100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached
logo-home
CIS 204 - Final exam Questions and Answers (Latest Update 2024) 600 Questions $15.49   Add to cart

Exam (elaborations)

CIS 204 - Final exam Questions and Answers (Latest Update 2024) 600 Questions

 0 view  0 purchase
  • Course
  • CIS 204 - Fin
  • Institution
  • CIS 204 - Fin

CIS 204 - Final exam Questions and Answers (Latest Update 2024) 600 Questions

Preview 4 out of 78  pages

  • August 24, 2024
  • 78
  • 2024/2025
  • Exam (elaborations)
  • Unknown
  • CIS 204 - Fin
  • CIS 204 - Fin
avatar-seller
Allivia
CIS 204 - Final exam Questions and
Answers (Latest Update 2024) 600
Questions
IS Security is a trade-off between ___________ and ____________. - Correct
Answer ✅security, freedom



In the context of IS Security, the ___________ is what a criminal wants. -
Correct Answer ✅Target



A _____ is any danger to which an information resource may be exposed. -
Correct Answer ✅Threat



In the context of IS Security, the _____________ is the defense or protective
measure. - Correct Answer ✅Safeguard



An information system's _____ is the possibility that the system will be
harmed by a threat. - Correct Answer ✅Vulnerability



You start a new job, and the first thing your new company wants you to do is
create a user ID and a password. To remember your password, you write it on
a Post It note and put it on your laptop screen. This is an example of
________________. - Correct Answer ✅Poor Security



You start a new job, and human resources gives you a ten-page document
that outlines the employee responsibilities for information security. Which of
the following statements is most likely to be true? - Correct Answer ✅You
are expected to read the document, and you could be reprimanded if you
don't follow its guidelines.



Segment of computer code that performs malicious actions and will replicate,
or spread, by itself (without requiring another computer program). - Correct
Answer ✅worm

,CIS 204 - Final exam Questions and
Answers (Latest Update 2024) 600
Questions
Segment of computer code that performs malicious actions by attaching to
another computer program. - Correct Answer ✅Virus



Software programs that hide in other computer programs and reveal their
designed behavior only when they are activated. - Correct Answer ✅Trojan
Horse



Targets large groups of people. Perpetrators try to find out as much
information as possible about individuals - Correct Answer ✅Spear
Phishing



Use a computer to gain unauthorized access to data in a system - Correct
Answer ✅Hack



Person or program successfully masquerades as another by falsifying data
therefore by gaining an illegitimate - Correct Answer ✅Spoof



Can record your key strokes and/or capture passwords - Correct Answer
✅Spyware



Software that automatically displays or downloads advertising material
(often unwanted) when the user is online - Correct Answer ✅Adware



Using deception to acquire sensitive personal information my masquerading
as official looking emails - Correct Answer ✅Phishing



Which of the following is considered a threat caused by human error? -
Correct Answer ✅an employee inadvertently installing an old database on
top of the current one

,CIS 204 - Final exam Questions and
Answers (Latest Update 2024) 600
Questions

In the context of security threats, pretexting, sniffing, spoofing, and phishing
are all examples of ________ - Correct Answer ✅Unauthorized Data
disclosure



Stan loves collecting stamps. He receives an email that appears to come
from a well-known stamp auction site asking him to reset his username and
password. He clicks on the link and it takes him to a site that looks similar to
the auction site, but the Web address is "scrambled" and unreadable. He
emails the customer service desk at the auction site and discovers they
never sent the email. This scenario is an example of attempted ________. -
Correct Answer ✅Phishing



________ is a technique for intercepting computer communications through a
physical connection to a network or without a physical connection in the case
of wireless networks. - Correct Answer ✅Sniffing



Which of the following is a sniffing technique? - Correct Answer ✅Adware



Griffin has been working really hard lately and asks his manager for a raise.
His manager tells him that he is already the highest paid employee on the
floor. Griffin doesn't believe his manager, and illegally accesses the
employee database to look at salary data. Griffin's act can be termed as
________. - Correct Answer ✅Hacking



Which of the following is considered a computer crime? - Correct Answer
✅Hacking of information systems



A person claiming to be from central IT called Chris and asked him to
participate in a password reset audit. The person had Chris change his
password to the word "123456", and then again to a secret passphrase only

, CIS 204 - Final exam Questions and
Answers (Latest Update 2024) 600
Questions
Chris knew. Later that day Chris noticed odd system behavior, and then the
system crashed. Chris was a victim of ________. - Correct Answer
✅Pretexting or spoofing



Which of the following is most likely to be a result of hacking? - Correct
Answer ✅Unauthorized transaction from a users credit card



________ occurs when computer criminals invade a computer system and
replace legitimate programs with their own, unauthorized ones that shut
down legitimate applications - Correct Answer ✅Usurpation



Which of the following usually happens in a malicious denial-of-service attack
(illustrated in the image below)? - Correct Answer ✅A hacker floods a Web
server with many millions of bogus service requests.



________ present(s) the largest risk for an organization's infrastructure loss. -
Correct Answer ✅Natural Disasters



________ are small files that enable a browser to access Web sites without
having to sign in every time. - Correct Answer ✅Cookies



A ________ is a string of bits used to encrypt data. - Correct Answer ✅Key



Layla is purchasing a new laptop from an online vendor. Which of the
following will be displayed in the address bar of the vendor's browser that
will let Layla know that the online retailer is using the Secure Sockets Layer
(SSL) protocol - Correct Answer ✅https



Jalo was browsing an online shopping site when a program got downloaded
onto her system without her knowledge. The next day she found that her

The benefits of buying summaries with Stuvia:

Guaranteed quality through customer reviews

Guaranteed quality through customer reviews

Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.

Quick and easy check-out

Quick and easy check-out

You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.

Focus on what matters

Focus on what matters

Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!

Frequently asked questions

What do I get when I buy this document?

You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.

Satisfaction guarantee: how does it work?

Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.

Who am I buying these notes from?

Stuvia is a marketplace, so you are not buying this document from us, but from seller Allivia. Stuvia facilitates payment to the seller.

Will I be stuck with a subscription?

No, you only buy these notes for $15.49. You're not tied to anything after your purchase.

Can Stuvia be trusted?

4.6 stars on Google & Trustpilot (+1000 reviews)

79223 documents were sold in the last 30 days

Founded in 2010, the go-to place to buy study notes for 14 years now

Start selling
$15.49
  • (0)
  Add to cart