CHAPTER 11— CYBERCRIME AND IT SECURITY
MULTIPLE CHOICE
- Identify a true statement about the bring your own device (BYOD) business policy.
- It can improve employee productivity.
- It can provide data security.
- It creates a bug-free environment.
- It enhances employee interaction.
ANS: A
RATIONALE: Bring your own device (BYOD) is a business policy that permits, and in some cases encourages, employees to use their own mobile devices to access company computing resources and applications, including email, corporate databases, the corporate intranet, and the Internet. Proponents of BYOD say it improves employee productivity by allowing workers to use devices with which they are already familiar—while also helping to create an image of a company as a flexible and progressive employer.
- Which of the following is a drawback of the bring your own device (BYOD) business policy?
- It affects the productivity of the employees of a company.
- It inhibits the privacy of the employees of a company.
- It exposes a company’s data to malware.
- It creates the image of a company as not being flexible.
ANS: C
RATIONALE: Most companies have found they cannot entirely prevent employees from using their own devices to perform work functions. However, this practice raises many potential security issues as it is highly likely that such devices are also used for nonwork activity (browsing Web sites, blogging, shopping, visiting social networks, etc.) that exposes them to malware much more frequently than a device used strictly for business purposes.
- In computing, a(n) _____ is an attack on an information system that takes advantage of a particular system vulnerability.
- exit door
- glitch
- bot
- exploit
ANS: D
RATIONALE: In computing, an exploit is an attack on an information system that takes advantage of a particular system vulnerability. Often this attack is due to poor system design or implementation. Once the vulnerability is discovered, software developers create and issue a “fix,” or patch, to eliminate the problem.
- Which of the following is created and issued by software engineers to remove a system vulnerability?
- A patch
- A key
- A license
- A constraint
ANS: A
RATIONALE: Once a vulnerability is discovered, software developers create and issue a “fix,” or patch, to eliminate the problem. Users of the system or application are responsible for obtaining and installing the patch, which they can usually download from the Web.
- The attack that takes place before a software developer knows about the vulnerability is known as a(n) _____.
- unidentified attack
- zero-day attack
- exploit
- threat
ANS: B
RATIONALE: It is difficult to keep up with all the required patches to fix vulnerabilities. Of special concern is a zero-day attack that takes place before the security community or software developer knows about the vulnerability or has been able to repair it.
- Which perpetrator violates computer or Internet security maliciously for illegal personal gain?
- A red hat hacker
- A gray hat hacker
- A white hat hacker
- A black hat hacker
ANS: D
RATIONALE: A black hat hacker is someone who violates computer or Internet security maliciously or for illegal personal gain (in contrast to a white hat hacker who is someone who has been hired by an organization to test the security of its information systems). He breaks into secure networks to destroy, modify, or steal data.
- Which of the following best describes malicious insiders?
- They hack computers in an attempt to promote a political ideology.
- They disrupt a company’s information systems and business operations.
- They are hired by an organization to test the security of its information systems.
- They are hired by an organization to test the security of another organization’s information systems.
ANS: B
RATIONALE: A malicious insider is an employee or contractor who attempts to gain financially and/or disrupt a company’s information systems and business operations. He or she has inside information concerning the organization’s security practices, data, or computer systems.
- Those who capture trade secrets and attempt to gain an unfair competitive advantage are known as _____.
- white hat hackers
- hacktivists
- industrial spies
- black hat hackers
ANS: C
RATIONALE: Industrial spies are individuals who capture trade secrets and attempt to gain an unfair competitive advantage. They are usually hired by organizations or individuals to illegally gain data and access to other organization’s trade secrets.
- Which of the following is true of white hat hackers?
- They are hired by an organization to test the security of its information systems.
- They disrupt a company’s information systems and business operations.
- They capture trade secrets and attempt to gain an unfair competitive advantage in a company.
- They destroy the infrastructure components of governments, financial institutions, and emergency response units.
ANS: A
RATIONALE: White hat hackers are people who have been hired by an organization to test the security of its information systems. They use their skills to improve security by exposing vulnerabilities before malicious hackers (known as black hat hackers) can detect and exploit them.
- In the context of computer crimes, those who cause problems, steal data, and corrupt systems are known as _____.
- black hat hackers
- white hat hackers
- hacktivists
- crackers
ANS: D
RATIONALE: A cracker is an individual who causes problems, steals data, and corrupts systems. He or she possesses a high level of skill and knowledge with computers that enables him or her to interfere with the confidentiality of any information or security system.
Reviews
There are no reviews yet.