deliver a:

payload.

Pharming involves:

redirecting users to a fraudulent website even when the user has typed in the correct address in the web browser.

A digital certificate system:

uses third party CAs to validate a user's identity.

Your company, an online discount pet supply store, has calculated that a loss of Internet connectivity for 3 hours results in a potential loss of $2,000 to $3,000 and that there is a 50% chance of this occurring each year. What is the annual expected loss from this exposure?

$1,250

Which of the following defines acceptable uses of a firm's information resources and computing equipment?

An AUP

Which of the following is not an example of a computer used as a target of crime?

Illegally accessing stored electronic communication

Which of the following specifically makes malware distribution and hacker attacks to disable websites a federal crime?

National Information Infrastructure Protection Act

Currently, the protocols used for secure information transfer over the Internet are:

SSL, TLS, and S-HTTP.

Comprehensive security management products, with tools for firewalls, VPNs, intrusion detection systems, and more, are called ________ systems.

UTM

Which of the following is the single greatest cause of network security breaches?

User lack of knowledge

All of the following are types of information systems general controls except:

application controls.

All of the following are currently being used as traits that can be profiled by biometric authentication except:

body odor.

The intentional defacement or destruction of a website is called:

cybervandalism

A firewall allows the organization to:

enforce a security policy on data exchanged between its network and the Internet.

________ is spyware that logs and transmits everything a user types.

A keylogger

Which of the following refers to all of the methods, policies, and organizational procedures that ensure the safety of the organization's assets, the accuracy and reliability of its accounting records, and operational adherence to management standards?

Controls

A salesperson clicks repeatedly on the online ads of a competitor in order to drive the competitor's advertising costs up. This is an example of:

click fraud.

Which of the following techniques stops data packets originating outside the organization, inspects them, and passes the packets to the other side of an organizations firewall?

Application proxy filtering

Which of the following is a virus that uses flaws in Windows software to take over a computer remotely?

Conficker

In which method of encryption is a single encryption key sent to the receiver so both sender and receiver share the same key?

Symmetric key encryption


संबंधित स्टडी सेट्स

Maternity Chapter 25: Complications of Pregnancy

View Set

Chapter 18 International aspects of financial planning

View Set

Oceanography Chapter 7, Oceans Chapter 8, Oceanography Chapter 9

View Set

Jarvis Ch 9: General Survey, Measurement, Vital Signs

View Set

Writing Linear, Quadratic and Exponential Function - STAAR Review

View Set

CISCO NetAcad CCNA 1 Chapter 6 Quiz

View Set

Ch 7: Social Determinants of Health and the Role of Law in Optimizing Health

View Set