IS 300 Ch4 HWK.docx - IS 300 Chapter 4 HWK 1 The threats to information security are and the greatest threat is increasing human 2 An unintentional

IS 300 Ch4 HWK.docx - IS 300 Chapter 4 HWK 1 The threats to...

This preview shows page 1 out of 1 page.

IS 300 Chapter 4 HWK 1. The threats to information security are ________, and the greatest threat is ________. increasing; human 2. An unintentional attack in which the perpetrator uses social skills to trick or manipulate a legitimate employee into providing confidential company information is known as: Social engineering 3. Which type of remote software attack does not require user action? Denial-of service attack 4. A password system on a computer network is an example of which type of information security control? Access 5. Access controls consist of ________, which confirms user identity, and _________, which determines user access levels. authentication; authorization 6. Which of the following is not a social engineering technique? C areless Internet surfing 7. Which type of alien software uses your computer to send emails that look like they came from you to all the people in your address book? Spamware 8. Hackers used _________ to get into the Democratic National Committee computer systems.
Image of page 1

You've reached the end of your free preview.

Want to read the whole page?

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture