MIS Chapter 10 Review – Flashcards
81 test answers
Unlock all answers in this set
Unlock answers 81question
Risk management is a critical security function addressed by an organization's senior management. T/F
answer
True
Unlock the answer
question
_____ is the process of transforming clear text into coded, unintelligible text for secure storage or communication.
answer
Ecryption
Unlock the answer
question
A ________ pretends to be a legitimate company and sends emails requesting confidential data.
answer
Phisher
Unlock the answer
question
Which of the following uses an individual's personal physical characteristics such as fingerprints, facial features, and retinal scans for verification purposes?
answer
biometric authentication
Unlock the answer
question
Hiring, training, and educating employees in an organization is a technical safeguard. T/F
answer
False
Unlock the answer
question
With https, data are encrypted using a protocol called the __________.
answer
Secure Sockets Layer
Unlock the answer
question
_______ are created by companies as false targets for computer criminals to attack.
answer
Honeypots
Unlock the answer
question
Which of the following occurs when millions of bogus service requests flood a Web server and prevent it from servicing legitimate requests?
answer
denial of service
Unlock the answer
question
Mark receives an email from his bank asking him to update and verify his credit card details. He replies to the email with all the requested details. Mark later learns that the email was not actually sent by his bank and that the information he had shared has been misused. Mark is a victim of________.
answer
phishing
Unlock the answer
question
As one of the safeguards against security threats, a person should preferably use the same password for different sites so as to avoid confusion. T/F
answer
False
Unlock the answer
question
The procedure of entrusting a party with a copy of an encryption key that can be used in case the actual key is lost or destroyed is called ______.
answer
key escrow
Unlock the answer
question
Davian, a professional hacker, trues every possible combination of characters to crack his victim's email password. Using this technique, he can crack a six-character password of either upper- or lowercase letters in about ten minutes. Which of the following techniques is used by Davian to obtain access to his victim's email?
answer
brute force attack
Unlock the answer
question
Most secure communications over the Internet use a protocol called_________.
answer
https
Unlock the answer
question
The loss of encryption keys by employees is referred to as key escrow. T/F
answer
False
Unlock the answer
question
Which of the following statements is true of the financial losses due to computer crimes?
answer
All studies on the costs of computer crimes are based on surveys.
Unlock the answer
question
There are no standards for tallying costs of computer crime. T/F
answer
True
Unlock the answer
question
______ occurs when a threat obtains data that is supposed to be protected.
answer
Unauthorized data closure
Unlock the answer
question
A key is a number used with an encryption algorithm to encrypt data. T/F
answer
True
Unlock the answer
question
_______ take computers with wireless connections through an area and search for unprotected wireless networks.
answer
Wardrivers
Unlock the answer
question
A virus is a computer program that replicates itself. T/F
answer
True
Unlock the answer
question
Thomas is responsible for creating backup copies of information in a system. He also works along with IT personnel to ensure that the backups are valid and that effective recovery procedures exist. Thomas is involved in establishing______.
answer
Data safeguards
Unlock the answer
question
Breaking into computers, servers, or networks to steal proprietary and confidential data is referred to as __________.
answer
hacking
Unlock the answer
question
Smart cards are convenient to use because they do not require a personal identification number for authentication. T/F
answer
False
Unlock the answer
question
Malware definitions are patterns that exist in malware code. T/F
answer
True
Unlock the answer
question
Existence of accounts that are no longer necessary does not pose a security threat. T/F
answer
False
Unlock the answer
question
In terms of password management, when an account is created, users should ________.
answer
immediately change the password they are given to a password of their own.
Unlock the answer
question
______ are all files that browsers store on users' computers when they visit Web sites.
answer
Cookies
Unlock the answer
question
Which of the following is a symptom for phishing?
answer
email spoofing
Unlock the answer
question
While making online purchases, a person should buy only from vendors who support https. T/F
answer
True
Unlock the answer
question
Which of the following is a technical safeguard against security threats?
answer
firewall
Unlock the answer
question
Which of the following is considered a personal security safeguard?
answer
removing high-value assets from computers
Unlock the answer
question
Why asymmetric encryption, two different keys are used for encoding and decoding a message. T/F
answer
true
Unlock the answer
question
Which of the following statements is true of position sensitivity?
answer
it enables security personnel to prioritize their activities in accordance with the possible risk and loss.
Unlock the answer
question
Which of the following information should be provided by users of smart cards for authentication?
answer
personal identification number
Unlock the answer
question
To safeguard data against security threats, every information system today requires a user name and a password. In this case, which of the following functions is performed by the user name?
answer
Identification
Unlock the answer
question
________refers to an organization-wide function that is in charge of developing data policies and enforcing data standards.
answer
Data administration
Unlock the answer
question
Which of the following statements is true of symmetric encryption?
answer
it uses the same key for both encoding and decoding
Unlock the answer
question
_______ is a technique for intercepting computer communications
answer
Sniffing
Unlock the answer
question
Incorrectly increasing a customer's discount is an example of incorrect data modification. T/F
answer
True
Unlock the answer
question
Backup and recovery against computer security threats are __________.
answer
data safeguards
Unlock the answer
question
Which of the following is a data safeguard against security threats?
answer
physical security
Unlock the answer
question
Viruses, worms, and Trojan horses are types of firewalls. T/F
answer
False
Unlock the answer
question
Packet-filtering firewalls cannot prohibit outsiders from starting a session with any user behind the firewall. T/F
answer
False
Unlock the answer
question
Incident-response plans should provide centralized reporting of all security incidents. T/F
answer
True
Unlock the answer
question
Which of the following is a human safeguard against threats?
answer
Procedure design
Unlock the answer
question
Pretexting occurs when someone deceives by pretending to be someone else.T/F
answer
True
Unlock the answer
question
Which of the following are the three independent factors that constitute the enforcement of security procedures and policies?
answer
responsibility, accountability, and compliance
Unlock the answer
question
A_______ is a message that individuals or organizations take to block a threat from obtaining an asset.
answer
safeguard
Unlock the answer
question
A threat is a person or an organization that seeks to obtain or alter data illegally, without the owners permission or knowledge.T/F
answer
True
Unlock the answer
question
Financial institutions must invest heavily in security safeguards because they are obvious targets for theft. T/F
answer
True
Unlock the answer
question
A criticism of biometric authentication is that it provides weak authentication. T/F
answer
False
Unlock the answer
question
Packet-filtering firewalls are the most sophisticated type of firewall.T/F
answer
False
Unlock the answer
question
An_______includes how employees should react to security problems, whom they should contact, the reports they should make, and steps they can take to reduce further loss.
answer
incident-response plan
Unlock the answer
question
_______ is a broad category of software that includes viruses, worms, Trojan horses, spyware, and adware.
answer
Malware
Unlock the answer
question
Technical safeguards include encryption and usage of passwords. T/F
answer
False
Unlock the answer
question
In an organization, security sensitivity for each position should be documented. T/F
answer
True
Unlock the answer
question
An________is a computer program that senses when another computer is attempting to scan a disk or access a computer.
answer
intrusion detection system
Unlock the answer
question
A help-desk information system has answers to questions that only a true user of an account or system would know. T/F
answer
True
Unlock the answer
question
______ a site means to take extraordinary measures to reduce a system's vulnerability.
answer
Hardening
Unlock the answer
question
Malware protection is an example of a technical safeguard. T/F
answer
True
Unlock the answer
question
A person calls the Stark residence and pretends to represent a credit card company. He asks Mrs. Stark to confirm her credit card number. this is an example of _______.
answer
pretexting
Unlock the answer
question
Damages to security systems caused by natural disasters are minimal when compared to the damages due to human errors.T/F
answer
False
Unlock the answer
question
The creation of backup copies of databse contents makes the data move vulnerable to security threats. T/F
answer
False
Unlock the answer
question
Every information system today should require users to sign on with a user name and a password. In this case, which of the following functions is performed by the user's password?
answer
authentication
Unlock the answer
question
Spoofing is a technique for intercepting computer communications. T/F
answer
False
Unlock the answer
question
In a brute force attack, a password cracker trues every possible combination of characters. T/F
answer
True
Unlock the answer
question
_______ are viruses that masquerade as useful programs like a computer game, an MP3 file, or some other useful innocuous program.
answer
Trojan horses
Unlock the answer
question
A _______ sits outside an organizational network and is the first device that Internet traffic encounters.
answer
perimeter firewall
Unlock the answer
question
Advanced persistent threats can be a means to engage in cyber warfare and cyber espionage. T/F
answer
True
Unlock the answer
question
IP spoofing occurs when an intruder uses another site's IP address to masquerade as that other site. T/F
answer
True
Unlock the answer
question
A_____ examines the source address, destination address, and other data of a message and determines whether to let that message pass.
answer
packet-filtering firewall
Unlock the answer
question
Which of the following types of encryption is used by the secure sockets layer protocol?
answer
public key encryption
Unlock the answer
question
Spyware programs are installed on a user's computer without the user's knowledge. T/F
answer
True
Unlock the answer
question
Wardrives are those who engage in phishing to obtain unauthorized access to data. T/F
answer
False
Unlock the answer
question
A user name authenticates a user, and a password identifies that user. T/F
answer
False
Unlock the answer
question
An _______ is a sophisticated, possibly long-run computer hack that is perpetrated by large, well-funded organizations like governments.
answer
advanced persistent threat
Unlock the answer
question
A______ is a plastic card that has a microchip loaded with identifying data.
answer
smart card
Unlock the answer