BIS Chapter 4

12 November 2022
4.7 (205 reviews)
165 test answers

Unlock all answers in this set

Unlock answers (161)
question
E-Espionage represents online security threats and should be a high-level concern that all companies and individuals need to implement measures to protect themselves from.
answer
True
question
Government agencies have reported in the past two years a huge increase in cybersecurity incidents to the U.S. Homeland Security Department.
answer
True
question
Poison Ivy was an E-Espionage training strategy performed by the United States military to avoid cyber attacks
answer
False
question
Ethics and security are two fundamental building blocks for all organizations.
answer
True
question
Privacy is the legal protection afforded an expression of an idea, such as a song, book, or video game.
answer
False
question
Information governance is a method or system of government for information management or control.
answer
True
question
Confidentiality is the right to be left alone when you want to be, to have control over your own personal possessions, and not to be observed without your consent.
answer
False
question
Epolicies are policies and procedures that address information management along with the ethical use of computers and the Internet in the business environment.
answer
True
question
An acceptable use policy (AUP) requires a user to agree to follow it to be provided access to corporate email, information systems, and the Internet.
answer
True
question
Companies do not need a privacy policy for email because an employee's work email is private and cannot be viewed by the company.
answer
False
question
A social media policy outlines the corporate guidelines or principles governing employee online communications.
answer
True
question
An ethical computer use policy contains general principles to guide computer user behavior.
answer
True
question
Employee monitoring policies explicitly state how, when, and where the company monitors its employees.
answer
True
question
Information technology monitoring tracks people's activities by such measures as number of keystrokes, error rate, and number of transactions processed.
answer
True
question
Spyware is software that, while purporting to serve some useful function and often fulfilling that functions, also allows Internet advertisers to display advertisements without the consent of the computer user.
answer
False
question
The Trojan-horse virus hides inside other software, usually as an attachment or a downloadable file.
answer
True
question
Information security is a broad term encompassing the protection of information from accidental or intentional misuse by persons inside or outside an organization
answer
True
question
Two of the common forms of viruses discussed in the book include the Trojan-horse virus and the acceptance-of-service attack.
answer
False
question
A hacker weapon called a splog (spam blog) is a fake blog created solely to raise the search engine rank of affiliated websites.
answer
True
question
. Information security is a high priority for protection of the company's information and it is critical to implement an information security procedure to combat misuse of this information.
answer
True
question
Smoking areas are targeted by hackers as they regularly use smoking entrances to gain building access where they pose as employees to gain access to the company network.
answer
True
question
Downtime refers to a period of time when a system is unavailable and unplanned downtime can strike at any time for various reasons.
answer
True
question
Legitimate users who purposely or accidentally misuse their access to the environment and cause some kind of business-affecting incident are called insiders.
answer
True
question
Insiders are illegitimate users who purposely or accidentally misuse their access to the environment to do business.
answer
False
question
Information security policies detail how an organization will implement the information security plan.
answer
False
question
Dumpster diving is another security breach for companies and is where people not associated with the company jump into the company's outside garbage bins and try to gather and steal any valuable company products they can resell on eBay.
answer
False
question
Organizations address security risks through two lines of defense. The first is people and the second is technology.
answer
True
question
Through social engineering, hackers use their social skills to trick people into revealing access credentials or other valuable information.
answer
True
question
The three primary information security areas are 1) authentication and authorization, 2) policies and rewards, and 3) detection and response.
answer
False
question
Tokens are small electronic devices that change user passwords automatically.
answer
True
question
The technique to gain personal information for the purpose of identity theft, often through fraudulent emails that look as though they came from legitimate businesses is called phishing.
answer
True
question
A process of providing a user with permission including access levels and abilities such as file access, hours of access, and amount of allocated storage space is called authentication.
answer
False
question
One of the most ineffective ways to set up authentication techniques is by setting up user ID's and passwords.
answer
True
question
Biometrics is the identification of a user based on a physical characteristic, such as a fingerprint, iris, face, voice, or handwriting.
answer
True
question
A firewall scrambles information into an alternative form that requires a key or password to decrypt.
answer
False
question
One of the biggest government technology breaches was in the form of an email, and landed in the email box of Jack Mulhern, the V.P. for international military assistance programs at Booz Allen. What was this case nicknamed?
answer
B. Poison Ivy
question
The pentagon researched and tracked this espionage email hacker sent to Booz Allen and tracked it all the way back to an Internet address in China called _______________.
answer
A. Cybersyndrome.3322.org
question
Which of the following represents the two fundamental building blocks that protect organizational information?
answer
C. Ethics and security
question
What is the legal protection afforded an expression of an idea, such as a song, book, or video game?
answer
D. Copyright
question
40. What is the intangible creative work that is embodied in physical form and includes trademarks and patents? A. Intellectual software B. Intellectual property C. Trademark property D. Ethical property
answer
B. Intellectual property
question
41. Trust between companies, customers, partners, and suppliers are the support structure of which of the following?
answer
A. Ebusiness
question
In relation to privacy, which of the following is the assurance that messages and information remain available only to those authorized to view them?
answer
C. Confidentiality
question
Which of the following key terms represents the principles and standards that guide our behavior toward other people?
answer
A. Ethics
question
What is the difference between pirated and counterfeit software?
answer
B. Pirated is the unauthorized use, duplication, distribution, or sale of copyrighted software, where counterfeit is software that is manufactured to look like the real thing and sold as such
question
Which of the following governs the ethical and moral issues arising from the development and use of information technologies, and the creation, collection, duplication, distribution, and processing of information?
answer
D. Information ethics
question
Which of the following means the right to be left alone when you want to be, to have control over your personal possessions, and not to be observed without your consent?
answer
C. Privacy
question
47. Determining what is ethical can sometimes be difficult because certain actions can be justified or condemned depending on how you view the relationship between ___ and _______.
answer
B. Legal and ethical
question
48. Which of the following examines the organizational resource of information and regulates its definitions, uses, value, and distribution ensuring it has the types of data or information required to function, and grow effectively?
answer
C. Information management
question
49. Sophie Black works as a computer programmer for a software company. Her boss, Mike Jones, is responsible for developing a new software game for the Wii. After completion of the project Mike gives all of the team members a free copy of the game without consent from the company. Sophie is a little hesitant and unsure about accepting the game because legally it would be considered ________.
answer
B. Pirated software
question
What is the method or system of government for information management or control?
answer
C. Information governance
question
Which of the below represents the definition of information compliance?
answer
A. The act of conforming, acquiescing, or yielding information
question
Which of the following is served as key evidence in many legal cases today and also provides a faster, easier way to search and organize paper documents?
answer
B. Digital information
question
Which of the following refers to the ability of a company to identify, search, gather, seize, or export digital information in responding to a litigation, audit, investigation, or an information inquiry?
answer
C. Ediscovery
question
In the information technology world, which of the following are examples of ethical issues that a company may have to manage?
answer
D. All of the following
question
As the President of a local trade company, Kristin is faced with leadership, ethical, and operational decisions on a daily basis. Kristen's responsibilities include examining the organizational resource of information and regulating its definitions, uses, value, and distribution ensuring it has the types of information required to function and grow effectively. What is Kristin overseeing for the company?
answer
B. Information management
question
When studying the figure of the four quadrants of ethical and legal behavior, the goal is for organizations to make decisions in which of the following quadrants?
answer
C. Quadrant I
question
Which of the following is included in the four quadrants of ethical and legal behavior?
answer
D. All of the above
question
What is intangible creative work that is embodied in physical form and includes copyrights, trademarks, and patents?
answer
B. Intellectual property
question
Which of the following describes privacy?
answer
The right to be left alone when you want to be, to have control over your own personal possessions, and to not be observed without your consent
question
Which of the following is an example of acting ethically?
answer
D. None of the above offers an example of acting ethically.
question
Which act restricts what information the federal government can collect?
answer
A. Privacy act
question
Which act protects investors by improving the accuracy and reliability of corporate disclosures?
answer
A. Sarbanes-Oxley Act
question
Which act strengthened criminal laws against identity theft?
answer
D. None of the above
question
Which of the following describes confidentiality?
answer
A. The assurance that messages and information are available only to those who are authorized to view them
question
What are policies and procedures that address information management along with the ethical use of computers and the Internet in the business environment?
answer
B. Epolicies
question
Which of the below is not one of the six epolicies that a company should implement for information protection as discussed in the text?
answer
D. Downtime monitoring policy
question
Which of the following contains general principles to guide computer user behavior?
answer
C. Ethical computer use policy
question
Which company policy did Visa create the program 'Innovant' to handle?
answer
B. Information privacy policy
question
Which of the following clauses is typically contained in an acceptable use policy?
answer
A. A nonrepudiation clause
question
Which of the below would not be found in a typical acceptable use policy?
answer
B. Not posting commercial messages to groups where the employee has received user consent
question
Which of the following terms refers to a contractual stipulation to ensure that ebusiness participants do not deny their online actions?
answer
C. Nonrepudiation
question
According to the ethical computer use policy, users should be ______________ of the rules and, by agreeing to use the system on that basis, _______________ to abide by the rules.
answer
C. Informed, consent
question
Which of the following policies states that users agree to follow it in order to be given access to corporate email, information systems, and the Internet?
answer
A. Acceptable use policy
question
Which of the following is not considered an epolicy?
answer
D. Anti-hacker use policy
question
Which policy contains general principles regarding information privacy?
answer
A. Information privacy policy
question
Which of the following represents the classic example of unintentional information reuse?
answer
B. Social Security number
question
What is one of the guidelines an organization can follow when creating an information privacy policy?
answer
B. Notice and disclosure
question
What is one of the major problems with email?
answer
C. User's expectation of privacy
question
If an organization implemented only one policy, which one would it want to implement?
answer
D. Ethical computer use policy
question
Jackie is the head teller at ABC Bank and her responsibilities include overseeing and managing the tellers, resolving customer issues, and developing and implementing systems for an optimal and efficient team. She notices a steady increase in customer complaints and tracks back to find that the complaints started right around the time ABC Bank provided Internet access to all employees. Jackie watched the tellers closely and found that they were spending significant amounts of time playing Internet games and posting on Facebook. Which policy should the company implement to help eliminate this problem?
answer
C. An Internet use policy
question
Which of the below would you find in a typical Internet use policy?
answer
D. All of the above
question
Which of the following policies details the extent to which email messages may be read by others?
answer
A. Email privacy policy
question
Employees need to understand that email privacy exists to an extent and that corporate email is solely owned by ________.
answer
B. The company
question
Which of the below should be included in a company email privacy policy?
answer
D. All of the above
question
What sends massive amounts of email to a specific person or system that can cause that user's server to stop functioning?
answer
A. Mail bomb
question
What is unsolicited email that plagues employees at all levels and clogs email systems?
answer
B. Spam
question
What kind of policy can a company implement that can help diminish the activity of sending unsolicited email?
answer
C. Anti-spam policy
question
To find out your company policy regarding such websites as YouTube, Facebook, and Twitter you would have to refer to the ____________.
answer
B. Social media policy
question
Social media can be a very valuable tool for a company if used properly. Which of the following represents social media uses for a company?
answer
D. All of the above
question
Which policy can protect a company's brand identity and outlines the corporate principles governing employee online communication?
answer
B. A social media policy
question
With so much information and moving parts within a company, technology has made it possible for employers to monitor many aspects of employee jobs and duties. What is a system that can track employee's activities by measures as keystrokes, error rate, and number of transaction processed?
answer
C. Information technology monitoring
question
Which of the below is a common Internet monitoring technology?
answer
D. All of the above
question
What is an Internet monitoring technique that captures keystrokes on their journey from the keyboard to the motherboard?
answer
D. Hardware key logger
question
What type of Internet monitoring technique records information about a customer during a web surfing session such as what websites were visited and how long the visit was, what ads were viewed and what was purchased?
answer
C. Clickstream
question
Which of the below is not included as a common stipulation an organization would follow when creating an employee monitoring policy?
answer
B. Do not state the consequences of violating the policy
question
96. What is a mail bomb?
answer
A. Sending a massive amount of email to a specific person or system resulting in filling up the recipient's disk space
question
Which policy details the extent to which email messages may be read by others? A. Acceptable use policy
answer
B. Email privacy policy
question
98. Which of the following describes information technology monitoring?
answer
D. All of the above
question
What is a program, when installed on a computer, records every keystroke and mouse click?
answer
A. Key logger software
question
What is a small file deposited on a hard drive by a website containing information about customers and their Web activities?
answer
C. Cookie
question
Which of the following refers to a period of time when a system is unavailable?
answer
A. Downtime
question
Which of the following is not an example of unplanned downtime?
answer
C. A system upgrade
question
What are critical questions that managers should ask when determining the cost of downtime?
answer
C. All of the above
question
Which of the following is a cost of downtime in addition to lost revenue?
answer
D. All of the above
question
A company should be able to calculate the cost of downtime by which of the following?
answer
A. Per hour, per day, and per week
question
Which quadrant in the cost of downtime includes equipment rental, overtime costs, and travel expenses?
answer
C. Other expenses
question
Jensen is a senior developer for HackersRUs, a company that helps secure management information systems. Jensen's new task is to break into the computer system of one of HackersRUs' top clients to identify system vulnerabilities and plug the holes. What type of hacker is Jensen?
answer
B. White-hat hacker
question
Which of the below defines information security?
answer
D. All of the above
question
What are experts in technology who use their knowledge to break into computers and networks, for profit or just as a challenge known as?
answer
C. Hacker
question
What is a hacker who breaks into other people's computer systems and may just look around or steal and destroy information?
answer
B. Black-hat hacker
question
Which of the following is the correct list of the six different types of hackers listed in your text?
answer
A. Black-hat, cracker, cyberterrorist, hactivist, script kiddies, and white-hat hackers
question
112. What is software written with malicious intent to cause annoyance or damage? A. Elevation of privilege
answer
D. Virus
question
113. What includes a variety of threats such as viruses, worms, and Trojan horses?
answer
A. Malicious code
question
114. What is the forging of the return address on an email so that the email message appears to come from someone other than the actual sender?
answer
C. Spoofing
question
115. What is a special class of adware that collects data about the user and transmits it over the Internet without the user's knowledge or permission?
answer
B. Spyware
question
116. What is the primary difference between a worm and a virus?
answer
C. A virus must attach to something to spread, where a worm does not need to attach to anything to spread and can tunnel itself into the computer
question
117. What is a process by which a user misleads a system into granting unauthorized rights, usually for the purpose of compromising or destroying the system?
answer
A. Elevation of privilege
question
118. A DDoS stands for one of the common forms of viruses, that attacks multiple computers to flood a website until it slows or crashes. What does DDoS stand for?
answer
D. Distributed denial-of-service attack
question
119. Which of the following are all common forms of viruses?
answer
C. Backdoor program, worm, Trojan-horse viruses
question
120. What is the software called that allows Internet advertisers to display advertisements without the consent of the computer user?
answer
B. Adware
question
121. Who are hackers with criminal intent?
answer
A. Crackers
question
122. Who are those who seek to cause harm to people or to destroy critical systems or information and use the Internet as a weapon of mass destruction?
answer
C. Cyberterrorists
question
123. Which of the following types of viruses spread themselves, not just from file to file, but also from computer to computer?
answer
B. Worm
question
124. What is the one of the most common forms of computer vulnerabilities that can cause massive computer damage?
answer
A. Virus
question
125. Which of the following changes its form as it propagates?
answer
C. Polymorphic viruses and worms
question
126. What are the first two lines of defense a company should take when addressing security risks?
answer
D. People first, technology second
question
127. Which of the below represents the biggest problem of information security breaches?
answer
A. People misusing organizational information
question
128. Angela works for an identity protection company that maintains large amounts of sensitive customer information such as usernames, passwords, personal information, and social security numbers. Angela and a coworker decide to use the sensitive information to open credit cards in a few of her customer's names. This is a classic example of which of the following security breaches?
answer
B. An insider
question
129. Using ones social skills to trick people into revealing access credentials or other valuable information is called _____________.
answer
A. Social engineering
question
130. All of the following are types of information security breaches except:
answer
D. E-discovery
question
131. What is it called when a hacker looks through your trash to find personal information?
answer
B. Dumpster diving
question
132. Working at a ski resort in the mountains has its own unique security issues. Kenny is the chief information officer for Sundance Ski Resort, and he is faced with both physical and information security threats every month. Since the resort implemented a new software system, they have been having larger number of threats and breaches of company information. He suspects that this may be the cause of an internal employee. He needs to clarify and establish what type of plan to help reduce further problems?
answer
A. An information security plan
question
133. eBay is an example of an online company that has been faced with numerous security issues. For example, imagine you purchase a digital camera on eBay. Three months later you might receive an email asking you to log in to the system to update your credit card or PayPal information. Of course, this email is not actually from eBay and as soon as you log in your information will be stolen. What type of information security breach would you consider this to be?
answer
D. Phishing
question
134. Which of the following is an example of a way to maintain information security that a company should include in their information security policies?
answer
D. All of the above
question
135. Janet is a financial aid counselor at a local community college and she shares an office with her three coworkers. Janet feels safe in her office environment and frequently leaves her username and password on a sticky note next to her computer. Without realizing it Janet is creating the potential for which type of information security breach to occur?
answer
A. Insiders to hack into the college system
question
136. Applications allowed to be placed on the corporate network, like IM software, and corporate computer equipment used for personal reason on personal networks are two areas that should be addressed by managers in which of the below company policies?
answer
B. Information security policies
question
137. Which of the following represents the three areas where technology can aid in the defense against information security attacks?
answer
D. Authentication and authorization, prevention and resistance, detection and response
question
138. What is forging of someone's identity for the purpose of fraud?
answer
B. Identity theft
question
139. What is the difference between phishing and pharming?
answer
C. Phishing is a technique to gain personal information for the purpose of identity theft, and pharming reroutes requests for legitimate websites to false websites
question
140. Imagine you accidently mistype the URL for your bank and you are redirected to a fake website that collects your information. What type of identity theft were you just a victim of?
answer
A. Pharming
question
141. What area of information security focuses on preventing identity theft, phishing, and pharming scams?
answer
D. Authentication and authorization
question
142. What is the process that provides a user with permission including access levels and abilities such as file access, hours of access, and amount of allocated storage space?
answer
C. Authorization
question
143. What is a method for confirming users' identities?
answer
B. Authentication
question
144. The most secure procedures combine which of the following authentication and authorization techniques?
answer
D. All of the above
question
145. A smart card is a device, the size of a credit card that contains embedded technology that stores information and small amounts of software, and can act as _________________.
answer
D. All of the above
question
146. The best and most effective way to manage authentication is through __________.
answer
C. Biometrics
question
147. Which of the following is not considered a form of biometrics?
answer
B. Password
question
148. Which of the following is the main drawback of biometrics?
answer
C. It can be costly and intrusive
question
149. How do prevention and resistance technologies stop intruders from accessing and reading sensitive information?
answer
A. Content filtering, encryption, and firewalls
question
150. Which of the following occurs when organizations use software that filters content, such as email, to prevent the accidental or malicious transmission of unauthorized information?
answer
B. Content filtering
question
151. What prevention technique scrambles information into an alternative form that requires a key or password to decrypt?
answer
A. Encryption
question
152. What can encryption technology perform?
answer
D. All of the above
question
153. What type of encryption technology uses multiple keys, one for public and one for private?
answer
C. Public key encryption
question
154. What is a data file that identifies individuals or organizations online and is comparable to a digital signature?
answer
C. Digital certificate
question
155. Charles Mott works for a company called VeriSign that acts a trusted third party to verify information. One of Charles' largest clients is CheckMd, which holds and authenticates customer reviews of doctors and dentists online and having a third party validating the reviews is critical to CheckMd's success. What type of authentication technique is VeriSign providing for CheckMD?
answer
B. Certificate authority
question
156. What is hardware or software that guards a private network by analyzing incoming and outgoing information for the correct markings?
answer
A. Firewall
question
157. Which of the following protection techniques scans and searches hard drives to prevent, detect, and remove known viruses, adware, and spyware?
answer
D. Antivirus software
question
158. What must you do with antivirus software to make it protect effectively?
answer
C. Must frequently update it to protect against viruses
question
159. Which of the following systems is designed with full-time monitoring tools that search for patterns in network traffic to identify intruders and to protect against suspicious network traffic which attempts to access files and data?
answer
B. Intrusion detection software (IDS)
question
160. What is the most secure type of authentication?
answer
D. Combination of all of the above
question
161. What is a device that is around the same size as a credit card, containing embedded technologies that can store information and small amounts of software to perform some limited processing?
answer
C. Smart card
question
162. What is the identification of a user based on a physical characteristic, such as a fingerprint, iris, face, voice, or handwriting?
answer
C. Biometrics
question
163. Which of the following is considered a type of biometrics?
answer
D. All of the above
question
164. Which of the following authentication methods is 100 percent accurate?
answer
D. None of the above
question
165. Where do organizations typically place firewalls?
answer
D. Between the server and the Internet