Accounting
Anthropology
Archaeology
Art History
Banking
Biology & Life Science
Business
Business Communication
Business Development
Business Ethics
Business Law
Chemistry
Communication
Computer Science
Counseling
Criminal Law
Curriculum & Instruction
Design
Earth Science
Economic
Education
Engineering
Finance
History & Theory
Humanities
Human Resource
International Business
Investments & Securities
Journalism
Law
Management
Marketing
Medicine
Medicine & Health Science
Nursing
Philosophy
Physic
Psychology
Real Estate
Science
Social Science
Sociology
Special Education
Speech
Visual Arts
Management
Q:
Tokens are small electronic devices that change user passwords automatically.
Q:
The technique to gain personal information for the purpose of identity theft, often through fraudulent emails that look as though they came from legitimate businesses, is called phishing.
Q:
A zombie is a program that secretly takes over another computer for the purpose of launching attacks on other computers.
Q:
Spear phishing is a phone scam that attempts to defraud people by asking them to call a bogus telephone number to confirm their account information.
Q:
Spear phishing is a phishing expedition in which the emails are carefully designed to target a particular person or organization.
Q:
A phishing expedition is a masquerading attack that combines spam with spoofing. The perpetrator sends millions of spam emails that appear to be from a respectable company. The emails contain a link to a website that is designed to look exactly like the company's website. The victim is encouraged to enter his or her username, password, and sometimes credit card information.
Q:
Phishing reroutes requests for legitimate websites to false websites.
FALSE
Q:
Dumpster diving is another security breach for companies and is where people not associated with the company jump into the companys outside garbage bins and try to gather and steal any valuable company products they can resell on eBay.
Q:
Information security policies detail how an organization will implement the information security plan.
Q:
The three primary information security areas are 1) authentication and authorization, 2) policies and rewards, and 3) detection and response.
Q:
Pretexting is a form of social engineering in which one individual lies to obtain confidential data about another individual.
Q:
Organizations address security risks through two lines of defense. The first is people and the second is technology.
Q:
Insiders are illegitimate users who purposely or accidentally misuse their access to the environment to do business.
Q:
Simplelocker is a new ransomware program that encrypts your personal files and demands payment for the files' decryption keys.
Q:
A hacker weapon called a splog (spam blog) is a fake blog created solely to raise the search engine rank of affiliated websites.
Q:
Legitimate users who purposely or accidentally misuse their access to the environment and cause some kind of business-affecting incident are called insiders.
Q:
Provide an example of each of the three primary information security areas: (1) authentication and authorization, (2) prevention and resistance, and (3) detection and response.
Q:
Through pretexting, hackers use their social skills to trick people into revealing access credentials or other valuable information.
Q:
Describe the relationship between information security policies and an information security plan.
Q:
Through social engineering, hackers use their social skills to trick people into revealing access credentials or other valuable information.
Q:
Describe the relationships and differences between hackers and viruses.
Q:
Ransomware is a form of social engineering in which one individual lies to obtain confidential data about another individual.
Q:
Identify the six epolicies organizations should implement to protect themselves.
Q:
Denial-of-service attack (DoS) floods a website with so many requests for service that it slows down or crashes the site.
Q:
Explain the ethical issues in the use of information technology.
Q:
Backdoor programs open a way into the network for future attacks.
Q:
What is a data file that identifies individuals or organizations online and is comparable to a digital signature?
A. digital certificate
B. encryption
C. decrypt
D. cryptography
Q:
Backdoor programs change their form as they propagate.
Q:
Where do organizations typically place firewalls?
A. between a personal computer and the server
B. between a personal computer and a printer
C. between the server and the content filtering software
D. between the server and the Internet
Q:
A worm spreads itself, not only from file to file, but also from computer to computer. The primary difference between a virus and a worm is that a virus must attach to something, such as an executable file, to spreaD. Worms do not need to attach to anything to spread and can tunnel themselves into computers.
Q:
Which of the following systems is designed with full-time monitoring tools that search for patterns in network traffic to identify intruders and to protect against suspicious network traffic that attempts to access files and data?
A. interconnected data software (IDS)
B. intrusion detection software (IDS)
C. security Information system (SIS)
D. internet detection scanner (IDS)
Q:
Script kiddies or script bunnies find hacking code on the Internet and click-and-point their way into systems to cause damage or spread viruses.
Q:
What must you do with antivirus software to make it protect effectively?
A. must never upgrade or change vendors
B. must download a portable button for it to activate
C. must frequently update it to protect against viruses
D. All of these are correct.
Q:
White-hat hackers have philosophical and political reasons for breaking into systems and will often deface the website as a protest.
Q:
Which of the following protection techniques scans and searches hard drives to prevent, detect, and remove known viruses, adware, and spyware?
A. firewall
B. digital certificate
C. virus software
D. antivirus software
Q:
Cyberterrorists seek to cause harm to people or to destroy critical systems or information and use the Internet as a weapon of mass destruction.
Q:
What is hardware or software that guards a private network by analyzing incoming and outgoing information for the correct markings?
A. firewall
B. certificate authority
C. online certificate
D. digital certificate
Q:
Script kiddies have criminal intent when hacking.
Q:
Charles Mott works for a company called VeriSign that acts as a trusted third party to verify information. One of Charless largest clients is CheckMd, which holds and authenticates customer reviews of doctors and dentists online, and a third party validating the reviews is critical to CheckMds success. What type of authentication technique is VeriSign providing for CheckMD?
A. firewall
B. certificate authority
C. online certificate
D. digital content certificate
Q:
A worm spreads itself not only from file to file but also from computer to computer.
Q:
What is a data file that identifies individuals or organizations online and is comparable to a digital signature?
A. digital code
B. digital sign
C. digital certificate
D. digital card
Q:
A worm is a form of malicious software that infects your computer and asks for money.
Q:
What type of encryption technology uses multiple keys, one for public and one for private?
A. private key encryption
B. policy key encryption
C. public key encryption
D. protective key code
Q:
Two of the common forms of viruses discussed in the book include the Trojan-horse virus and the acceptance-of-service attack.
Q:
What can encryption technology perform?
A. switch the order of characters
B. replace characters with other characters
C. insert or remove characters
D. All of these are correct.
Q:
The Trojan-horse virus hides inside other software, usually as an attachment or a downloadable file.
Q:
What prevention technique scrambles information into an alternative form that requires a key or password to decode?
A. encryption
B. content filtering
C. firewalls
D. antivirus software
Q:
Spyware is software that, while purporting to serve some useful function and often fulfills that function, also allows Internet advertisers to display advertisements without the consent of the computer user.
Q:
What is the science that studies encryption, which is the hiding of messages so that only the sender and receiver can read them?
A. digital certificate
B. encryption
C. decrypt
D. cryptography
Q:
Ransomware is a form of malicious software that infects your computer and asks for money.
Q:
What decodes information?
A. digital certificate
B. encryption
C. decryption
D. cryptography
Q:
Black-hat hackers work at the request of the system owners to find system vulnerabilities and plug the holes.
Q:
What scrambles information into an alternative form that requires a key or password to decrypt?
A. digital certificate
B. encryption
C. decrypt
D. cryptography
Q:
White-hat hackers break into other people's computer systems and may just look around or may steal and destroy information.
Q:
Which of the following occurs when organizations use software that filters content, such as email, to prevent the accidental or malicious transmission of unauthorized information?
A. antivirus software
B. content filtering
C. encryption
D. firewalls
Q:
Drive-by hacking is a computer attack where an attacker accesses a wireless computer network, intercepts data, uses network services, and/or sends attack instructions without entering the office or organization that owns the network
Q:
How do prevention and resistance technologies stop intruders from accessing and reading sensitive information?
A. content filtering, encryption, and firewalls
B. calculating, locking, and firewalls
C. content prohibiting, and cookies
D. None of these are correct.
Q:
Smoking areas are targeted by hackers as they regularly use smoking entrances to gain building access where they pose as employees to gain access to the company network.
Q:
Which of the following is the main drawback of biometrics?
A. It is considered illegal.
B. It is viewed as an invasion of privacy.
C. It can be costly and intrusive.
D. It requires constant monitoring and upgrading.
Q:
Information security is a high priority for protection of the companys information and it is critical to implement an information security procedure to combat misuse of this information.
Q:
Which of the following is not considered a form of biometrics?
A. iris scan
B. password
C. fingerprint
D. handwriting
Q:
Information security is a broad term encompassing the protection of information from accidental or intentional misuse by persons inside or outside an organization.
Q:
The best and most effective way to manage authentication is through ________.
A. smart technology card
B. tokens
C. biometrics
D. passwords
Q:
Downtime refers to a period of time when a system is unavailable and unplanned downtime can strike at any time for various reasons.
Q:
What are biometrics?
A. the traditional security process, which requires a user name and password
B. requires the user to provide two means of authentication, what the user knows (password) and what the user has (security token)
C. requires more than two means of authentication such as what the user knows (password), what the user has (security token), and what the user is (biometric verification)
D. the identification of a user based on a physical characteristic such as a fingerprint, iris, face, voice, or handwriting
Q:
Workplace MIS monitoring tracks people's activities by such measures as number of keystrokes, error rate, and number of transactions processeD.
Q:
What requires the user to provide two means of authentication, what the user knows (password) and what the user has (security token)?
A. single-factor authentication
B. two-factor authentication
C. multifactor authentication
D. biometrics
Q:
Employee monitoring policies explicitly state how, when, and where the company monitors its employees.
Q:
What requires more than two means of authentication such as what the user knows (password), what the user has (security token), and what the user is (biometric verification)?
A. single-factor authentication
B. two-factor authentication
C. multifactor authentication
D. biometrics
Q:
Cyberbullying is a person within the organization who is trusted to monitor, contribute, filter, and guide the social media presence of a company, individual, product, or branD.
Q:
What is the traditional security process that requires a user name and password?
A. single-factor authentication
B. two-factor authentication
C. multifactor authentication
D. biometrics
Q:
A social media manager refers to the process of monitoring and responding to what is being said about a company, individual, product, or branD.
Q:
What is two-factor authentication?
A. the traditional security process, which requires a user name and password
B. requires the user to provide two means of authentication, what the user knows (password) and what the user has (security token)
C. requires more than two means of authentication such as what the user knows (password), what the user has (security token), and what the user is (biometric verification)
D. the identification of a user based on a physical characteristic such as a fingerprint, iris, face, voice, or handwriting
Q:
A social media manager is a person within the organization who is trusted to monitor, contribute, filter, and guide the social media presence of a company, individual, product, or branD.
Q:
What is multifactor authentication?
A. the traditional security process, which requires a user name and password
B. requires the user to provide two means of authentication, what the user knows (password) and what the user has (security token)
C. requires more than two means of authentication such as what the user knows (password), what the user has (security token), and what the user is (biometric verification)
D. the identification of a user based on a physical characteristic such as a fingerprint, iris, face, voice, or handwriting
Q:
Social media monitoring is the process of monitoring and responding to what is being said about a company, individual, product, or branD.
Q:
What is single-factor authentication?
A. the traditional security process, which requires a user name and password
B. requires the user to provide two means of authentication, what the user knows (password) and what the user has (security token)
C. requires more than two means of authentication such as what the user knows (password), what the user has (security token), and what the user is (biometric verification)
D. the identification of a user based on a physical characteristic such as a fingerprint, iris, face, voice or handwriting
Q:
A user can opt out of receiving emails by choosing to allow permissions to incoming emails.
Q:
What is a set of measurable characteristics of a human voice that uniquely identifies an individual?
A. voiceprint
B. face
C. iris
D. All of these are correct.
Q:
A user can opt in to receive emails by choosing to deny permission to incoming emails.