IS 3003 Final Exam Questions With Correct
Answers
security |- |CORRECT |ANSWER✔✔-Policies, |procedures, |and |technical |measures |used |to |prevent
|unauthorized |access, |alteration, |theft, |or |physical |damage |to |information |systems. |; |the |
protections |of |information |from |accidental |or |intentional |misuse |by |persons |inside |or |outside |
th |organization.
controls |- |CORRECT |ANSWER✔✔-Methods, |policies, |and |organizational |procedures |that |ensure
|safety |of |organization's |assets; |accuracy |and |reliability |of |its |accounting |records; |and |
operational |adherence |to |management |standards
Facots |Driving |the |importance |of |security |- |CORRECT |ANSWER✔✔-1. |Evolution |for |mainframe |
environment |to |today's |interconnected, |wireless, |networked |infrastructure; |2. |Trend |toward |
smaller, |faster, |cheaper, |portable |computers |and |storage |devices |; |3. |increased |employee |use |
of |unmanaged |devices; |4. |The |computer |skills |necessary |to |be |a |hacker |are |decreasing... |
simplicity |of |attack |tools; |5. |Delays |in |user |patching/user |confusion |& |ignorance...; |6. |
international |organized |crime |is |taking |over |cybercrime
Computer |Crime |/ |Fraud |- |CORRECT |ANSWER✔✔-any |violation |of |criminal |law |that |involve |a |
knowledge |of |computer |technology |for |their |perpetration, |investigation, |or |prosecution; |
Commission |of |illegal |acts |through |use |of |computer |or |against |a |computer |system |- |computer |
may |be |the |object |(target) |of |the |instrument |or |crime
Identity |Theft |- |CORRECT |ANSWER✔✔-a |crime |in |which |an |imposter |obtains |key |pieces |of |
personal |information |to |impersonate |someone |else; |the |forging |of |someone's |identity |for |the |
purpose |of |fraud.
, Click |Fraud |- |CORRECT |ANSWER✔✔-occurs |when |an |individual |or |computer |program |
fraudulently |clicks |on |an |online |ad |without |any |intention |of |learning |more |about |the |
advertiser |or |making |a |purchase
Click |Farm |- |CORRECT |ANSWER✔✔-a |business |that |pays |employees |to |click |on |website |
elements |to |artificially |boost |the |status |of |a |client's |website/product |or |negatively |affect |
competitors |by |driving |up |their |marketing |costs
CAPTCHA |- |CORRECT |ANSWER✔✔-a |program |that |protects |websites |against |bots |by |
generating |and |grading |tests |that |humans |can |pass |but |current |computer |programs |cannot.
Hardware |problems |- |CORRECT |ANSWER✔✔-breakdowns, |configuration |errors, |damage |from |
improper |use |or |crime, |theft |of |devices
Software |problems |- |CORRECT |ANSWER✔✔-Programming |errors, |installation |errors, |
unauthorized |changes
Disasters |- |CORRECT |ANSWER✔✔-power |failures, |flood, |fires, |others...
wireless |security |challenges |- |CORRECT |ANSWER✔✔-radio |frequency |bands |easy |to |scan |- |
both |Bluetooth |and |Wi-Fi |are |susceptible |to |hacking
War |Driving |- |CORRECT |ANSWER✔✔-eavesdroppers |drive |by |buildings/areas |or |park |outside |
and |try |to |intercept |network |traffic
WEP |- |CORRECT |ANSWER✔✔-the |initial |security |standard |for |Wi-Fi |is |relatively |easy |to |crack...
|WPA2 |is |better |but |still |vulnerable
Answers
security |- |CORRECT |ANSWER✔✔-Policies, |procedures, |and |technical |measures |used |to |prevent
|unauthorized |access, |alteration, |theft, |or |physical |damage |to |information |systems. |; |the |
protections |of |information |from |accidental |or |intentional |misuse |by |persons |inside |or |outside |
th |organization.
controls |- |CORRECT |ANSWER✔✔-Methods, |policies, |and |organizational |procedures |that |ensure
|safety |of |organization's |assets; |accuracy |and |reliability |of |its |accounting |records; |and |
operational |adherence |to |management |standards
Facots |Driving |the |importance |of |security |- |CORRECT |ANSWER✔✔-1. |Evolution |for |mainframe |
environment |to |today's |interconnected, |wireless, |networked |infrastructure; |2. |Trend |toward |
smaller, |faster, |cheaper, |portable |computers |and |storage |devices |; |3. |increased |employee |use |
of |unmanaged |devices; |4. |The |computer |skills |necessary |to |be |a |hacker |are |decreasing... |
simplicity |of |attack |tools; |5. |Delays |in |user |patching/user |confusion |& |ignorance...; |6. |
international |organized |crime |is |taking |over |cybercrime
Computer |Crime |/ |Fraud |- |CORRECT |ANSWER✔✔-any |violation |of |criminal |law |that |involve |a |
knowledge |of |computer |technology |for |their |perpetration, |investigation, |or |prosecution; |
Commission |of |illegal |acts |through |use |of |computer |or |against |a |computer |system |- |computer |
may |be |the |object |(target) |of |the |instrument |or |crime
Identity |Theft |- |CORRECT |ANSWER✔✔-a |crime |in |which |an |imposter |obtains |key |pieces |of |
personal |information |to |impersonate |someone |else; |the |forging |of |someone's |identity |for |the |
purpose |of |fraud.
, Click |Fraud |- |CORRECT |ANSWER✔✔-occurs |when |an |individual |or |computer |program |
fraudulently |clicks |on |an |online |ad |without |any |intention |of |learning |more |about |the |
advertiser |or |making |a |purchase
Click |Farm |- |CORRECT |ANSWER✔✔-a |business |that |pays |employees |to |click |on |website |
elements |to |artificially |boost |the |status |of |a |client's |website/product |or |negatively |affect |
competitors |by |driving |up |their |marketing |costs
CAPTCHA |- |CORRECT |ANSWER✔✔-a |program |that |protects |websites |against |bots |by |
generating |and |grading |tests |that |humans |can |pass |but |current |computer |programs |cannot.
Hardware |problems |- |CORRECT |ANSWER✔✔-breakdowns, |configuration |errors, |damage |from |
improper |use |or |crime, |theft |of |devices
Software |problems |- |CORRECT |ANSWER✔✔-Programming |errors, |installation |errors, |
unauthorized |changes
Disasters |- |CORRECT |ANSWER✔✔-power |failures, |flood, |fires, |others...
wireless |security |challenges |- |CORRECT |ANSWER✔✔-radio |frequency |bands |easy |to |scan |- |
both |Bluetooth |and |Wi-Fi |are |susceptible |to |hacking
War |Driving |- |CORRECT |ANSWER✔✔-eavesdroppers |drive |by |buildings/areas |or |park |outside |
and |try |to |intercept |network |traffic
WEP |- |CORRECT |ANSWER✔✔-the |initial |security |standard |for |Wi-Fi |is |relatively |easy |to |crack...
|WPA2 |is |better |but |still |vulnerable