MIS Chapter 8 quiz

  1. ​______________________ is a general security term that includes computer​ viruses, worms, and Trojan horses.
  2. Which of the following is an opportunity for threats to gain access to​ assets?
  3. A(n) _______________ is a program that seems like a normal​ program, but does something completely unexpected.
    Trojan horse
  4. A​ __________ is a unique type of malware that replicates itself from one computer to another.
  5. A​ ___________ is a type of spyware that records keystrokes to steal sensitive information such as social security numbers.
  6. Someone hacking into your Facebook account to add terrible photos and messages is taking part in​ _________________.
  7. Taking over computers and directing those systems to overload a network is defined as​ a(n) _____________ attack.
  8. If you receive an email asking for your social security number in return for a million​ dollars, this is an example of​ _______________.
  9. ​____________________ is an increasing problem where hackers lock parts of your computer and then demand money to unlock the system.
  10. Although it may seem innocent​ enough, ___________ is a serious problem for companies that are involved with​ pay-per-click advertising.
    click fraud
  11. The​ ________________ virus, a rather nice sounding​ virus, was one of the most famous malwares that was detected in 2000.
  12. ​_______________ requires that your patient records be protected and saved for six years.
  13. Which act requires financial institutions to ensure the security and confidentiality of customer data and mandates that data must be stored on a secure medium and protected during storage and​ transmittal?
    Gramm-Leach-Bliley Act
  14. Which law provides rules related to the creation of financial statements to help avoid​ fraud?
    Sarbanes-Oxley Act
  15. Establishing a risk level of malware threats to an organization is an example of​ _______________.
    risk assessment
  16. Tricking employees to reveal their passwords by pretending to be a legitimate member of a company is referred to as​ ________.
    social engineering
  17. Electronic evidence on computer storage media that is not visible to the average user is called​ ________.
    ambient data
  18. Which of the following is a critical security function of senior management in an​ organization?
    Establishing the security policy and managing risk
  19. ​___________________ is the ability to determine that a person is who he or she claims to be through a variety of means.
  20. Gaining access to a safety deposit box using iris scanning is an example of​ _____________ authentication.
  21. Which of the following is NOT addressed by a business continuity​ plan?
    The technical issues involved in keeping systems up and running
  22. Which of the following examines data files and sorts out​ low-priority online material while assigning higher priority to​ business-critical files?
    Deep packet inspections
  23. Which statement about public key encryption is​ FALSE?
    On receiving the​ message, the recipient uses the public key to decrypt it.
  24. Which statement about digital certificates is​ FALSE?
    The CA verifies a digital certificate​ user's identity online.
  25. Which of the following is NOT a security threat posed by the use of the​ iPhone, iPad, and other mobile computing devices in the​ workplace?
    Mobile devices may dictate what kind of data an app can access inside its sandbox domain.
Card Set
MIS Chapter 8 quiz