Quiz 9 (Chapter 10) IS Security
Password managers such as Bitwarden and Lastpass use a type of technology called ______, which transforms user input into a mix of jumbled and unintelligible code that securely stores password information.
Encryption
You have assigned a database administrator the duty to upgrade the company database over the next couple days. However, instead of upgrading to the new version, he accidentally installs an old version on top of the current version. This is NOT an example of a security threat, since it is a human error.
False
You have recently been hired at a tech firm to help with their SEO (search engine optimization) algorithm. The CEO asks you to create a username and password for your work computer. Usernames are used to authenticate a user and passwords are used for identification of a user.
False
When you log onto your email, you see an email from your boss who is asking for your social security number to verify forms before tax season. However, a couple things seem fishy about the email and it doesn't look like an email your boss would send. With this in mind, you think back to IS 4410 and realize you are at risk of a ______ attack.
Phishing
______ is a popular type of authentication with smartphones today, where the phone owner may scan their fingerprint on the screen or show their face to the camera to gain access to the phone.
Biometric Authentication
After a massive layoff at the tech firm you work at, one employee becomes so enraged that they intentionally destroy customer records from the database before they leave the office. This is an example of ______.
Computer Crime
While shopping on your favorite clothing retailer's website, you see a jacket you want to buy, but want to wait for it to go on sale. You forget about the jacket for a week, but when you log back on, the jacket is still in your shopping cart. This is because your browser has saved a ______ to remember information you have entered in the website.
Cookie
When you go to download (what looks like a perfectly normal) music file for a song you can't get out of your head, you quickly realize that the file isn't as safe as you once thought it was. Your computer begins to act buggy and you become worried. You log onto your bank account and notice that all the money in it has been pulled from your account. This is an example of a(n) ______.
Trojan horse
The company you work for is debating whether to build a data center in New Orleans, Louisiana. This data center would replace all other data centers across the country and be the sole provider of all company data. It is wise to advise against building in this geographical area since natural disasters can include the initial loss of service plus losses stemming from the recovery of the initial loss.
True
Mark is transferring funds online through the Web site of a reputed bank. Which of the following will be displayed in the address bar of his browser that will let him know that the bank is using the Secure Sockets Layer (SSL) protocol?
https