Computer Security and Page Ref

Only available on StudyMode
  • Download(s) : 90
  • Published : December 21, 2012
Open Document
Text Preview
Management Information Systems, 12e (Laudon)
Chapter 8 Securing Information Systems

1) In addition to e-mail, instant messages and P2P file-sharing can also pose security threats to computer systems and networks. Answer: TRUE
Diff: 1Page Ref: 294
AACSB: Use of IT
CASE: Comprehension
Objective: 8.1

2) Computers using cable modems to connect to the Internet are more open to penetration than those connecting via dial-up. Answer: TRUE
Diff: 2Page Ref: 294
AACSB: Use of IT
CASE: Comprehension
Objective: 8.1

3) Wireless networks are vulnerable to penetration because radio frequency bands are easy to scan. Answer: TRUE
Diff: 2Page Ref: 295
AACSB: Use of IT
CASE: Comprehension
Objective: 8.1

4) The range of Wi-Fi networks can be extended up to two miles by using external antennae. Answer: FALSE
Diff: 3Page Ref: 295
AACSB: Use of IT
CASE: Comprehension
Objective: 8.1

5) The WEP specification calls for an access point and its users to share the same 40-bit encrypted password. Answer: TRUE
Diff: 3Page Ref: 296
AACSB: Use of IT
CASE: Comprehension
Objective: 8.1

6) Viruses can be spread through e-mail.
Answer: TRUE
Diff: 1Page Ref: 296
AACSB: Reflective Thinking
CASE: Comprehension
Objective: 8.1

7) Computer worms spread much more rapidly than computer viruses. Answer: TRUE
Diff: 2Page Ref: 296
AACSB: Reflective Thinking
CASE: Comprehension
Objective: 8.1

8) One form of spoofing involves forging the return address on an e-mail so that the e-mail message appears to come from someone other than the sender. Answer: TRUE
Diff: 2Page Ref: 299
AACSB: Reflective Thinking
CASE: Comprehension
Objective: 8.1

9) Sniffers enable hackers to steal proprietary information from anywhere on a network, including e-mail messages, company files, and confidential reports. Answer: TRUE
Diff: 2Page Ref: 299
AACSB: Reflective Thinking
CASE: Comprehension
Objective: 8.2

10) DoS attacks are used to destroy information and access restricted areas of a company’s information system. Answer: FALSE
Diff: 2Page Ref: 299
AACSB: Use of IT
CASE: Comprehension
Objective: 8.2

11) DoS attacks are one of the most economically damaging kinds of computer crime. Answer: TRUE
Diff: 3Page Ref: 300-301
AACSB: Use of IT
CASE: Comprehension
Objective: 8.2

12) Zero defects cannot be achieved in larger software programs because fully testing programs that contain thousands of choices and millions of paths would require thousands of years. Answer: TRUE

Diff: 2Page Ref: 303
AACSB: Use of IT
CASE: Comprehension
Objective: 8.2

13) An acceptable use policy defines the acceptable level of access to information assets for different users. Answer: FALSE
Diff: 2Page Ref: 310
AACSB: Use of IT
CASE: Comprehension
Objective: 8.3

14) Biometric authentication is the use of physical characteristics such as retinal images to provide identification. Answer: TRUE
Diff: 1Page Ref: 313
AACSB: Reflective Thinking
CASE: Comprehension
Objective: 8.4

15) Packet filtering catches most types of network attacks.
Answer: FALSE
Diff: 2Page Ref: 315
AACSB: Use of IT
CASE: Comprehension
Objective: 8.4

16) NAT conceals the IP addresses of the organization’s internal host computers to deter sniffer programs. Answer: TRUE
Diff: 2Page Ref: 315
AACSB: Use of IT
CASE: Comprehension
Objective: 8.4

17) SSL is a protocol used to establish a secure connection between two computers. Answer: TRUE
Diff: 2Page Ref: 317
AACSB: Use of IT
CASE: Comprehension
Objective: 8.4

18) Public key encryption uses two keys.
Answer: TRUE
Diff: 2Page Ref: 3127
AACSB: Reflective Thinking
CASE: Comprehension
Objective: 8.4

19) High-availability computing is also referred to as fault tolerance. Answer: FALSE
Diff: 2Page Ref: 319
AACSB: Use of IT
CASE: Comprehension
Objective: 8.2

20) Both software metrics and...
tracking img