版權說明:本文檔由用戶提供并上傳,收益歸屬內容提供方,若內容存在侵權,請進行舉報或認領
文檔簡介
1、管理信息系統(tǒng)(第7版)章節(jié)練習題及答案chapter extension 14管理信息系統(tǒng)(第7版)章節(jié)練習題及答案chapter extension 14 Copyright 2017 Pearson Education, Inc.管理信息系統(tǒng)(第7版)章節(jié)練習題及答案chapter extension 14Experiencing MIS, 7e (Kroenke)Chapter Extension 14 Data Breaches1) A student at the MSA University hacked into the universitys official Web site
2、 and stole some confidential information about the scholarship program. This incident is an example of _.A) a data breachB) asynchronous communicationC) key escrowD) a sequence flowAnswer: AAACSB: Reflective ThinkingDifficulty: 2: ModerateCourse LO: Discuss the ethical and social issues raised by th
3、e use of information systems.Learning Obj: LO 26.1: What is a data breach?Classification: Application2) Which of the following is a direct cost of handling a data breach?A) loss of reputationB) abnormal customer turnoverC) legal fees and consultationD) increased customer acquisition activitiesAnswer
4、: CAACSB: Information TechnologyDifficulty: 1: EasyCourse LO: Discuss the ethical and social issues raised by the use of information systems.Learning Obj: LO 26.1: What is a data breach?Classification: Concept3) Sam is a hacker who makes money by stealing and selling credit cards. He has targeted th
5、e employees of a local firm and is looking for details such as names, addresses, dates of birth, social security numbers, credit card numbers, or health records. In this case, Sam is looking for _.A) firewall security measuresB) business continuity plansC) malware definitionsD) personally identifiab
6、le informationAnswer: DAACSB: Reflective ThinkingDifficulty: 2: ModerateCourse LO: Discuss the ethical and social issues raised by the use of information systems.Learning Obj: LO 26.1: What is a data breach?Classification: Application4) _ refers to the process of placing a small charge on a credit c
7、ard to ensure it is working.A) HoardingB) CardingC) PhishingD) Credit card hijackingAnswer: BAACSB: Information TechnologyDifficulty: 1: EasyCourse LO: Discuss the ethical and social issues raised by the use of information systems.Learning Obj: LO 26.1: What is a data breach?Classification: Concept5
8、) Direct costs of handling a data breach do not include paying for detection of the breach.Answer: FALSEAACSB: Information TechnologyDifficulty: 1: EasyCourse LO: Discuss the ethical and social issues raised by the use of information systems.Learning Obj: LO 26.1: What is a data breach?Classificatio
9、n: Concept6) According to the reports in Ponemons 2014 Cost of Data Breach Study, organizations are more likely to lose larger amounts of data than smaller amounts of data.Answer: FALSEAACSB: Information TechnologyDifficulty: 1: EasyCourse LO: Discuss the ethical and social issues raised by the use
10、of information systems.Learning Obj: LO 26.1: What is a data breach?Classification: Concept7) Personally identifiable information includes a persons bank account numbers, personal identification numbers, email address, and social security numbers.Answer: TRUEAACSB: Information TechnologyDifficulty:
11、1: EasyCourse LO: Discuss the ethical and social issues raised by the use of information systems.Learning Obj: LO 26.1: What is a data breach?Classification: Concept8) Stolen credit card information is validated through a process called carding.Answer: TRUEAACSB: Information TechnologyDifficulty: 1:
12、 EasyCourse LO: Discuss the ethical and social issues raised by the use of information systems.Learning Obj: LO 26.1: What is a data breach?Classification: Concept9) Explain how hackers use information stolen from data breaches for credit card forgery.Answer: Over 67 percent of data breaches come fr
13、om hackers trying to make money. Hackers are primarily looking for personally identifiable information (PII), or data that can be used to identify a person. This includes names, addresses, dates of birth, social security numbers, credit card numbers, health records, bank account numbers, personal id
14、entification numbers, and email addresses. Stolen information is commonly used for credit card fraud. Stolen credit card information is validated through a process called carding, where a small charge is placed on the card to ensure it is working. Valid cards are then bundled and sold on the black m
15、arket. The price of stolen credit cards can run from $2 to $45 per card, depending on the type of account. Stolen data is commonly used for identity theft, extortion, and industrial espionage.AACSB: Information TechnologyDifficulty: 2: ModerateCourse LO: Discuss the ethical and social issues raised
16、by the use of information systems.Learning Obj: LO 26.1: What is a data breach?Classification: Concept10) The first step in protecting oneself from data breaches is _.A) securing credit and debit card detailsB) understanding how they happenC) learning the technologies used for these activitiesD) ins
17、talling necessary software to protect from possible breachesAnswer: BAACSB: Information TechnologyDifficulty: 2: ModerateCourse LO: Discuss the ethical and social issues raised by the use of information systems.Learning Obj: LO 26.2: How do data breaches happen?Classification: Concept11) Bob, a hack
18、er, encountered a vulnerability in a banks firewall when he was trying to hack into its Web site. Which of the following can Bob use to take advantage of this liability?A) exploitB) attack vectorC) cardingD) wardriverAnswer: AAACSB: Reflective ThinkingDifficulty: 2: ModerateCourse LO: Discuss the et
19、hical and social issues raised by the use of information systems.Learning Obj: LO 26.2: How do data breaches happen?Classification: Application12) A group of hackers use a targeted phishing attack to breach a companys firewalls and hack into its security system. Which of the following techniques hav
20、e the hackers used?A) pretextingB) IP spoofingC) spear phishingD) phone phishingAnswer: CAACSB: Information TechnologyDifficulty: 1: EasyCourse LO: Discuss the ethical and social issues raised by the use of information systems.Learning Obj: LO 26.2: How do data breaches happen?Classification: Concep
21、t13) A group of hackers decide to steal credit card details of the users of Swift Shopping Inc., a leading e-commerce company. They infect the security system of the companys third-party vendor and gain access into its internal network. They compromise an internal Windows server of the company and u
22、se a malware to extract customer data. Which of the following is illustrated in this scenario?A) hardeningB) cardingC) pretextingD) data breachingAnswer: DAACSB: Information TechnologyDifficulty: 2: ModerateCourse LO: Discuss the ethical and social issues raised by the use of information systems.Lea
23、rning Obj: LO 26.2: How do data breaches happen?Classification: Application14) Each type of data breach is different because hackers are continually developing new tools and techniques that enable them to steal more data.Answer: TRUEAACSB: Information TechnologyDifficulty: 1: EasyCourse LO: Discuss
24、the ethical and social issues raised by the use of information systems.Learning Obj: LO 26.2: How do data breaches happen?Classification: Concept15) Attack vectors refer to the ways hackers attack a target.Answer: TRUEAACSB: Information TechnologyDifficulty: 1: EasyCourse LO: Discuss the ethical and
25、 social issues raised by the use of information systems.Learning Obj: LO 26.2: How do data breaches happen?Classification: Concept16) An exploit is a type of attack vector used by hackers.Answer: TRUEAACSB: Information TechnologyDifficulty: 1: EasyCourse LO: Discuss the ethical and social issues rai
26、sed by the use of information systems.Learning Obj: LO 26.2: How do data breaches happen?Classification: Concept17) Spear phishing is used by organizations to monitor traffic passing through their internal network.Answer: FALSEAACSB: Information TechnologyDifficulty: 1: EasyCourse LO: Discuss the et
27、hical and social issues raised by the use of information systems.Learning Obj: LO 26.2: How do data breaches happen?Classification: Concept18) Explain how data breach occurs with an example.Answer: Hackers are continually developing new tools and techniques that enable them to steal more data. They
28、experiment with new attack vectors, or ways of attacking a target. In the data breach that occurred at Target Corporation in late 2013, attackers first purchased malware designed specifically for the attacks they planned to carry out. They then used spear phishing, or a targeted phishing attack, to
29、infect a Target third party vendors system and gather keystrokes, login credentials, and screenshots from the vendors users. The attackers used this information to gain access into Targets internal network. Once inside Targets network, the attackers compromised an internal Windows file server. From
30、this server, the attackers used malware named Trojan.POSRAM to extract customer data from point-of-sale (POS) terminals. Customer data was continuously sent from the POS terminals to an extraction server within Targets network. It was then funneled out of Targets network to drop servers in Russia, B
31、razil, and Miami. From there, the data was collected and sold on the black market.AACSB: Information TechnologyDifficulty: 3: ChallengingCourse LO: Discuss the ethical and social issues raised by the use of information systems.Learning Obj: LO 26.2: How do data breaches happen?Classification: Concep
32、t19) Stuart works for a financial brokerage. His job involves handling sensitive client information such as financial details. Stuart illegally transfers details of some clients from his office computer to his personal email ID, to misuse later. With reference to this situation, Stuart is guilty of
33、_. A) exfiltratingB) cardingC) hardeningD) pretextingAnswer: AAACSB: Reflective ThinkingDifficulty: 2: ModerateCourse LO: Describe different methods of managing IS security.Learning Obj: LO 26.3: How should organizations respond to data breaches?Classification: Application20) Which of the following
34、is true of the measures to be taken by an organization in the event of a data breach?A) The organization must delay informing its users so that the occurrence of data breach remains private.B) The organization must not involve additional technical or law enforcement professionals, as it may lead to
35、further damage to its data.C) The organization must destroy the evidence of the breach to avoid future security problems.D) The organization must respond quickly to mitigate the amount of damage hackers can do with the stolen data.Answer: DAACSB: Information TechnologyDifficulty: 2: ModerateCourse L
36、O: Describe different methods of managing IS security.Learning Obj: LO 26.3: How should organizations respond to data breaches?Classification: Concept21) Executives, managers, and all systems personnel of an organization discuss the actions to be taken by each employee in case a data breach occurs.
37、They identify areas that would need immediate attention and assign specific responsibilities to each employee. The employees of the organization are performing a(n) _.A) exfiltrationB) documentationC) walkthroughD) case studyAnswer: CAACSB: Information TechnologyDifficulty: 2: ModerateCourse LO: Des
38、cribe different methods of managing IS security.Learning Obj: LO 26.3: How should organizations respond to data breaches?Classification: Application22) The purpose of a business continuity planning session in an organization is to _.A) discuss how to return the organization to normal operations as q
39、uickly as possible after a data breachB) build plans to increase the market presence of the organization and increase its user baseC) identify new markets that will accelerate the growth of the organizationD) understand the type of information stored by the organization and implement relevant securi
40、ty measures as required by regulatory lawsAnswer: AAACSB: Information TechnologyDifficulty: 2: ModerateCourse LO: Describe different methods of managing IS security.Learning Obj: LO 26.3: How should organizations respond to data breaches?Classification: Concept23) Which of the following should be do
41、ne by employees to protect against data breaches?A) They should develop new exploits.B) They should remove existing honeypots.C) They should design methods for data extrusion.D) They should conduct a walkthrough.Answer: DAACSB: Information TechnologyDifficulty: 2: ModerateCourse LO: Describe differe
42、nt methods of managing IS security.Learning Obj: LO 26.3: How should organizations respond to data breaches?Classification: Concept24) Jobs Dot Com, an online recruitment site, was hacked into, and personal information of a number of users was stolen. What information should Jobs Dot Com include in
43、its data breach notification to its users? A) the costs incurred due to the breachB) a sincere apology and an acceptance of responsibility for the incidentC) details of how the breach occurred and the reasons for the breachD) a report on the current security measuresAnswer: BAACSB: Reflective Thinki
44、ngDifficulty: 2: ModerateCourse LO: Describe different methods of managing IS security.Learning Obj: LO 26.3: How should organizations respond to data breaches?Classification: Application25) Data extrusion helps organizations secure their data from possible data breaches.Answer: FALSEAACSB: Informat
45、ion TechnologyDifficulty: 1: EasyCourse LO: Describe different methods of managing IS security.Learning Obj: LO 26.3: How should organizations respond to data breaches?Classification: Concept26) Despite data breach, organizations should refrain from informing their users immediately as it will lead
46、to mass user defection.Answer: FALSEAACSB: Information TechnologyDifficulty: 1: EasyCourse LO: Describe different methods of managing IS security.Learning Obj: LO 26.3: How should organizations respond to data breaches?Classification: Concept27) Decisions on how to respond to a data breach are most
47、effective if they are made when the breach is happening.Answer: FALSEAACSB: Information TechnologyDifficulty: 1: EasyCourse LO: Describe different methods of managing IS security.Learning Obj: LO 26.3: How should organizations respond to data breaches?Classification: Concept28) Performing a walkthro
48、ugh should be done as part of a business continuity planning session.Answer: TRUEAACSB: Information TechnologyDifficulty: 1: EasyCourse LO: Describe different methods of managing IS security.Learning Obj: LO 26.3: How should organizations respond to data breaches?Classification: Concept29) Data brea
49、ch notifications should state that the existing security policies and procedures are inadequate and that changes are being made to prevent similar breaches in the future.Answer: TRUEAACSB: Information TechnologyDifficulty: 1: EasyCourse LO: Describe different methods of managing IS security.Learning
50、 Obj: LO 26.3: How should organizations respond to data breaches?Classification: Concept30) Why should organizations respond quickly to data breaches?Answer: Organizations need to respond to data breaches quickly for several reasons. First, by responding quickly an organization can stop hackers from
51、 doing more damage. Hackers can be prevented from accessing other internal systems, and affected systems can be patched and cleaned. Additionally, if organizations respond quickly enough, hackers may be prevented from exfiltrating, or illegally transferring, data out of the organization. Second, res
52、ponding quickly may mitigate the amount of damage hackers can do with the stolen data. If the affected users are notified immediately they can change their passwords, cancel their credit cards, and possibly activate credit monitoring services. Third, the longer organizations delay in notifying users
53、, the more upset users become. Based on past data breaches, users are reasonably forgiving of organizations that quickly notify them about what happened and what steps that are being taken to make things right.AACSB: Information TechnologyDifficulty: 3: ChallengingCourse LO: Describe different metho
54、ds of managing IS security.Learning Obj: LO 26.3: How should organizations respond to data breaches?Classification: Concept31) What are the steps involved in an organizations plan for a data breach?Answer: Data breaches arent guaranteed to happen, but they are likely to happen. As a result, organiza
55、tions need to plan for data breaches. They need to rehearse what they will do when a breach happens. Executives, managers, and systems personnel must perform a walkthrough and discuss the specific steps each person will take after a breach occurs. This should be done as part of a broader business co
56、ntinuity planning session that discusses how to return the organization to normal operations as quickly as possible. As part of the planning process, organizations should form a computer security incident response team (CSIRT) consisting of staff from the legal and public relations departments, as w
57、ell as executives and systems administrators. Coordinated pre-planning for an incident helps organizations avoid missteps like accidentally destroying evidence and issuing poorly worded data breach notices to users. Decisions must be made before the incident, not while its happening.Finally, as part
58、 of the planning process, organizations need to identify additional technical and law enforcement professionals that may need to be brought in to help handle the data breach. Evidence of the breach must be preserved, and the extent of the damage needs to be accurately measured.AACSB: Information Tec
59、hnologyDifficulty: 2: ModerateCourse LO: Describe different methods of managing IS security.Learning Obj: LO 26.3: How should organizations respond to data breaches?Classification: Concept32) The _ is a regulatory law that requires security precautions for government agencies.A) Federal Information
60、Security Management Act (FISMA)B) Gramm-Leach-Bliley Act (GLBA)C) Payment Card Industry Data Security Standard (PCI DSS)D) Family Educational Rights and Privacy Act (FERPA)Answer: AAACSB: Information TechnologyDifficulty: 1: EasyCourse LO: Discuss the ethical and social issues raised by the use of i
溫馨提示
- 1. 本站所有資源如無特殊說明,都需要本地電腦安裝OFFICE2007和PDF閱讀器。圖紙軟件為CAD,CAXA,PROE,UG,SolidWorks等.壓縮文件請下載最新的WinRAR軟件解壓。
- 2. 本站的文檔不包含任何第三方提供的附件圖紙等,如果需要附件,請聯(lián)系上傳者。文件的所有權益歸上傳用戶所有。
- 3. 本站RAR壓縮包中若帶圖紙,網(wǎng)頁內容里面會有圖紙預覽,若沒有圖紙預覽就沒有圖紙。
- 4. 未經(jīng)權益所有人同意不得將文件中的內容挪作商業(yè)或盈利用途。
- 5. 人人文庫網(wǎng)僅提供信息存儲空間,僅對用戶上傳內容的表現(xiàn)方式做保護處理,對用戶上傳分享的文檔內容本身不做任何修改或編輯,并不能對任何下載內容負責。
- 6. 下載文件中如有侵權或不適當內容,請與我們聯(lián)系,我們立即糾正。
- 7. 本站不保證下載資源的準確性、安全性和完整性, 同時也不承擔用戶因使用這些下載資源對自己和他人造成任何形式的傷害或損失。
最新文檔
- 2025年度樓層套房租賃合同書(含智能門禁系統(tǒng))4篇
- 2025年度高新技術項目股權投資合同4篇
- 二零二五年度汽車銷售企業(yè)車輛庫存股權轉讓協(xié)議4篇
- 二零二五年度大米種植基地無人機植保服務合同3篇
- 二零二五年度大理石石材施工與售后維修合同3篇
- 二零二五版鋁合金模板工程安裝與技術創(chuàng)新合同4篇
- 2025年度農(nóng)業(yè)生態(tài)修復工程鴨苗生態(tài)養(yǎng)殖合同4篇
- 2025年度打樁施工安全培訓服務合同4篇
- 二零二五年度大宗貨物物流倉儲設施租賃承包合同樣本4篇
- 2025年鐵路工程項目地質勘察合同示范文本3篇
- T-SDLPA 0001-2024 研究型病房建設和配置標準
- (人教PEP2024版)英語一年級上冊Unit 1 教學課件(新教材)
- 全國職業(yè)院校技能大賽高職組(市政管線(道)數(shù)字化施工賽項)考試題庫(含答案)
- 2024胃腸間質瘤(GIST)診療指南更新解讀 2
- 光儲電站儲能系統(tǒng)調試方案
- 2024年二級建造師繼續(xù)教育題庫及答案(500題)
- 小學數(shù)學二年級100以內連加連減口算題
- 建設單位如何做好項目管理
- 三年級上遞等式計算400題
- 一次性餐具配送投標方案
- 《中華民族多元一體格局》
評論
0/150
提交評論