logo image

MIS Final Exam ch 12

1) A(n) ________ is a measure that individuals or organizations take to block a threat from obtaining an asset.
2) Which of the following types of security loss is WikiLeaks an example of?
A) unauthorized data disclosure
unauthorized data disclosure
3) A person calls the Stark residence and pretends to represent a credit card company. He asks Mrs. Stark to confirm her credit card number. This is an example of ________.
4) A ________ pretends to be a legitimate company and sends emails requesting confidential data.
5) Mark receives an email from his bank asking him to update and verify his credit card details. He replies to the mail with all the requested details. Mark later learns that the mail was not actually sent by his bank and that the information he had shared has been misused. Mark is a victim of ________.
6) Which of the following is a synonym for phishing?
email spoofing
________ is a technique for intercepting computer communications.
________ take computers with wireless connections through an area and search for unprotected wireless networks.
Drive-by sniffers
Breaking into computers, servers, or networks to steal proprietary and confidential data is referred to as ________.
Which of the following occurs when millions of bogus service requests flood a Web server and prevent it from servicing legitimate requests?
DOS attack
________ occurs when computer criminals invade a computer system and replace legitimate programs with their own unauthorized ones.
A(n) ________ is a sophisticated, possibly long-running, computer hack that is perpetrated by large, well-funded organizations like governments.
Advanced Persistent Threat (APT)
Which of the following statements is true of the financial losses due to computer security threats?
The financial losses faced by companies due to human error are enormous.
A(n) ________ is a computer program that senses when another computer is attempting to scan a disk or access a computer.
intrusion detection system
Which of the following is considered a personal security safeguard?
send no valuable data via email or IM
During which of the following computer crimes does a password cracker try every possible combination of characters?
brute force attack
________ are small files that browsers store on users’ computers when they visit Web sites.
Which of the following is a human safeguard against security threats?
procedure design
Which of the following is a technical safeguard against security threats?
identification and authorization
Which of the following is a data safeguard against security threats?
physical security
Backup and physical security are ________ against computer security threats.
data safeguards
A user name ________ a user.
A password ________ a user.
Users of smart cards are required to enter a ________ to be authenticated.
personal identification number
A ________ has a microchip that is loaded with identifying data
smart card
Which of the following uses an individual’s personal physical characteristics such as fingerprints, facial features, and retinal scans for verification purposes?
biometric authentication
________ is the process of transforming clear text into coded, unintelligible text for secure storage or communication.
Which of the following statements is true of symmetric encryption?
With symmetric encryption, the same key is used for both encoding and decoding.
The most secure communications over the Internet use a protocol called ________.
With HTTPS, data are encrypted using a protocol called the ________.
Secure Socket Layer (SSL)
With HTTPS, data are encrypted using the Secure Socket Layer (SSL) protocol, which is also known as ________.
Transport Layer Security (TLS
A(n) ________ sits outside an organizational network and is the first device that Internet traffic encounters.
perimeter firewall
________ determine whether to pass each part of a message by examining its source address, destination addresses, and other such data.
Packet-filtering firewalls
________ includes viruses, worms, Trojan horses, spyware, and adware.
Which of the following refers to viruses that masquerade as useful programs?
Trojan horses
Adware and spyware are similar to each other in that they both ________.
are installed without a user’s permission
Which of the following is an example of a data safeguard against security threats?
backup and recovery
Organizations should protect sensitive data by storing it in ________ form.
The procedure of entrusting a party with a copy of an encryption key that can be used in case the actual key is lost or destroyed is called ________.
key escrow
Which of the following statements is true about position sensitivity?
Documenting position sensitivity enables security personnel to prioritize their activities.
The enforcement of security procedures and policies consists of three interdependent factors:
responsibility, accountability, and compliance
In terms of password management, when an account is created, users should ________.
immediately change the password they are given to a password of their own
Typically, a help-desk information system has answers to questions that only a true user would know. Which of the following statements is true of this information?
It helps authenticate a user
Activity log analyses constitute an important ________ function.
security monitoring

Need essay sample on "MIS Final Exam ch 12"? We will write a custom essay sample specifically for you for only $ 13.90/page

Can’t wait to take that assignment burden offyour shoulders?

Let us know what it is and we will show you how it can be done!
Sorry, but copying text is forbidden on this website. If you need this or any other sample, please register

Already on Businessays? Login here

No, thanks. I prefer suffering on my own
Sorry, but copying text is forbidden on this website. If you need this or any other sample register now and get a free access to all papers, carefully proofread and edited by our experts.
Sign in / Sign up
No, thanks. I prefer suffering on my own
Not quite the topic you need?
We would be happy to write it
Join and witness the magic
Service Open At All Times
Complete Buyer Protection
Plagiarism-Free Writing

Emily from Businessays

Hi there, would you like to get such a paper? How about receiving a customized one? Check it out https://goo.gl/chNgQy

We use cookies to give you the best experience possible. By continuing we’ll assume you’re on board with our cookie policy