-
Which of the following involves botnets deliberately moving through online ads and leads to higher marketing costs?
Click Fraud
-
Which of the following best describes pharming?
Redirecting users to a phony web page, even when the correct URL is typed in
-
Security in an information systems context refers to ___________________________, which are used to prevent unauthorized access or theft.
policies, procedures, and technical measures
-
Which wireless security concern involves eavesdroppers parking outside buildings to intercept wireless network traffic?
War Driving
-
Because so many Web pages use databases, _____ is a major malware threat since poorly coded Web application software is vulnerable.
an SQL injection attack
-
______________________ is a general security term that includes computer viruses, worms, and Trojan horses.
Malware
-
A(n) _______________ is a program that seems like a normal program, but does something completely unexpected.
Trojan Horse
-
A(n) _______________ is a program that seems like a normal program, but does something completely unexpected.Trojan HorseA __________ is a unique type of malware that replicates itself from one computer to another.
Worm
-
A ___________ is a type of spyware that records keystrokes to steal sensitive information such as social security numbers.
Keylogger
-
Taking over computers and directing those systems to overload a network is defined as a(n) _____________ attack.
denial-of-service
-
Someone hacking into your Facebook account to add terrible photos and messages is taking part in ______________
cybervandalism
-
____________________ is an increasing problem where hackers lock parts of your computer and then demand money to unlock the system.
Ransomware
-
Which of the following mandates that financial services firms ensure security and confidentiality of customer data?
Gramm-Leach-Bliley Act
-
Which of the following outlines medical security and privacy rules and procedures for simplifying the administration of health care billing and automating the transfer of health care data?
HIPAA Act
-
Which of the following involves collecting and maintaining data in such a way that the information can be used as evidence in a court of law?
Computer forensics
-
Tricking employees to reveal their passwords by pretending to be a legitimate member of a company is referred to as ________.
Social Engineering
-
__________________ was created as a result of financial scandals such as Enron and WorldCom.
Sarbanes-Oxley
-
________ check for data entering a system for accuracy and completeness, such as when a clerk confirms a telephone number for a new customer.
Input Controls
-
Application controls can be classified as _____ controls, _______controls, and ________ controls.
input; processing; output
-
A(n) _________________ policy would indicate if you are able to use your work computer to access social media websites.
acceptable use
-
In addition to developing a policy for restoring computer and communication services, some companies go a step further with _____, which focuses on how to get the business operations up and running again after a disaster.
business continuity planning
-
___________________ is the ability to determine that a person is who he or she claims to be through a variety of means.
Authentication
-
Using a combination of hardware and software, _______ are able to control incoming and outgoing data on a network.
firewalls
-
What is Secure Hypertext Transfer Protocol?
A protocol for encrypting data transferred over the Internet
-
One authentication technology that is about the size of a credit card and contains a chip containing access permission is called ___________________.
A Smart Card
-
Which of the following is used by a computer that reads and interprets fingerprints to grant access?
Biometric authentication
-
Public key encryption uses __________________.
one public and one private key
-
Which of the following is used by firms to determine the priority of data so that important data is sent more quickly than less important data?
Deep packet inspections
|
|