BMIS 311 CHAPTER 8 RAT EXAM QUESTIONS AND ANSWERS WITH COMPLETE SOLUTIONS VERIFIED
2 views 0 purchase
Course
BMIS 311
Institution
BMIS 311
BMIS 311 CHAPTER 8 RAT EXAM QUESTIONS AND ANSWERS WITH COMPLETE SOLUTIONS VERIFIED
____________ Includes computer virunes, worms, and Trojan horses
Malware
Viruses differ trom worms because worms ___________
can operate on their own without attaching to other computer program files
A _________...
____________ Includes computer virunes, worms, and Trojan horses
Malware
Viruses differ trom worms because worms ___________
can operate on their own without attaching to other computer program files
A _____________ is a software program that mimics another program and often causes damage
Trojan horse
If someone loads a program that tracks everything you type, the specific spyware is a(n).
______________
key logger
A(n) _____________ is said to occur when hackers flood a network server or web server with many
thousands of false communications or requests for services to crash the network
denial of service
_____________ is the scientific collection, examination, authentication, preservation, and analysis of
data held on or retrieved from computer storage media in such a way that the information can be used
as evidence in a court of law
Computer forensics
Which below is the correct definition of "war driving?
, Eavesdroppers drive by buildings or park outside and try to intercept wireless network traffic
What type of attack consists of malware that comes with a downloaded file that a user intentionally
requests, such as a free game or coupon?
drive-by download
In 2002, the Act was passed to help protect investors with new financial statements reforms
Sarbanes-Oxley
The law that requires financial insttutions to ensure confidentiality of customer data is called the
_____________
Gramm-Leach-Bliley Act
Formalizing standards, nules, and procedures to ensure that the organization's general and application
security controls properly executed and enforced is an) ___________ control
administrative
MasterCard having a duplicate computer center in multiple cities is an example of ____________ in
case operations at one location are disrupted.
disaster recovery planning
An information systems __________ examines a fiem's overal security environment and determines if
the organization is properly prepared lo address threats.
OB. audit
_____________ consists of processes and tools to identify the valid users of a system
Identity management
The benefits of buying summaries with Stuvia:
Guaranteed quality through customer reviews
Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.
Quick and easy check-out
You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.
Focus on what matters
Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!
Frequently asked questions
What do I get when I buy this document?
You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.
Satisfaction guarantee: how does it work?
Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.
Who am I buying these notes from?
Stuvia is a marketplace, so you are not buying this document from us, but from seller NurseAdvocate. Stuvia facilitates payment to the seller.
Will I be stuck with a subscription?
No, you only buy these notes for $10.49. You're not tied to anything after your purchase.