MIS Exam 2 CH 5

question

HIPAA protects individuals against the wrongful disclosure of their health information.
answer

True
question

What happens during a DDoS attack?
answer

A zombie army is used to attack computers or computer networks.
question

One way to reduce electrical waste is for organizations to use outside air to cool data centers and computer facilities.
answer

True
question

Many companies use access controls to minimize the chance that a perpetrator may intentionally access or an employee may accidentally access confidential information on a computer, mobile device, or network.
answer

True
question

Which of the following is the least likely motive for a DDoS?
answer

spoofing
question

To protect yourself from social engineering scams, shred all sensitive or confidential documents.
answer

True
question

Biometric objects are entirely foolproof.
answer

False
question

In which particularly devastating type of DoS attack are multiple unsuspecting computers used to attack multiple computer networks?
answer

distributed
question

Which of the following refers to the right of individuals and companies to deny or restrict the collection and use of information about them?
answer

Information privacy
question

Which of the following does your new smartphone use to unlock the device?
answer

face recognition system
question

Which of the following is any event or action that could cause a loss of or damage to computer hardware, software, data, information, or processing capability?
answer

digital security risk
question

Which of the following does your financial service institution use to secure the transactions you make using their phone banking service?
answer

voice verification system
question

To read encrypted data, the recipient must decipher it into a readable form. What is the term for this process?
answer

decryption
question

In the case of system failure or the discovery of corrupted files, what do users do to the backed-up files when they bring the files to their original location on a computer?
answer

They restore the files.
question

Which of the following is a federally funded Internet security research and development center?
answer

CERT/CC
question

What term is used to describe the discovery, collection, and analysis of evidence found on computers and networks?
answer

digital forensics
question

If a company does not have a formal email policy, it can read email messages without employee notification.
answer

True
question

Information collected and stored about individuals should be limited to what is necessary to carry out the function of the business or government agency collecting the data.
answer

True
question

With which of the following do users choose which folders and files to include in a backup?
answer

selective backup
question

Which of the following does your company use to track your time and attendance?
answer

hand geometry system
question

Many Internet security programs include a firewall, antivirus program, and filtering capabilities combined.
answer

True
question

The term, zombie, is _____________.
answer

a computer or device whose owner is unaware that the computer or device is being controlled remotely by an outsider
question

Which of the following terms refers to someone who accesses a computer or network illegally with the intent of malicious action?
answer

cracker
question

Which of the following statements is not true about backing up?
answer

With a selective backup, all of the files in the computer automatically are chosen to be copied.
question

Which of the following laws provides the same protection that covers mail and telephone communications to electronic communications such as voice mail?
answer

Electronic Communications Privacy Act (ECPA)
question

The term, PIN, is an acronym for which of the following?
answer

personal identification number
question

What is the term for a website that uses encryption techniques to protect its data?
answer

secure site
question

Which of the following terms is used to describe a program that copies itself repeatedly, using up resources and possibly shutting down the computer or network?
answer

a worm
question

​What occurs when someone steals personal or confidential information?
answer

Info theft
question

Audit trails only record unsuccessful access attempts.
answer

False
question

What happens during a DDoS attack?
answer

A zombie army is used to attack computers or computer networks.
question

To promote a better understanding of software piracy problems and, if necessary, to take legal action, a number of major worldwide software companies formed the BSA.
answer

True
question

Which of the following terms refers to a written list of guidelines that might include rules that prevent employees from using software illegally or using computers to steal?
answer

an IT code of conduct
question

COPPA requires that schools and libraries use content filtering software in order to receive certain federal funds.
answer

False
question

Which of the following is, as shown in the accompanying figure, a small text file that a web server stores on a user’s computer?
answer

Cookie
question

The ECPA protects consumers from disclosure of their personal financial information and requires institutions to alert customers of information disclosure policies.
answer

False
question

Which kind of license is a legal agreement that permits users to install the software on multiple computers, usually at a volume discount?
answer

site
question

Which of the following provides the mobile user with a secure connection to the company network server?
answer

VPN
question

Which of the following statements is not true about Internet and network attacks?
answer

Information kept on an organization’s premises has a higher security risk than information transmitted over networks.
question

Proximity sharing gives websites access to your current location.
answer

False
question

What term is used to describe the process of restricting access to certain material on the web?
answer

content filtering
question

Content filtering opponents argue that banning any materials violates constitutional guarantees of free speech and personal rights.
answer

True
question

Which of the following terms means in a location separate from the computer site?
answer

off-site
question

If a program or device has a default password, be sure to retain it.
answer

False
question

Which type of individual may steal credit card numbers to make fraudulent purchases?
answer

corrupt
question

Which of the following terms refers to a written list of guidelines that might include rules that prevent employees from using software illegally or using computers to steal?
answer

an IT code of conduct
question

In which particularly devastating type of DoS attack are multiple unsuspecting computers used to attack multiple computer networks?
answer

distributed
question

Combating cybercrime is not one of the FBI’s top priorities.
answer

False
question

Any illegal act involving a computer generally is referred to as a computer crime.
answer

True
question

Which of the following terms is used to describe a program that copies itself repeatedly, using up resources and possibly shutting down the computer or network?
answer

a worm
question

The term firewall is _____________.
answer

hardware and/or software that protects a network’s resources from intrusion
question

What is the term for a program that performs a repetitive task on a network?
answer

bot
question

`An IT code of conduct is a written guideline that helps determine whether a specific computer action is which of the following?
answer

ethical
question

One way to reduce electrical waste is for organizations to consolidate servers by user concatenation.
answer

False

Get instant access to
all materials

Become a Member