BTMA 317 Final Exam Questions With Verified Answers
2 views 0 purchase
Course
Btma
Institution
Btma
BTMA 317 Final Exam Questions With
Verified Answers
Three components of IT systems are - answerpeople information and information technology
most important component of IT systems - answerpeople
Ethics are defined as - answerthe principles and standards that shape our behaviour toward
other pe...
fair use doctrine - answer✔states that your IP can be used without your express contsent only if it
is used for teaching purposes or used in the creation of new content
keylogging - answer✔saving keystrokes event data recorders record events with automobiles
which can be leveraged in investigations
identity theft - answer✔includes people stealing your information for financial gain
friendly fraud - answer✔someone that you know takes your information from you very common
Phishing - answer✔is when you are redirected to a website that looks like the one you are trying
to visit for the purpose of stealing your password
spear phishing - answer✔the hackers specifically target you they have parts of your info and
desire more
whaling - answer✔high level execuatives and other high profile people are targeted
Pharming - answer✔you try to visit a website and upon doing so it auto re-directs you to website
to steal your password
monitoring technology - answer✔these things can scan incoming and outgoing emails employers
can track you with keylogger software
cookies - answer✔basic tools of web monitoring they are small files containing information
about you keeps password details also manages storing shopping carts on sites for when you
return next
unique cookies - answer✔track history across websites including what websites you visit
common cookies - answer✔start as unique cookies but are then changed and sold access to third
party where they can be used to track activity across many sites
spam - answer✔is unsolicited email from businesses that deliver goods and services people who
are bad can skirt laws and get past blockers link to unsubscribe but then you are linked on to
more of these emails
adware - answer✔is software that generates ads that installs itself on your computer when you
download something from the internet
Trojan horse software - answer✔something you don't want hidden in a download you do want
spyware - answer✔is a more malicious form of adware that installs itself and then collects your
information and data and gives it to a third party without your consent
web log - answer✔is something given to a specific website when you visit it is usually just a line
of information for every visitor stored usually on webservers provides record of your clickstream
clickstream - answer✔information during your web session about with websites you visited what
ads you looked at
Anonymous web browsing servies - answer✔can hide your information and thus your
clickstream from people who may want to view it
two parties collecting information to their advantages - answer✔NCIC and IRS
employee misconduct - answer✔companies are most likely to lose money as a result of
hackers - answer✔computer users who use their knowledge to invade other peoples computers
Hacktivists - answer✔philosophical or political message hackers
crackers - answer✔hired guns who illegally break into and usually steal information for a fee
White-hat hacker - answer✔good guys who test the vulnerability of systems so that protective
measures can be taken
computer virus - answer✔software that is written with malicious intent to cause annoyance or
damage
worm - answer✔a type of virus that spreads itself not just from file to file but form computer to
computer via email and other internet traffic
Black-hat hackers - answer✔break into peoples computers systems and may just look around
steal credit card info destroy information or otherwise damage
script kiddies - answer✔find hacking code on the internet and click and point their way into
systems to cause damage or spread viruses
cyber terrorists - answer✔cause harm to others or destroy critical systems or information
Denial of service DDos - answer✔attacks flood server with so many requests that it is forced to
shut down and can't handle the requests
three ways to prove access rights - answer✔passwords atm card fingerprint
Biometrics - answer✔is the use of physiological characterisitcs like your finger eye voice to
provide authentication to some services
The benefits of buying summaries with Stuvia:
Guaranteed quality through customer reviews
Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.
Quick and easy check-out
You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.
Focus on what matters
Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!
Frequently asked questions
What do I get when I buy this document?
You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.
Satisfaction guarantee: how does it work?
Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.
Who am I buying these notes from?
Stuvia is a marketplace, so you are not buying this document from us, but from seller sirjoel. Stuvia facilitates payment to the seller.
Will I be stuck with a subscription?
No, you only buy these notes for $10.49. You're not tied to anything after your purchase.