MIS Chapter 8 example #65424

16 November 2022
4.5 (156 reviews)
60 test answers

Unlock all answers in this set

Unlock answers (56)
question
Which of the following refers to policies, procedures, and technical measures used to prevent unauthorized access, alteration, theft, or physical damage to information systems?
answer
A) Security
question
Which of the following refers to all of the methods, policies, and organizational procedures that ensure the safety of the organization's assets, the accuracy and reliability of its accounting records, and operational adherence to management standards?
answer
E) Controls
question
Most computer viruses deliver a:
answer
E) payload.
question
Which of the following statements about wireless security is not true?
answer
E) Bluetooth is the only wireless technology that is not susceptible to hacking by eavesdroppers.
question
All of the following are specific security challenges that threaten the communications lines in a client/server environment except:
answer
A) errors.
question
All of the following are specific security challenges that threaten corporate servers in a client/server environment except:
answer
D) sniffing.
question
All of the following are specific security challenges that threaten corporate systems in a client/server environment except:
answer
D) radiation.
question
CryptoLocker is an example of which of the following?
answer
E) Ransomware
question
Which of the following statements about Internet security is not true?
answer
C) VoIP is more secure than the switched voice network.
question
A Trojan horse:
answer
A) is software that appears to be benign but does something other than expected.
question
A salesperson clicks repeatedly on the online ads of a competitor in order to drive the competitor's advertising costs up. This is an example of:
answer
E) click fraud.
question
Which of the following is a virus that uses flaws in Windows software to take over a computer remotely?
answer
E) Conficker
question
________ is malware that hijacks a user's computer and demands payment in return for giving back access.
answer
B) Ransomware
question
________ is malware that logs and transmits everything a user types.
answer
C) A keylogger
question
Which of the following statements about botnets is not true?
answer
E) It is not possible to make a smartphone part of a botnet.
question
Using numerous computers to inundate and overwhelm the network from numerous launch points is called a(n) ________ attack.
answer
A) DDoS
question
Which of the following is not an example of a computer used as a target of crime?
answer
C) Illegally accessing stored electronic communication
question
Which of the following is not an example of a computer used as an instrument of crime?
answer
D) Breaching the confidentiality of protected computerized data
question
Which of the following specifically makes malware distribution and hacker attacks to disable websites a federal crime?
answer
E) National Information Infrastructure Protection Act
question
The intentional defacement or destruction of a website is called:
answer
B) cybervandalism.
question
Evil twins are:
answer
E) bogus wireless network access points that look legitimate to users.
question
Pharming involves:
answer
A) redirecting users to a fraudulent website even when the user has typed in the correct address in the web browser.
question
Which of the following is the single greatest cause of network security breaches?
answer
B) User lack of knowledge
question
Tricking employees into revealing their passwords by pretending to be a legitimate member of a company is called:
answer
B) social engineering.
question
According to Ponemon Institute's 2015 Annual Cost of Cyber Crime Study, the average annualized cost of cybercrime for companies in the United States was approximately:
answer
B) $15 million.
question
Which of the following refers to eavesdroppers driving by buildings or parking outside and trying to intercept wireless network traffic?
answer
A) War driving
question
________ is a crime in which an imposter obtains key pieces of personal information to impersonate someone else.
answer
A) Identity theft
question
________ identify the access points in a Wi-Fi network.
answer
E) SSIDs
question
A foreign country attempting to access government networks in order to disable a national power grid is an example of:
answer
C) cyberwarfare.
question
According to the 2016 Identity Fraud Study by Javelin Strategy & Research, how much did consumers lose to identity fraud in 2015?
answer
E) $15 billion
question
All of the following have contributed to an increase in software flaws except:
answer
E) the increase in malicious intruders seeking system access.
question
Which of the following is an example of a keylogger?
answer
A) Zeus
question
The HIPAA Act of 1996:
answer
D) outlines medical security and privacy rules.
question
The Gramm-Leach-Bliley Act:
answer
A) requires financial institutions to ensure the security of customer data.
question
The Sarbanes-Oxley Act:
answer
C) imposes responsibility on companies and management to safeguard the accuracy of financial information.
question
Which of the following is the most common type of electronic evidence?
answer
D) E-mail
question
Which of the following is a type of ambient data?
answer
B) A file deleted from a hard disk
question
Computer forensics tasks include all of the following except:
answer
C) collecting physical evidence on the computer.
question
Your company, an online discount pet supply store, has calculated that a loss of Internet connectivity for 3 hours results in a potential loss of $2,000 to $3,000 and that there is a 50% chance of this occurring each year. What is the annual expected loss from this exposure?
answer
C) $1,250
question
Application controls:
answer
A) can be classified as input controls, processing controls, and output controls.
question
________ controls ensure that valuable business data files on either disk or tape are not subject to unauthorized access, change, or destruction while they are in use or in storage.
answer
C) Data security
question
An analysis of an information system that rates the likelihood of a security incident occurring and its cost would be included in which of the following?
answer
C) Risk assessment
question
A statement ranking information risks and identifying security goals would be included in which of the following?
answer
A) Security policy
question
Which of the following defines acceptable uses of a firm's information resources and computing equipment?
answer
E) An AUP
question
Which of the following focuses primarily on the technical issues of keeping systems up and running?
answer
C) Disaster recovery planning
question
Which of the following specifications replaced WEP with a stronger security standard that features changing encryption keys?
answer
D) WPA2
question
Which of the following statements about passwords is not true?
answer
A) Authentication cannot be established by the use of a password.
question
An authentication token is a(n):
answer
C) gadget that displays passcodes.
question
All of the following are currently being used as traits that can be profiled by biometric authentication except:
answer
C) body odor.
question
A firewall allows the organization to:
answer
A) enforce a security policy on data exchanged between its network and the Internet.
question
________ use scanning software to look for known problems such as bad passwords, the removal of important files, security attacks in progress, and system administration errors.
answer
B) Intrusion detection systems
question
Currently, the protocols used for secure information transfer over the Internet are:
answer
E) SSL, TLS, and S-HTTP.
question
In which method of encryption is a single encryption key sent to the receiver so both sender and receiver share the same key?
answer
B) Symmetric key encryption
question
A digital certificate system:
answer
A) uses third-party CAs to validate a user's identity.
question
All of the following are types of information systems general controls except:
answer
A) application controls.
question
For 100-percent availability, online transaction processing requires:
answer
C) fault-tolerant computer systems.
question
In controlling network traffic to minimize slow-downs, a technology called ________ is used to examine data files and sort low-priority data from high-priority data.
answer
B) deep packet inspection
question
An authentication system in which a user must provide two types of identification, such as a bank card and PIN, is called:
answer
C) two-factor authentication.
question
Which of the following provides additional security by determining whether packets are part of an ongoing dialogue between a sender and receiver?
answer
D) Stateful inspection
question
Comprehensive security management products, with tools for firewalls, VPNs, intrusion detection systems, and more, are called ________ systems.
answer
E) UTM