Is 3003 Chapter 8

Unlock all answers in this set

Unlock answers
question
1) Smartphones have the same security flaws as other Internet-connected devices.
answer
Answer: TRUE
question
2) In 2013, the security firm McAfee identified approximately 35,000 kinds of mobile malware.
answer
Answer: TRUE
question
3) Viruses can be spread through e-mail.
answer
Answer: TRUE
question
4) The term cracker is used to identify a hacker whose specialty is breaking open security systems.
answer
Answer: FALSE
question
5) To secure mobile devices, a company will need to implement special mobile device management software.
answer
Answer: TRUE
question
6) Wireless networks are vulnerable to penetration because radio frequency bands are easy to scan.
answer
Answer: TRUE
question
7) Computer worms spread much more rapidly than computer viruses.
answer
Answer: TRUE
question
8) One form of spoofing involves forging the return address on an e-mail so that the e-mail message appears to come from someone other than the sender.
answer
Answer: TRUE
question
9) Sniffers enable hackers to steal proprietary information from anywhere on a network, including e-mail messages, company files, and confidential reports.
answer
Answer: TRUE
question
10) DoS attacks are used to destroy information and access restricted areas of a company's information system.
answer
Answer: FALSE
question
11) The distributed nature of cloud computing makes it somewhat easier to track unauthorized access.
answer
Answer: FALSE
question
12) Zero defects cannot be achieved in larger software programs because fully testing programs that contain thousands of choices and millions of paths would require thousands of years.
answer
Answer: TRUE
question
13) An acceptable use policy defines the acceptable level of access to information assets for different users.
answer
Answer: FALSE
question
14) Biometric authentication is the use of physical characteristics such as retinal images to provide identification.
answer
Answer: TRUE
question
15) Packet filtering catches most types of network attacks.
answer
Answer: FALSE
question
16) NAT conceals the IP addresses of the organization's internal host computers to deter sniffer programs.
answer
Answer: TRUE
question
17) SSL is a protocol used to establish a secure connection between two computers.
answer
Answer: TRUE
question
18) Public key encryption uses two keys.
answer
Answer: TRUE
question
19) Over 70 percent of malware today is aimed at small businesses.
answer
Answer: FALSE
question
20) Smartphones typically feature state-of-the-art encryption and security features, making them highly secure tools for businesses.
answer
Answer: FALSE
question
21) ________ refers to policies, procedures, and technical measures used to prevent unauthorized access, alteration, theft, or physical damage to information systems.
answer
A) "Security"
question
22) ________ refers to all of the methods, policies, and organizational procedures that ensure the safety of the organization's assets, the accuracy and reliability of its accounting records, and operational adherence to management standards.
answer
D) "Controls"
question
23) Large amounts of data stored in electronic form are ________ than the same data in manual form.
answer
C) vulnerable to many more kinds of threats
question
24) Electronic data are more susceptible to destruction, fraud, error, and misuse because information systems concentrate data in computer files that:
answer
C) may be accessible by anyone who has access to the same network.
question
25) Specific security challenges that threaten the communications lines in a client/server environment include:
answer
A) tapping; sniffing; message alteration; radiation.
question
26) Specific security challenges that threaten clients in a client/server environment include:
answer
D) unauthorized access; errors; spyware.
question
27) Specific security challenges that threaten corporate servers in a client/server environment include:
answer
B) hacking; vandalism; denial of service attacks.
question
28) The Internet poses specific security problems because:
answer
A) it was designed to be easily accessible.
question
29) Which of the following statements about the Internet security is not true?
answer
C) VoIP is more secure than the switched voice network.
question
30) An independent computer program that copies itself from one computer to another over a network is called a:
answer
A) worm.
Get an explanation on any task
Get unstuck with the help of our AI assistant in seconds
New