Deck 8: Securing Information Systems

Full screen (f)
exit full mode
Question
All of the following are specific security challenges that threaten corporate servers in a client/server environment except:

A) hacking.
B) malware.
C) denial-of-service attacks.
D) sniffing.
E) vandalism.
Use Space or
up arrow
down arrow
to flip the card.
Question
________ is malware that hijacks a user's computer and demands payment in return for giving back access.

A) A Trojan horse
B) Ransomware
C) Spyware
D) A virus
E) An evil twin
Question
________ is spyware that logs and transmits everything a user types.

A) Spyware
B) A Trojan horse
C) A keylogger
D) A worm
E) A sniffer
Question
Which of the following specifically makes malware distribution and hacker attacks to disable websites a federal crime?

A) Computer Fraud and Abuse Act
B) Economic Espionage Act
C) Electronic Communications Privacy Act
D) Data Security and Breach Notification Act
E) National Information Infrastructure Protection Act
Question
A salesperson clicks repeatedly on the online ads of a competitor in order to drive the competitor's advertising costs up. This is an example of:

A) phishing.
B) pharming.
C) spoofing.
D) evil twins.
E) click fraud.
Question
An employee clicks on a link in an email from what looks like a fellow employee and is taken to a fraudulent web site which asks for personal information is an example of:

A) click fraud.
B) DDOS attack.
C) spear phishing.
D) pharming.
E) identity theft.
Question
A Trojan horse:

A) is software that appears to be benign but does something other than expected.
B) is a virus that replicates quickly.
C) is malware named for a breed of fast-moving Near-Eastern horses.
D) installs spyware on users' computers.
E) is a type of sniffer used to infiltrate corporate networks.
Question
Which of the following statements about Internet security is not true?

A) The use of P2P networks can expose a corporate computer to outsiders.
B) A corporate network without access to the Internet is more secure than one that provides access.
C) VoIP is more secure than the switched voice network.
D) Instant messaging can provide hackers access to an otherwise secure network.
E) Smartphones have the same security weaknesses as other Internet devices.
Question
Which of the following is a virus that uses flaws in Windows software to take over a computer remotely?

A) Sasser
B) Zeus
C) Cryptolocker
D) ILOVEYOU
E) Conficker
Question
Which of the following refers to all of the methods, policies, and organizational procedures that ensure the safety of the organization's assets, the accuracy and reliability of its accounting records, and operational adherence to management standards?

A) Legacy systems
B) SSID standards
C) Vulnerabilities
D) Security policy
E) Controls
Question
All of the following are specific security challenges that threaten the communications lines in a client/server environment except:

A) errors.
B) tapping.
C) theft and fraud.
D) radiation.
E) sniffing.
Question
Which of the following statements about botnets is not true?

A) Eighty percent of the world's malware is delivered by botnets.
B) Botnets are often used to perpetrate DDoS attacks.
C) Ninety percent of the world's spam is delivered by botnets.
D) Botnets are often used for click fraud.
E) It is not possible to make a smartphone part of a botnet.
Question
All of the following are specific security challenges that threaten corporate systems in a client/server environment except:

A) theft of data.
B) copying of data.
C) alteration of data.
D) radiation.
E) hardware failure.
Question
CryptoLocker is an example of which of the following?

A) Worm
B) SQL injection attack
C) Sniffer
D) Evil twin
E) Ransomware
Question
Which of the following statements about wireless security is not true?

A) SSIDs are broadcast multiple times and can be picked up fairly easily by sniffer programs.
B) Radio frequency bands are easy to scan.
C) An intruder who has associated with an access point by using the correct SSID is capable of accessing other resources on the network.
D) Intruders can force a user's NIC to associate with a rogue access point.
E) Bluetooth is the only wireless technology that is not susceptible to hacking by eavesdroppers.
Question
Using numerous computers to inundate and overwhelm the network from numerous launch points is called a(n) ________ attack.

A) DDoS
B) DoS
C) SQL injection
D) phishing
E) botnet
Question
Which of the following refers to policies, procedures, and technical measures used to prevent unauthorized access, alteration, theft, or physical damage to information systems?

A) Security
B) Controls
C) Benchmarking
D) Algorithms
E) Identity management
Question
Which of the following is not an example of a computer used as a target of crime?

A) Knowingly accessing a protected computer to commit fraud
B) Accessing a computer system without authority
C) Illegally accessing stored electronic communication
D) Threatening to cause damage to a protected computer
E) Breaching the confidentiality of protected computerized data
Question
Most computer viruses deliver a:

A) worm.
B) Trojan horse.
C) driveby download.
D) keylogger.
E) payload.
Question
The intentional defacement or destruction of a website is called:

A) spoofing.
B) cybervandalism.
C) cyberwarfare.
D) phishing.
E) pharming.
Question
As described in the chapter case, losing smartphones is a rare cause of data breaches.
Question
As described in the chapter case, which of the following did hackers use to gain access to the DNC network?

A) Trojan horse
B) Phishing emails
C) SQL injection attack
D) Computer worm
E) Pharming attack
Question
A computer worm is a program that can copy itself to other computers on the network.
Question
According to Ponemon Institute's 2016 Annual Cost of Cyber Crime Study, the average annualized cost of cybercrime for benchmarked companies in six different countries was approximately:

A) $900,000.
B) $9 million.
C) $90 million.
D) $9 billion.
E) $90 billion.
Question
Which of the following is the single greatest cause of network security breaches?

A) Viruses
B) User lack of knowledge
C) Trojan horses
D) Cyberwarfare
E) Bugs
Question
Which of the following is an example of a keylogger?

A) Zeus
B) Conficker
C) Sasser
D) ILOVEYOU
E) Cryptolocker
Question
When a hacker discovers a security hole in software that is unknown to the software vendor it is an example of:

A) sniffing.
B) social engineering.
C) phishing.
D) zero-day vulnerability
E) snooping
Question
When hackers gain access to a database containing your personal private information, this is an example of:

A) phishing.
B) spoofing.
C) social engineering.
D) identity theft.
E) pharming.
Question
Which of the following refers to eavesdroppers driving by buildings or parking outside and trying to intercept wireless network traffic?

A) War driving
B) Sniffing
C) Cybervandalism
D) Drive-by tapping
E) Snooping
Question
Phishing is a form of spoofing.
Question
Evil twins are:

A) Trojan horses that appears to the user to be a legitimate commercial software application.
B) email messages that mimic the email messages of a legitimate business.
C) fraudulent websites that mimic a legitimate business's website.
D) computers that fraudulently access a website or network using the IP address and identification of an authorized computer.
E) bogus wireless network access points that look legitimate to users.
Question
Wireless networks are more difficult for hackers to gain access to because radio frequency bands are difficult to scan.
Question
All of the following have contributed to an increase in software flaws except:

A) the growing complexity of software programs.
B) the growing size of software programs.
C) demands for timely delivery to markets.
D) the inability to fully test programs.
E) the increase in malicious intruders seeking system access.
Question
The term cracker is used to identify a hacker with criminal or malicious intent.
Question
Smartphones have the same security flaws as other Internet-connected devices.
Question
________ identify the access points in a Wi-Fi network.

A) NICs
B) Mac addresses
C) URLs
D) UTMs
E) SSIDs
Question
A computer virus replicates more quickly than a computer worm.
Question
A foreign country attempting to access government networks in order to disable a national power grid is an example of:

A) phishing.
B) denial-of-service attacks.
C) cyberwarfare.
D) cyberterrorism.
E) evil twins.
Question
According to the 2017 Identity Fraud Study by Javelin Strategy & Research, how much did consumers lose to identity fraud in 2016?

A) $1.6 million
B) $16 million
C) $160 million
D) $1.6 billion
E) $16 billion
Question
Pharming involves:

A) redirecting users to a fraudulent website even when the user has typed in the correct address in the web browser.
B) pretending to be a legitimate business's representative in order to garner information about a security system.
C) setting up fake website to ask users for confidential information.
D) using emails for threats or harassment.
E) setting up fake Wi-Fi access points that look as if they are legitimate public networks.
Question
What are the security challenges faced by wireless networks?
Question
Blockchain refers to a technology that:

A) uses a distributed ledger system of transactions.
B) uses a centralized data store in the cloud.
C) relies on the Internet to provide secure transactions.
D) uses existing banking systems to transfer funds.
E) relies on peer-to-peer networks.
Question
Malicious software programs referred to as spyware include a variety of threats such as computer viruses, worms, and Trojan horses.
Question
Computer forensics tasks include all of the following except:

A) presenting collected evidence in a court of law.
B) securely storing recovered electronic data.
C) collecting physical evidence on the computer.
D) finding significant information in a large volume of electronic data.
E) recovering data from computers while preserving evidential integrity.
Question
DoS attacks are used to destroy information and access restricted areas of a company's information system.
Question
The HIPAA Act of 1996:

A) requires financial institutions to ensure the security of customer data.
B) specifies best practices in information systems security and control.
C) imposes responsibility on companies and management to safeguard the accuracy of financial information.
D) outlines medical security and privacy rules.
E) identifies computer abuse as a crime and defines abusive activities.
Question
How is the security of a firm's information system and data affected by its people, organization, and technology? Is the contribution of one of these dimensions any more important than the other? Why?
Question
The Gramm-Leach-Bliley Act:

A) requires financial institutions to ensure the security of customer data.
B) specifies best practices in information systems security and control.
C) imposes responsibility on companies and management to safeguard the accuracy of financial information.
D) outlines medical security and privacy rules.
E) identifies computer abuse as a crime and defines abusive activities.
Question
Your company, an online discount pet supply store, has calculated that a loss of Internet connectivity for 3 hours results in a potential loss of $2,000 to $3,000 and that there is a 50% chance of this occurring each year. What is the annual expected loss from this exposure?

A) $500
B) $1,000
C) $1,250
D) $1,500
E) $2,500
Question
Implementation controls:

A) can be classified as input controls, processing controls, and output controls.
B) govern the design, security, and use of computer programs and the security of data files in general throughout the organization.
C) apply to all computerized applications and consist of a combination of hardware, software, and manual procedures that create an overall control environment.
D) include software controls, computer operations controls, and implementation controls.
E) Audit the systems development process at various points to ensure that the process is properly controlled and managed.
Question
Which of the following is a type of ambient data?

A) Computer log containing recent system errors
B) A file deleted from a hard disk
C) A file that contains an application's user settings
D) A set of raw data from an environmental sensor
E) Data that has been recorded over
Question
Explain how an SQL injection attack works and what types of systems are vulnerable to this type of attack.
Question
Define computer forensics and describe the types of problems it is designed to address.
Question
The Sarbanes-Oxley Act:

A) requires financial institutions to ensure the security of customer data.
B) specifies best practices in information systems security and control.
C) imposes responsibility on companies and management to safeguard the accuracy of financial information.
D) outlines medical security and privacy rules.
E) identifies computer abuse as a crime and defines abusive activities.
Question
Hackers and their companion viruses are an increasing problem, especially on the Internet. What are the most important measures for a firm to take to protect itself from this? Is full protection feasible? Why or why not?
Question
Zero defects cannot be achieved in larger software programs because fully testing programs that contain thousands of choices and millions of paths would require thousands of years.
Question
Sniffers enable hackers to steal proprietary information from anywhere on a network, including email messages, company files, and confidential reports.
Question
Most IoT devices support sophisticated security approaches.
Question
________ controls formalize standards, rules, procedures, and control disciplines to ensure that the organization's general and application controls are properly executed and enforced.

A) Software
B) Administrative
C) Data security
D) Implementation
E) Input
Question
Three major concerns of system builders and users are disaster, security, and human error. Of the three, which do you think is most difficult to deal with? Why?
Question
A digital certificate system:

A) uses third party CAs to validate a user's identity.
B) uses digital signatures to validate a user's identity.
C) uses tokens to validate a user's identity.
D) is used primarily by individuals for personal correspondence.
E) protects a user's identity by substituting a certificate in place of identifiable traits.
Question
Fault tolerant information systems offer 100 percent availability because they use:

A) high-capacity storage.
B) a multitier server network.
C) redundant hardware, software, and power supplies.
D) dedicated phone lines.
E) a digital certificate system.
Question
A firewall allows the organization to:

A) enforce a security policy on data exchanged between its network and the Internet.
B) check the accuracy of all transactions between its network and the Internet.
C) create an enterprise system on the Internet.
D) check the content of all incoming and outgoing email messages.
E) create access rules for a network.
Question
All of the following are currently being used as traits that can be profiled by biometric authentication except:

A) fingerprints.
B) facial characteristics.
C) body odor.
D) retinal images.
E) voice.
Question
In controlling network traffic to minimize slow-downs, a technology called ________ is used to examine data files and sort low-priority data from high-priority data.

A) high availability computing
B) deep packet inspection
C) application proxy filtering
D) stateful inspection
E) unified threat management
Question
Which of the following defines acceptable uses of a firm's information resources and computing equipment?

A) An information systems audit policy
B) A CA policy
C) A MSSP
D) A UTM system
E) An AUP
Question
How can a firm's security policies contribute and relate to the six main business objectives? Give examples.
Question
Which of the following focuses primarily on the technical issues of keeping systems up and running?

A) Business continuity planning
B) Security policies
C) Disaster recovery planning
D) An AUP
E) An information systems audit
Question
A statement ranking information risks and identifying security goals would be included in which of the following?

A) Security policy
B) AUP
C) Risk assessment
D) Business impact analysis
E) Business continuity plan
Question
An analysis of an information system that rates the likelihood of a security incident occurring and its cost would be included in which of the following?

A) Security policy
B) AUP
C) Risk assessment
D) Business impact analysis
E) Business continuity plan
Question
Which of the following statements about passwords is not true?

A) Authentication cannot be established by the use of a password.
B) Password systems that are too rigorous may hinder employee productivity.
C) Passwords can be stolen through social engineering.
D) Passwords are often disregarded by employees.
E) Passwords can be sniffed when being transmitted over a network.
Question
How does disaster recovery planning differ from business continuity planning?
Question
Two-factor authentication utilizes a(n):

A) unique password.
B) encrypted connection.
C) a multistep process of authentication.
D) a firewall.
E) a digital certificate.
Question
Currently, the protocols used for secure information transfer over the Internet are:

A) TCP/IP and SSL.
B) S-HTTP and CA.
C) HTTP and TCP/IP.
D) S-HTTP and SHTML.
E) SSL, TLS, and S-HTTP.
Question
All of the following are types of information systems general controls except:

A) application controls.
B) computer operations controls.
C) hardware controls.
D) software controls.
E) administrative controls.
Question
What is the role of an information systems audit?
Question
WPA2 is a more effective way to secure a wireless network than WEP because it:

A) includes an AUP.
B) operates on a VPN.
C) uses much longer encryption keys.
D) uses symmetric encryption methods.
E) is part of most vendors UTM products.
Question
In which method of encryption is a single encryption key sent to the receiver so both sender and receiver share the same key?

A) SSL/TLS
B) Symmetric key encryption
C) Public key encryption
D) Private key encryption
E) Distributed encryption
Question
An acceptable use policy defines acceptable uses of the firm's information resources and computing equipment.
Question
________ use scanning software to look for known problems such as bad passwords, the removal of important files, security attacks in progress, and system administration errors.

A) Stateful inspections
B) Intrusion detection systems
C) Application proxy filtering technologies
D) Packet filtering technologies
E) Firewalls
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/100
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 8: Securing Information Systems
1
All of the following are specific security challenges that threaten corporate servers in a client/server environment except:

A) hacking.
B) malware.
C) denial-of-service attacks.
D) sniffing.
E) vandalism.
D
2
________ is malware that hijacks a user's computer and demands payment in return for giving back access.

A) A Trojan horse
B) Ransomware
C) Spyware
D) A virus
E) An evil twin
B
3
________ is spyware that logs and transmits everything a user types.

A) Spyware
B) A Trojan horse
C) A keylogger
D) A worm
E) A sniffer
C
4
Which of the following specifically makes malware distribution and hacker attacks to disable websites a federal crime?

A) Computer Fraud and Abuse Act
B) Economic Espionage Act
C) Electronic Communications Privacy Act
D) Data Security and Breach Notification Act
E) National Information Infrastructure Protection Act
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
5
A salesperson clicks repeatedly on the online ads of a competitor in order to drive the competitor's advertising costs up. This is an example of:

A) phishing.
B) pharming.
C) spoofing.
D) evil twins.
E) click fraud.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
6
An employee clicks on a link in an email from what looks like a fellow employee and is taken to a fraudulent web site which asks for personal information is an example of:

A) click fraud.
B) DDOS attack.
C) spear phishing.
D) pharming.
E) identity theft.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
7
A Trojan horse:

A) is software that appears to be benign but does something other than expected.
B) is a virus that replicates quickly.
C) is malware named for a breed of fast-moving Near-Eastern horses.
D) installs spyware on users' computers.
E) is a type of sniffer used to infiltrate corporate networks.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
8
Which of the following statements about Internet security is not true?

A) The use of P2P networks can expose a corporate computer to outsiders.
B) A corporate network without access to the Internet is more secure than one that provides access.
C) VoIP is more secure than the switched voice network.
D) Instant messaging can provide hackers access to an otherwise secure network.
E) Smartphones have the same security weaknesses as other Internet devices.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
9
Which of the following is a virus that uses flaws in Windows software to take over a computer remotely?

A) Sasser
B) Zeus
C) Cryptolocker
D) ILOVEYOU
E) Conficker
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
10
Which of the following refers to all of the methods, policies, and organizational procedures that ensure the safety of the organization's assets, the accuracy and reliability of its accounting records, and operational adherence to management standards?

A) Legacy systems
B) SSID standards
C) Vulnerabilities
D) Security policy
E) Controls
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
11
All of the following are specific security challenges that threaten the communications lines in a client/server environment except:

A) errors.
B) tapping.
C) theft and fraud.
D) radiation.
E) sniffing.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
12
Which of the following statements about botnets is not true?

A) Eighty percent of the world's malware is delivered by botnets.
B) Botnets are often used to perpetrate DDoS attacks.
C) Ninety percent of the world's spam is delivered by botnets.
D) Botnets are often used for click fraud.
E) It is not possible to make a smartphone part of a botnet.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
13
All of the following are specific security challenges that threaten corporate systems in a client/server environment except:

A) theft of data.
B) copying of data.
C) alteration of data.
D) radiation.
E) hardware failure.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
14
CryptoLocker is an example of which of the following?

A) Worm
B) SQL injection attack
C) Sniffer
D) Evil twin
E) Ransomware
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
15
Which of the following statements about wireless security is not true?

A) SSIDs are broadcast multiple times and can be picked up fairly easily by sniffer programs.
B) Radio frequency bands are easy to scan.
C) An intruder who has associated with an access point by using the correct SSID is capable of accessing other resources on the network.
D) Intruders can force a user's NIC to associate with a rogue access point.
E) Bluetooth is the only wireless technology that is not susceptible to hacking by eavesdroppers.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
16
Using numerous computers to inundate and overwhelm the network from numerous launch points is called a(n) ________ attack.

A) DDoS
B) DoS
C) SQL injection
D) phishing
E) botnet
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
17
Which of the following refers to policies, procedures, and technical measures used to prevent unauthorized access, alteration, theft, or physical damage to information systems?

A) Security
B) Controls
C) Benchmarking
D) Algorithms
E) Identity management
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
18
Which of the following is not an example of a computer used as a target of crime?

A) Knowingly accessing a protected computer to commit fraud
B) Accessing a computer system without authority
C) Illegally accessing stored electronic communication
D) Threatening to cause damage to a protected computer
E) Breaching the confidentiality of protected computerized data
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
19
Most computer viruses deliver a:

A) worm.
B) Trojan horse.
C) driveby download.
D) keylogger.
E) payload.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
20
The intentional defacement or destruction of a website is called:

A) spoofing.
B) cybervandalism.
C) cyberwarfare.
D) phishing.
E) pharming.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
21
As described in the chapter case, losing smartphones is a rare cause of data breaches.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
22
As described in the chapter case, which of the following did hackers use to gain access to the DNC network?

A) Trojan horse
B) Phishing emails
C) SQL injection attack
D) Computer worm
E) Pharming attack
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
23
A computer worm is a program that can copy itself to other computers on the network.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
24
According to Ponemon Institute's 2016 Annual Cost of Cyber Crime Study, the average annualized cost of cybercrime for benchmarked companies in six different countries was approximately:

A) $900,000.
B) $9 million.
C) $90 million.
D) $9 billion.
E) $90 billion.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
25
Which of the following is the single greatest cause of network security breaches?

A) Viruses
B) User lack of knowledge
C) Trojan horses
D) Cyberwarfare
E) Bugs
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
26
Which of the following is an example of a keylogger?

A) Zeus
B) Conficker
C) Sasser
D) ILOVEYOU
E) Cryptolocker
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
27
When a hacker discovers a security hole in software that is unknown to the software vendor it is an example of:

A) sniffing.
B) social engineering.
C) phishing.
D) zero-day vulnerability
E) snooping
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
28
When hackers gain access to a database containing your personal private information, this is an example of:

A) phishing.
B) spoofing.
C) social engineering.
D) identity theft.
E) pharming.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
29
Which of the following refers to eavesdroppers driving by buildings or parking outside and trying to intercept wireless network traffic?

A) War driving
B) Sniffing
C) Cybervandalism
D) Drive-by tapping
E) Snooping
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
30
Phishing is a form of spoofing.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
31
Evil twins are:

A) Trojan horses that appears to the user to be a legitimate commercial software application.
B) email messages that mimic the email messages of a legitimate business.
C) fraudulent websites that mimic a legitimate business's website.
D) computers that fraudulently access a website or network using the IP address and identification of an authorized computer.
E) bogus wireless network access points that look legitimate to users.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
32
Wireless networks are more difficult for hackers to gain access to because radio frequency bands are difficult to scan.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
33
All of the following have contributed to an increase in software flaws except:

A) the growing complexity of software programs.
B) the growing size of software programs.
C) demands for timely delivery to markets.
D) the inability to fully test programs.
E) the increase in malicious intruders seeking system access.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
34
The term cracker is used to identify a hacker with criminal or malicious intent.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
35
Smartphones have the same security flaws as other Internet-connected devices.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
36
________ identify the access points in a Wi-Fi network.

A) NICs
B) Mac addresses
C) URLs
D) UTMs
E) SSIDs
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
37
A computer virus replicates more quickly than a computer worm.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
38
A foreign country attempting to access government networks in order to disable a national power grid is an example of:

A) phishing.
B) denial-of-service attacks.
C) cyberwarfare.
D) cyberterrorism.
E) evil twins.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
39
According to the 2017 Identity Fraud Study by Javelin Strategy & Research, how much did consumers lose to identity fraud in 2016?

A) $1.6 million
B) $16 million
C) $160 million
D) $1.6 billion
E) $16 billion
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
40
Pharming involves:

A) redirecting users to a fraudulent website even when the user has typed in the correct address in the web browser.
B) pretending to be a legitimate business's representative in order to garner information about a security system.
C) setting up fake website to ask users for confidential information.
D) using emails for threats or harassment.
E) setting up fake Wi-Fi access points that look as if they are legitimate public networks.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
41
What are the security challenges faced by wireless networks?
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
42
Blockchain refers to a technology that:

A) uses a distributed ledger system of transactions.
B) uses a centralized data store in the cloud.
C) relies on the Internet to provide secure transactions.
D) uses existing banking systems to transfer funds.
E) relies on peer-to-peer networks.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
43
Malicious software programs referred to as spyware include a variety of threats such as computer viruses, worms, and Trojan horses.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
44
Computer forensics tasks include all of the following except:

A) presenting collected evidence in a court of law.
B) securely storing recovered electronic data.
C) collecting physical evidence on the computer.
D) finding significant information in a large volume of electronic data.
E) recovering data from computers while preserving evidential integrity.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
45
DoS attacks are used to destroy information and access restricted areas of a company's information system.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
46
The HIPAA Act of 1996:

A) requires financial institutions to ensure the security of customer data.
B) specifies best practices in information systems security and control.
C) imposes responsibility on companies and management to safeguard the accuracy of financial information.
D) outlines medical security and privacy rules.
E) identifies computer abuse as a crime and defines abusive activities.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
47
How is the security of a firm's information system and data affected by its people, organization, and technology? Is the contribution of one of these dimensions any more important than the other? Why?
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
48
The Gramm-Leach-Bliley Act:

A) requires financial institutions to ensure the security of customer data.
B) specifies best practices in information systems security and control.
C) imposes responsibility on companies and management to safeguard the accuracy of financial information.
D) outlines medical security and privacy rules.
E) identifies computer abuse as a crime and defines abusive activities.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
49
Your company, an online discount pet supply store, has calculated that a loss of Internet connectivity for 3 hours results in a potential loss of $2,000 to $3,000 and that there is a 50% chance of this occurring each year. What is the annual expected loss from this exposure?

A) $500
B) $1,000
C) $1,250
D) $1,500
E) $2,500
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
50
Implementation controls:

A) can be classified as input controls, processing controls, and output controls.
B) govern the design, security, and use of computer programs and the security of data files in general throughout the organization.
C) apply to all computerized applications and consist of a combination of hardware, software, and manual procedures that create an overall control environment.
D) include software controls, computer operations controls, and implementation controls.
E) Audit the systems development process at various points to ensure that the process is properly controlled and managed.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
51
Which of the following is a type of ambient data?

A) Computer log containing recent system errors
B) A file deleted from a hard disk
C) A file that contains an application's user settings
D) A set of raw data from an environmental sensor
E) Data that has been recorded over
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
52
Explain how an SQL injection attack works and what types of systems are vulnerable to this type of attack.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
53
Define computer forensics and describe the types of problems it is designed to address.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
54
The Sarbanes-Oxley Act:

A) requires financial institutions to ensure the security of customer data.
B) specifies best practices in information systems security and control.
C) imposes responsibility on companies and management to safeguard the accuracy of financial information.
D) outlines medical security and privacy rules.
E) identifies computer abuse as a crime and defines abusive activities.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
55
Hackers and their companion viruses are an increasing problem, especially on the Internet. What are the most important measures for a firm to take to protect itself from this? Is full protection feasible? Why or why not?
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
56
Zero defects cannot be achieved in larger software programs because fully testing programs that contain thousands of choices and millions of paths would require thousands of years.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
57
Sniffers enable hackers to steal proprietary information from anywhere on a network, including email messages, company files, and confidential reports.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
58
Most IoT devices support sophisticated security approaches.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
59
________ controls formalize standards, rules, procedures, and control disciplines to ensure that the organization's general and application controls are properly executed and enforced.

A) Software
B) Administrative
C) Data security
D) Implementation
E) Input
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
60
Three major concerns of system builders and users are disaster, security, and human error. Of the three, which do you think is most difficult to deal with? Why?
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
61
A digital certificate system:

A) uses third party CAs to validate a user's identity.
B) uses digital signatures to validate a user's identity.
C) uses tokens to validate a user's identity.
D) is used primarily by individuals for personal correspondence.
E) protects a user's identity by substituting a certificate in place of identifiable traits.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
62
Fault tolerant information systems offer 100 percent availability because they use:

A) high-capacity storage.
B) a multitier server network.
C) redundant hardware, software, and power supplies.
D) dedicated phone lines.
E) a digital certificate system.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
63
A firewall allows the organization to:

A) enforce a security policy on data exchanged between its network and the Internet.
B) check the accuracy of all transactions between its network and the Internet.
C) create an enterprise system on the Internet.
D) check the content of all incoming and outgoing email messages.
E) create access rules for a network.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
64
All of the following are currently being used as traits that can be profiled by biometric authentication except:

A) fingerprints.
B) facial characteristics.
C) body odor.
D) retinal images.
E) voice.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
65
In controlling network traffic to minimize slow-downs, a technology called ________ is used to examine data files and sort low-priority data from high-priority data.

A) high availability computing
B) deep packet inspection
C) application proxy filtering
D) stateful inspection
E) unified threat management
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
66
Which of the following defines acceptable uses of a firm's information resources and computing equipment?

A) An information systems audit policy
B) A CA policy
C) A MSSP
D) A UTM system
E) An AUP
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
67
How can a firm's security policies contribute and relate to the six main business objectives? Give examples.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
68
Which of the following focuses primarily on the technical issues of keeping systems up and running?

A) Business continuity planning
B) Security policies
C) Disaster recovery planning
D) An AUP
E) An information systems audit
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
69
A statement ranking information risks and identifying security goals would be included in which of the following?

A) Security policy
B) AUP
C) Risk assessment
D) Business impact analysis
E) Business continuity plan
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
70
An analysis of an information system that rates the likelihood of a security incident occurring and its cost would be included in which of the following?

A) Security policy
B) AUP
C) Risk assessment
D) Business impact analysis
E) Business continuity plan
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
71
Which of the following statements about passwords is not true?

A) Authentication cannot be established by the use of a password.
B) Password systems that are too rigorous may hinder employee productivity.
C) Passwords can be stolen through social engineering.
D) Passwords are often disregarded by employees.
E) Passwords can be sniffed when being transmitted over a network.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
72
How does disaster recovery planning differ from business continuity planning?
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
73
Two-factor authentication utilizes a(n):

A) unique password.
B) encrypted connection.
C) a multistep process of authentication.
D) a firewall.
E) a digital certificate.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
74
Currently, the protocols used for secure information transfer over the Internet are:

A) TCP/IP and SSL.
B) S-HTTP and CA.
C) HTTP and TCP/IP.
D) S-HTTP and SHTML.
E) SSL, TLS, and S-HTTP.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
75
All of the following are types of information systems general controls except:

A) application controls.
B) computer operations controls.
C) hardware controls.
D) software controls.
E) administrative controls.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
76
What is the role of an information systems audit?
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
77
WPA2 is a more effective way to secure a wireless network than WEP because it:

A) includes an AUP.
B) operates on a VPN.
C) uses much longer encryption keys.
D) uses symmetric encryption methods.
E) is part of most vendors UTM products.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
78
In which method of encryption is a single encryption key sent to the receiver so both sender and receiver share the same key?

A) SSL/TLS
B) Symmetric key encryption
C) Public key encryption
D) Private key encryption
E) Distributed encryption
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
79
An acceptable use policy defines acceptable uses of the firm's information resources and computing equipment.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
80
________ use scanning software to look for known problems such as bad passwords, the removal of important files, security attacks in progress, and system administration errors.

A) Stateful inspections
B) Intrusion detection systems
C) Application proxy filtering technologies
D) Packet filtering technologies
E) Firewalls
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 100 flashcards in this deck.