CMGT 554 Wk 6: Ch. 8 Video Exercise: Information Security Management

0 items
CMGT 554 Wk 6: Ch. 8 Video Exercise: Information Security Management
CMGT 554 Wk 6: Ch. 8 Video Exercise: Information Security Management
$5.00
  • Description

CMGT 554 Wk 6: Ch. 8 Video Exercise: Information Security Management

Watch the video and complete the short quiz in MyLab MIS®. This video explains the different types of security issues that can take place in a business. You will have unlimited attempts on the quiz.

According to the DHS agent portrayed in this video, the Secret Service has responded to network intrusions at businesses throughout the United States that have been impacted by _____ through their point-of-sale systems.

 

A.

unauthorized wireless traffic

 

B.

spoofers

 

C.

malware

 

D.

spam

 

E.

data recovery failures

 

 

In this video, Agent Macey explains how a _____ pretends to be a legitimate company and sends email requesting users to update their confidential information such as passwords or account numbers.

 

A.

virus

 

B.

sniffer

 

C.

keylogger

 

D.

spoofer

 

 

E.

worm

 

 

Based on the information provided in this video, which of the following usually happens in a denial-of-service attack?

 

A.

A hacker monitors and intercepts wireless traffic.

 

B.

A hacker deceives someone by pretending to be someone else.

 

C.

A hacker uses unauthorized programs to break into a computer system and steal data.

 

D.

A hacker implements a computer worm to exploit an operating system vulnerability.

 

E.

A hacker floods a Web server with so many requests that it becomes unavailable to its intended users.

 

 

In this video, Special Agent Macey says the single largest threat to the Internet is _____.

 

A.

sniffing

 

B.

malware implemented through fraudulent pop-up ads

 

C.

denial-of-service attacks

 

D.

phishing

 

E.

spoofing

 

 

According to the information provided in this video, any business that has an online presence is at risk of _____.

 

A.

unauthorized data disclosure

 

B.

loss of customer data

 

C.

exposure to hacker activity

 

D.

denial-of-service attack

 

E.

all of these answers