MIS 3063 CH 9 – Flashcards

Unlock all answers in this set

Unlock answers
question
________ are viruses that masquerade as useful programs like a computer game, an MP3 file, or some other useful innocuous program
answer
Trojan horses
question
With https, data are encrypted using a protocol called the ________.
answer
Secure Sockets Layer (SSL)
question
________ is a broad category of software that includes viruses, worms, Trojan horses, spyware, and adware
answer
Malware
question
Which of the following statements is true of the financial losses due to computer crimes?
answer
All studies on the costs of computer crimes are based on surveys
question
Which of the following types of encryption is used by the secure sockets layer protocol?
answer
public key encryption
question
The procedure of entrusting a party with a copy of an encryption key that can be used in case the actual key is lost or destroyed is called ________.
answer
key escrow
question
Which of the following statements is true of symmetric encryption?
answer
It uses the same key for both encoding and decoding
question
Which of the following information should be provided by users of smart cards for authentication?
answer
personal identification number
question
________ occurs when computer criminals invade a computer system and replace legitimate programs with their own unauthorized ones
answer
Usurpation
question
Which of the following are the three independent factors that constitute the enforcement of security procedures and policies?
answer
responsibility, accountability, and compliance
question
Every information system today should require users to sign on with a user name and a password. In this case, which of the following functions is performed by the user's password?
answer
authentication
question
Which of the following uses an individual's personal physical characteristics such as fingerprints, facial features, and retinal scans for verification purposes?
answer
biometric authentication
question
A(n) ________ sits outside an organizational network and is the first device that Internet traffic encounters
answer
perimeter firewall
question
________ refers to an organization-wide function that is in charge of developing data policies and enforcing data standards
answer
Data administration
question
________ are small files that browsers store on users' computers when they visit Web sites.
answer
Cookies
question
Which of the following is a data safeguard against security threats?
answer
physical security
question
In terms of password management, when an account is created, users should ________.
answer
immediately change the password they are given to a password of their own
question
Which of the following statements is true of position sensitivity?
answer
It enables security personnel to prioritize their activities in accordance with the possible risk and loss if documented
question
A(n) ________ is a measure that individuals or organizations take to block a threat from obtaining an asset
answer
safeguard
question
Mark receives an email from his bank asking him to update and verify his credit card details. He replies to the mail with all the requested details. Mark later learns that the mail was not actually sent by his bank and that the information he had shared has been misused. Mark is a victim of ________.
answer
Phishing
Get an explanation on any task
Get unstuck with the help of our AI assistant in seconds
New