A keystroke logger is harmful code intentionally left on a computer system. It lies dormant for a certain period, and when specific conditions are met, it "explodes" and carries out its malicious function. correct answers False
A reasonable expectation of privacy is the same as the reasonable pe...
a keystroke logger is harmful code intentionally l
Written for
ITN 267
ITN 267
Seller
Follow
FullyFocus
Reviews received
Content preview
ITN 267 Final Study Guide || A Verified A+ Pass.
A keystroke logger is harmful code intentionally left on a computer system. It lies dormant for a
certain period, and when specific conditions are met, it "explodes" and carries out its malicious
function. correct answers False
A reasonable expectation of privacy is the same as the reasonable person standard. correct
answers False
All of the following are true with respect to cryptography except: correct answers only used
today by health care providers to protect health care data
How might the average person use cookies in a beneficial way? correct answers You save an
image of a relaxing, cloud-filled sky that appears every time you log-on to your Twitter account.
In which of the following types of communication is phishing least likely to occur? correct
answers phone calls
Integrity means that information systems and their data are accurate. correct answers True
____________ is the practice of tracking a user's actions on the Internet in order to create a user
profile. correct answers Online profiling
_____________ is an individual's right to control the use and disclosure of his or her own
personal data. correct answers Privacy
______________ means that only people with the right permission can access and use
information. correct answers Confidentiality
_______________ is the process of reviewing known vulnerabilities and threats. correct answers
Risk Analysis
________________ involves tricking other people into breaking security procedures and sharing
sensitive information. correct answers Social Engineering
__________________ is a body of law developed because of legal tradition and court cases.
correct answers Common Law
___________________ refers to applying safeguards designed to lower risks to a level deemed
acceptable but without eliminating such risks. correct answers Risk Mitigation
Which type of safeguard is put in place in order to limit the damage caused by a security
incident? correct answers Corrective
Which statement about privacy is NOT true? correct answers Privacy means that a person can
specify the collection, use, and sharing of their data.
, Which of the following correctly summarizes an employer's right to monitor telephone
conversations? correct answers An employer has right to monitor telephone conversations in the
ordinary course of business without a court order.
Which of the following U.S. Constitution amendments contribute to the right of privacy? correct
answers First, Third, and Fourth Amendments
Which of following is not one of the categories of vulnerabilities? correct answers Domain
What situation would be an example of an exploit? correct answers An art thief sneaks into a
museum and steals a famous painting and then sneaks out of the museum without being caught
by security because the thief identified and traveled through the museum via blind spots of the
museum's security cameras. After the incident, the museum increases the number of security
guards and cameras guarding the museum at all times.
What is a small string of text that a Web site stores on a user's computer? correct answers Cookie
A merchant of an e-commerce Web site wants to accept credit cards as a form of payment.
Which of the following must the merchant follow to ensure the safety of those payments? correct
answers PCI DSS
All of the following are examples of consumer financial information except: correct answers
Biometric Data
All of the following are examples of consumer financial institutions except: correct answers the
Federal Reserve System
Audits are ___________ performed by independent organizations. correct answers Occasionally
In the U.S. federal system, the U.S. Court of Appeals is the court of last resort. correct answers
False
Individual consumers are the targets of hackers far more often that financial institutions. correct
answers False
Nonpublic personal information (NPI) is personally identifiable financial information that a
consumer gives to a financial institution. NPI also includes private information that an institution
gets from other sources. It includes lists or descriptions of consumers that are prepared by using
this kind of information. correct answers True
Pretexting, which is also known as social engineering, is the act of trying to gain access to
customer information without proper authority to do so. correct answers True
The Federal Reserve reports directly to: correct answers the U.S. Congress
The benefits of buying summaries with Stuvia:
Guaranteed quality through customer reviews
Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.
Quick and easy check-out
You can quickly pay through credit card for the summaries. There is no membership needed.
Focus on what matters
Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!
Frequently asked questions
What do I get when I buy this document?
You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.
Satisfaction guarantee: how does it work?
Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.
Who am I buying these notes from?
Stuvia is a marketplace, so you are not buying this document from us, but from seller FullyFocus. Stuvia facilitates payment to the seller.
Will I be stuck with a subscription?
No, you only buy these notes for £9.20. You're not tied to anything after your purchase.