A ________ is a person or an organization that seeks to obtain or alter data or other IS assets illegally, without the owner’s permission and often without the owner’s knowledge. |
threat |
Which of the following is considered a threat caused by human error? |
an employee inadvertently installing an old database on top of the current one |
Which of the following is considered a computer crime? |
hacking of information systems |
________ occurs when someone deceives by pretending to be someone else. |
Pretexting |
In the context of security threats, pretexting, sniffing, spoofing, and phishing are all examples of ________. |
unauthorized data disclosure |
A ________ pretends to be a legitimate company and sends an email requesting confidential data, such as account numbers, Social Security numbers, account passwords, |
phisher |
Email spoofing is a synonym for ________. |
phishing |
________ is a technique for intercepting computer communications through a physical connection to a network or without a physical connection in the case of wireless |
Sniffing |
________ take computers with wireless connections through an area and search for unprotected wireless networks, and then monitor and intercept wireless traffic on unsecured wireless networks. |
Drive-by sniffers |
Which of the following is a sniffing technique? |
adware |
________ involves breaking into a network to steal data such as customer lists, product inventory data, employee data, and other proprietary and confidential data. |
Hacking |
Which of the following is most likely to be a result of hacking? |
an unauthorized transaction from a user’s credit card |
________ occurs through human error when employees do not follow proper procedures or when procedures have not been well designed. |
Incorrect data modification |
________ occurs when computer criminals invade a computer system and replace legitimate programs with their own, unauthorized ones that shut down legitimate applications. |
Usurpation |
Which of the following usually happens in a malicious denial-of-service attack? |
a hacker floods a Web server with millions of bogus service requests |
________ present(s) the largest risk for an organization’s infrastructure loss. |
Natural disasters |
Which of the following statements is true about losses to computer security threats? |
Surveys suggest that some organizations do not report all their computer crime losses, and some will not report such losses at all. |
Which of the following is a personal security safeguard? |
removing high-value assets from computers |
Nonword passwords are vulnerable to a ________ attack in which the password cracker tries every possible combination of characters. |
brute force |
________ are small files that enables a browser to access Web sites without having to sign in every time. |
Cookies |
Removing and disabling ________ that may contain sensitive security data presents an excellent example of the trade-off between improved security and cost. |
cookies |
Which of the following is a critical security function that should be addressed by the senior management of an organization? |
establishing the security policy |
In information security, which of the following is true about managing risk? |
Organizations should implement safeguards that balance the trade-off between risk and cost. |
Which of the following was passed to give individuals the right to access their own health data created by doctors and other healthcare providers? |
the HIPAA of 1996 |
Which of the following is classified as a technical safeguard? |
firewalls |
A(n) ________ has a microchip in it to hold data. |
smart card |
Users of smart cards are required to enter a ________ to be authenticated. |
personal identification number |
Which of the following is used for biometric authentication? |
facial features |
Which of the following statements is true about biometric identification? |
It often faces resistance from users for its invasive nature. |
A ________ is a number used to encrypt data. |
key |
In asymmetric encryption, each site has a ________ for encoding messages. |
public key |
With ________, the sender and receiver transmit a message using different keys. |
asymmetric encryption |
Secure Sockets Layer is also known as ________. |
Transport Layer Security |
Which of the following statements is true about the Secure Sockets Layer (SSL)? |
It is used to send sensitive data such as credit card numbers. |
Mark is transferring funds online through the Web site of a reputed bank. Which of the following will be displayed in the address bar of his browser that will let him know that the bank is using the Secure Sockets Layer (SSL) protocol? |
https |
A ____ examines each part of a message and determines whether to let that part pass. |
packet-filtering firewall |
Packet-filtering firewalls ________. |
can filter both inbound and outbound traffic |
________ is a broad category of software that includes viruses, spyware, and adware. |
Malware |
In the context of malware protection, the program code that causes the unwanted actions is called the ________. |
payload |
________ are viruses that masquerade as useful programs or files. |
Trojan horses |
A ________ is a type of virus that self-propagates using the Internet or other computer network. |
worm |
________ is similar to spyware in that it is installed without the user’s permission and that it resides in the background and observes user behavior. |
Adware |
Which of the following is likely to be accepted by a poorly designed application thereby leading to improper disclosure of data? |
SQL injection |
________ refers to an organization-wide function that is in charge of developing data policies and enforcing data standards. |
Data administration |
________ is a function pertaining to a particular database that develops procedures and practices to control and protect the database. |
Database administration |
Which of the following statements is true about data administration? |
It is involved in establishing data safeguards. |
Key escrow is a(n) ________. |
safety procedure that allows a trusted party to have a copy of the encryption key |
________ protect databases and other organizational data. |
Data safeguards |
The computers that run the DBMS and all devices that store database data should reside in locked, controlled-access facilities. This is done to ________. |
provide physical security |
Which of the following statements is true about the position definitions component of human safeguards? |
Documenting position sensitivity enables security personnel to prioritize their activities based on possible risk. |
________ involve the people and procedure components of information systems. |
Human safeguards |
Which of the following statements is true about human safeguards for employees? |
User accounts should be defined to give users the least possible privilege needed to perform their jobs. |
When an employee is terminated, IS administrators should receive advance notice so that they can ________. |
remove the user account and password |
________ a Web site means to take extraordinary measures to reduce a system’s vulnerability using special versions of the operating system. |
Hardening |
The process of hardening a Web site is a ________ safeguard. |
technical |
________ are the primary means of authentication for a user’s computer and other networks and servers to which the user may have access. |
Passwords |
Which of the following systems procedures is specifically the responsibility of operations personnel? |
creating back up of system databases |
________ involves accomplishing job tasks during failure. |
Recovery |
Firewalls produce ________ that include lists of all dropped packets, infiltration attempts, and unauthorized access attempts from within the firewall. |
activity logs |
________ are false targets for computer criminals to attack. |
Honeypots |
MIS CHAPTER 10 – SECURITY
Share This
Unfinished tasks keep piling up?
Let us complete them for you. Quickly and professionally.
Check Price