MIS Chapter 8 Practice Exam

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

enforce a security policy on data exchanged between its network and the internet

A firewall allows the organization to:

cyberwarfare

A foreign country attempting to access government networks in order to disable a national power grid would be an example of

spyware

A keylogger is a type of:

war driving

A practice in which eavesdroppers drive by buildings or park outside and try to intercept wireless network traffic is referred to as:

click fraud

A salesperson clicks repeatedly on the online ads of a competitor's in order to drive the competitor's advertising costs up. This is an example of

body odor

All of the following are currently being used as traits that can be profiled by biometric authentication except:

application controls

All of the following are types of information systems general controls except

is a device that displays passcodes

An authentication token:

setting up a fake medical Web site that asks users for confidential information.

An example of phishing is

worm

An independent computer program that copies itself from one computer to another over a network is called a

risk assessment

Analysis of an information system that rates the likelihood of a security incident occurring and its cost is included in a(n)

can be classified as input controls, processing controls, and output controls

Application controls

UTM

Comprehensive security management products, with tools for firewalls, VPNs, intrusion detection systems, and more, are called ________ systems.

collecting physical evidence on the computer.

Computer forensics tasks include all of the following except:

SSL, TLS, and S-HTTP

Currently, the protocols used for secure information transfer over the Internet are

bogus wireless network access points that look legitimate to users

Evil twins are:

deep packet inspection

In controlling network traffic to minimize slow-downs, a technology called ________ is used to examine data files and sort low-priority data from high-priority data

symmetric key encryption

In which method of encryption is a single encryption key sent to the receiver so both sender and receiver share the same key?

payload

Most computer viruses deliver a:

redirecting users to a fraudulent website even when the user has typed in the correct address in the web browser

Pharming involves

spoofing

Phishing is a form of:

spoofing

Redirecting a Web link to a different address is a form of

requires financial institutions to ensure the security of customer data.

The Gramm-Leach-Bliley Act

outlines medical security and privacy rules

The HIPAA Act of 1996:

imposes responsibility on companies and management to safeguard the accuracy of financial information

The Sarbanes-Oxley Act:

email

The most common type of electronic evidence is:

social engineering

Tricking employees to reveal their passwords by pretending to be a legitimate member of a company is called

DDoS

Using numerous computers to inundate and overwhelm the network from numerous launch points is called a(n) __________ attack

An AUP

Which of the following defines acceptable uses of a firm's information resources and computing equipment?

Disaster recovery planning

Which of the following focuses primarily on the technical issues of keeping systems up and running?

a file deleted from a hard disk

Which of the following is a type of ambient data?

illegally accessing stored electronic communication

Which of the following is not an example of a computer used as a target of crime?

breaching the confidentiality of protected computerized data

Which of the following is not an example of a computer used as an instrument of crime?

"Controls"

Which of the following refers to all of the methods, policies, and organizational procedures that ensure the safety of the organization's assets, the accuracy and reliability of its accounting records, and operational adherence to management standards?

National Information Infrastructure Protection Act

Which of the following specifically makes malware distribution and hacker attacks to disable websites a federal crime?

WPA2

Which of the following specifications replaced WEP with a stronger security standard that features changing encryption keys?

It is not possible to make a smartphone part of a botnet.

Which of the following statements about botnets is not true?

VoIP is more secure than the switched voice network

Which of the following statements about internet security is not true?

Authentication cannot be established by the use of a password

Which of the following statements about passwords is not true?

Data security

________ controls ensure that valuable business data files on either disk or tape are not subject to unauthorized access, change, or destruction while they are in use or in storage.

"Security"

________ refers to policies, procedures, and technical measures used to prevent unauthorized access, alternation, theft, or physical damage to information systems.

Identity theft

____________ is a crime in which an imposter obtains key pieces of personal information to impersonate someone else

SSIDs

_____________ identify the access points in a Wi-Fi network


Set pelajaran terkait

Sherpath: Skeletal Disorders and Immobilization

View Set

Bonus Chapter A Working within the Legal Environment

View Set

Chapter 27 programmable controllers

View Set