Fundamental Info Systems: Module 11

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/72

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

73 Terms

1
New cards

Ensuring access to information to authorized persons whenever needed is referred to as _____________.

availability

2
New cards

The policies, procedures and technologies used to protect information systems from unauthorized access, alteration, theft or damage is broady refered to as ________________

information system security

3
New cards

Restricting access to information to only those who need it in order to fulfill their job responsibilities is referred to as ________________

confidentiality

4
New cards

Ensures that information is accurate, complete and reliable

integrity

5
New cards

Assessing the threats to information systems including potential losses and implementing cost-beneficial measures to protect against these threats is referred to as _______________.

risk management

6
New cards

fill-in the blanks below for each example below with the correct factor of the IS security triad.
options: integrity, availability, confidentiality

A school administrator mistakenly gave a student another student's academic records. This is an example of a violation of ________________.

confidentiality

7
New cards

Fill-in the blanks below for each example below with the correct factor of the IS security triad.
options: integrity, availability, confidentiality

A storm damaged the data center of a local town and prevented town officials from accessing data needed to perform their jobs This is an example of a violation of ________________.

availability

8
New cards

fill-in the blanks below for each example below with the correct factor of the IS security triad.
options: integrity, availability, confidentiality

A financial analyst at a hospital gained access to a celebrity's medical records and posted them online. This is an example of a violation of ___________.

confidentiality

9
New cards

fill-in the blanks below for each example below with the correct factor of the IS security triad.
options: integrity, availability, confidentiality

A patient had a left rotator cuff tear but her medical records indicated right rotator cuff. This is an example of a violoation of ____________.

integrity

10
New cards

The increased prevalence of mobile computing devices have made information systems less vulnerable because they are small and easy to replace.

True or False

False

11
New cards

Computer systems have become more vulnerable to threats because large amounts of data can be stored on a small amount of storage space.

True or False

True

12
New cards

Corporate networks have become less vulnerable to threats because they are connected to the Internet.

True or False

False

13
New cards

It is a U.S. federal crime to attack computer systems with software that is intended to disable the targeted computer systems.

True or False

True

14
New cards

Firms should implement the strongest possible security measures for all identified threats no matter what their cost is.

True or False

False

15
New cards

Over time, the skills needed to hack an information systems have increased.

True or False

False

16
New cards

Without specific security measures, wireless communications networks are generally more vulnerable to threats than wired communication networks.

True or False

True

17
New cards

Stealing money by altering the data and programs of an information system is called _______________.

embezzlement

18
New cards

Stealing secret or sensitive corporate or government information is refered to as _____________.

espionage

19
New cards

Any crime that is committed through the use of an information system is defined as ______________.

a computer crime

20
New cards

After purchasing the passwords of a bank's clients on the dark web, a group of persons used the bank's cash managment system to transfer money from client accounts to their own accounts. This is an example of _____________.

embezzlement

21
New cards

A foreign government gained access to the email of a political candidate which detailed her campaign strategy and shared it with the political opponent of that candidate. This is an example of _______________.

espionage

22
New cards

__________ is unwanted software that is used to monitor a user’s behavior and is often downloaded as part of other free software.

Spyware

23
New cards

_____________ involves demanding payment in exchange for access to your computer system and data.

Ransomware

24
New cards

__________ involves setting up imposter web sites or e-mails that look like legitimate ones in order to trick users into providing personal identification information.

Phishing

25
New cards

_________________ involves unauthorized access to data as it is transmitted over a communication network.

Sniffing

26
New cards

_________________ involves flooding a web site with so many requests that it causes the web site to slow down or crash altogether.

A denial-of-service attack

27
New cards

______________ is an unwanted program that can cause a computer to malfunction and is spread from computer- to-computer by attaching itself to a legitimate program or document that a user opens or runs.

A virus

28
New cards

______________ is an unwanted program that can cause a computer to malfunction and is independently spread from computer- to-computer without attaching itself to a program or document.

A worm

29
New cards

When logging on, a user found a locked screen with a message claiming to be from a law enforcement agency. The message stated that the computer was used to access illegal pornographic material and that a fine needed to be paid in order to unlock the screen. This is an example of _____________.

ransomware

30
New cards

A hacker intercepted and read data packets transmitted on the Internet in order to gain access to usernames and passwords. This is an example of ___________.

sniffing

31
New cards

An employee received an email stating that his work had corrupted important data files and that the employee's password was needed to fix the problem. The email was signed with the name of the employee's direct supervisor. This is very likely an example of _____________.

phishing

32
New cards

A computer user clicked on an attachment to an email with the subject heading “I love you.” This resulted in the execution of an unwanted program which deleted the users computer files. This is an example of _____________.

a virus

33
New cards

A city's computer systems were infected with malware that prevented access to all data on its servers. The attackers sent a message stating that data was encrypted and a payment of $500,0000 was required to decrypt the data.

ransomware

34
New cards

The web servers of a major domain name service provider was flooded with nearly 1.2 terabits per second of data which caused its service to become inoperable. This is an example of ______________.

a denial-of-service attack

35
New cards

____________ refers to the potential loss if a threat occurs.

A risk

36
New cards

__________ depends on the likelihood that a threat will occur and the associated losses that be would be incurred.

An expected loss

37
New cards

__________ is a diagramming technique used to categorize the severity of risks.

A risk matrix

38
New cards

__________ is an action taken or not taken to protect an information system againt a threat.

A risk response

39
New cards

_________ refers to a threat that occurs.

A risk event

40
New cards

___________ is a situation that makes it easier for a threat to occur.

A vulnerability

41
New cards

A company experienced a malware attack that caused its computer system to be down for one week. This is an example of _____________.

a risk event

42
New cards

A company that does not provide IS security training to its employees is an example of ______________.

a vulnerability

43
New cards

The possibility that an earthquake will disable a data center is an example of _________.

a risk

44
New cards

A small software development company has decided not to purchase a backup power supply due to its cost and the low likelihood of a power outage. This is an example of risk__________.

acceptance

45
New cards

An e-tailer decided to NOT collect and store personally identifiable information about its customers to prevent such data from being stolen from its computer systems. This is an example of risk __________.

avoidance

46
New cards

A company contracted with a cloud service provider that accepts some responsibility for the security of data stored on its servers. This is an example of risk _________.

transference

47
New cards

A company contracted with a data center service provider to provide a cold backup site that would be used to recover from a natural disaster. This is an example of risk ____________.

mitigation

48
New cards

When initially activating an online bank account, a user had to create several secret questions with answers. If the user later wants to change the password, s/he will need to first answer the secret questions. This process is used for ___________ .

authentication

49
New cards

Biometrics are used for __________________.

authentication

50
New cards

The process of verifying the identity of a person or organization is called _____________.

authentication

51
New cards

A university system which tracks student grades allows professors to enter grades only for courses that they teach. This is an example of _________.

authorization

52
New cards

Restricting a person's access to functionality and data in an information system is called _________________,

authorization

53
New cards

Using the physical traits of a person to verify their identity is called ___________.

biometrics

54
New cards

A(n) ____________ uses a trusted third party to verify the identity of a person or organization when communicating electronically.

digital certificate

55
New cards

The main purpose of passwords is____________.

authentication

56
New cards

__________ is software-as-a-service that provides a private communication channel built on top of the Internet.

A VPN

57
New cards

______________ transforms plain text into a cypher text that can only be read with a key.

Encryption

58
New cards

________ specifies how an organization will resume operations after an event such as a fire that disrupted data center operations.

A disaster recover plan

59
New cards

__________ scans for and removes known unwanted software such as viruses, worms and spyware.

Anti-malware software

60
New cards

______________ must be updated frequently because new unwanted software programs are continually developed.

Anti-malware software

61
New cards

________________ blocks traffic coming into a network based on pre-specified rules.

A firewall

62
New cards

______________ learns normal behavior of a communication network and flags behavior that is out of the ordinary and suspicious.

Intrusion detection software

63
New cards

_________________ has redundant (duplicate) hardware components.

A fault-tolerant system

64
New cards

Which of the following items is a technology that figured out how to initially share an encryption key on an unsecure channel?

asymmetric key encryption

65
New cards

Indicate the most appropriate protection mechanism for the scenario below:

theft of data center equipment

locked entrances and securities cameras

66
New cards

Indicate the most appropriate protection mechanism for the scenario below:

lost data in a flooded data center

data backups stored at a different physical location

67
New cards

Indicate the most appropriate protection mechanism for the scenario below:


a failed disk drive

a fault tolerant computer

68
New cards

Indicate the most appropriate protection mechanism for the scenario below:

a stranger parked outside your house reading your wireless communication

encryption

69
New cards

Indicate the most appropriate protection mechanism for the scenario below:

a virus spreading from one computer to another

anti-malware software

70
New cards

Indicate the most appropriate protection mechanism for the scenario below:


incoming communications from a known malicious web site

a firewall

71
New cards

Indicate the most appropriate protection mechanism for the scenario below:


a flood of incoming HTTP web page requests which appear to be legitimate

intrusion detection software

72
New cards

Indicate the most appropriate protection mechanism for the scenario below:

impostering an-commerce trading partner

a digital certificate

73
New cards

A company decided to connect its corporate network to the Extranet of one of its largest customers even though it increased the chance of unauthorized access to its network. This is an example of __________.

a risk event