ANSWERS WITH COMPLETE SOLUTIONS VERIFIED
____________ Includes computer virunes, worms, and Trojan horses
Malware
Viruses differ trom worms because worms ___________
can operate on their own without attaching to other computer program files
A _____________ is a software program that mimics another program and often causes damage
Trojan horse
If someone loads a program that tracks everything you type, the specific spyware is a(n).
______________
key logger
A(n) _____________ is said to occur when hackers flood a network server or web server with many
thousands of false communications or requests for services to crash the network
denial of service
_____________ is the scientific collection, examination, authentication, preservation, and analysis of
data held on or retrieved from computer storage media in such a way that the information can be used
as evidence in a court of law
Computer forensics
Which below is the correct definition of "war driving?
, Eavesdroppers drive by buildings or park outside and try to intercept wireless network traffic
What type of attack consists of malware that comes with a downloaded file that a user intentionally
requests, such as a free game or coupon?
drive-by download
In 2002, the Act was passed to help protect investors with new financial statements reforms
Sarbanes-Oxley
The law that requires financial insttutions to ensure confidentiality of customer data is called the
_____________
Gramm-Leach-Bliley Act
Formalizing standards, nules, and procedures to ensure that the organization's general and application
security controls properly executed and enforced is an) ___________ control
administrative
MasterCard having a duplicate computer center in multiple cities is an example of ____________ in
case operations at one location are disrupted.
disaster recovery planning
An information systems __________ examines a fiem's overal security environment and determines if
the organization is properly prepared lo address threats.
OB. audit
_____________ consists of processes and tools to identify the valid users of a system
Identity management