ISTM 210 Management Information Systems Exam 4 –
Texas A&M University 2026/2027 Latest Update
Computer security - correct answer-is concerned with risk management,
confidentiality, integrity and the availability of the electronic information that is
processed and stored within a computing system
risk management - correct answer-includes the recognition, consequences, and
assessment of risk to a computer's assets, and developing strategies to manage
and protect them.
hacker or hacktivist - correct answer-someone who attempts to invade or disable
a computer's security measures and then to steal the computer resources at their
leisure
breach - correct answer-an unsecured computer is extremely easy to
True - correct answer-It is better to assume that a computer will be attacked
regardless of security measures and to take preemptive measures to prevent
them rather than to naively ignore computer security altogether. (T/F)
intranet - correct answer-is a businesses' private version of the Internet that
works the same way as the Internet, though it is confined within the business
privacy - correct answer-key aspect of an Intranet is
,firewall - correct answer-specialized hardware and software working together
that ensures that only authorized personnel and employees within a business can
use its Intranet.
keep unauthorized Internet users out of private intranets. Without this, an
Intranet is just another part of the Internet.
proxy server - correct answer-Any communications in or out of an intranet pass
through a special security computer called
port - correct answer-it's used to contain and delay structural fire from spreading
to contiguous buildings.
default-allow - correct answer-makes inadvertent network connections and
system compromise much more likely.
default-deny - correct answer-the only network connections that are permitted
are the ones that have been explicitly allowed.
Computer viruses/metamorphic viruses - correct answer-are computer files that
reproduce by making copies of them within a computer's memory, storage, or on
a network
Malware - correct answer-includes programs specifically intended to penetrate or
damage a computer system without the end user's knowledge.
, Worms - correct answer-a virus in that it is self-replicating but can be potentially
more insidious in that it does not need to attach itself to an existing program to
spread
trojan horse - correct answer-describes a program that often seems harmless and
possibly interesting at first until it is executed. When the program is executed, it
may release one or many harmful viruses, worms, or any other sort of malicious
programs into a computer or networked system
spyware - correct answer-a computer program that is installed covertly on a
computer to capture or take control of the system without the user's knowledge
or consent.
secretly monitors a user's keystrokes and behavior, but can also install new
software
Adware or advertising-supported software - correct answer-are programs that
automatically display or download advertising to a computer.
Spamming - Spam or junk email - correct answer-is the abuse of an email system
to arbitrarily send millions of unsolicited bulk messages.
Denial-of-service attack - A Denial-of-service (DoS) - correct answer-is an attempt
to make a computer or any of its resources unavailable to its intended users.
Denial of Service - correct answer-what does DoS stand for?
Texas A&M University 2026/2027 Latest Update
Computer security - correct answer-is concerned with risk management,
confidentiality, integrity and the availability of the electronic information that is
processed and stored within a computing system
risk management - correct answer-includes the recognition, consequences, and
assessment of risk to a computer's assets, and developing strategies to manage
and protect them.
hacker or hacktivist - correct answer-someone who attempts to invade or disable
a computer's security measures and then to steal the computer resources at their
leisure
breach - correct answer-an unsecured computer is extremely easy to
True - correct answer-It is better to assume that a computer will be attacked
regardless of security measures and to take preemptive measures to prevent
them rather than to naively ignore computer security altogether. (T/F)
intranet - correct answer-is a businesses' private version of the Internet that
works the same way as the Internet, though it is confined within the business
privacy - correct answer-key aspect of an Intranet is
,firewall - correct answer-specialized hardware and software working together
that ensures that only authorized personnel and employees within a business can
use its Intranet.
keep unauthorized Internet users out of private intranets. Without this, an
Intranet is just another part of the Internet.
proxy server - correct answer-Any communications in or out of an intranet pass
through a special security computer called
port - correct answer-it's used to contain and delay structural fire from spreading
to contiguous buildings.
default-allow - correct answer-makes inadvertent network connections and
system compromise much more likely.
default-deny - correct answer-the only network connections that are permitted
are the ones that have been explicitly allowed.
Computer viruses/metamorphic viruses - correct answer-are computer files that
reproduce by making copies of them within a computer's memory, storage, or on
a network
Malware - correct answer-includes programs specifically intended to penetrate or
damage a computer system without the end user's knowledge.
, Worms - correct answer-a virus in that it is self-replicating but can be potentially
more insidious in that it does not need to attach itself to an existing program to
spread
trojan horse - correct answer-describes a program that often seems harmless and
possibly interesting at first until it is executed. When the program is executed, it
may release one or many harmful viruses, worms, or any other sort of malicious
programs into a computer or networked system
spyware - correct answer-a computer program that is installed covertly on a
computer to capture or take control of the system without the user's knowledge
or consent.
secretly monitors a user's keystrokes and behavior, but can also install new
software
Adware or advertising-supported software - correct answer-are programs that
automatically display or download advertising to a computer.
Spamming - Spam or junk email - correct answer-is the abuse of an email system
to arbitrarily send millions of unsolicited bulk messages.
Denial-of-service attack - A Denial-of-service (DoS) - correct answer-is an attempt
to make a computer or any of its resources unavailable to its intended users.
Denial of Service - correct answer-what does DoS stand for?