Like this study set? Create a free account to save it.

Sign up for an account

Already have a Quizlet account? .

Create an account

You have been hired as a security consultant for a legal firm. Which of the following
constitutes the greatest threat, in terms of security, to the firm?


Based on your reading of the CardSystem's security breach and the text, what category
of malware was used on CardSystem's network?

Trojan horse

A digital certificate system:

uses third-party CAs to validate a user's identity.

In this method of encryption, a single encryption key is sent to the receiver so both
sender and receiver share the same key.

Symmetric key encryption

Currently, the protocols used for secure information transfer over the Internet are:


Most antivirus software is effective against:

only those viruses already known when the software is written.

________ use scanning software to look for known problems such as bad passwords,
the removal of important files, security attacks in progress, and system administration

Intrusion detection systems

In this technique, network communications are analyzed to see whether packets are part
of an ongoing dialogue between a sender and a receiver:

Stateful inspection

The text's discussion of the security enhancements of Monsanto Co and Clarion Health
Partners illustrates which of the following drawbacks to using passwords for

Poor password systems are a costly and insecure procedure.

A firewall allows the organization to:

enforce a security policy on traffic between its network and the Internet.

Biometric authentication:

can use a person's face as a unique, measurable trait.

A token is a:

gadget that displays passcodes

Rigorous password systems:

may hinder employee productivity.

An MIS audit must be conducted by someone who:

Has a thorough understanding of the entire system to be audited

Smaller firms can outsource security functions to:


Methods to make computer systems recover more quickly after mishaps is called:

Recovery oriented computing.

High-availability computing:

Helps firms recover quickly from a crash.

Online transaction processing requires:

fault-tolerant computer systems.

Downtime refers to:

periods of time in which a computer system is not operational.

A CSO is a:

chief security officer.

An analysis of the firm's most critical systems and the impact a system's outage would
have on the business is included in a(n):

business impact analysis.

Statements ranking information risks are included in a(n):

Security policy.

Analysis of an information system that rates the likelihood of a security incident
occurring and its cost is included in a(n):

Risk assessment

Electronic evidence on computer storage media that is not visible to the average user is

Ambient data.

What is the key issue in information systems security and control?

Intelligent management policies

The most common type of electronic evidence is:


The Gramm-Leach-Bliley Act:

Requires financial institutions to ensure the security of customer data.

The Sarbanes-Oxley Act:

Imposes responsibility on financial information.

ISO 17799:

Specifies best practices in information systems security and control.

The HIPAA act of 1996

Outlines medical security and privacy rules.

Policies, procedures, and tools for managing the retention, destruction, and storage of
electronic records is called:


How do software vendors correct flaws in their software after it has been distributed?

Issue patches.

Tricking employees to reveal their passwords by pretending to be a legitimate member of

Social engineering.

Spamming is an example of:

Computer abuse.

Evil twins are

Bogus wireless networks that look legitimate to users.

Pharming involves:

Redirecting users to a fraudulent Web site even when the user has typed in the
correct address in the Web browser

Phishing involves:

Setting up fake Web sites to ask users for confidential information.

Phishing is a form of :


Which of the following is NOT an example of a computer used as a target of crime?

Illegally accessing stored electronic communication.

In your reading of the text's discussion of the experiences of Jersey Joe, Akamai, and
Protx Ltd, what is the greatest protection against bot attacks?

Having individuals use adequate anti-virus protection

The approach taken by Akamai Technologies when it discovered its servers were under
attack illustrates that:

Enforcing security is a complex endeavor that involves multiple approaches.

How do hackers create a botnet?

Infecting corporate servers with "zombie" Trojan horses that allow undetected access
through a back door.

In 2004, ICQ users were enticed by a sales message from a supposed anti-virus vendor.
On the vendor's site, a small program called Mitglieder was downloaded to the user's
machine. The program enabled outsiders to infiltrate the user's machine. What type of
malware is this an example of?

Trojan horse

A key logger is a type of:


Redirecting a Web link to a different address is a form of :


Using numerous computers to inundate and overwhelm the network from numerous
launch points is called a:


Sobig.F and Netsky.P are:

"Worm" type viruses that arrive attached to e-mail and spread from computer to

An independent computer program that copies itself from one computer to another over a
network is called a:


What software vulnerability does Wi-Fi present?

Use of the SSID as a password

The main security problem on the Internet is:


Computers linked to the Internet are more vulnerable if they are linked through:

a cable modem and a DSL line

The Internet poses specific security problems because:

It was designed to be easily accessible.

Security challenges specifically faced by network servers include:

Theft and fraud

Security challenges posed by the communications between layers in a client/server
environment are:

Tapping, sniffing, message alteration

All of the methods, policies, and organizational procedures that ensure the safety of the
organization's assets, the accuracy and reliability of its accounting records, and
operational adherence to management standards refers to:


Large amounts of data stored in electronic form are _____________ than the same data
in manual form.

Vulnerable to many more kinds of threats

Automated data are more susceptible to destruction, fraud, error, and misuse because
information systems concentrate data in computer files that:

Have the potential to be accessed by large numbers of people and by groups outside of
the organization.

Policies, procedures, and technical measures used to prevent unauthorized access,
alternation, theft, or physical damage to information systems refers to:


What is the most far-reaching effect of identity theft?

Lowering of revenues and profits due to public mistrust of e-commerce safety.

The fact that phishing is growing at an explosive rate indicates what?

The increasing use of the Internet for e-commerce is a factor in drafrom larger numbers of criminals.

Which type of network would be most appropriate for a business that comprised three
employees and a manager located in the same office space, whose primary need is to
share documents?

Peer-to-peer network

What is a business value of RSS?

Lowers costs and improves efficiency by minimizing Internet access

What is the business value of an intelligent agent shopping bot?

Product differentiation

The need in some cases for employees to have access to sexually explicit material on the
Internet, such as medical researchers, suggests that:

Companies need to base their Internet use policies on the needs of the organization
and culture.

Based on your reading of the examples in the chapter, what would be the best use of
RFID for a business?

Supply chain management

Which technologies are helping Transalta maintain its equipment?

RFID and wireless technology

RFID tag costs are currently:

About 19 cents

Automated toll-collection systems use these types of RFID tags:

High frequency

In a RFID system, a(n) ____________________ is electronically programmed with
information that can uniquely identify an item, such as an electronic code.


EV-DO provides wireless access to the Internet over a cellular network at an average
speed of:

300 - 500 Kbps.

The WiMax standard can transmit up to a distance of:

31 miles.

The IEEE standard for the WiMax is:

IEEE 802.16.

One or more access points positioned on a ceiling, wall, or other strategic spot in a public
place to provide maximum wireless coverage for a specific area are referred to as:


Why are products built for 802.11b and 802.11g compatible?

They use the same frequency band

Each access point and its wireless devices are known as a:


A Wi-Fi system can operate in two different modes. Ad-hoc mode is also known as:

Peer-to-peer mode.

The Wi-Fi 802.11b standard can transmit up to:

Can transmit up to 11 Mbps in the unlicensed 2.4-GHz band and has an effective
distance of 30 to 50 meters.

The Wi-Fi 802.11a standard can transmit up to:

54 Mbps in the unlicensed 5-GHz frequency range

Bluetooth can be used to link up to __________________ devices within a 10-meter area
using low-power, radio-based communication.


Bluetooth is the popular name for this IEEE standard:

IEEE 802.15.

To deliver Internet content, I-mode uses:

Compact HTML

The most appropriate wireless networking standard for creating PANs is:


Which cellular network has enough transmission capacity for video, graphics, and other
rich media in addition to voice?

3G networks


Transmits over several frequencies

Wireless cellular phone systems are entering this generation of networks:



Is an encrypted private network configured within the public Internet

For corporations, one of the drawbacks to the worldwide explosion of e-mail use is:

Too much bandwidth used by e-mails

Which technology uses the Internet protocol to deliver voice information in digital form
using packet-switching?


A network that links a business with its customers, suppliers, and other business partners
is called:


To keep internal data secure, a company employing an extranet must be sure to put a(n)
_________________ in place.


Instant messaging is a type of:

chat service.

The paid sponsored links delivered with search results is a form of:

search engine marketing.

What technology allows people to have content pulled from Web sites and fed
automatically to their computers?


The open-source Web server that controls 70 percent of the market is:

Apache HTTP server

Together, a protocol prefix, a domain name, a directory path, and a document name, are
called a:

Uniform resource locator

Web browser software requests Web pages from the Internet using which protocol?


The Internet is based on client/server technology in which:

All the data resides on servers

Which of the following services enables logging on to one computer system and working
on another?


The IPv6 is being developed in order to:

Create more IP addresses

Which of the following services enables discussion groups on electronic bulletin boards?

Usenet newsgroups

Which organization helps define the overall structure of the Internet


The child domain of the root is the:

Top-level domain

In the domain name "", what are the root, top-level, second-level, and third-level domains, respectively?

".", com, blogging, myspace

What service converts IP addresses into more recognizable alphanumeric names?


Which protocol is the Internet based on?


T lines:

are very-high-speed data lines typically leased from long-distance telephone


integrates voice, data, image, and video services.

Digital subscriber lines:

Operate over existing telephone lines to carry voice, data, and video

The most common Ethernet topology is:


Which transmission technology parcels information into fixed 53-byte cells?


In the domain network model:

a dedicated server manages the network computers.

The most common LAN operating systems are:

Windows, Linux, and Novell

A bus network:

Links a number of computers by a single circuit with all messages broadcast to the
entire network.

A peer-to-peer network architecture:

Gives equal power to all computers on the network and is used primarily in small

A network that covers a large geographic area is most commonly referred to as a(n):

Wide area network.

A network that spans a city, and sometimes its major suburbs as well, is an example of a:



Connects computers and peripheral devices located close to each other, often in the
same building.

In a bus network:

Signals are broadcast in both directions to the entire network

All network components connect to a single hub in a:

Star network

Which type of network treats all processors equally, and allows peripheral devices to be
shared without going to a separate server?


TCP/IP stands for:

transmission Control Protocol/Internet Protocol.

Which type of network is used to connect digital devices within a half-mile or 500-meter


The total amount of digital information that can be telecommunications medium is measured in:


Bandwidth is:

the difference between the highest and lowest frequencies that can be accommodated
on a single channel.

_____________ work by using radio waves to communicate with radio antennas placed
within adjacent geographic areas

Cell phones

The difference between the highest and lowest frequencies that can be accommodated on
a single channel is called its:


What type of transmission technology is used in relay stations for terrestrial microwave


Which type of signals follow a straight line and do not bend with the curve of the Earth?


Which type of network can transmit all types of traffic-voice, data, and video-over fiber
cables and provide the massive bandwidth for new types of services and software?


Multiplexing can be defined as a:

technology that enables a single communications channel to carry data transmissions
from multiple sources simultaneously.

BP Amoco uses __________________ for real-time data transfer of oil field exploration
data gathered from searches of the ocean floor.


Which technology will enable communications service providers to add transmission
capacity to an existing fiber-optic network without having to lay more fiber-optic cable?


To use an analog telephone system for sending digital data, you must use:

A modem

Data is sent through the fiber-optic cable by a:

Laser device

These signals are represented by a continuous waveform:


The part of a network that handles the major traffic is:


A communications medium that uses one or more copper wires surrounded by thick
insulation is:

Coaxial cable

This is the simplest and slowest type of telecommunications media:


In a telecommunications network architecture, a protocol is:

A standard set of rules and procedures for control of communications in a network.
c. A communications service for microcomputer users.

In TCP/IP, IP is responsible for:

Disassembling and reassembling of packets during transmission

The four layers of the TCP/IP reference model are:

Application layer, transport layer, Internet layer, network interface layer

Which of the following is NOT a characteristic of packet switching?

Requires dedicated circuits

The telephone system is an example of a:

Circuit-switched network

The method of slicing digital messages into parcels, transmitting them along different
communication paths, and reassembling them at their destinations is called:

Packet switching

The Internet is based on the following three key technologies

Client/server computing, packet switching, and the development of widely used
communications standards for linking networks and computers.

The most important communication standard today for linking disparate computers and
networks is:

Transmission Control Protocol/Internet Protocol (TCP/IP).

Which device connects multiple computers in a network?

Network hub

A device that acts as a connection point between computers and can filter and forward
data to a specified destination is called a:


A computer on a network that performs important network functions for client
computers, such as serving up Web pages, storing data, and storing the network
operating system, is called a:

Server computer

See more

Please allow access to your computer’s microphone to use Voice Recording.

Having trouble? Click here for help.

We can’t access your microphone!

Click the icon above to update your browser permissions and try again


Reload the page to try again!


Press Cmd-0 to reset your zoom

Press Ctrl-0 to reset your zoom

It looks like your browser might be zoomed in or out. Your browser needs to be zoomed to a normal size to record audio.

Please upgrade Flash or install Chrome
to use Voice Recording.

For more help, see our troubleshooting page.

Your microphone is muted

For help fixing this issue, see this FAQ.

Star this term

You can study starred terms together

Voice Recording