Chapter 8-Securing Information Systems
________ is spyware that logs and transmits everything a user types.
A keylogger
Which of the following statements about wireless security is not true
Bluetooth is the only wireless technology that is not susceptible to hacking by eavesdroppers
refers to all of the methods, policies, and organizational procedures that ensure the safety of the organization's assets, the accuracy and reliability of its accounting records, and operational adherence to management standards?
Controls
What happened when hackers targeted the US presidential election?
Hackers took advantage of uneven security and controls and loose management to attack the Clinton campaign
what are controls?
Methods, Policies, and organizational procures that ensure the safety of the organizations assets, accuracy, and reliability
Internet Vulnerabilities
Network is open to anyone unencrypted VOIP Email, P2P, IM-interception, malware, transmit trade secrets
wireless security challenges
Radio frequencies are easy to intercept ssid- named wifi
________ is malware that hijacks a user's computer and demands payment in return for giving back access.
Ransomware
war driving
Searching for wireless signals from an automobile or on foot using a portable computing device.
Which of the following refers to policies, procedures, and technical measures used to prevent unauthorized access, alteration, theft, or physical damage to information systems
Security
An employee clicks on a link in an email from what looks like a fellow employee and is taken to a fraudulent web site which asks for personal information is an example of:
Spear phishing
A salesperson clicks repeatedly on the online ads of a competitor in order to drive the competitor's advertising costs up. This is an example of
click fraud.
A Trojan horse:
is software that appears to be benign but does something other than expected
Most computer viruses deliver a:
payload
All of the following are specific security challenges that threaten corporate servers in a client/server environment except
sniffing. denial-of-service attacks. malware. vandalism. hacking.