100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached
logo-home
MIS FINAL EXAM|Latest Update Graded A+ $11.09   Add to cart

Exam (elaborations)

MIS FINAL EXAM|Latest Update Graded A+

 4 views  0 purchase
  • Course
  • Institution

MIS FINAL EXAM|Latest Update Graded A+ threat A ________ is a person or an organization that seeks to obtain or alter data or other IS assets illegally, without the owner's permission and often without the owner's knowledge. an employee inadvertently installing an old database on top of the ...

[Show more]

Preview 2 out of 11  pages

  • June 12, 2024
  • 11
  • 2023/2024
  • Exam (elaborations)
  • Questions & answers
avatar-seller
MIS FINAL EXAM|Latest Update Graded A+
threat
A ________ is a person or an organization that seeks to obtain or alter data or other IS assets illegally,
without the owner's permission and often without the owner's knowledge.


an employee inadvertently installing an old database on top of the current one
Which of the following is considered a threat caused by human error?


hacking of information systems
Which of the following is considered a computer crime?


pretexting
A person claiming to be from central IT called Chris and asked him to participate in a password reset
audit. The person had Chris change his password to the word "123456", and then again to a secret
passphrase only Chris knew. Later that day Chris noticed odd system behavior, and then the system
crashed. Chris was a victim of ________.


unauthorized data disclosure
In the context of security threats, pretexting, sniffing, spoofing, and phishing are all examples of
________.


phishing
Stan loves collecting stamps. He receives an email that appears to come from a well-known stamp
auction site asking him to reset his username and password. He clicks on the link and it takes him to a
site that looks similar to the auction site, but the Web address is "scrambled" and unreadable. He
emails the customer service desk at the auction site and discovers they never sent the email. This
scenario is an example of attempted ________.


phishing
Email spoofing is a synonym for ________.


Sniffing
________ is a technique for intercepting computer communications through a physical connection to
a network or without a physical connection in the case of wireless networks.


adware
Which of the following is a sniffing technique?


hacking
Sally has been working really hard lately and asks her manager for a raise. Her manager tells her that
she is already the highest paid employee on the floor. Sally doesn't believe her manager, and illegally
accesses the employee database to look at salary data. Sally's act can be termed as ________.


an unauthorized transaction from a user's credit card
Which of the following is most likely to be a result of hacking?

, Incorrect data modification
________ occurs through human error when employees do not follow proper procedures or when
procedures have not been well designed.


Usurpation
________ occurs when computer criminals invade a computer system and replace legitimate
programs with their own, unauthorized ones that shut down legitimate applications.


A hacker floods a Web server with many millions of bogus service requests.
Which of the following usually happens in a malicious denial-of-service attack?


Natural disasters
________ present(s) the largest risk for an organization's infrastructure loss.


Advanced persistent threat
________ is a sophisticated, possibly long-running computer hack that is perpetrated by large, well-
funded organizations such as governments.


Surveys suggest that some organizations do not report all their computer crime losses, and some will
not report such losses at all.
Which of the following statements is TRUE about losses due to computer security threats?


removing high-value assets from computers
Which of the following is a personal security safeguard?


brute force
Nonword passwords are vulnerable to a ________ attack in which the password cracker tries every
possible combination of characters.


cookies
Removing and disabling ________ that may contain sensitive security data presents an excellent
example of the trade-off between improved security and cost.


Organizations should implement safeguards that balance the trade-off between risk and cost.
In information security, which of the following is TRUE about managing risk?


the HIPAA of 1996
Which of the following was passed to give individuals the right to access their own health data
created by doctors and other healthcare providers?


firewalls
Which of the following is classified as a technical safeguard?


smart card

The benefits of buying summaries with Stuvia:

Guaranteed quality through customer reviews

Guaranteed quality through customer reviews

Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.

Quick and easy check-out

Quick and easy check-out

You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.

Focus on what matters

Focus on what matters

Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!

Frequently asked questions

What do I get when I buy this document?

You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.

Satisfaction guarantee: how does it work?

Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.

Who am I buying these notes from?

Stuvia is a marketplace, so you are not buying this document from us, but from seller ACADEMICAIDSTORE. Stuvia facilitates payment to the seller.

Will I be stuck with a subscription?

No, you only buy these notes for $11.09. You're not tied to anything after your purchase.

Can Stuvia be trusted?

4.6 stars on Google & Trustpilot (+1000 reviews)

78861 documents were sold in the last 30 days

Founded in 2010, the go-to place to buy study notes for 14 years now

Start selling
$11.09
  • (0)
  Add to cart