Copyright Goodheart-Willcox Co., Inc. Chapter 2 Information Security Fundamentals 67 5. This type of malware spreads through an open network port. A. Trojan horse B. Worm C. Root kit D. Polymorphic 6. Which situation leaves you most vulnerable to malware infections? A. Installing purchased software from a DVD. B. Surfi ng the Internet on mobile devices. C. Exchanging messages through a social media app. D. Using a fl ash drive on multiple machines. 7. Bug-bounty programs are especially useful against which of the following? A. Ransomware attacks B. Zero-day vulnerabilities C. Keyloggers D. Malicious cookies 8. Which of the following is true of adware? A. It is always considered malware. B. It spreads from computer to computer through network ports. C. It can cause problems with multiple browser pop-up windows. D. It will encrypt the data on your hard drive. 9. This type of cookie is only used when a website is displayed in the browser. It is removed when the browser is closed. A. Session cookie B. Persistent cookie C. Term cookie D. Third-party cookie 10. Companies that handle money, such as a credit union, are subject to which law? A. SOX B. PCI DSS C. HIPAA D. GLBA Application and Extension of Knowledge 1. Research how IoT is expected to present challenges for cybersecurity. Spotlight some nontraditional devices that have already caused some incidents. Be prepared to present your fi ndings in a class discussion. 2. Interview a small business owner in your community. Discuss his or her understanding of security concerns related to customer credit card data. Is he or she aware of the policies required by the PCI DSS? Summarize your interview in a one-page written report. Format the report according to your school’s guidelines. 3. Locate the HIPAA privacy practices for your doctor’s offi ce, a local hospital, or a medical center. Develop a brief presentation to summarize the type of information they can share and which information you have some say in its disclosure. Identify some situations where they can disclose and share your PHI. 4. Research the scandal and fraud committed by the companies Enron and Arthur Andersen. Write a one- to two-page summary on some of the fraudulent practices that they used. Describe how these cases factored into the development of the Sarbanes-Oxley Act. 5. Investigate the digital footprint for a parent, grandparent, or guardian using advanced Internet searches and tools you found online. Present your fi ndings to the person you investigated. Write a one- to two-page summary of how he or she reacted to the data you found. Include an explanation of whether or not you feel the data could present any security threats to the person.