A _____ is a person or organization that seeks to obtain data or other assets illegally, without the owner’s permission and often without the owner’s knowledge.
Which of the following is considered a computer crime?
hacking of information systems
_____ occurs when someone deceives by pretending to be someone else.
When referring to security threats, pretexting, sniffing, spoofing, and phishing are all examples of _____.
unauthorized data disclosure
A _____ pretends to be a legitimate company and sends an email requesting confidential data, such as account numbers, Social Security numbers, account passwords, and so forth.
Email spoofing is a synonym for _____.
_____ is a technique for intercepting computer communications, either through a physical connection to a network or without physical connection in the case of wireless networks.
Which of the following is an example of a sniffing technique?
_____ occurs when a person breaks into a network to steal data such as customer lists, product inventory data, employee data, and other proprietary and confidential data.
Which of the following usually happens in a malicious denial-of-service attack?
A hacker floods a web server with millions of bogus service requests.
_____ present the largest risk for an organization’s infrastructure loss.
_____ are small files that your browser stores on your computer when you visit web sites and enable you to access web sites without having to sign in every time.
Which of the following is a critical security function senior management in an organization?
Establishing the security policy and managing risk
The Privacy Act of 1974 provides protection to individuals regarding ______.
records held by the US government
Which of the following was passed to give individuals the right to access their own health data created by doctors and other healthcare providers?
HIPAA of 1996
Which of the following is an example of a technical safeguard?
Users of smart cards are required to enter a _____ to be authenticated.
personal identification number
Which of the following is used for biometric authentication?
______ is the process of transforming clear text into coded, unintelligible text for secure storage or communication.
Secure Socket Layer is also known as _____.
transport layer security
You are transferring funds online through the web site of a reputed bank. Which of the following displayed in your browser’s address bar will let you know that the bank is using the SSL protocol?
A _____ examines each part of a message and determines whether to let that part pass.
_____ is the term used to denote viruses, worms, and trojan horses.
What is the major difference between spyware and adware?
Unlike spyware, adware does not perform malicious acts.
In a locked room, maintaining the computers of an organization that run the DBMS is a part of ______.
physical security procedures
_____ involve the people and the procedure components of information systems.
_____ are the primary means of authentication and are important not just for access to a user’s computer, but also for authentication to other networks and servers to which the user may have access.
Need essay sample on "COB 204 Chapter 12"? We will write a custom essay sample specifically for you for only $ 13.90/page