MIS Exam 2 CH 5 – Flashcards
Unlock all answers in this set
Unlock answersquestion
            HIPAA protects individuals against the wrongful disclosure of their health information.
answer
        True
question
            What happens during a DDoS attack?
answer
        A zombie army is used to attack computers or computer networks.
question
            One way to reduce electrical waste is for organizations to use outside air to cool data centers and computer facilities.
answer
        True
question
            Many companies use access controls to minimize the chance that a perpetrator may intentionally access or an employee may accidentally access confidential information on a computer, mobile device, or network.
answer
        True
question
            Which of the following is the least likely motive for a DDoS?
answer
        spoofing
question
            To protect yourself from social engineering scams, shred all sensitive or confidential documents.
answer
        True
question
            Biometric objects are entirely foolproof.
answer
        False
question
            In which particularly devastating type of DoS attack are multiple unsuspecting computers used to attack multiple computer networks?
answer
        distributed
question
            Which of the following refers to the right of individuals and companies to deny or restrict the collection and use of information about them?
answer
        Information privacy
question
            Which of the following does your new smartphone use to unlock the device?
answer
        face recognition system
question
            Which of the following is any event or action that could cause a loss of or damage to computer hardware, software, data, information, or processing capability?
answer
        digital security risk
question
            Which of the following does your financial service institution use to secure the transactions you make using their phone banking service?
answer
        voice verification system
question
            To read encrypted data, the recipient must decipher it into a readable form. What is the term for this process?
answer
        decryption
question
            In the case of system failure or the discovery of corrupted files, what do users do to the backed-up files when they bring the files to their original location on a computer?
answer
        They restore the files.
question
            Which of the following is a federally funded Internet security research and development center?
answer
        CERT/CC
question
            What term is used to describe the discovery, collection, and analysis of evidence found on computers and networks?
answer
        digital forensics
question
            If a company does not have a formal email policy, it can read email messages without employee notification.
answer
        True
question
            Information collected and stored about individuals should be limited to what is necessary to carry out the function of the business or government agency collecting the data.
answer
        True
question
            With which of the following do users choose which folders and files to include in a backup?
answer
        selective backup
question
            Which of the following does your company use to track your time and attendance?
answer
        hand geometry system
question
            Many Internet security programs include a firewall, antivirus program, and filtering capabilities combined.
answer
        True
question
            The term, zombie, is _____________.
answer
        a computer or device whose owner is unaware that the computer or device is being controlled remotely by an outsider
question
            Which of the following terms refers to someone who accesses a computer or network illegally with the intent of malicious action?
answer
        cracker
question
            Which of the following statements is not true about backing up?
answer
        With a selective backup, all of the files in the computer automatically are chosen to be copied.
question
            Which of the following laws provides the same protection that covers mail and telephone communications to electronic communications such as voice mail?
answer
        Electronic Communications Privacy Act (ECPA)
question
            The term, PIN, is an acronym for which of the following?
answer
        personal identification number
question
            What is the term for a website that uses encryption techniques to protect its data?
answer
        secure site
question
            Which of the following terms is used to describe a program that copies itself repeatedly, using up resources and possibly shutting down the computer or network?
answer
        a worm
question
            What occurs when someone steals personal or confidential information?
answer
        Info theft
question
            Audit trails only record unsuccessful access attempts.
answer
        False
question
            What happens during a DDoS attack?
answer
        A zombie army is used to attack computers or computer networks.
question
            To promote a better understanding of software piracy problems and, if necessary, to take legal action, a number of major worldwide software companies formed the BSA.
answer
        True
question
            Which of the following terms refers to a written list of guidelines that might include rules that prevent employees from using software illegally or using computers to steal?
answer
        an IT code of conduct
question
            COPPA requires that schools and libraries use content filtering software in order to receive certain federal funds.
answer
        False
question
            Which of the following is, as shown in the accompanying figure, a small text file that a web server stores on a user's computer?
answer
        Cookie
question
            The ECPA protects consumers from disclosure of their personal financial information and requires institutions to alert customers of information disclosure policies.
answer
        False
question
            Which kind of license is a legal agreement that permits users to install the software on multiple computers, usually at a volume discount?
answer
        site
question
            Which of the following provides the mobile user with a secure connection to the company network server?
answer
        VPN
question
            Which of the following statements is not true about Internet and network attacks?
answer
        Information kept on an organization's premises has a higher security risk than information transmitted over networks.
question
            Proximity sharing gives websites access to your current location.
answer
        False
question
            What term is used to describe the process of restricting access to certain material on the web?
answer
        content filtering
question
            Content filtering opponents argue that banning any materials violates constitutional guarantees of free speech and personal rights.
answer
        True
question
            Which of the following terms means in a location separate from the computer site?
answer
        off-site
question
            If a program or device has a default password, be sure to retain it.
answer
        False
question
            Which type of individual may steal credit card numbers to make fraudulent purchases?
answer
        corrupt
question
            Which of the following terms refers to a written list of guidelines that might include rules that prevent employees from using software illegally or using computers to steal?
answer
        an IT code of conduct
question
            In which particularly devastating type of DoS attack are multiple unsuspecting computers used to attack multiple computer networks?
answer
        distributed
question
            Combating cybercrime is not one of the FBI's top priorities.
answer
        False
question
            Any illegal act involving a computer generally is referred to as a computer crime.
answer
        True
question
            Which of the following terms is used to describe a program that copies itself repeatedly, using up resources and possibly shutting down the computer or network?
answer
        a worm
question
            The term firewall is _____________.
answer
        hardware and/or software that protects a network's resources from intrusion
question
            What is the term for a program that performs a repetitive task on a network?
answer
        bot
question
            `An IT code of conduct is a written guideline that helps determine whether a specific computer action is which of the following?
answer
        ethical
question
            One way to reduce electrical waste is for organizations to consolidate servers by user concatenation.
answer
        False
