IS Chapter 8 T/F

Unlock all answers in this set

Unlock answers
question
Fault-tolerant computers contain redundant hardware, software, and power supply components. T/F
answer
True
question
NAT conceals the IP addresses of the organization's internal host computers to deter sniffer programs. - True - False
answer
True
question
SSL is a protocol used to establish a secure connection between two computers. - True - False
answer
True (Secure Sockets Layer)
question
Biometric authentication is the use of physical characteristics such as retinal images to provide identification. - True - False
answer
False (uses systems that read and interpret individual human traits such as fingerprints in order to grant or deny access)
question
Public key encryption uses two keys. - True - False
answer
True
question
The most economically damaging kinds of computer crime are e-mail viruses. - True - False
answer
False
question
An acceptable use policy defines the acceptable level of access to information assets for different users. - True - False
answer
False (defines acceptable uses of the firms information resources and computing equipment including desktop...)
question
Computers using cable modems to connect to the Internet are more open to penetration than those connecting via dial-up. - True - False
answer
True
question
The potential for unauthorized access is usually limited to the communications lines of a network. - True - False
answer
False
question
High-availability computing is also referred to as fault tolerance. - True - False
answer
False
question
Computer worms spread much more rapidly than computer viruses. - True - False
answer
True
question
The range of Wi-Fi networks can be extended up to two miles by using external antennae. - True - False
answer
False
question
One form of spoofing involves forging the return address on an e-mail so that the e-mail message appears to come from someone other than the sender. T/F
answer
True
question
Zero defects cannot be achieved in larger software programs because fully testing programs that contain thousands of choices and millions of paths would require thousands of years. T/F
answer
True
question
Smartphones have the same security flaws as other Internet-connected devices. T/F
answer
True
question
In 2013, the security firm McAfee identified approximately 35,000 kinds of mobile malware. T/F
answer
True
question
The term cracker is used to identify a hacker whose specialty is breaking open security systems. T/F
answer
False
question
To secure mobile devices, a company will need to implement special mobile device management software. T/F
answer
True
question
The distributed nature of cloud computing makes it somewhat easier to track unauthorized access. T/F
answer
False
question
Over 70 percent of malware today is aimed at small businesses.
answer
False
question
Malicious software programs referred to as spyware include a variety of threats such as computer viruses, worms, and Trojan horses.
answer
False (referred to as malware)
question
Authorization refers to the ability to know that a person is who he or she claims to be.
answer
False (authentication)
question
Wireless networks are vulnerable to penetration because radio frequency bands are easy to scan. - True - False
answer
TRUE
question
Sniffers enable hackers to steal proprietary information from anywhere on a network, including e-mail messages, company files, and confidential reports. - True - False
answer
TRUE
question
A drive-by download is a technique used by hackers to enable accessing files on a wireless network. T/F
answer
FALSE
question
Mobile devices are not targeted as extensively by malware as traditional computers. T/F
answer
TRUE
question
A Trojan horse is a software program that appears to be benign but then does something other than expected. T/F
answer
TRUE
question
DoS attacks are used to destroy information and access restricted areas of a company's information system. T/F
answer
FALSE
question
In a walkthrough, hackers are able to bypass security controls of a system with little opposition. T/F
answer
FALSE
question
Unauthorized access is a security challenge that is most likely to occur in a network at the point of client computers. T/F
answer
TRUE
Get an explanation on any task
Get unstuck with the help of our AI assistant in seconds
New