Securing Information Systems

50 questions available

Summary unavailable.

Questions

Question 1

According to the opening case study, what was a primary security failure that led to the 2012 LinkedIn password breach?

View answer and explanation
Question 2

What is the term for the policies, procedures, and technical measures used to prevent unauthorized access, alteration, theft, or physical damage to information systems?

View answer and explanation
Question 3

What distinguishes a computer worm from a computer virus?

View answer and explanation
Question 4

What is the term for a software program that appears to be benign but then does something other than expected, often introducing malicious code?

View answer and explanation
Question 5

According to Symantec's 2012 report, how many new and unique threats from malicious software were detected in 2011?

View answer and explanation
Question 6

What is the primary purpose of a Denial-of-Service (DoS) attack?

View answer and explanation
Question 7

Which U.S. law, passed after the Enron and WorldCom scandals, imposes responsibility on companies and their management to safeguard the accuracy and integrity of financial information?

View answer and explanation
Question 8

What is the scientific collection, examination, authentication, preservation, and analysis of data from computer storage media for use as evidence in a court of law called?

View answer and explanation
Question 9

In the context of information systems controls, what is the primary function of general controls?

View answer and explanation
Question 10

Based on the sample risk assessment for an online order processing system in Table 8.5, which risk has the highest expected annual loss?

View answer and explanation
Question 11

What defines acceptable uses of a firm's information resources and computing equipment, including computers, wireless devices, and the Internet?

View answer and explanation
Question 12

What is the primary function of a firewall in a corporate network?

View answer and explanation
Question 13

Which technology for securing wireless networks replaces the older WEP standard with stronger security using longer, dynamically changing keys?

View answer and explanation
Question 14

What is the process of transforming plain text or data into cipher text that cannot be read by anyone other than the sender and intended receiver?

View answer and explanation
Question 15

What is a key difference between symmetric key encryption and public key encryption?

View answer and explanation
Question 16

What is the primary purpose of a digital certificate in a Public Key Infrastructure (PKI)?

View answer and explanation
Question 17

What is the primary goal of fault-tolerant computer systems?

View answer and explanation
Question 18

According to the Ponemon Institute's study mentioned on page 333, what was the approximate cost per compromised customer record for data breaches in the U.S. in 2011?

View answer and explanation
Question 19

What is the practice of tricking employees into revealing their passwords by pretending to be legitimate members of the company in need of information called?

View answer and explanation
Question 20

The Stuxnet worm, a primary example of cyberwarfare discussed in the chapter, was specifically designed to target what type of system?

View answer and explanation
Question 21

What does a business continuity plan focus on?

View answer and explanation
Question 22

What type of biometric authentication involves technology that is now being equipped in many PC laptops and mobile devices?

View answer and explanation
Question 23

What is the primary vulnerability of systems that are constantly connected to the Internet via cable modem or DSL?

View answer and explanation
Question 24

In 2011, the second annual Cost of Cyber Crime Study by the Ponemon Institute found the median annualized cost of cyber crime for organizations was what amount?

View answer and explanation
Question 25

What kind of systems contain redundant hardware, software, and power supply components to provide continuous, uninterrupted service?

View answer and explanation
Question 26

The MWEB Business case study illustrates a security breach that occurred because hackers gained access to what system?

View answer and explanation
Question 27

What is the primary cause of software vulnerability according to the textbook?

View answer and explanation
Question 28

What term is used for small pieces of software created by vendors to repair flaws in their programs without disturbing the proper operation of the software?

View answer and explanation
Question 29

According to the case study on Information Security Threats in Europe, what is a botnet?

View answer and explanation
Question 30

What type of firewall technology examines the application content of packets and uses a proxy server to handle communication between internal and external users?

View answer and explanation
Question 31

The Grum botnet, once the world's third-largest, was reportedly responsible for what percentage of worldwide spam traffic before it was shut down in 2012?

View answer and explanation
Question 32

Which of the following is an example of a general control?

View answer and explanation
Question 33

What is a 'hot site' in the context of disaster recovery planning?

View answer and explanation
Question 34

The median annualized cost of cyber crime for the organizations in the 2011 Ponemon Institute study was:

View answer and explanation
Question 35

What type of malware did Symantec identify as having 351 browser vulnerabilities in 2011?

View answer and explanation
Question 36

Which of these is NOT a principal source of poor system performance?

View answer and explanation
Question 37

What is the primary function of an intrusion detection system?

View answer and explanation
Question 38

What percentage of responding organizations in the 2011 Computer Security Institute survey experienced a computer security incident within the past year?

View answer and explanation
Question 39

What is the most common type of attack experienced by organizations, according to the 2011 Computer Security Institute survey?

View answer and explanation
Question 40

Which law outlines medical security and privacy rules and procedures for simplifying the administration of health care billing?

View answer and explanation
Question 41

The chapter discusses a new networking approach where control functions are managed by a central program, separate from the network devices. What is this approach called?

View answer and explanation
Question 42

What is the purpose of a MIS audit?

View answer and explanation
Question 43

How many days did the e-mail disruption for BlackBerry users last in October 2011?

View answer and explanation
Question 44

What is the primary method used by the Zeus Trojan to steal financial and personal data?

View answer and explanation
Question 45

What is the term for a wireless network that pretends to be a trustworthy Wi-Fi connection to capture users' passwords or credit card numbers?

View answer and explanation
Question 46

What is the primary security concern with cloud computing discussed in the chapter?

View answer and explanation
Question 47

In the context of the MWEB Business case study, how many attacks does MWEB claim to repel daily?

View answer and explanation
Question 48

What kind of information systems control is a software control?

View answer and explanation
Question 49

What is the primary function of deep packet inspection (DPI)?

View answer and explanation
Question 50

In the Sony data breach of April 2011, how many users had their personal information, including credit and bank account numbers, compromised?

View answer and explanation