Information Systems Chapter 13

29 December 2023
4.4 (101 reviews)
25 test answers

Unlock all answers in this set

Unlock answers (21)
question
Which of the following is the correct description of a firewall?
answer
It is a software and hardware combination that limits the incoming and outgoing Internet traffic.
question
Someone who violates computer or Internet security maliciously or for illegal personal gain is known as a(n) _______.
answer
black hat hacker
question
In a denial-of-service (DDoS) attack, the perpetrator ____.
answer
instructs the zombie computers to send simple access requests to target computers
question
You had used an online service to apply for a credit card. As part of the process, you submitted your personal information such as SSN, date of birth, employer information, etc. Soon after you started receiving bills for items you did not purchase. You have become a victim of ________.
answer
identity theft
question
​There has been a data breach at your business and the business has lost some customer data. It has led to angry customers who have filed charges. What is a recommended course of action to prepare for future events?
answer
activate the forensics analysis team and prepare documentation
question
The US-CERT incident reporting system is used to ____.
answer
​alert the Department of Homeland Security about information security incidents
question
Your business has a web server that has suddenly become unresponsive. When you study the server's logs there are a huge number of requests from what appear to be legitimate computers. The problem is likely because of _____.
answer
a denial-of-service attack
question
​Which of the following subject areas does the USA Patriot Act cover?
answer
Cyberterrorism
question
Which of the following laws covers false claims regarding unauthorized use of credit cards?
answer
​Fraud and Related Activity in Connection with Access Devices Statute
question
A botnet is a ____.
answer
network of computers that send out access requests to servers repeatedly
question
Which of the following is NOT a popular vendor of firewall software?
answer
Red Hat
question
​A hacktivist is someone who _______.
answer
hacks computers or Web sites in an attempt to promote a political ideology
question
​Assume your organization is experiencing an intruder attack. You have an intrusion detection system (IDS) set up. Which of the following events occurs first?
answer
The network router sends traffic to the firewall as well as to the IDS
question
​The purpose of Advanced Persistent Threat (APT) usually is to ____.
answer
steal data
question
On the back of a credit card the three-digit number above the signature panel is used to _____.
answer
​verify the card is legitimate and not a stolen card number
question
This harmful malware is triggered by a specific event, such as Friday the 13th
answer
Logic Bomb
question
Which of the following shortcoming may be revealed during an IT security au
answer
whether only a limited number of people have access to critical data or not
question
The second phase of an Advanced Persistent Threat attack is _____.
answer
Incursion
question
Once a _____ is installed, the attacker can gain full access to the computer.
answer
botnet
question
You work for a company that is growing. Originally, all the users in all departments had access to all the data in the database. It is considered a security risk. What is an appropriate action to reduce the risk?
answer
Assign roles and privileges to users so that only job-relevant data is accessible to the user.
question
These days, the biggest threats to IT security are from ________.
answer
organized groups that have ample resources, including money and sophisticated tools, to support their efforts
question
You have been hired as the new Information Security consultant at XYZ Inc. Which of these employee behaviors would be a top security concern?
answer
Leaving laptop computers unattended in public space
question
​Which of these organizations offers guidelines on developing security policies?
answer
SANS
question
​You wish to use your personal laptop computer at work. However, the IT department folks are unwilling to allow you. The likely reason is ______.
answer
your non-work related use of the laptop could increase vulnerability
question
​A company's risk assessment process can include numerous threats to the computers and networks. Which of the following can be considered an adverse event?
answer
All of the above