版权说明:本文档由用户提供并上传,收益归属内容提供方,若内容存在侵权,请进行举报或认领
文档简介
1、管理信息系统(第7版)章节练习题及答案chapter extension 14管理信息系统(第7版)章节练习题及答案chapter extension 14 Copyright 2017 Pearson Education, Inc.管理信息系统(第7版)章节练习题及答案chapter extension 14Experiencing MIS, 7e (Kroenke)Chapter Extension 14 Data Breaches1) A student at the MSA University hacked into the universitys official Web site
2、 and stole some confidential information about the scholarship program. This incident is an example of _.A) a data breachB) asynchronous communicationC) key escrowD) a sequence flowAnswer: AAACSB: Reflective ThinkingDifficulty: 2: ModerateCourse LO: Discuss the ethical and social issues raised by th
3、e use of information systems.Learning Obj: LO 26.1: What is a data breach?Classification: Application2) Which of the following is a direct cost of handling a data breach?A) loss of reputationB) abnormal customer turnoverC) legal fees and consultationD) increased customer acquisition activitiesAnswer
4、: CAACSB: Information TechnologyDifficulty: 1: EasyCourse LO: Discuss the ethical and social issues raised by the use of information systems.Learning Obj: LO 26.1: What is a data breach?Classification: Concept3) Sam is a hacker who makes money by stealing and selling credit cards. He has targeted th
5、e employees of a local firm and is looking for details such as names, addresses, dates of birth, social security numbers, credit card numbers, or health records. In this case, Sam is looking for _.A) firewall security measuresB) business continuity plansC) malware definitionsD) personally identifiab
6、le informationAnswer: DAACSB: Reflective ThinkingDifficulty: 2: ModerateCourse LO: Discuss the ethical and social issues raised by the use of information systems.Learning Obj: LO 26.1: What is a data breach?Classification: Application4) _ refers to the process of placing a small charge on a credit c
7、ard to ensure it is working.A) HoardingB) CardingC) PhishingD) Credit card hijackingAnswer: BAACSB: Information TechnologyDifficulty: 1: EasyCourse LO: Discuss the ethical and social issues raised by the use of information systems.Learning Obj: LO 26.1: What is a data breach?Classification: Concept5
8、) Direct costs of handling a data breach do not include paying for detection of the breach.Answer: FALSEAACSB: Information TechnologyDifficulty: 1: EasyCourse LO: Discuss the ethical and social issues raised by the use of information systems.Learning Obj: LO 26.1: What is a data breach?Classificatio
9、n: Concept6) According to the reports in Ponemons 2014 Cost of Data Breach Study, organizations are more likely to lose larger amounts of data than smaller amounts of data.Answer: FALSEAACSB: Information TechnologyDifficulty: 1: EasyCourse LO: Discuss the ethical and social issues raised by the use
10、of information systems.Learning Obj: LO 26.1: What is a data breach?Classification: Concept7) Personally identifiable information includes a persons bank account numbers, personal identification numbers, email address, and social security numbers.Answer: TRUEAACSB: Information TechnologyDifficulty:
11、1: EasyCourse LO: Discuss the ethical and social issues raised by the use of information systems.Learning Obj: LO 26.1: What is a data breach?Classification: Concept8) Stolen credit card information is validated through a process called carding.Answer: TRUEAACSB: Information TechnologyDifficulty: 1:
12、 EasyCourse LO: Discuss the ethical and social issues raised by the use of information systems.Learning Obj: LO 26.1: What is a data breach?Classification: Concept9) Explain how hackers use information stolen from data breaches for credit card forgery.Answer: Over 67 percent of data breaches come fr
13、om hackers trying to make money. Hackers are primarily looking for personally identifiable information (PII), or data that can be used to identify a person. This includes names, addresses, dates of birth, social security numbers, credit card numbers, health records, bank account numbers, personal id
14、entification numbers, and email addresses. Stolen information is commonly used for credit card fraud. Stolen credit card information is validated through a process called carding, where a small charge is placed on the card to ensure it is working. Valid cards are then bundled and sold on the black m
15、arket. The price of stolen credit cards can run from $2 to $45 per card, depending on the type of account. Stolen data is commonly used for identity theft, extortion, and industrial espionage.AACSB: Information TechnologyDifficulty: 2: ModerateCourse LO: Discuss the ethical and social issues raised
16、by the use of information systems.Learning Obj: LO 26.1: What is a data breach?Classification: Concept10) The first step in protecting oneself from data breaches is _.A) securing credit and debit card detailsB) understanding how they happenC) learning the technologies used for these activitiesD) ins
17、talling necessary software to protect from possible breachesAnswer: BAACSB: Information TechnologyDifficulty: 2: ModerateCourse LO: Discuss the ethical and social issues raised by the use of information systems.Learning Obj: LO 26.2: How do data breaches happen?Classification: Concept11) Bob, a hack
18、er, encountered a vulnerability in a banks firewall when he was trying to hack into its Web site. Which of the following can Bob use to take advantage of this liability?A) exploitB) attack vectorC) cardingD) wardriverAnswer: AAACSB: Reflective ThinkingDifficulty: 2: ModerateCourse LO: Discuss the et
19、hical and social issues raised by the use of information systems.Learning Obj: LO 26.2: How do data breaches happen?Classification: Application12) A group of hackers use a targeted phishing attack to breach a companys firewalls and hack into its security system. Which of the following techniques hav
20、e the hackers used?A) pretextingB) IP spoofingC) spear phishingD) phone phishingAnswer: CAACSB: Information TechnologyDifficulty: 1: EasyCourse LO: Discuss the ethical and social issues raised by the use of information systems.Learning Obj: LO 26.2: How do data breaches happen?Classification: Concep
21、t13) A group of hackers decide to steal credit card details of the users of Swift Shopping Inc., a leading e-commerce company. They infect the security system of the companys third-party vendor and gain access into its internal network. They compromise an internal Windows server of the company and u
22、se a malware to extract customer data. Which of the following is illustrated in this scenario?A) hardeningB) cardingC) pretextingD) data breachingAnswer: DAACSB: Information TechnologyDifficulty: 2: ModerateCourse LO: Discuss the ethical and social issues raised by the use of information systems.Lea
23、rning Obj: LO 26.2: How do data breaches happen?Classification: Application14) Each type of data breach is different because hackers are continually developing new tools and techniques that enable them to steal more data.Answer: TRUEAACSB: Information TechnologyDifficulty: 1: EasyCourse LO: Discuss
24、the ethical and social issues raised by the use of information systems.Learning Obj: LO 26.2: How do data breaches happen?Classification: Concept15) Attack vectors refer to the ways hackers attack a target.Answer: TRUEAACSB: Information TechnologyDifficulty: 1: EasyCourse LO: Discuss the ethical and
25、 social issues raised by the use of information systems.Learning Obj: LO 26.2: How do data breaches happen?Classification: Concept16) An exploit is a type of attack vector used by hackers.Answer: TRUEAACSB: Information TechnologyDifficulty: 1: EasyCourse LO: Discuss the ethical and social issues rai
26、sed by the use of information systems.Learning Obj: LO 26.2: How do data breaches happen?Classification: Concept17) Spear phishing is used by organizations to monitor traffic passing through their internal network.Answer: FALSEAACSB: Information TechnologyDifficulty: 1: EasyCourse LO: Discuss the et
27、hical and social issues raised by the use of information systems.Learning Obj: LO 26.2: How do data breaches happen?Classification: Concept18) Explain how data breach occurs with an example.Answer: Hackers are continually developing new tools and techniques that enable them to steal more data. They
28、experiment with new attack vectors, or ways of attacking a target. In the data breach that occurred at Target Corporation in late 2013, attackers first purchased malware designed specifically for the attacks they planned to carry out. They then used spear phishing, or a targeted phishing attack, to
29、infect a Target third party vendors system and gather keystrokes, login credentials, and screenshots from the vendors users. The attackers used this information to gain access into Targets internal network. Once inside Targets network, the attackers compromised an internal Windows file server. From
30、this server, the attackers used malware named Trojan.POSRAM to extract customer data from point-of-sale (POS) terminals. Customer data was continuously sent from the POS terminals to an extraction server within Targets network. It was then funneled out of Targets network to drop servers in Russia, B
31、razil, and Miami. From there, the data was collected and sold on the black market.AACSB: Information TechnologyDifficulty: 3: ChallengingCourse LO: Discuss the ethical and social issues raised by the use of information systems.Learning Obj: LO 26.2: How do data breaches happen?Classification: Concep
32、t19) Stuart works for a financial brokerage. His job involves handling sensitive client information such as financial details. Stuart illegally transfers details of some clients from his office computer to his personal email ID, to misuse later. With reference to this situation, Stuart is guilty of
33、_. A) exfiltratingB) cardingC) hardeningD) pretextingAnswer: AAACSB: Reflective ThinkingDifficulty: 2: ModerateCourse LO: Describe different methods of managing IS security.Learning Obj: LO 26.3: How should organizations respond to data breaches?Classification: Application20) Which of the following
34、is true of the measures to be taken by an organization in the event of a data breach?A) The organization must delay informing its users so that the occurrence of data breach remains private.B) The organization must not involve additional technical or law enforcement professionals, as it may lead to
35、further damage to its data.C) The organization must destroy the evidence of the breach to avoid future security problems.D) The organization must respond quickly to mitigate the amount of damage hackers can do with the stolen data.Answer: DAACSB: Information TechnologyDifficulty: 2: ModerateCourse L
36、O: Describe different methods of managing IS security.Learning Obj: LO 26.3: How should organizations respond to data breaches?Classification: Concept21) Executives, managers, and all systems personnel of an organization discuss the actions to be taken by each employee in case a data breach occurs.
37、They identify areas that would need immediate attention and assign specific responsibilities to each employee. The employees of the organization are performing a(n) _.A) exfiltrationB) documentationC) walkthroughD) case studyAnswer: CAACSB: Information TechnologyDifficulty: 2: ModerateCourse LO: Des
38、cribe different methods of managing IS security.Learning Obj: LO 26.3: How should organizations respond to data breaches?Classification: Application22) The purpose of a business continuity planning session in an organization is to _.A) discuss how to return the organization to normal operations as q
39、uickly as possible after a data breachB) build plans to increase the market presence of the organization and increase its user baseC) identify new markets that will accelerate the growth of the organizationD) understand the type of information stored by the organization and implement relevant securi
40、ty measures as required by regulatory lawsAnswer: AAACSB: Information TechnologyDifficulty: 2: ModerateCourse LO: Describe different methods of managing IS security.Learning Obj: LO 26.3: How should organizations respond to data breaches?Classification: Concept23) Which of the following should be do
41、ne by employees to protect against data breaches?A) They should develop new exploits.B) They should remove existing honeypots.C) They should design methods for data extrusion.D) They should conduct a walkthrough.Answer: DAACSB: Information TechnologyDifficulty: 2: ModerateCourse LO: Describe differe
42、nt methods of managing IS security.Learning Obj: LO 26.3: How should organizations respond to data breaches?Classification: Concept24) Jobs Dot Com, an online recruitment site, was hacked into, and personal information of a number of users was stolen. What information should Jobs Dot Com include in
43、its data breach notification to its users? A) the costs incurred due to the breachB) a sincere apology and an acceptance of responsibility for the incidentC) details of how the breach occurred and the reasons for the breachD) a report on the current security measuresAnswer: BAACSB: Reflective Thinki
44、ngDifficulty: 2: ModerateCourse LO: Describe different methods of managing IS security.Learning Obj: LO 26.3: How should organizations respond to data breaches?Classification: Application25) Data extrusion helps organizations secure their data from possible data breaches.Answer: FALSEAACSB: Informat
45、ion TechnologyDifficulty: 1: EasyCourse LO: Describe different methods of managing IS security.Learning Obj: LO 26.3: How should organizations respond to data breaches?Classification: Concept26) Despite data breach, organizations should refrain from informing their users immediately as it will lead
46、to mass user defection.Answer: FALSEAACSB: Information TechnologyDifficulty: 1: EasyCourse LO: Describe different methods of managing IS security.Learning Obj: LO 26.3: How should organizations respond to data breaches?Classification: Concept27) Decisions on how to respond to a data breach are most
47、effective if they are made when the breach is happening.Answer: FALSEAACSB: Information TechnologyDifficulty: 1: EasyCourse LO: Describe different methods of managing IS security.Learning Obj: LO 26.3: How should organizations respond to data breaches?Classification: Concept28) Performing a walkthro
48、ugh should be done as part of a business continuity planning session.Answer: TRUEAACSB: Information TechnologyDifficulty: 1: EasyCourse LO: Describe different methods of managing IS security.Learning Obj: LO 26.3: How should organizations respond to data breaches?Classification: Concept29) Data brea
49、ch notifications should state that the existing security policies and procedures are inadequate and that changes are being made to prevent similar breaches in the future.Answer: TRUEAACSB: Information TechnologyDifficulty: 1: EasyCourse LO: Describe different methods of managing IS security.Learning
50、 Obj: LO 26.3: How should organizations respond to data breaches?Classification: Concept30) Why should organizations respond quickly to data breaches?Answer: Organizations need to respond to data breaches quickly for several reasons. First, by responding quickly an organization can stop hackers from
51、 doing more damage. Hackers can be prevented from accessing other internal systems, and affected systems can be patched and cleaned. Additionally, if organizations respond quickly enough, hackers may be prevented from exfiltrating, or illegally transferring, data out of the organization. Second, res
52、ponding quickly may mitigate the amount of damage hackers can do with the stolen data. If the affected users are notified immediately they can change their passwords, cancel their credit cards, and possibly activate credit monitoring services. Third, the longer organizations delay in notifying users
53、, the more upset users become. Based on past data breaches, users are reasonably forgiving of organizations that quickly notify them about what happened and what steps that are being taken to make things right.AACSB: Information TechnologyDifficulty: 3: ChallengingCourse LO: Describe different metho
54、ds of managing IS security.Learning Obj: LO 26.3: How should organizations respond to data breaches?Classification: Concept31) What are the steps involved in an organizations plan for a data breach?Answer: Data breaches arent guaranteed to happen, but they are likely to happen. As a result, organiza
55、tions need to plan for data breaches. They need to rehearse what they will do when a breach happens. Executives, managers, and systems personnel must perform a walkthrough and discuss the specific steps each person will take after a breach occurs. This should be done as part of a broader business co
56、ntinuity planning session that discusses how to return the organization to normal operations as quickly as possible. As part of the planning process, organizations should form a computer security incident response team (CSIRT) consisting of staff from the legal and public relations departments, as w
57、ell as executives and systems administrators. Coordinated pre-planning for an incident helps organizations avoid missteps like accidentally destroying evidence and issuing poorly worded data breach notices to users. Decisions must be made before the incident, not while its happening.Finally, as part
58、 of the planning process, organizations need to identify additional technical and law enforcement professionals that may need to be brought in to help handle the data breach. Evidence of the breach must be preserved, and the extent of the damage needs to be accurately measured.AACSB: Information Tec
59、hnologyDifficulty: 2: ModerateCourse LO: Describe different methods of managing IS security.Learning Obj: LO 26.3: How should organizations respond to data breaches?Classification: Concept32) The _ is a regulatory law that requires security precautions for government agencies.A) Federal Information
60、Security Management Act (FISMA)B) Gramm-Leach-Bliley Act (GLBA)C) Payment Card Industry Data Security Standard (PCI DSS)D) Family Educational Rights and Privacy Act (FERPA)Answer: AAACSB: Information TechnologyDifficulty: 1: EasyCourse LO: Discuss the ethical and social issues raised by the use of i
温馨提示
- 1. 本站所有资源如无特殊说明,都需要本地电脑安装OFFICE2007和PDF阅读器。图纸软件为CAD,CAXA,PROE,UG,SolidWorks等.压缩文件请下载最新的WinRAR软件解压。
- 2. 本站的文档不包含任何第三方提供的附件图纸等,如果需要附件,请联系上传者。文件的所有权益归上传用户所有。
- 3. 本站RAR压缩包中若带图纸,网页内容里面会有图纸预览,若没有图纸预览就没有图纸。
- 4. 未经权益所有人同意不得将文件中的内容挪作商业或盈利用途。
- 5. 人人文库网仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对用户上传分享的文档内容本身不做任何修改或编辑,并不能对任何下载内容负责。
- 6. 下载文件中如有侵权或不适当内容,请与我们联系,我们立即纠正。
- 7. 本站不保证下载资源的准确性、安全性和完整性, 同时也不承担用户因使用这些下载资源对自己和他人造成任何形式的伤害或损失。
最新文档
- 2025年度医院医疗废物处理设施建设合同4篇
- 2025年度个人创业贷款合同示范文本8篇
- 二零二五年度美容院美容护肤品生产股份合作合同4篇
- 二零二五版木质家具定制设计与生产加工合同3篇
- 二零二五年度电子商务平台标志设计及用户体验合同3篇
- 二零二五年度托盘租赁与供应链金融结合合同范本3篇
- 二零二五年度昌平区食堂员工激励与绩效考核合同3篇
- 2025年度汽车租赁与品牌合作推广合同范本3篇
- 二零二五年度城市绿化工程承包合同14篇
- 2025年度线上线下联动大型促销活动合作合同3篇
- 河北省沧州市五县联考2024-2025学年高一上学期期末英语试卷(含答案含含听力原文无音频)
- 急性肺栓塞抢救流程
- 《统计学-基于Python》 课件全套 第1-11章 数据与Python语言-时间序列分析和预测
- 《形象价值百万》课件
- 红色文化教育国内外研究现状范文十
- 中医基础理论-肝
- 小学外来人员出入校门登记表
- 《土地利用规划学》完整课件
- GB/T 25283-2023矿产资源综合勘查评价规范
- 《汽车衡全自动智能称重系统》设计方案
- 义务教育历史课程标准(2022年版)
评论
0/150
提交评论