Matching
Match the most appropriate item with one item below.
Premises:
A cashier receives inadequate training and gives a customer too much change.
A corporate spy sells information about new products to a firm's competitors.
A cyber-criminal threatens to disable an air traffic control system unless he is provided with a flight out of the country.
A data entry clerk increases prices by ten percent when inputting invoice data.
A group of hackers bombard an information system with requests for information, preventing other users from accessing the system.
A hacker introduces a virus in an information system.
A restaurant waiter sells a customer's credit card number to a friend.
A systems designer uses a secret password to bypass controls added by the client.
Because of a power outage, payroll checks are processed two days late.
Responses:
Denial of service attack.
Disclosure of confidential information.
Error.
Extortion.
Information manipulation.
Information theft.
Intrusions.
Malicious software.
Service interruptions and delays.
Correct Answer:
Premises:
Responses:
A cashier receives inadequate training and gives a customer too much change.
A corporate spy sells information about new products to a firm's competitors.
A cyber-criminal threatens to disable an air traffic control system unless he is provided with a flight out of the country.
A data entry clerk increases prices by ten percent when inputting invoice data.
A group of hackers bombard an information system with requests for information, preventing other users from accessing the system.
A hacker introduces a virus in an information system.
A restaurant waiter sells a customer's credit card number to a friend.
A systems designer uses a secret password to bypass controls added by the client.
Because of a power outage, payroll checks are processed two days late.
Premises:
A cashier receives inadequate training and gives a customer too much change.
A corporate spy sells information about new products to a firm's competitors.
A cyber-criminal threatens to disable an air traffic control system unless he is provided with a flight out of the country.
A data entry clerk increases prices by ten percent when inputting invoice data.
A group of hackers bombard an information system with requests for information, preventing other users from accessing the system.
A hacker introduces a virus in an information system.
A restaurant waiter sells a customer's credit card number to a friend.
A systems designer uses a secret password to bypass controls added by the client.
Because of a power outage, payroll checks are processed two days late.
Responses:
Related Questions
Q27: Phil, a corporate controller, was preparing a
Q28: Steps for Better Thinking comprise four steps
Q29: Working in groups frequently leads to information
Q30: Kay was frustrated. She was auditing a
Q31: When a person has to make a
Q33: The first step in creating a knowledge
Q34: Marge was creating an Access database to
Q35: Mike had recently finished his accounting degree,
Q36: Decision makers can avoid information overload caused
Q37: Steps for Better Thinking comprise four steps