Exam 2 ISAM Ch 8

  1. Which of the following involves botnets deliberately moving through online ads and leads to higher marketing​ costs?
    Click Fraud
  2. Which of the following best describes​ pharming?
    Redirecting users to a phony web​ page, even when the correct URL is typed in
  3. Security in an information systems context refers to​ ___________________________, which are used to prevent unauthorized access or theft.
    policies, procedures, and technical measures
  4. Which wireless security concern involves eavesdroppers parking outside buildings to intercept wireless network​ traffic?
    War Driving
  5. Because so many Web pages use​ databases, _____ is a major malware threat since poorly coded Web application software is vulnerable.
    an SQL injection attack
  6. ​______________________ is a general security term that includes computer​ viruses, worms, and Trojan horses.
    Malware
  7. ​A(n) _______________ is a program that seems like a normal​ program, but does something completely unexpected.
    Trojan Horse
  8. ​A(n) _______________ is a program that seems like a normal​ program, but does something completely unexpected.Trojan HorseA​ __________ is a unique type of malware that replicates itself from one computer to another.
    Worm
  9. A​ ___________ is a type of spyware that records keystrokes to steal sensitive information such as social security numbers.
    Keylogger
  10. Taking over computers and directing those systems to overload a network is defined as​ a(n) _____________ attack.
    denial-of-service
  11. Someone hacking into your Facebook account to add terrible photos and messages is taking part in​ ______________
    cybervandalism
  12. ​____________________ is an increasing problem where hackers lock parts of your computer and then demand money to unlock the system.
    Ransomware
  13. Which of the following mandates that financial services firms ensure security and confidentiality of customer​ data?​
    ​Gramm-Leach-Bliley Act
  14. Which of the following outlines medical security and privacy rules and procedures for simplifying the administration of health care billing and automating the transfer of health care​ data?
    HIPAA Act
  15. Which of the following involves collecting and maintaining data in such a way that the information can be used as evidence in a court of​ law?
    Computer forensics
  16. Tricking employees to reveal their passwords by pretending to be a legitimate member of a company is referred to as​ ________.
    Social Engineering
  17. ​__________________ was created as a result of financial scandals such as Enron and WorldCom.
    Sarbanes-Oxley
  18. ​________ check for data entering a system for accuracy and​ completeness, such as when a clerk confirms a telephone number for a new customer.
    Input Controls
  19. Application controls can be classified as​ _____ controls,​ _______controls, and​ ________ controls.
    input; processing; output
  20. A(n) _________________ policy would indicate if you are able to use your work computer to access social media websites.
    acceptable use
  21. In addition to developing a policy for restoring computer and communication​ services, some companies go a step further with​ _____, which focuses on how to get the business operations up and running again after a disaster.
    business continuity planning
  22. ___________________ is the ability to determine that a person is who he or she claims to be through a variety of means.
    Authentication
  23. Using a combination of hardware and​ software, _______ are able to control incoming and outgoing data on a network.
    firewalls
  24. What is Secure Hypertext Transfer​ Protocol?
    A protocol for encrypting data transferred over the Internet
  25. One authentication technology that is about the size of a credit card and contains a chip containing access permission is called​ ___________________.
    A Smart Card
  26. Which of the following is used by a computer that reads and interprets fingerprints to grant​ access?
    Biometric authentication
  27. Public key encryption uses​ __________________.
    one public and one private key
  28. Which of the following is used by firms to determine the priority of data so that important data is sent more quickly than less important​ data?
    Deep packet inspections
Author
wacko90
ID
351612
Card Set
Exam 2 ISAM Ch 8
Description
ISAM Ch 8
Updated