1) Which of the following refers to policies, procedures, and technical measures used to prevent
unauthorized access, alteration, theft, or physical damage to information systems?
A) Security
B) Controls
C) Benchmark
...
1) Which of the following refers to policies, procedures, and technical measures used to prevent
unauthorized access, alteration, theft, or physical damage to information systems?
A) Security
B) Controls
C) Benchmarking
D) Algorithms
E) Identity management
Answer: A
Difficulty: Moderate
AACSB: Application of knowledge
LO: 8-1: Why are information systems vulnerable to destruction, error, and abuse?
2) Which of the following refers to all of the methods, policies, and organizational procedures
that ensure the safety of the organization's assets, the accuracy and reliability of its accounting
records, and operational adherence to management standards?
A) Legacy systems
B) SSID standards
C) Vulnerabilities
D) Security policy
E) Controls
Answer: E
Difficulty: Moderate
AACSB: Application of knowledge
LO: 8-1: Why are information systems vulnerable to destruction, error, and abuse?
3) Most computer viruses deliver a:
A) worm.
B) Trojan horse.
C) driveby download.
D) keylogger.
E) payload.
Answer: E
Difficulty: Easy
AACSB: Application of knowledge
LO: 8-1: Why are information systems vulnerable to destruction, error, and abuse?
1
4) Which of the following statements about wireless security is not true?
A) SSIDs are broadcast multiple times and can be picked up fairly easily by sniffer programs.
B) Radio frequency bands are easy to scan.
C) An intruder who has associated with an access point by using the correct SSID is capable of
accessing other resources on the network.
D) Intruders can force a user's NIC to associate with a rogue access point.
E) Bluetooth is the only wireless technology that is not susceptible to hacking by
eavesdroppers.
Answer: E
Difficulty: Challenging
AACSB: Application of knowledge
LO: 8-1: Why are information systems vulnerable to destruction, error, and abuse?
5) All of the following are specific security challenges that threaten the communications lines
in a client/server environment except:
A) errors.
B) tapping.
C) theft and fraud.
D) radiation.
E) sniffing.
Answer: A
Difficulty: Challenging
AACSB: Analytical thinking
LO: 8-1: Why are information systems vulnerable to destruction, error, and abuse?
6) All of the following are specific security challenges that threaten corporate servers in a
client/server environment except:
A) hacking.
B) malware.
C) denial-of-service attacks.
D) sniffing.
E) vandalism.
Answer: D
Difficulty: Challenging
AACSB: Analytical thinking
LO: 8-1: Why are information systems vulnerable to destruction, error, and abuse?
2
7) All of the following are specific security challenges that threaten corporate systems in a
client/server environment except:
A) theft of data.
B) copying of data.
C) alteration of data.
D) radiation.
E) hardware failure.
Answer: D
Difficulty: Challenging
AACSB: Analytical thinking
LO: 8-1: Why are information systems vulnerable to destruction, error, and abuse?
8) CryptoLocker is an example of which of the following?
A) Worm
B) SQL injection attack
C) Sniffer
D) Evil twin
E) Ransomware
Answer: E
Difficulty: Easy
AACSB: Analytical thinking
LO: 8-1: Why are information systems vulnerable to destruction, error, and abuse?
9) Which of the following statements about Internet security is not true?
A) The use of P2P networks can expose a corporate computer to outsiders.
B) A corporate network without access to the Internet is more secure than one that provides
access.
C) VoIP is more secure than the switched voice network.
D) Instant messaging can provide hackers access to an otherwise secure network.
E) Smartphones have the same security weaknesses as other Internet devices.
Answer: C
Difficulty: Challenging
AACSB: Analytical thinking
LO: 8-1: Why are information systems vulnerable to destruction, error, and abuse?
10) A Trojan horse:
A) is software that appears to be benign but does something other than expected.
B) is a virus that replicates quickly.
C) is malware named for a breed of fast-moving Near-Eastern horses.
D) installs spyware on users' computers.
E) is a type of sniffer used to infiltrate corporate networks.
Answer: A
Difficulty: Easy
AACSB: Information technology
LO: 8-1: Why are information systems vulnerable to destruction, error, and abuse?
3
11) A salesperson clicks repeatedly on the online ads of a competitor in order to drive the
competitor's advertising costs up. This is an example of:
A) phishing.
B) pharming.
C) spoofing.
D) evil twins.
E) click fraud.
Answer: E
Difficulty: Moderate
AACSB: Analytical thinking
LO: 8-1: Why are information systems vulnerable to destruction, error, and abuse?
12) Which of the following is a virus that uses flaws in Windows software to take over a
computer remotely?
A) Sasser
B) Zeus
C) Cryptolocker
D) ILOVEYOU
E) Conficker
Answer: E
Difficulty: Challenging
AACSB: Application of knowledge
LO: 8-1: Why are information systems vulnerable to destruction, error, and abuse?
13) ________ is malware that hijacks a user's computer and demands payment in return for
giving back access.
A) A Trojan horse
B) Ransomware
C) Spyware
D) A virus
E) An evil twin
Answer: B
Difficulty: Moderate
AACSB: Application of knowledge
LO: 8-1: Why are information systems vulnerable to destruction, error, and abuse?
14) ________ is malware that logs and transmits everything a user types.
A) Spyware
B) A Trojan horse
C) A keylogger
D) A worm
E) A sniffer
Answer: C
Difficulty: Easy
AACSB: Application of knowledge
LO: 8-1: Why are information systems vulnerable to destruction, error, and abuse?
15) Which of the following statements about botnets is not true?
4
A) Eighty percent of the world's malware is delivered by botnets.
B) Botnets are often used to perpetrate DDoS attacks.
C) Ninety percent of the world's spam is delivered by botnets.
D) Botnets are often used for click fraud.
E) It is not possible to make a smartphone part of a botnet.
Answer: E
Difficulty: Challenging
AACSB: Information technology
LO: 8-1: Why are information systems vulnerable to destruction, error, and abuse?
16) Using numerous computers to inundate and overwhelm the network from numerous launch
points is called a(n) ________ attack.
A) DDoS
B) DoS
C) SQL injection
D) phishing
E) botnet
Answer: A
Difficulty: Moderate
AACSB: Information technology
LO: 8-1: Why are information systems vulnerable to destruction, error, and abuse?
17) Which of the following is not an example of a computer used as a target of crime?
A) Knowingly accessing a protected computer to commit fraud
B) Accessing a computer system without authority
C) Illegally accessing stored electronic communication
D) Threatening to cause damage to a protected computer
E) Breaching the confidentiality of protected computerized data
Answer: C
Difficulty: Moderate
AACSB: Analytical thinking
LO: 8-1: Why are information systems vulnerable to destruction, error, and abuse?
18) Which of the following is not an example of a computer used as an instrument of crime?
A) Theft of trade secrets
B) Intentionally attempting to intercept electronic communication
C) Unauthorized copying of software
D) Breaching the confidentiality of protected computerized data
E) Schemes to defraud
Answer: D
Difficulty: Challenging
AACSB: Analytical thinking
LO: 8-1: Why are information systems vulnerable to destruction, error, and abuse?
5
19) Which of the following specifically makes malware distribution and hacker attacks to
disable websites a federal crime?
A) Computer Fraud and Abuse Act
B) Economic Espionage Act
C) Electronic Communications Privacy Act
D) Data Security and Breach Notification Act
E) National Information Infrastructure Protection Act
Answer: E
Difficulty: Moderate
AACSB: Application of knowledge
LO: 8-1: Why are information systems vulnerable to destruction, error, and abuse?
20) The intentional defacement or destruction of a website is called:
A) spoofing.
B) cybervandalism.
C) cyberwarfare.
D) phishing.
E) pharming.
Answer: B
Difficulty: Moderate
AACSB: Application of knowledge
LO: 8-1: Why are information systems vulnerable to destruction, error, and abuse?
21) Evil twins are:
A) Trojan horses that appears to the user to be a legitimate commercial software application.
B) e-mail messages that mimic the e-mail messages of a legitimate business.
C) fraudulent websites that mimic a legitimate business's website.
D) computers that fraudulently access a website or network using the IP address and
identification of an authorized computer.
E) bogus wireless network access points that look legitimate to users.
Answer: E
Difficulty: Easy
AACSB: Application of knowledge
LO: 8-1: Why are information systems vulnerable to destruction, error, and abuse?
22) Pharming involves:
A) redirecting users to a fraudulent website even when the user has typed in the correct address
in the web browser.
B) pretending to be a legitimate business's representative in order to garner information about a
security system.
C) setting up fake website to ask users for confidential information.
D) using e-mails for threats or harassment.
E) setting up fake Wi-Fi access points that look as if they are legitimate public networks.
Answer: A
Difficulty: Moderate
AACSB: Application of knowledge
LO: 8-1: Why are information systems vulnerable to destruction, error, and abuse?
6
23) Which of the following is the single greatest cause of network security breaches?
A) Viruses
B) User lack of knowledge
C) Trojan horses
D) Cyberwarfare
E) Bugs
Answer: B
Difficulty: Moderate
AACSB: Analytical thinking
LO: 8-1: Why are information systems vulnerable to destruction, error, and abuse?
24) Tricking employees into revealing their passwords by pretending to be a legitimate member
of a company is called:
A) sniffing.
B) social engineering.
C) phishing.
D) pharming.
E) snooping
Answer: B
Difficulty: Easy
AACSB: Application of knowledge
LO: 8-1: Why are information systems vulnerable to destruction, error, and abuse?
25) According to Ponemon Institute's 2015 Annual Cost of Cyber Crime Study, the average
annualized cost of cybercrime for companies in the United States was approximately:
A) $1.5 million.
B) $15 million.
C) $150 million.
D) $1.5 billion.
E) $15 billion.
Answer: B
Difficulty: Moderate
AACSB: Application of knowledge
LO: 8-1: Why are information systems vulnerable to destruction, error, and abuse?
26) Which of the following refers to eavesdroppers driving by buildings or parking outside and
trying to intercept wireless network traffic?
A) War driving
B) Sniffing
C) Cybervandalism
D) Drive-by tapping
E) Snooping
Answer: A
Difficulty: Moderate
AACSB: Application of knowledge
LO: 8-1: Why are information systems vulnerable to destruction, error, and abuse?
27) ________ is a crime in which an imposter obtains key pieces of personal information to
7
impersonate someone else.
A) Identity theft
B) Spoofing
C) Social engineering
D) Evil twins
E) Pharming
Answer: A
Difficulty: Easy
AACSB: Application of knowledge
LO: 8-1: Why are information systems vulnerable to destruction, error, and abuse?
28) ________ identify the access points in a Wi-Fi network.
A) NICs
B) Mac addresses
C) URLs
D) UTMs
E) SSIDs
Answer: E
Difficulty: Challenging
AACSB: Information technology
LO: 8-1: Why are information systems vulnerable to destruction, error, and abuse?
29) A foreign country attempting to access government networks in order to disable a national
power grid is an example of:
A) phishing.
B) denial-of-service attacks.
C) cyberwarfare.
D) cyberterrorism.
E) evil twins.
Answer: C
Difficulty: Moderate
AACSB: Application of knowledge
LO: 8-1: Why are information systems vulnerable to destruction, error, and abuse?
30) According to the 2016 Identity Fraud Study by Javelin Strategy & Research, how much did
consumers lose to identity fraud in 2015?
A) $1.5 million
B) $15 million
C) $150 million
D) $1.5 billion
E) $15 billion
Answer: E
Difficulty: Moderate
AACSB: Application of knowledge
LO: 8-1: Why are information systems vulnerable to destruction, er
[Show More]