CIS 204 - Final exam Questions and
Answers (Latest Update 2024) 600
Questions
IS Security is a trade-off between ___________ and ____________. - Correct
Answer ✅security, freedom
In the context of IS Security, the ___________ is what a criminal wants. -
Correct Answer ✅Target
A _____ is any danger to which an information resource may be exposed. -
Correct Answer ✅Threat
In the context of IS Security, the _____________ is the defense or protective
measure. - Correct Answer ✅Safeguard
An information system's _____ is the possibility that the system will be
harmed by a threat. - Correct Answer ✅Vulnerability
You start a new job, and the first thing your new company wants you to do is
create a user ID and a password. To remember your password, you write it on
a Post It note and put it on your laptop screen. This is an example of
________________. - Correct Answer ✅Poor Security
You start a new job, and human resources gives you a ten-page document
that outlines the employee responsibilities for information security. Which of
the following statements is most likely to be true? - Correct Answer ✅You
are expected to read the document, and you could be reprimanded if you
don't follow its guidelines.
Segment of computer code that performs malicious actions and will replicate,
or spread, by itself (without requiring another computer program). - Correct
Answer ✅worm
,CIS 204 - Final exam Questions and
Answers (Latest Update 2024) 600
Questions
Segment of computer code that performs malicious actions by attaching to
another computer program. - Correct Answer ✅Virus
Software programs that hide in other computer programs and reveal their
designed behavior only when they are activated. - Correct Answer ✅Trojan
Horse
Targets large groups of people. Perpetrators try to find out as much
information as possible about individuals - Correct Answer ✅Spear
Phishing
Use a computer to gain unauthorized access to data in a system - Correct
Answer ✅Hack
Person or program successfully masquerades as another by falsifying data
therefore by gaining an illegitimate - Correct Answer ✅Spoof
Can record your key strokes and/or capture passwords - Correct Answer
✅Spyware
Software that automatically displays or downloads advertising material
(often unwanted) when the user is online - Correct Answer ✅Adware
Using deception to acquire sensitive personal information my masquerading
as official looking emails - Correct Answer ✅Phishing
Which of the following is considered a threat caused by human error? -
Correct Answer ✅an employee inadvertently installing an old database on
top of the current one
,CIS 204 - Final exam Questions and
Answers (Latest Update 2024) 600
Questions
In the context of security threats, pretexting, sniffing, spoofing, and phishing
are all examples of ________ - Correct Answer ✅Unauthorized Data
disclosure
Stan loves collecting stamps. He receives an email that appears to come
from a well-known stamp auction site asking him to reset his username and
password. He clicks on the link and it takes him to a site that looks similar to
the auction site, but the Web address is "scrambled" and unreadable. He
emails the customer service desk at the auction site and discovers they
never sent the email. This scenario is an example of attempted ________. -
Correct Answer ✅Phishing
________ is a technique for intercepting computer communications through a
physical connection to a network or without a physical connection in the case
of wireless networks. - Correct Answer ✅Sniffing
Which of the following is a sniffing technique? - Correct Answer ✅Adware
Griffin has been working really hard lately and asks his manager for a raise.
His manager tells him that he is already the highest paid employee on the
floor. Griffin doesn't believe his manager, and illegally accesses the
employee database to look at salary data. Griffin's act can be termed as
________. - Correct Answer ✅Hacking
Which of the following is considered a computer crime? - Correct Answer
✅Hacking of information systems
A person claiming to be from central IT called Chris and asked him to
participate in a password reset audit. The person had Chris change his
password to the word "123456", and then again to a secret passphrase only
, CIS 204 - Final exam Questions and
Answers (Latest Update 2024) 600
Questions
Chris knew. Later that day Chris noticed odd system behavior, and then the
system crashed. Chris was a victim of ________. - Correct Answer
✅Pretexting or spoofing
Which of the following is most likely to be a result of hacking? - Correct
Answer ✅Unauthorized transaction from a users credit card
________ occurs when computer criminals invade a computer system and
replace legitimate programs with their own, unauthorized ones that shut
down legitimate applications - Correct Answer ✅Usurpation
Which of the following usually happens in a malicious denial-of-service attack
(illustrated in the image below)? - Correct Answer ✅A hacker floods a Web
server with many millions of bogus service requests.
________ present(s) the largest risk for an organization's infrastructure loss. -
Correct Answer ✅Natural Disasters
________ are small files that enable a browser to access Web sites without
having to sign in every time. - Correct Answer ✅Cookies
A ________ is a string of bits used to encrypt data. - Correct Answer ✅Key
Layla is purchasing a new laptop from an online vendor. Which of the
following will be displayed in the address bar of the vendor's browser that
will let Layla know that the online retailer is using the Secure Sockets Layer
(SSL) protocol - Correct Answer ✅https
Jalo was browsing an online shopping site when a program got downloaded
onto her system without her knowledge. The next day she found that her
The benefits of buying summaries with Stuvia:
Guaranteed quality through customer reviews
Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.
Quick and easy check-out
You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.
Focus on what matters
Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!
Frequently asked questions
What do I get when I buy this document?
You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.
Satisfaction guarantee: how does it work?
Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.
Who am I buying these notes from?
Stuvia is a marketplace, so you are not buying this document from us, but from seller Allivia. Stuvia facilitates payment to the seller.
Will I be stuck with a subscription?
No, you only buy these notes for $15.49. You're not tied to anything after your purchase.