Chapter: Chapter 5: IT Security, crime, Compliance, and Continuity
1. ______ refers to viruses, Trojan horses, spyware, and other types of disruptive, destructive, or unwanted programs.
a) Bad program
d) Zombie computer
2. Social networks and cloud computing increase vulnerabilities by providing _____.
a) a single point of failure
b) an easy way to steal data
c) an easier way for data to be read over networks
d) extra security over a network
3. _______ is a deceptive attempt to steal a person’s confidential information by pretending to be a legitimate organization ...view middle of the document...
6. One of the worst and most prevalent crimes is/are _____.
c) identity theft
7. Physical control is an example of what category of control?
8. Network Security measures involve ___ types of defenses referred to as layers.
9. _____ is a type of security protocol used for wireless transmission.
10. The _________ is an anti-fraud law that forces more accurate business reporting and disclosure of generally accepted accounting principles.
a) The Balanced Book Act
b) Sarbanes-Oxley Act (SOX)
c) The Madoff Act
d) The Enron Act
11. Another name for a disaster recovery plan is _____.
a) an alternative plan
b) just in case plan
c) Plan B
d) business continuity plan
1. IT Security covers the protection of information, communication networks, and traditional and e-commerce operations to assure their confidentiality, integrity, availability, and authorized use.
2. Human error is not a type of unintentional threat.
3. Hackers call employees company employees and pretend to be a network administrator in order to gain access to a network by getting them to reveal their password.
4. A biometric control is not reliable because anyone can use or mimic it.