




版权说明:本文档由用户提供并上传,收益归属内容提供方,若内容存在侵权,请进行举报或认领
文档简介
1、管理信息系统(第7版)章节练习题及答案chapter extension 14管理信息系统(第7版)章节练习题及答案chapter extension 14 Copyright 2017 Pearson Education, Inc.管理信息系统(第7版)章节练习题及答案chapter extension 14Experiencing MIS, 7e (Kroenke)Chapter Extension 14 Data Breaches1) A student at the MSA University hacked into the universitys official Web site
2、 and stole some confidential information about the scholarship program. This incident is an example of _.A) a data breachB) asynchronous communicationC) key escrowD) a sequence flowAnswer: AAACSB: Reflective ThinkingDifficulty: 2: ModerateCourse LO: Discuss the ethical and social issues raised by th
3、e use of information systems.Learning Obj: LO 26.1: What is a data breach?Classification: Application2) Which of the following is a direct cost of handling a data breach?A) loss of reputationB) abnormal customer turnoverC) legal fees and consultationD) increased customer acquisition activitiesAnswer
4、: CAACSB: Information TechnologyDifficulty: 1: EasyCourse LO: Discuss the ethical and social issues raised by the use of information systems.Learning Obj: LO 26.1: What is a data breach?Classification: Concept3) Sam is a hacker who makes money by stealing and selling credit cards. He has targeted th
5、e employees of a local firm and is looking for details such as names, addresses, dates of birth, social security numbers, credit card numbers, or health records. In this case, Sam is looking for _.A) firewall security measuresB) business continuity plansC) malware definitionsD) personally identifiab
6、le informationAnswer: DAACSB: Reflective ThinkingDifficulty: 2: ModerateCourse LO: Discuss the ethical and social issues raised by the use of information systems.Learning Obj: LO 26.1: What is a data breach?Classification: Application4) _ refers to the process of placing a small charge on a credit c
7、ard to ensure it is working.A) HoardingB) CardingC) PhishingD) Credit card hijackingAnswer: BAACSB: Information TechnologyDifficulty: 1: EasyCourse LO: Discuss the ethical and social issues raised by the use of information systems.Learning Obj: LO 26.1: What is a data breach?Classification: Concept5
8、) Direct costs of handling a data breach do not include paying for detection of the breach.Answer: FALSEAACSB: Information TechnologyDifficulty: 1: EasyCourse LO: Discuss the ethical and social issues raised by the use of information systems.Learning Obj: LO 26.1: What is a data breach?Classificatio
9、n: Concept6) According to the reports in Ponemons 2014 Cost of Data Breach Study, organizations are more likely to lose larger amounts of data than smaller amounts of data.Answer: FALSEAACSB: Information TechnologyDifficulty: 1: EasyCourse LO: Discuss the ethical and social issues raised by the use
10、of information systems.Learning Obj: LO 26.1: What is a data breach?Classification: Concept7) Personally identifiable information includes a persons bank account numbers, personal identification numbers, email address, and social security numbers.Answer: TRUEAACSB: Information TechnologyDifficulty:
11、1: EasyCourse LO: Discuss the ethical and social issues raised by the use of information systems.Learning Obj: LO 26.1: What is a data breach?Classification: Concept8) Stolen credit card information is validated through a process called carding.Answer: TRUEAACSB: Information TechnologyDifficulty: 1:
12、 EasyCourse LO: Discuss the ethical and social issues raised by the use of information systems.Learning Obj: LO 26.1: What is a data breach?Classification: Concept9) Explain how hackers use information stolen from data breaches for credit card forgery.Answer: Over 67 percent of data breaches come fr
13、om hackers trying to make money. Hackers are primarily looking for personally identifiable information (PII), or data that can be used to identify a person. This includes names, addresses, dates of birth, social security numbers, credit card numbers, health records, bank account numbers, personal id
14、entification numbers, and email addresses. Stolen information is commonly used for credit card fraud. Stolen credit card information is validated through a process called carding, where a small charge is placed on the card to ensure it is working. Valid cards are then bundled and sold on the black m
15、arket. The price of stolen credit cards can run from $2 to $45 per card, depending on the type of account. Stolen data is commonly used for identity theft, extortion, and industrial espionage.AACSB: Information TechnologyDifficulty: 2: ModerateCourse LO: Discuss the ethical and social issues raised
16、by the use of information systems.Learning Obj: LO 26.1: What is a data breach?Classification: Concept10) The first step in protecting oneself from data breaches is _.A) securing credit and debit card detailsB) understanding how they happenC) learning the technologies used for these activitiesD) ins
17、talling necessary software to protect from possible breachesAnswer: BAACSB: Information TechnologyDifficulty: 2: ModerateCourse LO: Discuss the ethical and social issues raised by the use of information systems.Learning Obj: LO 26.2: How do data breaches happen?Classification: Concept11) Bob, a hack
18、er, encountered a vulnerability in a banks firewall when he was trying to hack into its Web site. Which of the following can Bob use to take advantage of this liability?A) exploitB) attack vectorC) cardingD) wardriverAnswer: AAACSB: Reflective ThinkingDifficulty: 2: ModerateCourse LO: Discuss the et
19、hical and social issues raised by the use of information systems.Learning Obj: LO 26.2: How do data breaches happen?Classification: Application12) A group of hackers use a targeted phishing attack to breach a companys firewalls and hack into its security system. Which of the following techniques hav
20、e the hackers used?A) pretextingB) IP spoofingC) spear phishingD) phone phishingAnswer: CAACSB: Information TechnologyDifficulty: 1: EasyCourse LO: Discuss the ethical and social issues raised by the use of information systems.Learning Obj: LO 26.2: How do data breaches happen?Classification: Concep
21、t13) A group of hackers decide to steal credit card details of the users of Swift Shopping Inc., a leading e-commerce company. They infect the security system of the companys third-party vendor and gain access into its internal network. They compromise an internal Windows server of the company and u
22、se a malware to extract customer data. Which of the following is illustrated in this scenario?A) hardeningB) cardingC) pretextingD) data breachingAnswer: DAACSB: Information TechnologyDifficulty: 2: ModerateCourse LO: Discuss the ethical and social issues raised by the use of information systems.Lea
23、rning Obj: LO 26.2: How do data breaches happen?Classification: Application14) Each type of data breach is different because hackers are continually developing new tools and techniques that enable them to steal more data.Answer: TRUEAACSB: Information TechnologyDifficulty: 1: EasyCourse LO: Discuss
24、the ethical and social issues raised by the use of information systems.Learning Obj: LO 26.2: How do data breaches happen?Classification: Concept15) Attack vectors refer to the ways hackers attack a target.Answer: TRUEAACSB: Information TechnologyDifficulty: 1: EasyCourse LO: Discuss the ethical and
25、 social issues raised by the use of information systems.Learning Obj: LO 26.2: How do data breaches happen?Classification: Concept16) An exploit is a type of attack vector used by hackers.Answer: TRUEAACSB: Information TechnologyDifficulty: 1: EasyCourse LO: Discuss the ethical and social issues rai
26、sed by the use of information systems.Learning Obj: LO 26.2: How do data breaches happen?Classification: Concept17) Spear phishing is used by organizations to monitor traffic passing through their internal network.Answer: FALSEAACSB: Information TechnologyDifficulty: 1: EasyCourse LO: Discuss the et
27、hical and social issues raised by the use of information systems.Learning Obj: LO 26.2: How do data breaches happen?Classification: Concept18) Explain how data breach occurs with an example.Answer: Hackers are continually developing new tools and techniques that enable them to steal more data. They
28、experiment with new attack vectors, or ways of attacking a target. In the data breach that occurred at Target Corporation in late 2013, attackers first purchased malware designed specifically for the attacks they planned to carry out. They then used spear phishing, or a targeted phishing attack, to
29、infect a Target third party vendors system and gather keystrokes, login credentials, and screenshots from the vendors users. The attackers used this information to gain access into Targets internal network. Once inside Targets network, the attackers compromised an internal Windows file server. From
30、this server, the attackers used malware named Trojan.POSRAM to extract customer data from point-of-sale (POS) terminals. Customer data was continuously sent from the POS terminals to an extraction server within Targets network. It was then funneled out of Targets network to drop servers in Russia, B
31、razil, and Miami. From there, the data was collected and sold on the black market.AACSB: Information TechnologyDifficulty: 3: ChallengingCourse LO: Discuss the ethical and social issues raised by the use of information systems.Learning Obj: LO 26.2: How do data breaches happen?Classification: Concep
32、t19) Stuart works for a financial brokerage. His job involves handling sensitive client information such as financial details. Stuart illegally transfers details of some clients from his office computer to his personal email ID, to misuse later. With reference to this situation, Stuart is guilty of
33、_. A) exfiltratingB) cardingC) hardeningD) pretextingAnswer: AAACSB: Reflective ThinkingDifficulty: 2: ModerateCourse LO: Describe different methods of managing IS security.Learning Obj: LO 26.3: How should organizations respond to data breaches?Classification: Application20) Which of the following
34、is true of the measures to be taken by an organization in the event of a data breach?A) The organization must delay informing its users so that the occurrence of data breach remains private.B) The organization must not involve additional technical or law enforcement professionals, as it may lead to
35、further damage to its data.C) The organization must destroy the evidence of the breach to avoid future security problems.D) The organization must respond quickly to mitigate the amount of damage hackers can do with the stolen data.Answer: DAACSB: Information TechnologyDifficulty: 2: ModerateCourse L
36、O: Describe different methods of managing IS security.Learning Obj: LO 26.3: How should organizations respond to data breaches?Classification: Concept21) Executives, managers, and all systems personnel of an organization discuss the actions to be taken by each employee in case a data breach occurs.
37、They identify areas that would need immediate attention and assign specific responsibilities to each employee. The employees of the organization are performing a(n) _.A) exfiltrationB) documentationC) walkthroughD) case studyAnswer: CAACSB: Information TechnologyDifficulty: 2: ModerateCourse LO: Des
38、cribe different methods of managing IS security.Learning Obj: LO 26.3: How should organizations respond to data breaches?Classification: Application22) The purpose of a business continuity planning session in an organization is to _.A) discuss how to return the organization to normal operations as q
39、uickly as possible after a data breachB) build plans to increase the market presence of the organization and increase its user baseC) identify new markets that will accelerate the growth of the organizationD) understand the type of information stored by the organization and implement relevant securi
40、ty measures as required by regulatory lawsAnswer: AAACSB: Information TechnologyDifficulty: 2: ModerateCourse LO: Describe different methods of managing IS security.Learning Obj: LO 26.3: How should organizations respond to data breaches?Classification: Concept23) Which of the following should be do
41、ne by employees to protect against data breaches?A) They should develop new exploits.B) They should remove existing honeypots.C) They should design methods for data extrusion.D) They should conduct a walkthrough.Answer: DAACSB: Information TechnologyDifficulty: 2: ModerateCourse LO: Describe differe
42、nt methods of managing IS security.Learning Obj: LO 26.3: How should organizations respond to data breaches?Classification: Concept24) Jobs Dot Com, an online recruitment site, was hacked into, and personal information of a number of users was stolen. What information should Jobs Dot Com include in
43、its data breach notification to its users? A) the costs incurred due to the breachB) a sincere apology and an acceptance of responsibility for the incidentC) details of how the breach occurred and the reasons for the breachD) a report on the current security measuresAnswer: BAACSB: Reflective Thinki
44、ngDifficulty: 2: ModerateCourse LO: Describe different methods of managing IS security.Learning Obj: LO 26.3: How should organizations respond to data breaches?Classification: Application25) Data extrusion helps organizations secure their data from possible data breaches.Answer: FALSEAACSB: Informat
45、ion TechnologyDifficulty: 1: EasyCourse LO: Describe different methods of managing IS security.Learning Obj: LO 26.3: How should organizations respond to data breaches?Classification: Concept26) Despite data breach, organizations should refrain from informing their users immediately as it will lead
46、to mass user defection.Answer: FALSEAACSB: Information TechnologyDifficulty: 1: EasyCourse LO: Describe different methods of managing IS security.Learning Obj: LO 26.3: How should organizations respond to data breaches?Classification: Concept27) Decisions on how to respond to a data breach are most
47、effective if they are made when the breach is happening.Answer: FALSEAACSB: Information TechnologyDifficulty: 1: EasyCourse LO: Describe different methods of managing IS security.Learning Obj: LO 26.3: How should organizations respond to data breaches?Classification: Concept28) Performing a walkthro
48、ugh should be done as part of a business continuity planning session.Answer: TRUEAACSB: Information TechnologyDifficulty: 1: EasyCourse LO: Describe different methods of managing IS security.Learning Obj: LO 26.3: How should organizations respond to data breaches?Classification: Concept29) Data brea
49、ch notifications should state that the existing security policies and procedures are inadequate and that changes are being made to prevent similar breaches in the future.Answer: TRUEAACSB: Information TechnologyDifficulty: 1: EasyCourse LO: Describe different methods of managing IS security.Learning
50、 Obj: LO 26.3: How should organizations respond to data breaches?Classification: Concept30) Why should organizations respond quickly to data breaches?Answer: Organizations need to respond to data breaches quickly for several reasons. First, by responding quickly an organization can stop hackers from
51、 doing more damage. Hackers can be prevented from accessing other internal systems, and affected systems can be patched and cleaned. Additionally, if organizations respond quickly enough, hackers may be prevented from exfiltrating, or illegally transferring, data out of the organization. Second, res
52、ponding quickly may mitigate the amount of damage hackers can do with the stolen data. If the affected users are notified immediately they can change their passwords, cancel their credit cards, and possibly activate credit monitoring services. Third, the longer organizations delay in notifying users
53、, the more upset users become. Based on past data breaches, users are reasonably forgiving of organizations that quickly notify them about what happened and what steps that are being taken to make things right.AACSB: Information TechnologyDifficulty: 3: ChallengingCourse LO: Describe different metho
54、ds of managing IS security.Learning Obj: LO 26.3: How should organizations respond to data breaches?Classification: Concept31) What are the steps involved in an organizations plan for a data breach?Answer: Data breaches arent guaranteed to happen, but they are likely to happen. As a result, organiza
55、tions need to plan for data breaches. They need to rehearse what they will do when a breach happens. Executives, managers, and systems personnel must perform a walkthrough and discuss the specific steps each person will take after a breach occurs. This should be done as part of a broader business co
56、ntinuity planning session that discusses how to return the organization to normal operations as quickly as possible. As part of the planning process, organizations should form a computer security incident response team (CSIRT) consisting of staff from the legal and public relations departments, as w
57、ell as executives and systems administrators. Coordinated pre-planning for an incident helps organizations avoid missteps like accidentally destroying evidence and issuing poorly worded data breach notices to users. Decisions must be made before the incident, not while its happening.Finally, as part
58、 of the planning process, organizations need to identify additional technical and law enforcement professionals that may need to be brought in to help handle the data breach. Evidence of the breach must be preserved, and the extent of the damage needs to be accurately measured.AACSB: Information Tec
59、hnologyDifficulty: 2: ModerateCourse LO: Describe different methods of managing IS security.Learning Obj: LO 26.3: How should organizations respond to data breaches?Classification: Concept32) The _ is a regulatory law that requires security precautions for government agencies.A) Federal Information
60、Security Management Act (FISMA)B) Gramm-Leach-Bliley Act (GLBA)C) Payment Card Industry Data Security Standard (PCI DSS)D) Family Educational Rights and Privacy Act (FERPA)Answer: AAACSB: Information TechnologyDifficulty: 1: EasyCourse LO: Discuss the ethical and social issues raised by the use of i
温馨提示
- 1. 本站所有资源如无特殊说明,都需要本地电脑安装OFFICE2007和PDF阅读器。图纸软件为CAD,CAXA,PROE,UG,SolidWorks等.压缩文件请下载最新的WinRAR软件解压。
- 2. 本站的文档不包含任何第三方提供的附件图纸等,如果需要附件,请联系上传者。文件的所有权益归上传用户所有。
- 3. 本站RAR压缩包中若带图纸,网页内容里面会有图纸预览,若没有图纸预览就没有图纸。
- 4. 未经权益所有人同意不得将文件中的内容挪作商业或盈利用途。
- 5. 人人文库网仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对用户上传分享的文档内容本身不做任何修改或编辑,并不能对任何下载内容负责。
- 6. 下载文件中如有侵权或不适当内容,请与我们联系,我们立即纠正。
- 7. 本站不保证下载资源的准确性、安全性和完整性, 同时也不承担用户因使用这些下载资源对自己和他人造成任何形式的伤害或损失。
最新文档
- 2024年投资咨询工程师常见问题试题及答案探讨
- 2024年银行从业资格考试复习计划试题及答案
- 2024年基金考试技巧小贴士试题及答案
- 2024年投资咨询工程师新趋势试题及答案
- 土地利用变化与生态系统服务的关系试题及答案
- 家庭教育指导师教学评估试题及答案
- 外科护理案例分析与应用
- 宝宝早期交流的必要性试题及答案
- 2024监理考试的关键策略试题及答案
- 黑龙江省东南联合体2024-2025学年高三下学期阶段测试生物试题试卷含解析
- 专升本思政全新模式试题及答案
- Unit 7 A Day to Remember Section A (课件)-2024-2025学年英语人教版7年级下册
- 中央2025年中央社会工作部所属事业单位招聘11人笔试历年参考题库附带答案详解
- 健康咨询与服务推广协议
- 教师语言与沟通艺术知到智慧树章节测试课后答案2024年秋温州大学
- DeepSeek入门到精通-实操+进阶玩法培训
- 2025中国建材集团有限公司招聘6人笔试参考题库附带答案详解
- 2025年吉林铁道职业技术学院单招职业技能测试题库必考题
- 车辆运输安全管理制度
- 2025年北京电子科技职业学院高职单招语文2018-2024历年参考题库频考点含答案解析
- 食堂食材配送采购投标方案(技术标)
评论
0/150
提交评论