BCIS4720/5680 test 2

Ace your homework & exams now with Quizwiz!

Which of the following statements about data breaches in 2019 is not true?

According to the Identity Theft Resource Center, employee error was the leading cause of data breaches.

Which of the following did the Internet Advertising Bureau urge advertisers to abandon?

Adobe Flash

Which of the following is an example of an integrity violation of e-commerce security?

An unauthorized person intercepts an online communication and changes its contents.

________ is the ability to identify the person or entity with whom you are dealing on the Internet.

Authenticity

________ is the ability to ensure that an e-commerce site continues to function as intended.

Availability

The attack against Dyn servers is an example of a(n):

DDoS attack.

Which of the following technologies is aimed at reducing e-mail address spoofing and phishing?

DMARC

What is not a piece of information stored in the SQLData Source?

DataReader Command

When does a master page load?

Every time a form loads Every time a button is pushed Every time a form with a master page loads

Exploit kits can be purchased by users to protect their computers from malware.(T/F)

False

If you are not reading from the database, you still seed a DataReader.

False

Phishing attacks rely on browser parasites.(T/F)

False

Why is it difficult to accurately estimate the actual amount of cybercrime?

It is difficult to accurately estimate the actual amount of cybercrime in part because many companies are hesitant to report it due to a fear of losing the trust of their customers, and because even if crime is reported, it may be difficult to quantify the actual dollar amount of the loss.

Which of the following is the leading cause of data breaches?

hackers

Which dimensions of security is spoofing a threat to?

integrity and authenticity

Automatically redirecting a web link to a different address is an example of which of the following?

pharming

Which of the following is not an example of malicious code?

sniffer

What is the most frequent cause of stolen credit cards and card information today?

the hacking and looting of corporate servers storing credit card information

Conficker is an example of a:

worm.

Which of the following is an example of an online privacy violation?

your online purchasing history being sold to other merchants without your consent

Confidentiality is sometimes confused with:

privacy.

Which of the following types of attacks enabled hackers to take control of the Twitter accounts of dozens of America's most prominent political, entertainment and technology leaders?

social engineering

Software that is used to obtain private user information such as a user's keystrokes or copies of e-mail is referred to as:

spyware.

A Trojan horse appears to be benign, but then does something other than expected.(T/F)

True

A drive-by download is malware that comes with a downloaded file that a user intentionally or unintentionally requests.

True

FREAK is an example of a software vulnerability.(T/F)

True

Spoofing is the attempt to hide a hacker's true identity by using someone else's e-mail or IP address.

True

Beebone is an example of which of the following?

botnet

According to Ponemon Institute's 2019 survey, which of the following was not among the causes of the costliest cybercrimes?

botnets

Accessing data without authorization on Dropbox is an example of a:

cloud security issue.

Which of the following is a brute force attack which hackers launch via botnets and automated tools using known user name and password combinations

credential stuffing

Which of the following is not a key factor for establishing e-commerce security?

data integrity

Which of the following is not an example of a potentially unwanted program (PUP)?

drive-by download

Malware that comes with a downloaded file requested by a user is called a:

drive-by download.

________ is the ability to ensure that messages and data are only available to those authorized to view them.

Confidentiality

What piece of information is needed by the SQLCommand?

ConnectionString

What are the three pieces of information needed by an SQLCommand?

Parameters, Connection, and CommandText

________ typically attack governments, organizations, and sometimes individuals for political purposes.

Hacktivists

________ is the ability to ensure that e-commerce participants do not deny their online actions.

Nonrepudiation

What event executes every time a page is loaded?

Page_Load

Which of the following was designed to cripple Iranian nuclear centrifuges?

Stuxnet

Which is not a library we need to add to work with databases in C#?

System.UI

The SQLDataSource will automatically build INSERT, UPDATE, AND DELETE commands.(T/F)

True

Typically, the more security measures added to an e-commerce site, the slower and more difficult it becomes to use. (T/F)

True

WannaCry is an example of ransomware.(T/F)

True


Related study sets

CH 22 Nursing Management of the Postpartum Woman at Risk; CH 23 Nursing Care of the Newborn With Special Needs; CH 24 Nursing Care of the Newborn at Risk PrepU (Developmental)

View Set

Campbell Biology; Chapter 5: Worksheet

View Set

142 Acute & Chronic Illness - PRACTICE QUESTIONS

View Set

Using a Rule to Find Decimal Products (Quiz)

View Set

Chapter 20: Trauma and Surgical Management

View Set

UNIT #2: Regulation of Investment Adviser Representative

View Set

Ch 20 Trauma and Surgical Management

View Set

Vocabulary from classical roots Book E lesson 14

View Set