chapter 8 BCIS
Which of the following defines acceptable uses of a firm's information resources and computing equipment?
An AUP
All of the following countries are popular sources of malware attacks except:
Mexico
Which of the following specifications replaced WEP with a stronger security standard that features changing encryption keys?
WPA2
Conficker (also known as Downadup or Downup) is an example of which of the following?
Worm
All of the following are types of information systems general controls except:
application controls
Evil twins are:
bogus wireless network access points that look legitimate to users.
Which of the following is not an example of a computer used as an instrument of crime?
breaching the confidentiality of protected computerized data
Application controls:
can be classified as input controls, processing controls, and output controls
A salesperson clicks repeatedly on the online ads of a competitor's in order to drive the competitor's advertising costs up. This is an example of:
click fraud
the most common type of electronic evidence is:
A firewall allows the organization to:
enforce a security policy on data exchanged between its network and the Internet
Viruses cannot be spread through email
false
the term cracker is used to identify a hacker whose specialty is breaking open security systems.
false
For 100 percent availability, online transaction processing requires:
fault-tolerant computer systems
The HIPAA Act of 1996:
outlines medical security and privacy rules
Pharming involves;
redirecting users to a fraudulent website even when the user has typed in the correct address in the web browser.
Analysis of an information system that rates the likelihood of a security incident occurring and its cost is included in a(n):
risk assessment
statements ranking information risks and identifying security goals are included in a(n):
security policy
An example of phishing is:
setting up a fake medical website that asks users for confidential information.
Redirecting a web link to a different address is a form of:
spoofing
All of the following have contributed to an increase in software flaws except:
the increase in malicious intruders seeking system access.
According to IT security experts, mobile devices pose greater security risks than larger computers.
true
Biometric authentication is the use of physical characteristics such as retinal images to provide identification.
true
SSL is a protocol used to establish a secure connection between two computers.
true
Smartphones have the same security flaws as other Internet-connected devices
true
To secure mobile devices, a company will need to implement special mobile device management software.
true
When errors are discovered in software programs, the sources of the errors are found and eliminated through a process called debugging.
true
computer worms spread much more rapidly than computer viruses.
true
malicious software programs referred to as malware include a variety of threats such as computer viruses, worms, and Trojan horses.
true
A practice in which eavesdroppers drive by buildings or park outside and try to intercept wireless network traffic is referred to as:
war driving