ISYS 209 C8 – Flashcards
Unlock all answers in this set
Unlock answersquestion
Which act requires financial institutions to ensure the security and confidentiality of customer data
answer
Gramm-Leach-Billey Act
question
A _____________ is a unique type of malware that replicates itself from one computer to another
answer
worm
question
Gaining access to a safety deposit box using iris scanning is an example of ___________________ authentication
answer
biometric
question
Someone hacking into your facebook
answer
cybervandalism
question
Electronic evidence on computer storage media that is not visible to the average user is called ____________
answer
ambient data
question
The ________ virus, a rather nice sounding virus, was one of the most
answer
ILOVEYOU
question
__________________ requires that your patient records be protected and saved for six years
answer
HIPAA
question
Establishing a risk level of malware threats to an organization
answer
risk assessment
question
Which of the following is NOT addressed by a business continuity plan?
answer
The technical issues involved in keeping systems up and running
question
___________________ is the ability to determine that a person is who he or she claims to be through a variety of means
answer
Authentication
question
Which of the following is NOT a security threat posed by the use of the iPhone, iPad,
answer
Dictating what kind of data an app can access inside its sandbox domain
question
Which of the following is an opportunity for threats to gain access to assets
answer
vulnerability
question
A __________ is a type of spyware that records keystrokes to steal sensitive
answer
keylogger
question
A __________ is a program that seems like a normal program, but does something completely unexpected
answer
Trojan horse
question
_________________ is a general security term that includes computer viruses, worms, and Trojan horses
answer
Malware
question
Which of the following is a critical security function of senior management in an organization
answer
Establishing the security policy and managing risk
question
_______________ is an increasing problem where hackers lock parts of your computer and then demand money to unlock
answer
Ransomware
question
If you receive an email asking for your social security number in return for a million
answer
phishing
question
Which of the following examines data files and sorts out low-priority online material while assigning higher priority to business-critical
answer
Deep packet inspection
question
Although it may seem innocent enough, _________is a serious problem for companies that are involved with pay-per-click
answer
click fraud
question
tricking employees to reveal their password by pretending to be a legitimate member of a company
answer
social engineering
question
Which of the following is FALSE regarding public-key encryption
answer
on receiving the message, the recipient uses the public key to decrypt it
question
Taking over computers and directing those systems to overload a network is defined as
answer
denial-of-service
question
Which of the following is FALSE regarding digital certificates?
answer
The CA verifies a digital certificate user's identity online
question
____________ provides rules related to the creation of financial statement to help avoid fraud
answer
Sarbanes-Oxley Act