Deck 10: Securing Information Systems
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/103
Play
Full screen (f)
Deck 10: Securing Information Systems
1
The Computer Fraud and Abuse Act of 1986 prohibits ________.
A) accessing company intranet and confidential information from public computers
B) stealing or compromising data about national defense,foreign relations,atomic energy,or other restricted information
C) the use of external devices to provide access and information to companies' confidential information
D) contracting with consultants outside the United States to process information
E) access to company extranets when outsourcing work to clients overseas
A) accessing company intranet and confidential information from public computers
B) stealing or compromising data about national defense,foreign relations,atomic energy,or other restricted information
C) the use of external devices to provide access and information to companies' confidential information
D) contracting with consultants outside the United States to process information
E) access to company extranets when outsourcing work to clients overseas
B
2
________ targeted at networks,is designed to spread by itself,without the need for an infected host file to be shared.
A) Adware
B) Spyware
C) A worm
D) Spam
E) A logic bomb
A) Adware
B) Spyware
C) A worm
D) Spam
E) A logic bomb
C
3
Today,people who break into computer systems with the intention of doing damage or committing a crime are usually called ________.
A) bots
B) white hats
C) worms
D) cyber spies
E) crackers
A) bots
B) white hats
C) worms
D) cyber spies
E) crackers
E
4
________ refers to any software that covertly gathers information about a user through an Internet connection without the user's knowledge.
A) Spyware
B) Spam
C) Web filter
D) Cookie
E) Bot herder
A) Spyware
B) Spam
C) Web filter
D) Cookie
E) Bot herder
Unlock Deck
Unlock for access to all 103 flashcards in this deck.
Unlock Deck
k this deck
5
Which of the following US laws amended the Computer Fraud and Abuse Act to allow investigators access to voice-related communications?
A) the Non-detention Act
B) the Espionage Act
C) the Patriot Act
D) the Video Privacy Protection Act
E) the Clery Act
A) the Non-detention Act
B) the Espionage Act
C) the Patriot Act
D) the Video Privacy Protection Act
E) the Clery Act
Unlock Deck
Unlock for access to all 103 flashcards in this deck.
Unlock Deck
k this deck
6
Computers that are located in homes,schools,and businesses are infected with viruses or worms to create armies of zombie computers to execute ________ attacks.
A) phishing
B) malware
C) adware
D) denial-of-service
E) encryption
A) phishing
B) malware
C) adware
D) denial-of-service
E) encryption
Unlock Deck
Unlock for access to all 103 flashcards in this deck.
Unlock Deck
k this deck
7
WikiLeaks is a famous not-for-profit whistleblower Web site.MasterCard and Visa stopped payments to WikiLeaks after a series of leaks by the site.An anonymous group attacked the Web sites of both MasterCard and Visa reacting to this.These Web vandals,who tried to protect WikiLeaks,can be called ________.
A) hacktivists
B) bots
C) ethical hackers
D) patriot hackers
E) cyber soldiers
A) hacktivists
B) bots
C) ethical hackers
D) patriot hackers
E) cyber soldiers
Unlock Deck
Unlock for access to all 103 flashcards in this deck.
Unlock Deck
k this deck
8
Ronald downloads a movie from the Internet onto his company's computer.During this process,his system gets affected by a virus.The virus spreads rapidly in the company's network and causes the server to crash.This type of virus is most likely to be ________.
A) adware
B) phishing mail
C) spam
D) a worm
E) a Trojan horse
A) adware
B) phishing mail
C) spam
D) a worm
E) a Trojan horse
Unlock Deck
Unlock for access to all 103 flashcards in this deck.
Unlock Deck
k this deck
9
Which of the following is the most complete definition of a computer crime?
A) the act of using a computer to commit an illegal act
B) the act of using someone's computer to browse the Internet
C) the act of using someone's computer to check e-mail
D) the act of stealing a computer and related hardware
E) the act of giving personal information to Web sites when shopping
A) the act of using a computer to commit an illegal act
B) the act of using someone's computer to browse the Internet
C) the act of using someone's computer to check e-mail
D) the act of stealing a computer and related hardware
E) the act of giving personal information to Web sites when shopping
Unlock Deck
Unlock for access to all 103 flashcards in this deck.
Unlock Deck
k this deck
10
In May 2001,an e-mail with "This is unbelievable!" in the subject field and an attached file spread to numerous computers in the world.Any user who downloaded the attached file complained of his or her systems slowing down and in some cases,files being erased.The attached file is most likely to be ________.
A) adware
B) spyware
C) a virus
D) spam
E) a logic bomb
A) adware
B) spyware
C) a virus
D) spam
E) a logic bomb
Unlock Deck
Unlock for access to all 103 flashcards in this deck.
Unlock Deck
k this deck
11
Some violations of state and federal computer crime laws are punishable by fines and by not more than one year in prison.Such violations are charged as ________.
A) misdemeanors
B) felonies
C) embezzlements
D) indictments
E) larcenies
A) misdemeanors
B) felonies
C) embezzlements
D) indictments
E) larcenies
Unlock Deck
Unlock for access to all 103 flashcards in this deck.
Unlock Deck
k this deck
12
Which of the following terms represents junk newsgroup postings used for the purpose of advertising for some product or service?
A) spam
B) adware
C) cookie
D) bot herder
E) Web filter
A) spam
B) adware
C) cookie
D) bot herder
E) Web filter
Unlock Deck
Unlock for access to all 103 flashcards in this deck.
Unlock Deck
k this deck
13
The official Web site of the Iranian government was made unreachable by foreign activists seeking to help the opposition parties during the 2009 Iranian election protests.Web sites belonging to many Iranian news agencies were also made unreachable by the activists.This cyber protest is an example of a(n)________ attack.
A) denial-of-service
B) logic bomb
C) Trojan horse
D) online predator
E) bot herder
A) denial-of-service
B) logic bomb
C) Trojan horse
D) online predator
E) bot herder
Unlock Deck
Unlock for access to all 103 flashcards in this deck.
Unlock Deck
k this deck
14
Violating data belonging to banks or other financial institutions is a crime in the United States.Which of the following legislations prohibit such violations?
A) the Foreign Intelligence Surveillance Act
B) the Computer Fraud and Abuse Act
C) the Patriot Act
D) the Banking Rights and Privacy Act
E) the Electronic Communications Privacy Act
A) the Foreign Intelligence Surveillance Act
B) the Computer Fraud and Abuse Act
C) the Patriot Act
D) the Banking Rights and Privacy Act
E) the Electronic Communications Privacy Act
Unlock Deck
Unlock for access to all 103 flashcards in this deck.
Unlock Deck
k this deck
15
While adding information to the employee information database,Neil's computer crashed and the entire database on his computer was erased along with it.Which of the following types of virus would have caused Neil's computer to crash?
A) spyware
B) worm
C) adware
D) logic bomb
E) encryption
A) spyware
B) worm
C) adware
D) logic bomb
E) encryption
Unlock Deck
Unlock for access to all 103 flashcards in this deck.
Unlock Deck
k this deck
16
Computer criminals who attempt to break into systems or deface Web sites to promote political or ideological goals are called ________.
A) hacktivists
B) crackers
C) social promoters
D) internet activists
E) online predators
A) hacktivists
B) crackers
C) social promoters
D) internet activists
E) online predators
Unlock Deck
Unlock for access to all 103 flashcards in this deck.
Unlock Deck
k this deck
17
While Shelly downloaded an arcade game from an unknown Internet Web site,an unauthorized connection unknown to Shelly had been established with her computer.The arcade game is most likely to be ________.
A) spyware
B) a worm
C) adware
D) a Trojan horse
E) encryption
A) spyware
B) a worm
C) adware
D) a Trojan horse
E) encryption
Unlock Deck
Unlock for access to all 103 flashcards in this deck.
Unlock Deck
k this deck
18
Which of the following is one of the main federal laws in the United States against computer crimes?
A) Satellite Act of 1962
B) Trade Expansions Act of 1962
C) United States Information and Educational Exchange Act
D) Central Intelligence Agency Act
E) Electronic Communications Privacy Act of 1986
A) Satellite Act of 1962
B) Trade Expansions Act of 1962
C) United States Information and Educational Exchange Act
D) Central Intelligence Agency Act
E) Electronic Communications Privacy Act of 1986
Unlock Deck
Unlock for access to all 103 flashcards in this deck.
Unlock Deck
k this deck
19
Those individuals who are knowledgeable enough to gain access to computer systems without authorization have long been referred to as ________.
A) hackers
B) bots
C) online predators
D) worms
E) power users
A) hackers
B) bots
C) online predators
D) worms
E) power users
Unlock Deck
Unlock for access to all 103 flashcards in this deck.
Unlock Deck
k this deck
20
Employees steal time on company computers to do personal business.This can be considered as an example of ________.
A) unauthorized access
B) hacking
C) Web vandalism
D) cyberstalking
E) embezzlement
A) unauthorized access
B) hacking
C) Web vandalism
D) cyberstalking
E) embezzlement
Unlock Deck
Unlock for access to all 103 flashcards in this deck.
Unlock Deck
k this deck
21
________ is the dubious practice of registering a domain name and then trying to sell the name for big bucks to the person,company,or organization most likely to want it.
A) Cybersquatting
B) Bot herding
C) Spear phishing
D) Logic bombing
E) Hacktivism
A) Cybersquatting
B) Bot herding
C) Spear phishing
D) Logic bombing
E) Hacktivism
Unlock Deck
Unlock for access to all 103 flashcards in this deck.
Unlock Deck
k this deck
22
A hacker takes an individual's Social Security number,credit card number,and other personal information for the purpose of using the victim's credit rating to run up debts that are never repaid.This practice is called ________.
A) identity theft
B) cyberstalking
C) cyberbullying
D) bot herding
E) viral marketing
A) identity theft
B) cyberstalking
C) cyberbullying
D) bot herding
E) viral marketing
Unlock Deck
Unlock for access to all 103 flashcards in this deck.
Unlock Deck
k this deck
23
________ is the use of computer and networking technologies,by individuals and organized groups,against persons or property to intimidate or coerce governments,civilians,or any segment of society in order to attain political,religious,or ideological goals.
A) Cyberterrorism
B) Web vandalism
C) Cyberwar
D) Patriot hacking
E) Cyberbullying
A) Cyberterrorism
B) Web vandalism
C) Cyberwar
D) Patriot hacking
E) Cyberbullying
Unlock Deck
Unlock for access to all 103 flashcards in this deck.
Unlock Deck
k this deck
24
________ is the stealing of another person's Social Security number,credit card number,and other personal information for the purpose of using the victim's credit rating to borrow money,buy merchandise,and otherwise run up debts that are never repaid.
A) Logic bombing
B) Battery
C) Spear phishing
D) Bot herding
E) Identity theft
A) Logic bombing
B) Battery
C) Spear phishing
D) Bot herding
E) Identity theft
Unlock Deck
Unlock for access to all 103 flashcards in this deck.
Unlock Deck
k this deck
25
________ broadly refers to the use of a computer to communicate obscene,vulgar,or threatening content that causes a reasonable person to endure distress.
A) Cyberharassment
B) Viral marketing
C) Hacktivism
D) Bot herding
E) Spam filtering
A) Cyberharassment
B) Viral marketing
C) Hacktivism
D) Bot herding
E) Spam filtering
Unlock Deck
Unlock for access to all 103 flashcards in this deck.
Unlock Deck
k this deck
26
________ refers to offering stolen proprietary software for free over the Internet.
A) Bot herding
B) Warez peddling
C) Spam filtering
D) Viral marketing
E) Spear phishing
A) Bot herding
B) Warez peddling
C) Spam filtering
D) Viral marketing
E) Spear phishing
Unlock Deck
Unlock for access to all 103 flashcards in this deck.
Unlock Deck
k this deck
27
Arbitron consultants,a leading software consulting firm in the United States,decides to launch an ERP solution.The company chooses the brand name ArbitEnterprise for the new solution.However,when the company attempts to register the domain name,it finds that the domain name is already registered to an unknown firm.The small firm is now attempting to sell the domain name to Arbitron.Which of the following terms refers to this practice of buying a domain name only to sell it for big bucks?
A) cybersquatting
B) logic bombing
C) cyberbullying
D) bot herding
E) cyberstalking
A) cybersquatting
B) logic bombing
C) cyberbullying
D) bot herding
E) cyberstalking
Unlock Deck
Unlock for access to all 103 flashcards in this deck.
Unlock Deck
k this deck
28
A(n)________ typically consists of a distorted image displaying a combination of letters and/or numbers that a user has to input into a form before submitting it.
A) ASCII
B) CTAN
C) ENGO
D) CAPTCHA
E) WYSIWYG
A) ASCII
B) CTAN
C) ENGO
D) CAPTCHA
E) WYSIWYG
Unlock Deck
Unlock for access to all 103 flashcards in this deck.
Unlock Deck
k this deck
29
Which of the following can typically be filed for a copyright?
A) iPhone
B) music by the Beatles
C) Amazon's one-click buying
D) Google Nexus phone
E) iPad
A) iPhone
B) music by the Beatles
C) Amazon's one-click buying
D) Google Nexus phone
E) iPad
Unlock Deck
Unlock for access to all 103 flashcards in this deck.
Unlock Deck
k this deck
30
Which of the following is a message passed to a Web browser on a user's computer by a Web server?
A) cookie
B) botnet
C) honeypot
D) phish
E) spam
A) cookie
B) botnet
C) honeypot
D) phish
E) spam
Unlock Deck
Unlock for access to all 103 flashcards in this deck.
Unlock Deck
k this deck
31
________ is a more sophisticated fraudulent e-mail attack that targets a specific person or organization by personalizing the message in order to make the message appear as if it is from a trusted source such as an individual within the recipient's company,a government entity,or a well-known company.
A) Spear phishing
B) Cyber tunneling
C) Viral marketing
D) Logic bombing
E) Hacking
A) Spear phishing
B) Cyber tunneling
C) Viral marketing
D) Logic bombing
E) Hacking
Unlock Deck
Unlock for access to all 103 flashcards in this deck.
Unlock Deck
k this deck
32
Which of the following is the most accurate definition of a botnet?
A) fraudulent e-mail attack that targets a specific person or organization by personalizing the message
B) spider software used by a search algorithm to crawl various Web sites to return a query
C) small text file passed to a Web browser on a user's computer by a Web server
D) common platform used by search engines to index the contents of a Web site
E) destructive software robots,working together on a collection of zombie computers via the Internet
A) fraudulent e-mail attack that targets a specific person or organization by personalizing the message
B) spider software used by a search algorithm to crawl various Web sites to return a query
C) small text file passed to a Web browser on a user's computer by a Web server
D) common platform used by search engines to index the contents of a Web site
E) destructive software robots,working together on a collection of zombie computers via the Internet
Unlock Deck
Unlock for access to all 103 flashcards in this deck.
Unlock Deck
k this deck
33
Which of the following can typically be filed for a patent?
A) material inventions
B) software
C) music
D) literature
E) art
A) material inventions
B) software
C) music
D) literature
E) art
Unlock Deck
Unlock for access to all 103 flashcards in this deck.
Unlock Deck
k this deck
34
________ are false messages often circulated online about new viruses,earthquakes,kids in trouble,cancer causes,or any other topic of public interest.
A) Internet hoaxes
B) Honeypots
C) Cookies
D) Logic bombs
E) Malware
A) Internet hoaxes
B) Honeypots
C) Cookies
D) Logic bombs
E) Malware
Unlock Deck
Unlock for access to all 103 flashcards in this deck.
Unlock Deck
k this deck
35
Independent citizens or supporters of a country that perpetrate attacks on perceived or real enemies are called ________.
A) patriot hackers
B) bot herders
C) online predators
D) hacktivists
E) ethical hackers
A) patriot hackers
B) bot herders
C) online predators
D) hacktivists
E) ethical hackers
Unlock Deck
Unlock for access to all 103 flashcards in this deck.
Unlock Deck
k this deck
36
________ is an attempt to trick financial account and credit card holders into giving away their authentication information,usually by sending spam messages to literally millions of e-mail accounts.
A) Phishing
B) Cyber tunneling
C) Viral marketing
D) Logic bombing
E) Hacking
A) Phishing
B) Cyber tunneling
C) Viral marketing
D) Logic bombing
E) Hacking
Unlock Deck
Unlock for access to all 103 flashcards in this deck.
Unlock Deck
k this deck
37
Cyber criminals gain information on a victim by monitoring online activities,accessing databases,and so on and make false accusations that damage the reputation of the victim on blogs,Web sites,chat rooms,or e-commerce sites.Such acts are called ________.
A) bot herding
B) cyberstalking
C) spam filtering
D) viral marketing
E) spear phishing
A) bot herding
B) cyberstalking
C) spam filtering
D) viral marketing
E) spear phishing
Unlock Deck
Unlock for access to all 103 flashcards in this deck.
Unlock Deck
k this deck
38
Robert receives an e-mail which says he has won an online lottery worth $50 billion.Robert had his doubts as he did not remember entering or buying any lottery ticket.It was a spam e-mail intended to obtain the bank account details and the credit card number of Robert.Which of the following is evident here?
A) logic bomb
B) hacktivism
C) phishing
D) tunneling
E) cyberterrorism
A) logic bomb
B) hacktivism
C) phishing
D) tunneling
E) cyberterrorism
Unlock Deck
Unlock for access to all 103 flashcards in this deck.
Unlock Deck
k this deck
39
When using Yahoo Messenger,you get an unsolicited advertisement from a company.This advertisement contains a link to connect to the merchant's Web site.Which of the following is the best way of classifying this advertisement?
A) adware
B) cookie
C) Internet hoax
D) spim
E) cyber squatting
A) adware
B) cookie
C) Internet hoax
D) spim
E) cyber squatting
Unlock Deck
Unlock for access to all 103 flashcards in this deck.
Unlock Deck
k this deck
40
________ refers to an organized attempt by a country's military to disrupt or destroy the information and communication systems of another country.
A) Cyberwar
B) Internet hoaxing
C) Cybersquatting
D) Web vandalism
E) Logic bombing
A) Cyberwar
B) Internet hoaxing
C) Cybersquatting
D) Web vandalism
E) Logic bombing
Unlock Deck
Unlock for access to all 103 flashcards in this deck.
Unlock Deck
k this deck
41
An organization builds a fully equipped backup facility,having everything from office chairs to a one-to-one replication of the most current data.This facility is called a ________.
A) buying center
B) firewall
C) hot backup site
D) botnet
E) collocation facility
A) buying center
B) firewall
C) hot backup site
D) botnet
E) collocation facility
Unlock Deck
Unlock for access to all 103 flashcards in this deck.
Unlock Deck
k this deck
42
In ________,an attacker accesses the network,intercepts data from it,and even uses network services and/or sends attack instructions to it without having to enter the home,office,or organization that owns the network.
A) drive-by hacking
B) hacktivism
C) viral marketing
D) cybersquatting
E) denial-of-service
A) drive-by hacking
B) hacktivism
C) viral marketing
D) cybersquatting
E) denial-of-service
Unlock Deck
Unlock for access to all 103 flashcards in this deck.
Unlock Deck
k this deck
43
Which of the following is a valid observation about encryption?
A) Encrypted messages cannot be deciphered without the decoding key.
B) Encryption is used for data enhancement rather than data protection.
C) Encryption is performed only after the messages enter the network.
D) The encryption approach is not dependent on the type of data transmission.
E) Encryption implementation is an expensive process and needs an authentication from a relevant authority.
A) Encrypted messages cannot be deciphered without the decoding key.
B) Encryption is used for data enhancement rather than data protection.
C) Encryption is performed only after the messages enter the network.
D) The encryption approach is not dependent on the type of data transmission.
E) Encryption implementation is an expensive process and needs an authentication from a relevant authority.
Unlock Deck
Unlock for access to all 103 flashcards in this deck.
Unlock Deck
k this deck
44
________ by terrorists refers to the use of the vast amount of information available on the Internet regarding virtually any topic for planning,recruitment,and numerous other endeavors.
A) Data mining
B) Information dissemination
C) Location monitoring
D) Information sharing
E) Cybersquatting
A) Data mining
B) Information dissemination
C) Location monitoring
D) Information sharing
E) Cybersquatting
Unlock Deck
Unlock for access to all 103 flashcards in this deck.
Unlock Deck
k this deck
45
A ________ is nothing more than an empty warehouse with all necessary connections for power and communication but nothing else.
A) cold backup site
B) buying center
C) botnet
D) firewall
E) collocation facility
A) cold backup site
B) buying center
C) botnet
D) firewall
E) collocation facility
Unlock Deck
Unlock for access to all 103 flashcards in this deck.
Unlock Deck
k this deck
46
Which of the following is a part of a computer system designed to detect intrusion and prevent unauthorized access to or from a private network?
A) firewall
B) cookie
C) botnet
D) honeypot
E) spam filter
A) firewall
B) cookie
C) botnet
D) honeypot
E) spam filter
Unlock Deck
Unlock for access to all 103 flashcards in this deck.
Unlock Deck
k this deck
47
Albitrex Systems is an Asian software consulting firm which develops solutions for companies in the United States and Europe.The company is heavily dependent on the Internet for transporting data.The company wants to ensure that only authorized users access the data and that the data cannot be intercepted and compromised.Which of the following would be most helpful to the company in achieving this goal?
A) spam filtering
B) hot backing up
C) tunneling
D) open transmitting
E) cloud storage
A) spam filtering
B) hot backing up
C) tunneling
D) open transmitting
E) cloud storage
Unlock Deck
Unlock for access to all 103 flashcards in this deck.
Unlock Deck
k this deck
48
________ refers to precautions taken to keep all aspects of information systems safe from destruction,manipulation,or unauthorized use or access.
A) Information systems security
B) Information systems resources
C) Information systems planning
D) Information systems audit
E) Information systems distribution
A) Information systems security
B) Information systems resources
C) Information systems planning
D) Information systems audit
E) Information systems distribution
Unlock Deck
Unlock for access to all 103 flashcards in this deck.
Unlock Deck
k this deck
49
Implementing encryption on a large scale,such as on a busy Web site,requires a third party,called a(n)________.
A) certificate authority
B) virtual private network
C) arbitrative authority
D) control center
E) buying center
A) certificate authority
B) virtual private network
C) arbitrative authority
D) control center
E) buying center
Unlock Deck
Unlock for access to all 103 flashcards in this deck.
Unlock Deck
k this deck
50
Your company uses a fingerprint recognition system instead of an access card.This helps the company prevent unauthorized physical access.Which of the following technologies is used for authentication here?
A) biometrics
B) passwords
C) smart cards
D) access-control software
E) encryption
A) biometrics
B) passwords
C) smart cards
D) access-control software
E) encryption
Unlock Deck
Unlock for access to all 103 flashcards in this deck.
Unlock Deck
k this deck
51
With ________,employees may be identified by fingerprints,retinal patterns in the eye,facial features,or other bodily characteristics before being granted access to use a computer or to enter a facility.
A) CAPTCHAs
B) biometrics
C) passwords
D) access-control software
E) smart cards
A) CAPTCHAs
B) biometrics
C) passwords
D) access-control software
E) smart cards
Unlock Deck
Unlock for access to all 103 flashcards in this deck.
Unlock Deck
k this deck
52
RBS Publishing is a leading media company in France.The company handles sensitive information and often finds it susceptible to information threats.As a counter measure the company installs strong firewalls and protective software.These steps are a part of a ________ strategy.
A) risk acceptance
B) risk reduction
C) risk mitigation
D) risk transference
E) risk rescheduling
A) risk acceptance
B) risk reduction
C) risk mitigation
D) risk transference
E) risk rescheduling
Unlock Deck
Unlock for access to all 103 flashcards in this deck.
Unlock Deck
k this deck
53
Ciscon Telecom is a mobile operator in the European Union.The company provides personalized services to its customers and its databases contain valuable information about its customers.The loss of customer information which is used to decide services would be extremely harmful to the organization.Which of the following strategies used by Ciscon is an example of risk transference?
A) The company insures any possible data loss for a large sum.
B) The company forms a special team of top executives to monitor and correct the information policies.
C) It installs a corporate firewall to protect unauthorized access to information.
D) It enforces a strict employee data policy and prohibits employees from unauthorized access.
E) The company decides to absorb any damages that might occur.
A) The company insures any possible data loss for a large sum.
B) The company forms a special team of top executives to monitor and correct the information policies.
C) It installs a corporate firewall to protect unauthorized access to information.
D) It enforces a strict employee data policy and prohibits employees from unauthorized access.
E) The company decides to absorb any damages that might occur.
Unlock Deck
Unlock for access to all 103 flashcards in this deck.
Unlock Deck
k this deck
54
A(n)________ is a network connection that is constructed dynamically within an existing network in order to connect users or nodes.
A) virtual private network
B) ambient network
C) cognitive network
D) collaborative service network
E) internetwork
A) virtual private network
B) ambient network
C) cognitive network
D) collaborative service network
E) internetwork
Unlock Deck
Unlock for access to all 103 flashcards in this deck.
Unlock Deck
k this deck
55
An organization takes active countermeasures to protect its systems,such as installing firewalls.This approach is known as ________.
A) risk reduction
B) risk acceptance
C) risk rescheduling
D) risk transference
E) risk elimination
A) risk reduction
B) risk acceptance
C) risk rescheduling
D) risk transference
E) risk elimination
Unlock Deck
Unlock for access to all 103 flashcards in this deck.
Unlock Deck
k this deck
56
________ is a process in which you assess the value of the assets being protected,determine their probability of being compromised,and compare the probable costs of their being compromised with the estimated costs of whatever protections you might have to take.
A) Risk analysis
B) Information systems audit
C) Disintermediation
D) Operational analysis
E) Data mining
A) Risk analysis
B) Information systems audit
C) Disintermediation
D) Operational analysis
E) Data mining
Unlock Deck
Unlock for access to all 103 flashcards in this deck.
Unlock Deck
k this deck
57
________ software is used to keep track of computer activity so that inspectors can spot suspicious activity and take action.
A) Access-control
B) Firewall
C) Audit-control
D) Denial-of-service
E) Risk analysis
A) Access-control
B) Firewall
C) Audit-control
D) Denial-of-service
E) Risk analysis
Unlock Deck
Unlock for access to all 103 flashcards in this deck.
Unlock Deck
k this deck
58
An organization does not implement countermeasures against information threats; instead it simply absorbs the damages that occur.This approach is called ________.
A) risk acceptance
B) risk reduction
C) risk mitigation
D) risk transference
E) risk rescheduling
A) risk acceptance
B) risk reduction
C) risk mitigation
D) risk transference
E) risk rescheduling
Unlock Deck
Unlock for access to all 103 flashcards in this deck.
Unlock Deck
k this deck
59
A mass cyber attack occurred in a country when it took severe actions against a group of citizens who protested against the country's religious policies.The attack involved a denial-of-service in which selected sites were bombarded with traffic to force them offline.This is an example of ________.
A) cyberterrorism
B) logic bombing
C) hot backing up
D) cyberbullying
E) cybersquatting
A) cyberterrorism
B) logic bombing
C) hot backing up
D) cyberbullying
E) cybersquatting
Unlock Deck
Unlock for access to all 103 flashcards in this deck.
Unlock Deck
k this deck
60
Some data centers rent server space to multiple customers and provide necessary infrastructure in terms of power,backups,connectivity,and security.Such data centers are called ________.
A) collocation facilities
B) hot backup sites
C) virtual private networks
D) offshore networks
E) control centers
A) collocation facilities
B) hot backup sites
C) virtual private networks
D) offshore networks
E) control centers
Unlock Deck
Unlock for access to all 103 flashcards in this deck.
Unlock Deck
k this deck
61
Patriot hackers are independent citizens or supporters of a country that perpetrate attacks on perceived or real enemies.
Unlock Deck
Unlock for access to all 103 flashcards in this deck.
Unlock Deck
k this deck
62
Logic bombs are variations of Trojan horses that can reproduce themselves to disrupt the normal functioning of a computer.
Unlock Deck
Unlock for access to all 103 flashcards in this deck.
Unlock Deck
k this deck
63
________ is the use of formal investigative techniques to evaluate digital information for judicial review.
A) Computer forensics
B) Flaming
C) Hacktivism
D) Certificate authority
E) Encryption
A) Computer forensics
B) Flaming
C) Hacktivism
D) Certificate authority
E) Encryption
Unlock Deck
Unlock for access to all 103 flashcards in this deck.
Unlock Deck
k this deck
64
Organizations periodically have an external entity review the controls so as to uncover any potential problems in the controls.This process is called ________.
A) information systems audit
B) risk analysis
C) information modification
D) recovery plan objective analysis
E) business continuity plan
A) information systems audit
B) risk analysis
C) information modification
D) recovery plan objective analysis
E) business continuity plan
Unlock Deck
Unlock for access to all 103 flashcards in this deck.
Unlock Deck
k this deck
65
Employees steal time on company computers to do personal business.This is a form of unauthorized access.
Unlock Deck
Unlock for access to all 103 flashcards in this deck.
Unlock Deck
k this deck
66
The ________ is a set of best practices that helps organizations both maximize the benefits from their IS infrastructure and establish appropriate controls.
A) Sarbanes-Oxley Act of 2002 (S-OX)
B) Completely Automated Public Turing Test to Tell Computers and Humans Apart (CAPTCHA)
C) Electronic Communications Privacy Act of 1986
D) Control objectives for information and related technology (COBIT)
E) USA Patriot Act
A) Sarbanes-Oxley Act of 2002 (S-OX)
B) Completely Automated Public Turing Test to Tell Computers and Humans Apart (CAPTCHA)
C) Electronic Communications Privacy Act of 1986
D) Control objectives for information and related technology (COBIT)
E) USA Patriot Act
Unlock Deck
Unlock for access to all 103 flashcards in this deck.
Unlock Deck
k this deck
67
Which of the following laws makes it mandatory for organizations to demonstrate that there are controls in place to prevent misuse or fraud,controls to detect any potential problems,and effective measures to correct any problems?
A) Sarbanes-Oxley Act
B) Trade Expansions Act of 1962
C) Electronic Communications Privacy Act of 1986
D) Central Intelligence Agency Act
E) USA Patriot Act
A) Sarbanes-Oxley Act
B) Trade Expansions Act of 1962
C) Electronic Communications Privacy Act of 1986
D) Central Intelligence Agency Act
E) USA Patriot Act
Unlock Deck
Unlock for access to all 103 flashcards in this deck.
Unlock Deck
k this deck
68
Computer crime is defined as the act of using a computer to commit an illegal act.
Unlock Deck
Unlock for access to all 103 flashcards in this deck.
Unlock Deck
k this deck
69
Making false accusations that damage the reputation of the victim on blogs,Web sites,chat rooms,or e-commerce sites is a form of cyberstalking.
Unlock Deck
Unlock for access to all 103 flashcards in this deck.
Unlock Deck
k this deck
70
Spam filters are used to reduce the amount of spam processed by central e-mail servers.
Unlock Deck
Unlock for access to all 103 flashcards in this deck.
Unlock Deck
k this deck
71
Controls that are used to assess whether anything went wrong,such as unauthorized access attempts,are called ________ controls.
A) detective
B) preventive
C) corrective
D) adaptive
E) protective
A) detective
B) preventive
C) corrective
D) adaptive
E) protective
Unlock Deck
Unlock for access to all 103 flashcards in this deck.
Unlock Deck
k this deck
72
Identify the policy that lists procedures for adding new users to systems and removing users who have left the organization.
A) information policy
B) use policy
C) incident handling procedures
D) disaster recovery plan
E) account management policy
A) information policy
B) use policy
C) incident handling procedures
D) disaster recovery plan
E) account management policy
Unlock Deck
Unlock for access to all 103 flashcards in this deck.
Unlock Deck
k this deck
73
Recovery point objectives of a recovery plan specify ________.
A) the maximum time allowed to recover from a catastrophic event
B) data structures and patterns of the data
C) the minimum time after which response should be allowed in a catastrophic event
D) how current the backup data should be
E) the capacity of a backup server in storing the necessary data
A) the maximum time allowed to recover from a catastrophic event
B) data structures and patterns of the data
C) the minimum time after which response should be allowed in a catastrophic event
D) how current the backup data should be
E) the capacity of a backup server in storing the necessary data
Unlock Deck
Unlock for access to all 103 flashcards in this deck.
Unlock Deck
k this deck
74
Which of the following types of plans describes how a business resumes operation after a disaster?
A) business continuity plan
B) internal operations plan
C) collocation facilities plan
D) emergency operation plan
E) virtual private network plan
A) business continuity plan
B) internal operations plan
C) collocation facilities plan
D) emergency operation plan
E) virtual private network plan
Unlock Deck
Unlock for access to all 103 flashcards in this deck.
Unlock Deck
k this deck
75
Which of the following terms refers to a computer,data,or network site that is designed to be enticing to crackers so as to detect,deflect,or counteract illegal activity?
A) honeypot
B) firewall
C) bot herder
D) botnet
E) zombie computer
A) honeypot
B) firewall
C) bot herder
D) botnet
E) zombie computer
Unlock Deck
Unlock for access to all 103 flashcards in this deck.
Unlock Deck
k this deck
76
Cyberwar refers to an organized attempt by a country's military to disrupt or destroy the information and communication systems of another country.
Unlock Deck
Unlock for access to all 103 flashcards in this deck.
Unlock Deck
k this deck
77
An Internet hoax is a false message circulated online about new viruses.
Unlock Deck
Unlock for access to all 103 flashcards in this deck.
Unlock Deck
k this deck
78
Spyware is electronic junk mail or junk newsgroup postings,posted usually for the purpose of advertising some product and/or service.
Unlock Deck
Unlock for access to all 103 flashcards in this deck.
Unlock Deck
k this deck
79
A cookie is a message passed to a Web browser on a user's computer by a Web server.
Unlock Deck
Unlock for access to all 103 flashcards in this deck.
Unlock Deck
k this deck
80
Patents generally refer to creations of the mind such as music,literature,or software.
Unlock Deck
Unlock for access to all 103 flashcards in this deck.
Unlock Deck
k this deck