MIS CHAPTER 4 Flashcards

(24 cards)

1
Q

What is an Ethical Computer Use Policy?

A

A policy containing general principles to guide the proper use of computers in the workplace.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is an Acceptable Use Policy (AUP)?

A

A policy that defines acceptable uses of an organization’s information system and the consequences of misuse.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is an Information Privacy Policy?

A

A policy that details how a company handles and protects customer and employee information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is an Email Privacy Policy?

A

A policy that governs the extent to which emails may be monitored or accessed within a company.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is a Social Media Policy?

A

A policy that outlines acceptable use of social media by employees, both personally and professionally.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is a Workplace Monitoring Policy?

A

A policy that explains what activities are monitored and under what circumstances, both physically and digitally.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is the primary difference between a virus and a worm?

A

A virus needs to attach to an executable file to spread; a worm does not and spreads on its own.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is a Trojan Horse virus?

A

Malware that disguises itself as legitimate software to trick users into installing it.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is a Polymorphic virus or worm?

A

Malware that changes its code as it spreads to avoid detection.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is Scareware?

A

Malware that tricks users into thinking their computer is infected to prompt them to buy or download malicious software.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is Ransomware?

A

Malware that encrypts data and demands payment to restore access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is a White hat hacker?

A

A security expert who uses hacking skills to protect systems and find vulnerabilities.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is a Black hat hacker?

A

A malicious hacker who breaks into systems to steal, damage, or destroy data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is a Script kiddie?

A

An unskilled individual who uses pre-written code to launch attacks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is a Cyberterrorist?

A

A hacker who uses digital means to cause physical or financial harm to people or infrastructure.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is Elevation of privilege?

A

When a user gains unauthorized access to elevated permissions, such as admin rights.

17
Q

What is a Distributed denial of service (DDoS) attack?

A

An attack that floods a network or website with traffic from multiple sources to crash it.

18
Q

What are the two types of keyloggers?

A

Hardware keyloggers and software keyloggers.

19
Q

What is an Anti-spam policy?

A

A policy designed to reduce the volume and risk of spam emails in an organization’s systems.

20
Q

What is Spoofing?

A

Faking the sender’s identity in communication to trick the recipient.

21
Q

What is Spear phishing?

A

A targeted phishing attack aimed at a specific person or role in an organization.

22
Q

What is Social engineering?

A

Manipulating people into revealing confidential information.

23
Q

What is Authentication?

A

The process of verifying a user’s identity.

24
Q

What is Authorization?

A

Granting a verified user permission to perform specific actions or access certain data.