Ch. 8 Study Guide

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

According to the 2016 Identity Fraud Study by Javelin Strategy & Research, how much did consumers lose to identity fraud in 2015?

15 billion

According to Ponemon Institute's 2015 Annual Cost of Cyber Crime Study, the average annualized cost of cybercrime for companies in the United States was approximately:

15 million

Which of the following defines acceptable uses of a firm's information resources and computing equipment?

An AUP

Which of the following statements about wireless security is not true?

Bluetooth is the only wireless technology that is not susceptible to hacking by eavesdroppers.

Which of the following is not an example of a computer used as an instrument of crime?

Breaching the confidentiality of protected computerized data

Computer forensics tasks include all of the following except

Collecting physical evidence (finger prints)

Which of the following refers to all of the methods, policies, and organizational procedures that ensure the safety of the organization's assets, the accuracy and reliability of its accounting records, and operational adherence to management standards?

Controls

Using numerous computers to inundate and overwhelm the network from numerous launch points is called a(n) ________ attack

DDoS

________ controls ensure that valuable business data files on either disk or tape are not subject to unauthorized access, change, or destruction while they are in use or in storage.

Data security

________ is malware that hijacks a user's computer and demands payment in return for giving back access

Ransomeware

Which of the following statements about Internet security is not true?

VoIP is more secure than the switched voice network.

Which of the following refers to eavesdroppers driving by buildings or parking outside and trying to intercept wireless network traffic?

War driving

Evil twins are

bogus wireless network access points that look legit

Application controls:

can be classified as input controls, processing controls, and output controls.

A salesperson clicks repeatedly on the online ads of a competitor in order to drive the competitor's advertising costs up. This is an example of:

click-fraud

A foreign country attempting to access government networks in order to disable a national power grid is an example of:

cyber warfare

Most common evidence

e-mail

The Sarbanes-Oxley Act:

imposes responsibility on companies and management to safeguard the accuracy of financial information.

Which of the following statements about botnets is not true?

it is not possible to make a cell phone part of a botnet

is malware that logs and transmits everything a user types

keylogger

Pharming involves:

redirecting users to a fraudulent website even when the user has typed in the correct address in the web browser.

The Gramm-Leach-Bliley Act:

requires financial institutions to ensure the security of customer data.

Tricking employees into revealing their passwords by pretending to be a legitimate member of a company is called:

social engineering


Set pelajaran terkait

Nutrition Unit 1: Review questions

View Set

Combo with "Chapter 32: The Conservative Resurgence" and 10 others

View Set

UNIDAD 8: La tecnología y las ciencias Spanish-Spanish

View Set

Parts and Functions of the Musculoskeletal System

View Set