mis12信息系统复习参考8

上传人:哈**** 文档编号:137563682 上传时间:2020-07-09 格式:DOC 页数:24 大小:101.01KB
返回 下载 相关 举报
mis12信息系统复习参考8_第1页
第1页 / 共24页
mis12信息系统复习参考8_第2页
第2页 / 共24页
mis12信息系统复习参考8_第3页
第3页 / 共24页
mis12信息系统复习参考8_第4页
第4页 / 共24页
mis12信息系统复习参考8_第5页
第5页 / 共24页
点击查看更多>>
资源描述

《mis12信息系统复习参考8》由会员分享,可在线阅读,更多相关《mis12信息系统复习参考8(24页珍藏版)》请在金锄头文库上搜索。

1、Management Information Systems, 12e (Laudon)Chapter 8 Securing Information Systems1) In addition to e-mail, instant messages and P2P file-sharing can also pose security threats to computer systems and networks.Answer: TRUEDiff: 1Page Ref: 294AACSB: Use of ITCASE: ComprehensionObjective: 8.12) Comput

2、ers using cable modems to connect to the Internet are more open to penetration than those connecting via dial-up. Answer: TRUEDiff: 2Page Ref: 294AACSB: Use of ITCASE: ComprehensionObjective: 8.13) Wireless networks are vulnerable to penetration because radio frequency bands are easy to scan.Answer:

3、 TRUEDiff: 2Page Ref: 295AACSB: Use of ITCASE: ComprehensionObjective: 8.14) The range of Wi-Fi networks can be extended up to two miles by using external antennae.Answer: FALSEDiff: 3Page Ref: 295AACSB: Use of ITCASE: ComprehensionObjective: 8.15) The WEP specification calls for an access point and

4、 its users to share the same 40-bit encrypted password.Answer: TRUEDiff: 3Page Ref: 296AACSB: Use of ITCASE: ComprehensionObjective: 8.16) Viruses can be spread through e-mail.Answer: TRUEDiff: 1Page Ref: 296AACSB: Reflective ThinkingCASE: ComprehensionObjective: 8.17) Computer worms spread much mor

5、e rapidly than computer viruses. Answer: TRUEDiff: 2Page Ref: 296AACSB: Reflective ThinkingCASE: ComprehensionObjective: 8.18) One form of spoofing involves forging the return address on an e-mail so that the e-mail message appears to come from someone other than the sender. Answer: TRUEDiff: 2Page

6、Ref: 299AACSB: Reflective ThinkingCASE: ComprehensionObjective: 8.19) Sniffers enable hackers to steal proprietary information from anywhere on a network, including e-mail messages, company files, and confidential reports. Answer: TRUEDiff: 2Page Ref: 299AACSB: Reflective ThinkingCASE: Comprehension

7、Objective: 8.210) DoS attacks are used to destroy information and access restricted areas of a companys information system.Answer: FALSEDiff: 2Page Ref: 299AACSB: Use of ITCASE: ComprehensionObjective: 8.211) DoS attacks are one of the most economically damaging kinds of computer crime.Answer: TRUED

8、iff: 3Page Ref: 300-301AACSB: Use of ITCASE: ComprehensionObjective: 8.212) Zero defects cannot be achieved in larger software programs because fully testing programs that contain thousands of choices and millions of paths would require thousands of years.Answer: TRUEDiff: 2Page Ref: 303AACSB: Use o

9、f ITCASE: ComprehensionObjective: 8.213) An acceptable use policy defines the acceptable level of access to information assets for different users.Answer: FALSEDiff: 2Page Ref: 310AACSB: Use of ITCASE: ComprehensionObjective: 8.314) Biometric authentication is the use of physical characteristics suc

10、h as retinal images to provide identification. Answer: TRUEDiff: 1Page Ref: 313AACSB: Reflective ThinkingCASE: ComprehensionObjective: 8.415) Packet filtering catches most types of network attacks. Answer: FALSEDiff: 2Page Ref: 315AACSB: Use of ITCASE: ComprehensionObjective: 8.416) NAT conceals the

11、 IP addresses of the organizations internal host computers to deter sniffer programs.Answer: TRUEDiff: 2Page Ref: 315AACSB: Use of ITCASE: ComprehensionObjective: 8.417) SSL is a protocol used to establish a secure connection between two computers. Answer: TRUEDiff: 2Page Ref: 317AACSB: Use of ITCAS

12、E: ComprehensionObjective: 8.418) Public key encryption uses two keys. Answer: TRUEDiff: 2Page Ref: 3127AACSB: Reflective ThinkingCASE: ComprehensionObjective: 8.419) High-availability computing is also referred to as fault tolerance.Answer: FALSEDiff: 2Page Ref: 319AACSB: Use of ITCASE: Comprehensi

13、onObjective: 8.220) Both software metrics and software testing are techniques used to improve software quality.Answer: TRUEDiff: 2Page Ref: 320AACSB: Use of ITCASE: ComprehensionObjective: 8.421) _ refers to policies, procedures, and technical measures used to prevent unauthorized access, alternatio

14、n, theft, or physical damage to information systems. A) SecurityB) ControlsC) BenchmarkingD) AlgorithmsAnswer: ADiff: 2Page Ref: 293AACSB: Use of ITCASE: ComprehensionObjective: 8.322) _ refers to all of the methods, policies, and organizational procedures that ensure the safety of the organizations

15、 assets, the accuracy and reliability of its accounting records, and operational adherence to management standards.A) Legacy systemsB) SSID standardsC) VulnerabilitiesD) ControlsAnswer: DDiff: 2Page Ref: 293AACSB: Use of ITCASE: ComprehensionObjective: 8.323) Which of the following does not pose a security threat to wireless

展开阅读全文
相关资源
相关搜索

当前位置:首页 > 大杂烩/其它

电脑版 |金锄头文库版权所有
经营许可证:蜀ICP备13022795号 | 川公网安备 51140202000112号