MIS Exam 2 CH 5 – Flashcards

Unlock all answers in this set

Unlock answers
question
HIPAA protects individuals against the wrongful disclosure of their health information.
answer
True
question
What happens during a DDoS attack?
answer
A zombie army is used to attack computers or computer networks.
question
One way to reduce electrical waste is for organizations to use outside air to cool data centers and computer facilities.
answer
True
question
Many companies use access controls to minimize the chance that a perpetrator may intentionally access or an employee may accidentally access confidential information on a computer, mobile device, or network.
answer
True
question
Which of the following is the least likely motive for a DDoS?
answer
spoofing
question
To protect yourself from social engineering scams, shred all sensitive or confidential documents.
answer
True
question
Biometric objects are entirely foolproof.
answer
False
question
In which particularly devastating type of DoS attack are multiple unsuspecting computers used to attack multiple computer networks?
answer
distributed
question
Which of the following refers to the right of individuals and companies to deny or restrict the collection and use of information about them?
answer
Information privacy
question
Which of the following does your new smartphone use to unlock the device?
answer
face recognition system
question
Which of the following is any event or action that could cause a loss of or damage to computer hardware, software, data, information, or processing capability?
answer
digital security risk
question
Which of the following does your financial service institution use to secure the transactions you make using their phone banking service?
answer
voice verification system
question
To read encrypted data, the recipient must decipher it into a readable form. What is the term for this process?
answer
decryption
question
In the case of system failure or the discovery of corrupted files, what do users do to the backed-up files when they bring the files to their original location on a computer?
answer
They restore the files.
question
Which of the following is a federally funded Internet security research and development center?
answer
CERT/CC
question
What term is used to describe the discovery, collection, and analysis of evidence found on computers and networks?
answer
digital forensics
question
If a company does not have a formal email policy, it can read email messages without employee notification.
answer
True
question
Information collected and stored about individuals should be limited to what is necessary to carry out the function of the business or government agency collecting the data.
answer
True
question
With which of the following do users choose which folders and files to include in a backup?
answer
selective backup
question
Which of the following does your company use to track your time and attendance?
answer
hand geometry system
question
Many Internet security programs include a firewall, antivirus program, and filtering capabilities combined.
answer
True
question
The term, zombie, is _____________.
answer
a computer or device whose owner is unaware that the computer or device is being controlled remotely by an outsider
question
Which of the following terms refers to someone who accesses a computer or network illegally with the intent of malicious action?
answer
cracker
question
Which of the following statements is not true about backing up?
answer
With a selective backup, all of the files in the computer automatically are chosen to be copied.
question
Which of the following laws provides the same protection that covers mail and telephone communications to electronic communications such as voice mail?
answer
Electronic Communications Privacy Act (ECPA)
question
The term, PIN, is an acronym for which of the following?
answer
personal identification number
question
What is the term for a website that uses encryption techniques to protect its data?
answer
secure site
question
Which of the following terms is used to describe a program that copies itself repeatedly, using up resources and possibly shutting down the computer or network?
answer
a worm
question
​What occurs when someone steals personal or confidential information?
answer
Info theft
question
Audit trails only record unsuccessful access attempts.
answer
False
question
What happens during a DDoS attack?
answer
A zombie army is used to attack computers or computer networks.
question
To promote a better understanding of software piracy problems and, if necessary, to take legal action, a number of major worldwide software companies formed the BSA.
answer
True
question
Which of the following terms refers to a written list of guidelines that might include rules that prevent employees from using software illegally or using computers to steal?
answer
an IT code of conduct
question
COPPA requires that schools and libraries use content filtering software in order to receive certain federal funds.
answer
False
question
Which of the following is, as shown in the accompanying figure, a small text file that a web server stores on a user's computer?
answer
Cookie
question
The ECPA protects consumers from disclosure of their personal financial information and requires institutions to alert customers of information disclosure policies.
answer
False
question
Which kind of license is a legal agreement that permits users to install the software on multiple computers, usually at a volume discount?
answer
site
question
Which of the following provides the mobile user with a secure connection to the company network server?
answer
VPN
question
Which of the following statements is not true about Internet and network attacks?
answer
Information kept on an organization's premises has a higher security risk than information transmitted over networks.
question
Proximity sharing gives websites access to your current location.
answer
False
question
What term is used to describe the process of restricting access to certain material on the web?
answer
content filtering
question
Content filtering opponents argue that banning any materials violates constitutional guarantees of free speech and personal rights.
answer
True
question
Which of the following terms means in a location separate from the computer site?
answer
off-site
question
If a program or device has a default password, be sure to retain it.
answer
False
question
Which type of individual may steal credit card numbers to make fraudulent purchases?
answer
corrupt
question
Which of the following terms refers to a written list of guidelines that might include rules that prevent employees from using software illegally or using computers to steal?
answer
an IT code of conduct
question
In which particularly devastating type of DoS attack are multiple unsuspecting computers used to attack multiple computer networks?
answer
distributed
question
Combating cybercrime is not one of the FBI's top priorities.
answer
False
question
Any illegal act involving a computer generally is referred to as a computer crime.
answer
True
question
Which of the following terms is used to describe a program that copies itself repeatedly, using up resources and possibly shutting down the computer or network?
answer
a worm
question
The term firewall is _____________.
answer
hardware and/or software that protects a network's resources from intrusion
question
What is the term for a program that performs a repetitive task on a network?
answer
bot
question
`An IT code of conduct is a written guideline that helps determine whether a specific computer action is which of the following?
answer
ethical
question
One way to reduce electrical waste is for organizations to consolidate servers by user concatenation.
answer
False
Get an explanation on any task
Get unstuck with the help of our AI assistant in seconds
New