MIS 200 exam 2 |99 Questions with
Accurate Answers
spyware - -software that secretly gathers information about users while they
browse the web
Prevented by installing antivirus software
- adware - -form of spyware. collects information about the user to display
advertisement in the web browser
Prevented by ad-blocking feature
- phishing - -sending fraudulent emails that seem to come from legitimate
sources. direct email recipients to false web sites.
- keystroke loggers - -monitor and record keystrokes. sometimes used by
companies to track employees use of email and internet
- sniffing - -capturing and recording network traffic.
-Used for legitimate reasons like monitoring network performance
-often used by hackers to intercept information
- spoofing - -attempt to gain access to a network by posing as an authorized
user to find sensitive information.
- computer fraud - -unauthorized use of computer data for personal gain..
social network used for committing computer crime.
1. E-mail spamming
2. Virus Hoaxes
3. Changning computer records illegally
4. Denial of service attacks
5. Identity theft
6. Stealing files for industrial espionage
- computer and network security - -critical for most organization. especially
in recent years. Sniffers, password crackers, and rootlets.
- comprehensive security system safegaurds - -protects an organizations
resources. new product designs and such. includes hardware, software,
procedures, and personnel that collectively protect information resources
, - confidentiality - -system must not allow disclosing information to anyone
who isn't authorized to access it.
secure government agencies. business, e commerce.q
- integrity - -ensures the accuracy of information resources within an
organization
- availability - -Authorized users can access the information they need from
operating computers and networks
1. Quick recovery in the event of a system failure or disaster
- three levels of security - -level 1: front end servers
level 2: back end systems
level 3: corporate network
- fault tolerant systems - -Ensure availability in the event of a system failure
by using a combination of hardware and software
Methods used:
1. Uninterruptible power supply (UPS)
2. Redundant array of independent disks (RAID)
3. Mirror disks
- intentional threats - -viruses, worms, trojan programs, logic bombs,
backdoors, blended threats, rootlets, denial of service attacks, social
engineering.
- viruses - -Type of malware.
1.Consists of self-propagating program code that is triggered by a specified
time or event
2.Attaches itself to other files, and the cycle continues when the program or
operating system containing the virus is used
3.Transmitted through a network or e-mail attachments
- worms - -travels from computer to computer in a network. doesn't erase
data.
1. Independent programs that spread themselves without having to be
attached to a host program.
Accurate Answers
spyware - -software that secretly gathers information about users while they
browse the web
Prevented by installing antivirus software
- adware - -form of spyware. collects information about the user to display
advertisement in the web browser
Prevented by ad-blocking feature
- phishing - -sending fraudulent emails that seem to come from legitimate
sources. direct email recipients to false web sites.
- keystroke loggers - -monitor and record keystrokes. sometimes used by
companies to track employees use of email and internet
- sniffing - -capturing and recording network traffic.
-Used for legitimate reasons like monitoring network performance
-often used by hackers to intercept information
- spoofing - -attempt to gain access to a network by posing as an authorized
user to find sensitive information.
- computer fraud - -unauthorized use of computer data for personal gain..
social network used for committing computer crime.
1. E-mail spamming
2. Virus Hoaxes
3. Changning computer records illegally
4. Denial of service attacks
5. Identity theft
6. Stealing files for industrial espionage
- computer and network security - -critical for most organization. especially
in recent years. Sniffers, password crackers, and rootlets.
- comprehensive security system safegaurds - -protects an organizations
resources. new product designs and such. includes hardware, software,
procedures, and personnel that collectively protect information resources
, - confidentiality - -system must not allow disclosing information to anyone
who isn't authorized to access it.
secure government agencies. business, e commerce.q
- integrity - -ensures the accuracy of information resources within an
organization
- availability - -Authorized users can access the information they need from
operating computers and networks
1. Quick recovery in the event of a system failure or disaster
- three levels of security - -level 1: front end servers
level 2: back end systems
level 3: corporate network
- fault tolerant systems - -Ensure availability in the event of a system failure
by using a combination of hardware and software
Methods used:
1. Uninterruptible power supply (UPS)
2. Redundant array of independent disks (RAID)
3. Mirror disks
- intentional threats - -viruses, worms, trojan programs, logic bombs,
backdoors, blended threats, rootlets, denial of service attacks, social
engineering.
- viruses - -Type of malware.
1.Consists of self-propagating program code that is triggered by a specified
time or event
2.Attaches itself to other files, and the cycle continues when the program or
operating system containing the virus is used
3.Transmitted through a network or e-mail attachments
- worms - -travels from computer to computer in a network. doesn't erase
data.
1. Independent programs that spread themselves without having to be
attached to a host program.