Quiz Chapter 8 IS290
Most computer viruses deliver a:
payload.
Pharming involves:
redirecting users to a fraudulent website even when the user has typed in the correct address in the web browser.
A digital certificate system:
uses third party CAs to validate a user's identity.
Your company, an online discount pet supply store, has calculated that a loss of Internet connectivity for 3 hours results in a potential loss of $2,000 to $3,000 and that there is a 50% chance of this occurring each year. What is the annual expected loss from this exposure?
$1,250
Which of the following defines acceptable uses of a firm's information resources and computing equipment?
An AUP
Which of the following is not an example of a computer used as a target of crime?
Illegally accessing stored electronic communication
Which of the following specifically makes malware distribution and hacker attacks to disable websites a federal crime?
National Information Infrastructure Protection Act
Currently, the protocols used for secure information transfer over the Internet are:
SSL, TLS, and S-HTTP.
Comprehensive security management products, with tools for firewalls, VPNs, intrusion detection systems, and more, are called ________ systems.
UTM
Which of the following is the single greatest cause of network security breaches?
User lack of knowledge
All of the following are types of information systems general controls except:
application controls.
All of the following are currently being used as traits that can be profiled by biometric authentication except:
body odor.
The intentional defacement or destruction of a website is called:
cybervandalism
A firewall allows the organization to:
enforce a security policy on data exchanged between its network and the Internet.
________ is spyware that logs and transmits everything a user types.
A keylogger
Which of the following refers to all of the methods, policies, and organizational procedures that ensure the safety of the organization's assets, the accuracy and reliability of its accounting records, and operational adherence to management standards?
Controls
A salesperson clicks repeatedly on the online ads of a competitor in order to drive the competitor's advertising costs up. This is an example of:
click fraud.
Which of the following techniques stops data packets originating outside the organization, inspects them, and passes the packets to the other side of an organizations firewall?
Application proxy filtering
Which of the following is a virus that uses flaws in Windows software to take over a computer remotely?
Conficker
In which method of encryption is a single encryption key sent to the receiver so both sender and receiver share the same key?
Symmetric key encryption