MIS Textbook - Chapter 4 PDF

Title MIS Textbook - Chapter 4
Course Management Information Systems
Institution University of Ottawa
Pages 59
File Size 346.7 KB
File Type PDF
Total Downloads 14
Total Views 154

Summary

Testbank for C4 of the textbook - good for midterms...


Description

Package Title: Chapter 4, Testbank Course Title: Rainer, IS 5e Chapter Number: 4

Question type: Multiple Choice 1) The 2017 Equifax data breach occurred because attackers _______. a) exploited a vulnerability in some web application software b) sent e-mails to consumers with links to websites with malicious software c) used social engineering to get user IDs and passwords from employees d) were able to access discarded equipment with sensitive information Answer: A Difficulty: Easy Section Reference 1: Opening Case Learning Objective 1: Compare and contrast human mistakes and social engineering and provide a specific example of each one. Bloomcode: Knowledge Standard 1: AACSB || Technology

2) Equifax hired _______ to help after they suffered two breaches in 2017. a) Cylance b) Mandiant c) Praetorian d) Zero Trust Answer: B Difficulty: Easy Section Reference 1: Opening Case Learning Objective 1: Compare and contrast human mistakes and social engineering and provide a specific example of each one. Bloomcode: Knowledge Standard 1: AACSB || Technology 3) Consumers ___ put a freeze on their credit with the three credit bureaus; this is ____ for consumers. a) can; an appealing fix

b) can; not an appealing fix c) cannot; is a problem for d)cannot; irrelevant Answer: B Difficulty: Medium Section Reference 1: Opening Case Learning Objective 1: Compare and contrast human mistakes and social engineering and provide a specific example of each one. Bloomcode: Analysis Standard 1: AACSB || Technology 4) A(n) _________ to an information resource is any danger to which a system may be exposed. a) exposure b) risk c) threat d) vulnerability Answer: c Difficulty: Easy Section Reference 1: 4.1 Learning Objective 1: Identify the five factors that contribute to the increasing vulnerability of information resources and specific examples of each factor. Bloomcode: Knowledge Standard 1: AACSB || Technology

5) The _________ of an information resource is the harm, loss, or damage that can result if a threat compromises that resource. a) exposure b) risk c) threat d) vulnerability Answer: a Difficulty: Easy Section Reference 1: 4.1 Learning Objective 1: Identify the five factors that contribute to the increasing vulnerability of information resources and specific examples of each factor. Bloomcode: Knowledge

Standard 1: AACSB || Technology 6) An information resource’s _________ is the possibility that the system will be harmed by a threat. a) exposure b) risk c) threat d) vulnerability Answer: d Difficulty: Easy Section Reference 1: 4.1 Learning Objective 1: Identify the five factors that contribute to the increasing vulnerability of information resources and specific examples of each factor. Bloomcode: Knowledge Standard 1: AACSB || Technology

7) Which of the following does NOT contribute to the increasing vulnerability of organizational information resources? a) Increasing skills necessary to be a computer hacker b) International organized crime taking over cybercrime c) Lack of management support d) Smaller, faster, cheaper computers and storage devices e) Today’s interconnected, interdependent, wirelessly networked business environment Answer: a Difficulty: Easy Section Reference 1: 4.1 Learning Objective 1: Identify the five factors that contribute to the increasing vulnerability of information resources and specific examples of each factor. Bloomcode: Knowledge Standard 1: AACSB || Technology

8) Which of the following does NOT contribute to the increasing vulnerability of organizational information resources? a) Additional management support b) Decreasing skills necessary to be a computer hacker c) International organized crime taking over cybercrime

d) Smaller, faster, cheaper computers and storage devices e) Today’s interconnected, interdependent, wirelessly networked business environment Answer: a Difficulty: Easy Section Reference 1: 4.1 Learning Objective 1: Identify the five factors that contribute to the increasing vulnerability of information resources and specific examples of each factor. Bloomcode: Knowledge Standard 1: AACSB || Technology 9) A(n) _________ network is any network within your organization; a(n) _________ network is any network external to your organization. a) trusted; trusted b) trusted; untrusted c) untrusted; trusted d) untrusted; untrusted Answer: b Difficulty: Easy Section Reference 1: 4.1 Learning Objective 1: Identify the five factors that contribute to the increasing vulnerability of information resources and specific examples of each factor. Bloomcode: Knowledge Standard 1: AACSB || Technology

10) Computer crimes typically average _________ of dollars and cause businesses _________ of dollars in damages. a) hundreds; millions b) hundreds; billions c) hundreds of thousands; millions d) hundreds of thousands; billions Answer: d Difficulty: Medium Section Reference 1: 4.1 Learning Objective 1: Identify the five factors that contribute to the increasing vulnerability of information resources and specific examples of each factor. Bloomcode: Knowledge

Standard 1: AACSB || Technology 11) Careless Internet surfing is _________ and is an _________ mistake. a) a human error; intentional b) a human error; unintentional c) social engineering; intentional d) social engineering; unintentional Answer: b Difficulty: Easy Section Reference 1: 4.2 Learning Objective 1: Compare and contrast human mistakes and social engineering, and provide a specific example of each one. Bloomcode: Knowledge Standard 1: AACSB || Technology

12) You leave your laptop at your desk while you go to the restroom. This is _________ and is an _________ mistake. a) a human error; intentional b) a human error; unintentional c) social engineering; intentional d) social engineering; unintentional Answer: b Difficulty: Medium Section Reference 1: 4.2 Learning Objective 1: Compare and contrast human mistakes and social engineering, and provide a specific example of each one. Bloomcode: Application Standard 1: AACSB || Technology 13) You lose the company’s USB with your sales spreadsheets on it. This is _________ and is an _________ mistake. a) a human error; intentional b) a human error; unintentional c) social engineering; intentional d) social engineering; unintentional

Answer: b Difficulty: Medium Section Reference 1: 4.2 Learning Objective 1: Compare and contrast human mistakes and social engineering, and provide a specific example of each one. Bloomcode: Application Standard 1: AACSB || Technology

14) You open an e-mail from your friend that looks a little odd, but you figure your friend would never send you anything bad. This is _________ and is an _________ mistake. a) a human error; intentional b) a human error; unintentional c) social engineering; intentional d) social engineering; unintentional Answer: b Difficulty: Medium Section Reference 1: 4.2 Learning Objective 1: Compare and contrast human mistakes and social engineering, and provide a specific example of each one. Bloomcode: Application Standard 1: AACSB || Technology 15) You don’t lock your computer when you go to the restroom. This is _________ and is an _________ mistake. a) a human error; intentional b) a human error; unintentional c) social engineering; intentional d) social engineering; unintentional Answer: b Difficulty: Medium Section Reference 1: 4.2 Learning Objective 1: Compare and contrast human mistakes and social engineering, and provide a specific example of each one. Bloomcode: Application Standard 1: AACSB || Technology

16) Carelessness using unmanaged devices is _________ and is an _________ mistake. a) a human error; intentional b) a human error; unintentional c) social engineering; intentional d) social engineering; unintentional Answer: b Difficulty: Easy Section Reference 1: 4.2 Learning Objective 1: Compare and contrast human mistakes and social engineering, and provide a specific example of each one. Bloomcode: Knowledge Standard 1: AACSB || Technology 17) You get a new smartphone and throw your old one away without erasing all your data. This is _________ and is an _________ mistake. a) a human error; intentional b) a human error; unintentional c) social engineering; intentional d) social engineering; unintentional Answer: b Difficulty: Medium Section Reference 1: 4.2 Learning Objective 1: Compare and contrast human mistakes and social engineering, and provide a specific example of each one. Bloomcode: Application Standard 1: AACSB || Technology

18) You never wipe the dust off your computer. This is _________ and is an _________ mistake. a) a human error; intentional b) a human error; unintentional c) social engineering; intentional d) social engineering; unintentional Answer: b Difficulty: Medium Section Reference 1: 4.2

Learning Objective 1: Compare and contrast human mistakes and social engineering, and provide a specific example of each one. Bloomcode: Application Standard 1: AACSB || Technology

19) _________ is an attack in which the perpetrator uses social skills to trick or manipulate legitimate employees into providing confidential company information such as passwords. a) Espionage b) Malware c) Profiling d) Social engineering Answer: d Difficulty: Easy Section Reference 1: 4.2 Learning Objective 1: Compare and contrast human mistakes and social engineering, and provide a specific example of each one. Bloomcode: Knowledge Standard 1: AACSB || Technology 20) You are a nice person, so you hold the door open for the person running in behind you. Since you needed to use your ID badge to open the door, the person running in behind you is __________; this is _________. a) shoulder surfing; a good way to show kindness that causes no harm b) shoulder surfing; an unintentional threat to your organization c) tailgating; a good way to show kindness that causes no harm d) tailgating; an unintentional threat to your organization Answer: d Difficulty: Easy Section Reference 1: 4.2 Learning Objective 1: Compare and contrast human mistakes and social engineering, and provide a specific example of each one. Bloomcode: Knowledge Standard 1: AACSB || Technology 21) _________ is an unintentional threat. a) Espionage

b) Identity theft c) Social engineering d) Software attacks Answer: c Difficulty: Easy Section Reference 1: 4.2 Learning Objective 1: Compare and contrast human mistakes and social engineering, and provide a specific example of each one. Bloomcode: Knowledge Standard 1: AACSB || Technology 22) _________ occurs when an unauthorized individual attempts to gain illegal access to organizational information. a) Alien software b) Espionage c) Identity theft d) Information extortion Answer: b Difficulty: Easy Section Reference 1: 4.3 Learning Objective 1: Discuss the 10 types of deliberate attacks. Bloomcode: Knowledge Standard 1: AACSB || Technology

23) _________ occur(s) when an attacker either threatens to steal, or actually steals, information from a company and then demands payment for not carrying out a particular act. a) Alien software b) Espionage c) Information extortion d) SCADA attacks Answer: c Difficulty: Medium Section Reference 1: 4.3 Learning Objective 1: Discuss the 10 types of deliberate attacks. Bloomcode: Knowledge Standard 1: AACSB || Technology

24) _________ is a deliberate act that involves defacing an organization’s website, potentially damaging the organization’s image and causing its customers to lose faith. a) Espionage b) Sabotage c) SCADA attacks d) Software attacks Answer: b Difficulty: Easy Section Reference 1: 4.3 Learning Objective 1: Discuss the 10 types of deliberate attacks. Bloomcode: Knowledge Standard 1: AACSB || Technology 25) If humans are careless with laptops, this is an _________ error which could cause theft of equipment or information (an _________ error) . a) intentional; intentional b) intentional; unintentional c) unintentional; intentional d) unintentional; unintentional Answer: c Difficulty: Easy Section Reference 1: 4.3 Learning Objective 1: Discuss the 10 types of deliberate attacks. Bloomcode: Knowledge Standard 1: AACSB || Technology

26) Intellectual property is NOT protected under _________ laws. a) copyright b) patent c) privacy d) trade secret Answer: c Difficulty: Medium

Section Reference 1: 4.3 Learning Objective 1: Discuss the 10 types of deliberate attacks. Bloomcode: Knowledge Standard 1: AACSB || Technology

27) A _________ is an intellectual work that is not based on public information. a) copyright b) patent c) trade secret d) trademark Answer: c Difficulty: Easy Section Reference 1: 4.3 Learning Objective 1: Discuss the 10 types of deliberate attacks. Bloomcode: Knowledge Standard 1: AACSB || Technology 28) A _________ is an official document that grants the holder exclusive rights on an invention or a process for a specified period of time. a) copyright b) patent c) trade secret d) trademark Answer: b Difficulty: Easy Section Reference 1: 4.3 Learning Objective 1: Discuss the 10 types of deliberate attacks. Bloomcode: Knowledge Standard 1: AACSB || Technology 29) A _________ is a statutory grant that provides the creators or owners of intellectual property with ownership of the property for a designated period. a) copyright b) patent c) trade secret d) trademark

Answer: a Difficulty: Easy Section Reference 1: 4.3 Learning Objective 1: Discuss the 10 types of deliberate attacks. Bloomcode: Knowledge Standard 1: AACSB || Technology

30) Current US laws award patents for _________ years and copyright protection for _________ years. a) 20; 20 b) 20; life+70 c) life+70; 20 d) life+70; life+70 Answer: b Difficulty: Easy Section Reference 1: 4.3 Learning Objective 1: Discuss the 10 types of deliberate attacks. Bloomcode: Knowledge Standard 1: AACSB || Technology 31) You purchased a copy of Microsoft Office and give a copy to a friend so he/she doesn’t have to buy it too. This is _________ and is _________. a) piracy; legal b) piracy; illegal c) social engineering; legal d) social engineering; illegal Answer: b Difficulty: Easy Section Reference 1: 4.3 Learning Objective 1: Discuss the 10 types of deliberate attacks. Bloomcode: Knowledge Standard 1: AACSB || Technology 32) Piracy costs businesses _________ of dollars per year.

a) hundreds b) millions c) billions d) trillions Answer: c Difficulty: Hard Section Reference 1: 4.3 Learning Objective 1: Discuss the 10 types of deliberate attacks. Bloomcode: Knowledge Standard 1: AACSB || Technology 33) _________ is a remote attack requiring user action. a) DoS b) A logic bomb c) A Trojan horse d) Virus Answer: d Difficulty: Easy Section Reference 1: 4.3 Learning Objective 1: Discuss the 10 types of deliberate attacks. Bloomcode: Knowledge Standard 1: AACSB || Technology

34) _________ is a remote attack requiring no user action. a) DoS b) A logic bomb c) A Trojan horse d) Virus Answer: a Difficulty: Easy Section Reference 1: 4.3 Learning Objective 1: Discuss the 10 types of deliberate attacks. Bloomcode: Knowledge Standard 1: AACSB || Technology

35) _________ is an attack by a programmer developing a system. a) DoS b) A phishing attack c) A Trojan horse d) Virus Answer: c Difficulty: Easy Section Reference 1: 4.3 Learning Objective 1: Discuss the 10 types of deliberate attacks. Bloomcode: Knowledge Standard 1: AACSB || Technology

36) Hackers would use a botnet to perform a _________. a) DDoS b) a logic bomb c) a Trojan horse d) virus Answer: a Difficulty: Medium Section Reference 1: 4.3 Learning Objective 1: Discuss the 10 types of deliberate attacks. Bloomcode: Knowledge Standard 1: AACSB || Technology 37) _________ causes pop-up advertisements to appear on your screen. a) Adware b) Marketware c) Spamware d) Spyware Answer: a Difficulty: Easy Section Reference 1: 4.3 Learning Objective 1: Discuss the 10 types of deliberate attacks. Bloomcode: Knowledge Standard 1: AACSB || Technology

38) _________ collects personal information about users without their consent. a) Adware b) Marketware c) Spamware d) Spyware Answer: d Difficulty: Easy Section Reference 1: 4.3 Learning Objective 1: Discuss the 10 types of deliberate attacks. Bloomcode: Knowledge Standard 1: AACSB || Technology 39) Keystroke loggers and screen scrapers are examples of _________. a) adware b) marketware c) spamware d) spyware Answer: d Difficulty: Easy Section Reference 1: 4.3 Learning Objective 1: Discuss the 10 types of deliberate attacks. Bloomcode: Knowledge Standard 1: AACSB || Technology 40) _________ is pestware that users your computer as a launch pad for unsolicited e-mail, usually advertising for products and services. a) Adware b) Marketware c) Spamware d) Spyware Answer: c Difficulty: Easy Section Reference 1: 4.3

Learning Objective 1: Discuss the 10 types of deliberate attacks. Bloomcode: Knowledge Standard 1: AACSB || Technology

41) Spam costs US companies _________ of dollars per year. a) hundreds b) millions c) billions d) trillions Answer: c Difficulty: Hard Section Reference 1: 4.3 Learning Objective 1: Discuss the 10 types of deliberate attacks. Bloomcode: Knowledge Standard 1: AACSB || Technology

42) If a hacker takes control of equipment such as power grids or nuclear power plants, this is an example of a(n) _________ attack. a) alien software b) espionage c) SCADA d) virus Answer: c Difficulty: Easy Section Reference 1: 4.3 Learning Objective 1: Discuss the 10 types of deliberate attacks. Bloomcode: Knowledge Standard 1: AACSB || Technology 43) _________ refers to malicious acts in which attackers use a target’s computer systems to cause physical, real-world harm or severe disruption, often to carry out a political agenda. a) A SCADA attack b) Cyberterrorism c) Espionage d) Identity theft

Answer: b Difficulty: Easy Section Reference 1: 4.3 Learning Objective 1: Discuss the 10 types of deliberate attacks. Bloomcode: Knowledge Standard 1: AACSB || Technology 44) The U.S. government considers the Sony hack _________. a) a SCADA attack b) cyberterrorism c) espionage d) identity theft Answer: b Difficulty: Hard Section Reference 1: 4.3 Learning Objective 1: Discuss the 10 types of deliberate attacks. Bloomcode: Knowledge Standard 1: AACSB || Technology

45) Whaling attack is a targeted attempt to ____________ a) Bring down a company’s server b) Steal sensitive information from a company such as financial data or personal details about employees c) Break encryption keys d) Perform SQL injection attacks on a server Answer: B Difficulty: Easy Section Reference 1: IT’s About Business 4.1 Learning Objective 1: Discuss the 10 types of deliberate attacks. Bloomcode: Knowledge Standard 1: AACSB || Technology 46) The DarkHotel Group has continually evolved its tactics and has integrated whaling and social engineering techniques into its malware in order to_______ ,_____________.

a) Conduct espionage on corporate research and development. . b) To advertise products with its malware. c) Sell private data to companies for marketing purposes d) Identify your search engine searches for Google ads targeting. . Answer: A Difficulty: Easy Section Reference 1: IT’s About Business 4.1 Learning Objective 1: Discuss the 10 types of deliberate attacks. Bloomcode: Comprehension Standard 1: AACSB || Technology

47) A ______ attack is a targeted attempt to steal sensitive information from a company, such as financial data or personal details about employees. a) Phishing b) Spear-phishing c) Spear-whaling d) Whaling Answer: D Difficulty: Easy Section Reference 1: IT’s About Business 4.1 Learning Objective 1: Discuss the 10 types of deliberate attacks. Bloomcode: Knowledge Standard 1: AACSB || Technology 48) The goal of whaling is to trick a(n) _______ into revealing personal or corporate data. a) executive b) factory worker c) janitor d) salesperson Answer: A Difficulty: Easy Section Reference 1: IT’s About Business 4.1 Learning Objective 1: Discuss the 10 types of deliberate attacks. Bloomcode: Knowledge Standard 1: AACSB || Technology

49) The entire basis of a whaling attack ...


Similar Free PDFs