COB 204 Chapter 12 – Flashcards

Unlock all answers in this set

Unlock answers
question
A _____ is a person or organization that seeks to obtain data or other assets illegally, without the owner's permission and often without the owner's knowledge.
answer
threat
question
Which of the following is considered a computer crime?
answer
hacking of information systems
question
_____ occurs when someone deceives by pretending to be someone else.
answer
Pretexting
question
When referring to security threats, pretexting, sniffing, spoofing, and phishing are all examples of _____.
answer
unauthorized data disclosure
question
A _____ pretends to be a legitimate company and sends an email requesting confidential data, such as account numbers, Social Security numbers, account passwords, and so forth.
answer
phisher
question
Email spoofing is a synonym for _____.
answer
phishing
question
_____ is a technique for intercepting computer communications, either through a physical connection to a network or without physical connection in the case of wireless networks.
answer
Sniffing
question
Which of the following is an example of a sniffing technique?
answer
Adware
question
_____ occurs when a person breaks into a network to steal data such as customer lists, product inventory data, employee data, and other proprietary and confidential data.
answer
Hacking
question
Which of the following usually happens in a malicious denial-of-service attack?
answer
A hacker floods a web server with millions of bogus service requests.
question
_____ present the largest risk for an organization's infrastructure loss.
answer
Natural disasters
question
_____ are small files that your browser stores on your computer when you visit web sites and enable you to access web sites without having to sign in every time.
answer
Cookies
question
Which of the following is a critical security function senior management in an organization?
answer
Establishing the security policy and managing risk
question
The Privacy Act of 1974 provides protection to individuals regarding ______.
answer
records held by the US government
question
Which of the following was passed to give individuals the right to access their own health data created by doctors and other healthcare providers?
answer
HIPAA of 1996
question
Which of the following is an example of a technical safeguard?
answer
Firewalls
question
Users of smart cards are required to enter a _____ to be authenticated.
answer
personal identification number
question
Which of the following is used for biometric authentication?
answer
Facial features
question
______ is the process of transforming clear text into coded, unintelligible text for secure storage or communication.
answer
Encryption
question
Secure Socket Layer is also known as _____.
answer
transport layer security
question
You are transferring funds online through the web site of a reputed bank. Which of the following displayed in your browser's address bar will let you know that the bank is using the SSL protocol?
answer
https
question
A _____ examines each part of a message and determines whether to let that part pass.
answer
packet-filtering firewall
question
_____ is the term used to denote viruses, worms, and trojan horses.
answer
Malware
question
What is the major difference between spyware and adware?
answer
Unlike spyware, adware does not perform malicious acts.
question
In a locked room, maintaining the computers of an organization that run the DBMS is a part of ______.
answer
physical security procedures
question
_____ involve the people and the procedure components of information systems.
answer
Human safeguards
question
_____ are the primary means of authentication and are important not just for access to a user's computer, but also for authentication to other networks and servers to which the user may have access.
answer
Passwords
Get an explanation on any task
Get unstuck with the help of our AI assistant in seconds
New