100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached
logo-home
MIS 2201 Exam 3 Questions with Correct Answers R234,79   Add to cart

Exam (elaborations)

MIS 2201 Exam 3 Questions with Correct Answers

 9 views  0 purchase
  • Course
  • MIS 2201
  • Institution
  • MIS 2201

MIS 2201 Exam 3 Questions with Correct Answers What are data harvesters? - Answer-Cybercriminals who infiltrate systems and collect data for illegal resale. What are cash-out fraudsters? - Answer-Criminals that purchase assets from data harvesters to be used for illegal financial gain. They mi...

[Show more]

Preview 2 out of 10  pages

  • August 30, 2024
  • 10
  • 2024/2025
  • Exam (elaborations)
  • Questions & answers
  • MIS 2201
  • MIS 2201
avatar-seller
MIS 2201 Exam 3 Questions with
Correct Answers
What are data harvesters? - Answer-Cybercriminals who infiltrate systems and collect
data for illegal resale.

What are cash-out fraudsters? - Answer-Criminals that purchase assets from data
harvesters to be used for illegal financial gain. They might buy goods using stolen credit
cards or create false accounts.

What are botnets? - Answer-Hordes of surreptitiously infiltrated computers, controlled
remotely.

What are distributed denial of service (DDoS) attacks? - Answer-Shutting down
websites with a crushing load of seemingly legitimate requests.

What is extortion? - Answer-The group or individual usually sends a company a
threatening email stating that they have received confidential information about their
company and will exploit a security leak or launch an attack that will harm the
company's network.

What is hacktivism? - Answer-the use of computer-based techniques such as hacking
as a form of civil disobedience to promote a political agenda or social change.

What is a hacker? - Answer-someone who breaks into a computer, or to a particularly
clever programmer.

What is a white-hat hacker? - Answer-Unicer computer weaknesses without exploiting
them. Contribute to improving system security.

What is a black-hat hacker? - Answer-COmputer criminals who exploit a system's
weakness for personal gain.

What are the tenets of information security? - Answer-Confidentality, integrity and
availability.

What is Confidentiality? - Answer-only authorized users can view information.

What is integreity? - Answer-Only authorized users can change information.

What is availability? - Answer-Information is accessible by authroized users whenerver
they request the infromation.

, What are you trying to protect? - Answer-Customer data, IT and network infrastructure,
intellectual property, finances and financial data, service availability and productivity,
reputation.

What are the six areas of weakness? - Answer-Users/Administrators, Network, Physical
Threats, Client Vulnerabilities, Computing Hardware, and Server Software.

What is a bad apple? - Answer-rogue employees who steal secrets, install malware, or
hold a firm hostage.

What is social engineering? - Answer-Con games that trick employees into revealing
information or performing other tasks that comprise a firm.

What is phishing? - Answer-cons executed using technology, i border to acquire
sensitive information or trick someone into installing malicious software.

What is spoofing? - Answer-Email transmissions and packets that have been a;tered to
form or disguise their origin or identity.

What is zero-day exploits? - Answer-New attacks that haven't been clearly identifies and
have not been incorporated into security screening systems, after the security is
recognized by companies announcement.

What is Malware? - Answer-seeks to compromise a computing system without
permission.

What are viruses? - Answer-Infect other software files.

What are worms? - Answer-Take advantage of security vulnerabilities to automatically
spread.

What is a data warehouse? - Answer-a set of databases to support decision-making in
an organization.

What is a data mart? - Answer-database or databases focused on addressing the
concerns of a specific problem or business unit.

What are the query and reporting tools? - Answer-Canned reports, ad hoc reporting
tools, dashboards, OLAP, data cube

What is canned reports? - Answer-provide regular summaries of information in a
predetermined format

What is ad hoc reporting tools? - Answer-puts users in control so that they can create
custom reports on an as-needed basis by selecting fields, ranges, summary conditions,
and other parameters.

The benefits of buying summaries with Stuvia:

Guaranteed quality through customer reviews

Guaranteed quality through customer reviews

Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.

Quick and easy check-out

Quick and easy check-out

You can quickly pay through EFT, credit card or Stuvia-credit for the summaries. There is no membership needed.

Focus on what matters

Focus on what matters

Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!

Frequently asked questions

What do I get when I buy this document?

You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.

Satisfaction guarantee: how does it work?

Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.

Who am I buying this summary from?

Stuvia is a marketplace, so you are not buying this document from us, but from seller Scholarsstudyguide. Stuvia facilitates payment to the seller.

Will I be stuck with a subscription?

No, you only buy this summary for R234,79. You're not tied to anything after your purchase.

Can Stuvia be trusted?

4.6 stars on Google & Trustpilot (+1000 reviews)

77988 documents were sold in the last 30 days

Founded in 2010, the go-to place to buy summaries for 14 years now

Start selling
R234,79
  • (0)
  Buy now