IS 201 4.5 Reading Quiz

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

Phishing

Phishing is a fraudulent technique for obtaining a person's private information through an email. Phishing emails typically ask you to provide personal information (usernames, passwords, credit card numbers, government IDs, etc.). They may also ask you to click on a link that will lead to a website that asks for personal information or is infected with malware.

The 3 forms of Identity theft

1. Financial Identity Theft: stealing another person's credit card or bank account number. This may also include using a stolen identity (social security number, address, name, etc.) to apply for a credit card or loan that may impact credit ratings or cause unmerited financial obligations. 2. Medical Identity Theft: stealing another person's personal information to obtain medical care, buy drugs, or submit fake billings to an insurance company. Aside from its financial consequences, this form of identity theft could be life-threatening if incorrect information is inserted into one's medical records and the wrong medical decisions are made based on these records. 3. Criminal Identity Theft: giving another person's name, date of birth, driver's license number, etc., to a law enforcement officer during an investigation or upon arrest. This identity theft may result in false criminal records, fines, or other legal actions.

What's the difference between a Virus, Worm, and Trojan Horse?

A virus refers to a malicious program that attaches itself to another program or file. It spreads from one computer to another as users share programs or files. A worm is similar to a virus, except that it can spread from computer to computer by itself (without requiring users to share the virus). A Trojan horse is a malicious program that is disguised as a legitimate, useful program. However, when you open the Trojan horse, it may consume the resources of your computer, cause damage to your computer (e.g., delete files), steal information, or create a backdoor that allows someone to take control of your computer. Trojan horses do not self-replicate or infect files like worms or viruses do

In creating a strong password, which of the following should you avoid? A. Using names of family members, pets, sports teams, etc. B. Using letters, numbers, and special characters C. Creating unique passwords for different accounts D. Using a phrase or sentence (modified by inserting special characters, numbers, or random capitalization) that you can easily remember

A. Using names of family members, pets, sports teams, etc.

Which of the following is an example of something-you-are-based authentication? A. Voice B. Smart Card C. User ID D. None of these

A. Voice

Which of the following are reasons for committing identity theft? A. To apply for a credit card or loan in another person's name B. To obtain medical care, buy drugs, or submit fake billings to an insurance company in another person's name C. To give another person's name, driver's license number, or contact information to a law enforcement officer upon arrest D. Both a and b E. All of the above

All of the above

Tom keeps his computer in his front room. He has lots of friends who frequently come by unannounced (his door is normally unlocked), and he loves to show them YouTube videos. Tom is very busy finishing school and feels like he doesn't have time to back up his data himself. However, he wants to back up his homework as quickly and frequently as possible. He would like to have the option of restoring previous versions of his documents if something accidentally gets deleted or modified.Which of the following backup plans would be most secure in the above scenario? A. A hard drive that sits on the desk next to his computer and that he will enable to automatically perform backups B. A hard drive or an online backup account because either one works and it really doesn't matter in this instance C. An online backup system (e.g., Mozy, Carbonite, or even Dropbox) that automatically backs up data on his computer D. CDs that are burned once a week and relocated to the Granite Mountain Vault

C. An online backup system (e.g., Mozy, Carbonite, or even Dropbox) that automatically backs up data on his computer

What is true of the Hypertext Transfer Protocol Secure (https) protocol? A. It securely backs up your data. B. It encrypts data located on your hard drive. C. It can help protect against network sniffing (people intercepting your information over a wireless network). D. It is always used when websites request sensitive information (e.g., user's names and passwords).

C. It can help protect against network sniffing (people intercepting your information over a wireless network).

In the CIA triad, integrity is defined as ________. A. Restricting access to information and resources to those who are authorized to use them B. Ensuring that authorized users are able to access information and resources when they need to C. Protecting data from unauthorized modification or deletion D. None of the above

C. Protecting data from unauthorized modification or deletion

This type of malware is disguised to be a legitimate, useful program. However, when you install the software, it may consume the resources of your computer, cause damage to your computer, steal information, or create a backdoor that allows someone to take control of your computer. A. Virus B. Worm C. Trojan horse D. All of the above

C. Trojan horse

CIA Triad

Confidentiality, Integrity, Availability

Which of the following does a firewall perform? A. Limits the number of ways an attack can come in B. Blocks unauthorized packets from entering or exiting the network C. Detects computers communicating with the Internet without approval D. All of the above

D. All of the above

Why might an ordinary person be a target of a security breach? A. Ordinary people have identities that can be stolen. B. Ordinary people have computers that can be turned into zombies. C. Hackers can impersonate a normal person and attack that person's acquaintances. D. Both a and b E. All of the above

E. All of the above

Which of the following is not a real information system security threat or vulnerability? A. Hackers B. Weak passwords C. Severe weather (fire, floods, etc.) D. New or temp employees E. All of the above are real threats

E. All of the above are real threats


Set pelajaran terkait

Cost Management Knowledge Area (10 questions)

View Set

Milady Chapter 19: Advanced topics and treatments

View Set

PHYSIO: chapter 7 practice questions

View Set