ISYS 363 Ch. 10 Flashcards

1
Q

A person who breaks into a politician’s website with plans to deface photos and add disturbing text is called a ____________________.

smacker

black hat

hacktivist

red hat

cracktivist

A

hacktivist

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

People who break into computer systems out of curiosity or to test security measures are often called ________.

hacktivists

white hats

cracktivists

smackers

black hats

A

white hats

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Many popular movies today portray individuals who steal trade secrets to gain advantages over competitors. This activity is called __________________.

hacktivism

blackmail

technological surveillance

operational espionage

industrial espionage

A

industrial espionage

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

One troubling method computer criminals use to steal your passwords is called _________________, which involves collecting every keystroke.

keyboard capture

photo capturing

key recording

brute-force

keylogging

A

keylogging

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

A type of malware that appears to be a legitimate program but actually carries a destructive program is called a _____________.

Trojan horse

virus

super worm

worm

superbug

A

Trojan horse

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which of the following is a type of malware that holds a computer hostage by locking the computer or encrypting the computer’s files?

Ransomware

Trojan horse

Kidnapper

Time bomb

Virus

A

Ransomware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Which of the following is a type of attack that could prevent the users of a website from being able to use the website?

Spyware

Spam

Adware

Denial of service

Cookies

A

Denial of service

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

About 85% of all e-mail spam is sent by one of six major __________, which are destructive software robots working together on a collection of zombie computers.

spy rings

spear phishers

botnets

zombie webs

bot webs

A

botnets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which of the following is the stealing of another person’s private information with the intention of executing financial transactions using the victim’s accounts?

Captcha

Botnet

Identity theft

Spyware

Spam

A

Identity theft

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which of the following is NOT a form of cyberstalking?

Posting incriminating pictures of the victim on social networking sites

Making false accusations that damage the reputation of the victim on blogs, Web sites, chat rooms, or e-commerce sites

Gaining information on a victim by monitoring online activities, accessing databases, and so on

Using LinkedIn to find out where an acquaintance is employed

Encouraging others to harass a victim by posting personal information about the victim on Web sites, chat rooms, or social networking sites

A

Using LinkedIn to find out where an acquaintance is employed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

The illegal practice of using proprietary software that you have not paid for is called _______________, and it costs the software industry billions of dollars a year.

software piracy

software stealing

cyberharrassment

cybersquatting

software plundering

A

software piracy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Which of the following prevents an individual from including a favorite song without permission in a commercial business presentation?

Copyright laws

Patent protection

Hacking concerns

Federal customs laws

Computer fraud fears

A

Copyright laws

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

One part of an organization’s security measures involves ensuring that unauthorized manipulations of data and systems (that may compromise accuracy, completeness, or reliability) are prevented. This is referred to as ________________.

confidentiality

availability

accountability

privacy

integrity

A

integrity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

One important security measure necessary for an organization to create a digital audit trail by ensuring that all actions can be traced is referred to as ________________.

integrity

confidentiality

availability

auditability

accountability

A

accountability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

When an organization provides its employees with policies stating, for instance, whether employees have permission to use Facebook during the day, the organization is providing its _____________ policies.

technology

privacy

acceptable use

copyright

information systems

A

acceptable use

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Which of the following statements is NOT true about cyberwar and cyberterrorism?

Damages from a major attack could cost billions of dollars and endanger many citizens.

Energy and transportation systems are extremely vulnerable.

A major attack could cripple a country’s economic system.

Most experts believe cyberwar and cyberterrorism are imminent threats to the United States.

The prospects for a significant attack are considered very low.

A

The prospects for a significant attack are considered very low.

17
Q

Which of the following is the ultimate goal of cyberwar?

Denial of service

Intimidation

Web vandalism

Distribute propaganda

Gain an information advantage over an opponent in order to diminish various capabilities

A

Gain an information advantage over an opponent in order to diminish various capabilities

18
Q

Terrorists are using the Internet extensively to distribute propaganda to current and potential supporters, to influence international public opinion, and to notify potential enemies of pending plans. This is an example of ______________.

recruiting

training

information dissemination

networking

data mining

A

information dissemination

19
Q

The precautions taken to keep all aspects of information systems (e.g., all hardware, software, network equipment, and data) safe from destruction, manipulation, or unauthorized use or access, while providing the intended functionality to legitimate users are collectively referred to as __________________.

information systems security

information systems countermeasures

cybermeasures

information systems protections

reverse engineering

A

information systems security

20
Q

If you were advising an organization about what to include in its information system security process, which of the following would you NOT include?

Assess risks.

Monitor security.

Develop a security strategy.

Implement controls and training.

Once developed, the plan need not be changed.

A

Once developed, the plan need not be changed.

21
Q

Undesirable events that can cause harm, arising from agents internal or external to an organization, are called ________.

risks

threats

impacts

vulnerabilities

controls

A

threats

22
Q

An organization that implements no information system countermeasures and decides to absorb any damages which are incurred has implemented a risk ________ strategy.

reduction

transference

acceptance

avoidance

mitigation

A

acceptance

23
Q

Limiting users’ access to just the systems, data, or resources that are needed to perform their duties and restricting access to other resources is accomplished by implementing the principles of ________.

user restraints

least permissions and least privileges

least permissions and maximum access

limited scope and access

restricted access

A

least permissions and least privileges

24
Q

Issues that should be included in an organization’s disaster recovery plan include all of the following EXCEPT:

identify the hardware and software that is needed to recover from a disaster.

define the chain of command.

identify which events are considered disasters.

identify the people that will be needed and their roles during the recovery.

plan only for events with a high likelihood of occurring.

A

plan only for events with a high likelihood of occurring.

25
Q

An ________ can help organizations assess the state of their IS controls to determine necessary changes and to help ensure the information systems’ availability, confidentiality, and integrity.

information systems protocol

information systems pact

information systems audit

information systems contract

information systems standard

A

information systems audit

26
Q

a backup facility consisting of an empty warehouse with all the necessary connections for power and communications but nothing else

A

cold backup site

27
Q

a fully equipped backup facility, having everything from hardware, software, and current data to office equipment

A

hot backup site