Matching
Match the most appropriate item with one item below.
Premises:
A cashier receives inadequate training and gives a customer too much change.
A corporate spy sells information about new products to a firm's competitors.
A cyber-criminal threatens to disable an air traffic control system unless he is provided with a flight out of the country.
A data entry clerk increases prices by ten percent when inputting invoice data.
A group of hackers bombard an information system with requests for information, preventing other users from accessing the system.
A hacker introduces a virus in an information system.
A restaurant waiter sells a customer's credit card number to a friend.
A systems designer uses a secret password to bypass controls added by the client.
Because of a power outage, payroll checks are processed two days late.
Responses:
Denial of service attack.
Disclosure of confidential information.
Error.
Extortion.
Information manipulation.
Information theft.
Intrusions.
Malicious software.
Service interruptions and delays.
Correct Answer:
Premises:
Responses:
A cashier receives inadequate training and gives a customer too much change.
A corporate spy sells information about new products to a firm's competitors.
A cyber-criminal threatens to disable an air traffic control system unless he is provided with a flight out of the country.
A data entry clerk increases prices by ten percent when inputting invoice data.
A group of hackers bombard an information system with requests for information, preventing other users from accessing the system.
A hacker introduces a virus in an information system.
A restaurant waiter sells a customer's credit card number to a friend.
A systems designer uses a secret password to bypass controls added by the client.
Because of a power outage, payroll checks are processed two days late.
Premises:
A cashier receives inadequate training and gives a customer too much change.
A corporate spy sells information about new products to a firm's competitors.
A cyber-criminal threatens to disable an air traffic control system unless he is provided with a flight out of the country.
A data entry clerk increases prices by ten percent when inputting invoice data.
A group of hackers bombard an information system with requests for information, preventing other users from accessing the system.
A hacker introduces a virus in an information system.
A restaurant waiter sells a customer's credit card number to a friend.
A systems designer uses a secret password to bypass controls added by the client.
Because of a power outage, payroll checks are processed two days late.
Responses:
Related Questions
Q40: Steps for Better Thinking comprises four steps
Q41: Part of creating a knowledge management system
Q42: Kay was frustrated. She was auditing a
Q43: Kay was frustrated. She was auditing a
Q44: Arnold and Robin were trying to
Q45: Kay was frustrated. She was auditing a
Q46: Kay was frustrated. She was auditing a
Q47: Kay was frustrated. She was auditing a
Q48: Indicate the most applicable to each independent
Q50: Match the most appropriate definition with each
Unlock this Answer For Free Now!
View this answer and more for free by performing one of the following actions
Scan the QR code to install the App and get 2 free unlocks
Unlock quizzes for free by uploading documents