MNGT 220 chapter 8 review
using numerous computers to inundate and overwhelm the network from numerous launch point is called
DDoS
true of false DoS attacks flood a network server with thousands of requests for service
TRUE
true or false a computer worm is a program that can copy itself to other computers on a network
TRUE
true or false legislation requiring private or governmental entities to notify individuals of security breaches involving personally identifiable information has been enacted in all 50 states
TRUE
true or false phishing is a form of spoofing
TRUE
an AUP
acceptable uses of a firms information resources and computing equipment
evil twins are
bogus wireless network access points that look legitimate
what are the security challenges faced by wireless networks?
both bluetooth and wifi networks are susceptible to hacking by eavesdroppers. local area networks (LANs) using 802.11 standard can be easily penetrated by outsiders armed with laptops, wireless cards, external antennae and hacking software.
the international defacement or destruction of a website is called
cyber vandalism
a foreign company attempting to access government networks in order to disable a power grid is
cyberwarfare
focuses primarily on the technical issues of keeping systems up and running
disaster recovery planning
true or false mobile devices typically feature state of the art encryption and security features making them highly secure tools for businesses and therefor do not require any special protections
false
true or false most IoT devices support sophisticated security approaches
false
the gramm- leach- bliley act says
financial institutions are to ensure the security of customer data
the sarbanes oxley act
imposes responsibility on companies and management to safeguard the accuracy of financial information
does not contribute to an increase to software flaws
increase in the number of computer hackers in the world
a tool used for scanning software to look for known problems such as bad passwords, the removal of important files, security attacks in progress, and system administration errors
intrusion detection systems
spyware that logs and transmits everything a user types
keylogger
what is not true about internet security vulnerabilities
large public networks, such as the internet, are less vulnerable than internal networks
HIPPA act of 1966 says
outlines medical security and privacy rules
a firewall allows an organization to
prevent unauthorized communication into and out of its network
risk assessment
ranking information risk and identifying security goals
malware that hijacks a users computer and demands payment
ransomware
what uses policies, procedures, and technical measures to prevent unauthorized access to information
security
what about blockchians is not true
the data represented in a blockchain is maintained in a central database
is the cloud a safer and more secure computing environment than an in house network? why or why not
the safety of cloud computing as compared to in house network computing depends on the implications both at the corporation and the service provider. the company will need to make ensure procedures and make sure that employees have secure passwords and access levels.
true or false biometric authentication uses systems that read and interpret individual human traits
true
true or false a firewall is a combination or hardware and software the controls the flow of incoming and outgoing network traffic
true
true or false an acceptable use policy defines acceptable uses of the firms information resources and computing equipment
true
true or false authentication refers to verifying that people are who they claim to be
true
true or false in cloud computing, accountability and responsibility for protection of sensitive data resides within the company owning the data
true
true or false zero defects cannot be achieved in larger software programs because fully testing programs that contain thousands of choices and millions of paths would require thousands of years
true
explain how two factor authentication increases security
two factor authentication increases security by validating the user through a multistep process. to be properly identified, the user must provide a physical token as well as data
blockchain refers to a technology that
uses a chain of digital blocks that that contain records of transactions
a digital certificate system
uses third party CAs to validate a users identity