BCIS 4720 Final Bank

Ace your homework & exams now with Quizwiz!

Software that is used to obtain private user information such as a user's keystrokes or copies of e-mail is referred to as: A. spyware. B. adware. C. a browser parasite. D. a backdoor.

A

What is the most frequent cause of stolen credit cards and card information today? A. the hacking and looting of corporate servers storing credit card information B. phishing attacks C. sniffing programs D. lost cards

A

Which dimensions of security is spoofing a threat to? A. integrity and authenticity B. availability and authenticity C. integrity and confidentiality D. availability and integrity

A

Which of the following is not an example of a potentially unwanted program (PUP)? A. drive-by download B. spyware C. browser parasite D. adware

A

Which of the following is not an example of malicious code? A. sniffer B. scareware C. bot D. Trojan horse

A

Which of the following was designed to cripple Iranian nuclear centrifuges? A. Stuxnet B. Shamoon C. Storm D. Snake

A

________ is the ability to ensure that an e-commerce site continues to function as intended. A. Availability B. Integrity C. Nonrepudiation D. Authenticity

A

Exploit kits can be purchased by users to protect their computers from malware. True or False?

False

If you are not reading from the database, you still seed a DataReader. True or False?

False

Phishing attacks rely on browser parasites. True or False?

False

The SQLDataSource will automatically build INSERT, UPDATE, AND DELETE commands. True or False?

True

Typically the more security measures added to an e-commerce site, the slower and more difficult it becomes to use. True or False?

True

WannaCry is an example of ransomware. True or False?

True

According to Ponemon Institute's 2019 survey, which of the following was not among the causes of the costliest cybercrimes? A. denial of service B. botnets C. malicious insiders D. web-based attacks

B

Confidentiality is sometimes confused with: A. authenticity. B. privacy. C. nonrepudiation. D. integrity.

B

The attack against Dyn servers is an example of a(n): A. SQL injection attack. B. DDoS attack. C. browser parasite. D. MitM attack.

B

What event executes every time a page is loaded? A. btn_Load B. Page_Load C. System.UI D. Master Page

B

Which is not a library we need to work with databases in C#? A. System.Data.SQL B. System.UI C. System.Data.SQLClient D. System.Data

B

Which of the following is not a key factor for establishing e-commerce security? A. organizational policies B. data integrity C. technology D. laws and industry standards

B

________ is the ability to ensure that messages and data are only available to those authorized to view them. A. Availability B. Confidentiality C. Privacy D. Integrity

B

FREAK is an example of a software vulnerability. True or False?

True

A Trojan horse appears to be benign, but then does something other than expected. True or False?

True

Automatically redirecting a web link to a different address is an example of which of the following? A. pharming B. social engineering C. DDoS attack D. sniffing

A

Beebone is an example of which of the following? A. botnet B. worm C. hacktivism D. phishing

A

A drive-by download is malware that comes with a downloaded file that a user intentionally or unintentionally requests. True or False?

True

Spoofing is the attempt to hide a hacker's true identity by using someone else's e-mail or IP address. True or False?

True

Conficker is an example of a: A. Trojan horse. B. botnet. C. worm. D. virus

C

Malware that comes with a downloaded file requested by a user is called a: A. PUP. B. backdoor. C. drive-by download. D. Trojan horse.

C

Which of the following is a brute force attack which hackers launch via botnets and automated tools using known user name and password combinations? A. MitM attack B. phishing C. credential stuffing D. pharming

C

Which of the following is an example of an integrity violation of e-commerce security? A. A website is not actually operated by the entity the customer believes it to be. B. A merchant uses customer information in a manner not intended by the customer. C. An unauthorized person intercepts an online communication and changes its contents. D. A customer denies that he is the person who placed the order.

C

Which of the following technologies is aimed at reducing e-mail address spoofing and phishing? A. TLS B. WPA C. DMARC D. MFA

C

Which of the following types of attacks enabled hackers to take control of the Twitter accounts of dozens of America's most prominent political, entertainment and technology leaders? A. sniffing B. ransomware C. social engineering D. DDoS attack

C

________ is the ability to identify the person or entity with whom you are dealing on the Internet. A. Availability B. Nonrepudiation C. Authenticity D. Integrity

C

________ typically attack governments, organizations, and sometimes individuals for political purposes. A. Bounty hunters B. Tiger teams C. Hacktivists D. Crackers

C

Accessing data without authorization on Dropbox is an example of a: A. social network security issue. B. sniffing issue. C. mobile platform security issue. D. cloud security issue.

D

What are the three pieces of information needed by an SQLCommand? A. Connectionstring, Parameters, and Commandtext B. Datareader, connection, and commandtext C. Datareader, connectionstring, and commandtex D. Parameters, Connection, and CommandText

D

What is not a piece of information stored in the SQLData Source? A. Update Command B. Select Command C. Connection String D. DataReader Command

D

What piece of information is needed by the SQLCommand? A. Parameters B. DataReader C. CommandText D. ConnectionString

D

When does a master page load? A. Every time a session variable is created B. Every time a form loads C. Every time a button is pushed D. Every time a form with a master page loads

D

Which of the following did the Internet Advertising Bureau urge advertisers to abandon? A. HTML5 B. HTML C. Adobe Acrobat D. Adobe Flash

D

Which of the following is an example of an online privacy violation? A. your e-mail being altered by a hacker B. your computer being used as a part of a botnet C. your e-mail being read by a hacker D. your online purchasing history being sold to other merchants without your consent

D

Which of the following is the leading cause of data breaches? A. theft of a computer B. DDoS attacks C. accidental disclosures D. hackers

D

Which of the following statements about data breaches in 2019 is not true? A. According to the Identity Theft Resource Center, the breaches exposed almost 165 million sensitive records, such as the social security numbers and financial account data. B. According to the Identity Theft Resource Center, data breaches involving the business sector represented about 44% of all breaches. C. According to the Identity Theft Resource Center, the number of breaches in 2019 increased by 17% from 2018. D. According to the Identity Theft Resource Center, employee error was the leading cause of data breaches.

D

________ is the ability to ensure that e-commerce participants do not deny their online actions. A. Authenticity B. Integrity C. Availability D. Nonrepudiation

D

Why is it difficult to accurately estimate the actual amount of cybercrime?

There is a reputational factor to companies and conglomerates not estimating and thus disclosing cybercrime to the general public. Also, quantitative conversions of cybercrime are difficult to create due to the fact that quantified estimates are virtually impossible to create on the basis of loss. Legal obstructions also create both a hard place relative to this dilemma.


Related study sets

Test 3 Saunders & Davis NCLEX questions

View Set

La naturaleza y la geografía de Colombia y Venezuela

View Set

WorkBook Chapter 11 (DA1) Dental Assisting 1

View Set

project management chapter 3 quiz

View Set

Chapter 4: Writing Collaboratively

View Set