Preview

Computer Security and Page Ref

Good Essays
Open Document
Open Document
6120 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Computer Security and Page Ref
Management Information Systems, 12e (Laudon)
Chapter 8 Securing Information Systems

1) In addition to e-mail, instant messages and P2P file-sharing can also pose security threats to computer systems and networks.
Answer: TRUE
Diff: 1 Page Ref: 294
AACSB: Use of IT
CASE: Comprehension
Objective: 8.1

2) Computers using cable modems to connect to the Internet are more open to penetration than those connecting via dial-up.
Answer: TRUE
Diff: 2 Page Ref: 294
AACSB: Use of IT
CASE: Comprehension
Objective: 8.1

3) Wireless networks are vulnerable to penetration because radio frequency bands are easy to scan.
Answer: TRUE
Diff: 2 Page Ref: 295
AACSB: Use of IT
CASE: Comprehension
Objective: 8.1

4) The range of Wi-Fi networks can be extended up to two miles by using external antennae.
Answer: FALSE
Diff: 3 Page Ref: 295
AACSB: Use of IT
CASE: Comprehension
Objective: 8.1

5) The WEP specification calls for an access point and its users to share the same 40-bit encrypted password.
Answer: TRUE
Diff: 3 Page Ref: 296
AACSB: Use of IT
CASE: Comprehension
Objective: 8.1

6) Viruses can be spread through e-mail.
Answer: TRUE
Diff: 1 Page Ref: 296
AACSB: Reflective Thinking
CASE: Comprehension
Objective: 8.1

7) Computer worms spread much more rapidly than computer viruses.
Answer: TRUE
Diff: 2 Page Ref: 296
AACSB: Reflective Thinking
CASE: Comprehension
Objective: 8.1

8) One form of spoofing involves forging the return address on an e-mail so that the e-mail message appears to come from someone other than the sender.
Answer: TRUE
Diff: 2 Page Ref: 299
AACSB: Reflective Thinking
CASE: Comprehension
Objective: 8.1

9) Sniffers enable hackers to steal proprietary information from anywhere on a network, including e-mail messages, company files, and confidential reports.
Answer: TRUE
Diff: 2 Page Ref: 299
AACSB: Reflective Thinking
CASE: Comprehension
Objective: 8.2

10) DoS

You May Also Find These Documents Helpful

  • Satisfactory Essays

    Unit 4 Assignment 2

    • 1005 Words
    • 5 Pages

    Internet use creates the possibility of virus attacks or allowing any unauthorized people to get into our system with the potential of accessing company’s confidential information.…

    • 1005 Words
    • 5 Pages
    Satisfactory Essays
  • Good Essays

    Refer to the exhibit. When configuring the wireless access point, which setting does the network administrator use to configure the unique identifier that client devices use to distinguish this wireless network from others?…

    • 2145 Words
    • 9 Pages
    Good Essays
  • Satisfactory Essays

    b. Devices will only operate at a limited distance from an access point, with the distance determined by the standard used and buildings and other obstacles between the access point and the user.…

    • 807 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    3. Another SMTP Server security threat is malware. Malware is malicious software which can be in various forms such as trojans, viruses, spyware and worms. Malware is usually installed without the user’s consent. It can attack the user’s computer and then use the user’s computer to attack other computers. To help prevent the spread of malware, you can have firewalls and proper security software protection. (Hampton, 2011)…

    • 487 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Netw410 Week 2 Lab

    • 393 Words
    • 2 Pages

    4. Provide open wireless access for the students and the local population in the areas outside of each building.…

    • 393 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Chapter 7 ITM 4272

    • 851 Words
    • 4 Pages

    3) The total range of possible 802.11 WLAN frequencies in the 2.4 GHz band constitutes…

    • 851 Words
    • 4 Pages
    Satisfactory Essays
  • Good Essays

    unit 8 assignement

    • 920 Words
    • 3 Pages

    A wireless local area network, or LAN is a flexible data communications system implemented as an augmentation to, or an alternative for a, wired local area network. These networks rely on electromagnetic airwaves to transmit and receive over a defined area, usually a few hundred feet. (Yahoo-wireless) In most cases, a wireless transmitter will be connected directly to a wired land network using Ethernet cables. Once the network feed has been connected to the transmitter, and a constant power supply is established, a steady stream of radio, or infrared waves with be produced (both are electromagnetic waves). The vast majority of wireless LAN systems tend to rely on radio waves as the carries for their signals, because infrared waves tend to have a shorter distance at which they are able to transmit, and are more easily interrupted. Radio waves, or radio carriers as they are referred to, transfer data through modulations of the carrier signal. The addition of data to a radio carrier causes the signal to occupy more than a single frequency. Once data is imprinted onto the radio signal it is a simple reversal of the transmitting process that allows the information to be decoded by a receiving station. (Rho Wireless)…

    • 920 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    In the late 1800s, Europeans were looking overseas for places to sell their products because…

    • 2157 Words
    • 9 Pages
    Powerful Essays
  • Good Essays

    It241 Appendix B

    • 1021 Words
    • 5 Pages

    Each of the following images depicts a real-life scenario in which a wireless technology is being used. Review the five images below and answer the corresponding questions.…

    • 1021 Words
    • 5 Pages
    Good Essays
  • Satisfactory Essays

    Mat 540 Quiz 4

    • 1474 Words
    • 6 Pages

    In a transportation problem, a demand constraint (the amount of product demanded at a given destination) is a less-than-or equal-to constraint (≤).…

    • 1474 Words
    • 6 Pages
    Satisfactory Essays
  • Good Essays

    Week 8 It-242

    • 685 Words
    • 3 Pages

    Wi-Fi is one of the wireless signal types, it uses IEEE 802.11 specifications to make a wireless LAN or local-area network that we can secure, like a home or office network, or even a public network like a coffee shop. Mostly a Wi-Fi network is a way wired connections thru a subscription to the internet leads to a wireless router sending and receiving data from and to customer’s devices, not only they connect to the internet but also to other users directly. The Wi-Fi range is usually wide so most homes or small businesses can communicate together, but for larger homes or even college campuses for example, must implement extenders in strategic places to extend the wireless signal all over the needed place. Wi-Fi standard evolved quickly, with newer versions of it making the signal more efficient & faster than previous versions. Right now most devices use 802.11a/b/g or n, but is also backwards compatible in order to make sure that an older device or laptop computer can also connect to new Wi-Fi routers. But to get the optimal connection speeds, your router & devices must use the latest 802.11 technology, so once you upgrade your computer or get a USB wireless n antenna, consider also getting a…

    • 685 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    CHFD331 Quiz 1

    • 756 Words
    • 9 Pages

    Authoritarian parents employ firm control in an arbitrary way that does not take account of the child's individuality.…

    • 756 Words
    • 9 Pages
    Satisfactory Essays
  • Good Essays

    Ing Life

    • 572 Words
    • 3 Pages

    Although major part of security issues are from inside, Internet does take external threats. When users connect the Internet, the web browsers might contain breaches that permit scripts to access the system and may cause damages potentially. In addition, when information is transmitting through the public network, the transmission might be captured by someone else. This is known as man-in-the middle attack. (Dean, 2009) Another potential common risk associated with Internet is called reconnaissance threats. Attackers could detect the reachable networks, devices and services through the Internet connection, or even draw an entire network map. Furthermore, DoS attack is another risk users could encounter when using Internet. Hackers attempts to over-whelm the system in order to make it shut down. (Oppenheimer, 2011)…

    • 572 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    Chapter 1 1.What is the range of transmission for a WPAN? 10 feet 2.At what rate is the number of wireless hostpots increasing each year? 350% 3.Which of the following technologies came first chronologically? leased transmission lines 4.A Bluetooth network that contains one master and at least one slave device forms a ____. piconet 5.If an organization s data processing center becomes inoperable, it can move all data processing operations to a ____, often within an hour. Hot site 6____ give team-based workers the ability to access the network resources that they need while collaborating in a team environment. WLANs 7.What is the maximum transmission distance for FSO? 4 miles 8.Where must a WiMax transmitter be located? on the roof of a building 9Why is a WLAN less expensive for business than a wired LAN? no need to tunnel through walls and ceilings to install cable 10.The ____ technology has a transmission distance of up to 10 meters. Bluetooth 11.A WAP cell phone runs a tiny browser program called a microbrowser that uses Wireless Markup Language (WML) instead of HTML. True 12.An increasingly ____ workforce is one characteristic of today s business world. mobile 13.A large amount of equipment is required to create a wireless LAN. False 14What aspect of RF may produce biological damage? heating effects 15How many millions of bits per second can be transmitted in a Wi-Fi network? 11 16.An employee who purchases an access point and secretly brings it into the office in order to provide personal wireless access has installed what is known as a ____ access point. rogue 17.When a Web server sends a Web page back to a PC, it is only sending HTML code; the ____ is responsible for interpreting that code and displaying the results on the screen. Web browser 18.Which sector of the economy has adopted wireless technology most completely? travel 19.In a wireless network, the ____ acts as a base station to receive the signals and transmit signals back to the wireless network…

    • 2020 Words
    • 9 Pages
    Powerful Essays
  • Satisfactory Essays

    Hackers: A hacker is someone who finds weaknesses in a computer or computer network, enters, and modifies or/and steals data this could slow down performance very much or even completely halt it.…

    • 555 Words
    • 3 Pages
    Satisfactory Essays