《mis12信息系统复习参考8》由会员分享,可在线阅读,更多相关《mis12信息系统复习参考8(24页珍藏版)》请在金锄头文库上搜索。
1、Management Information Systems, 12e (Laudon)Chapter 8 Securing Information Systems1) In addition to e-mail, instant messages and P2P file-sharing can also pose security threats to computer systems and networks.Answer: TRUEDiff: 1Page Ref: 294AACSB: Use of ITCASE: ComprehensionObjective: 8.12) Comput
2、ers using cable modems to connect to the Internet are more open to penetration than those connecting via dial-up. Answer: TRUEDiff: 2Page Ref: 294AACSB: Use of ITCASE: ComprehensionObjective: 8.13) Wireless networks are vulnerable to penetration because radio frequency bands are easy to scan.Answer:
3、 TRUEDiff: 2Page Ref: 295AACSB: Use of ITCASE: ComprehensionObjective: 8.14) The range of Wi-Fi networks can be extended up to two miles by using external antennae.Answer: FALSEDiff: 3Page Ref: 295AACSB: Use of ITCASE: ComprehensionObjective: 8.15) The WEP specification calls for an access point and
4、 its users to share the same 40-bit encrypted password.Answer: TRUEDiff: 3Page Ref: 296AACSB: Use of ITCASE: ComprehensionObjective: 8.16) Viruses can be spread through e-mail.Answer: TRUEDiff: 1Page Ref: 296AACSB: Reflective ThinkingCASE: ComprehensionObjective: 8.17) Computer worms spread much mor
5、e rapidly than computer viruses. Answer: TRUEDiff: 2Page Ref: 296AACSB: Reflective ThinkingCASE: ComprehensionObjective: 8.18) One form of spoofing involves forging the return address on an e-mail so that the e-mail message appears to come from someone other than the sender. Answer: TRUEDiff: 2Page
6、Ref: 299AACSB: Reflective ThinkingCASE: ComprehensionObjective: 8.19) Sniffers enable hackers to steal proprietary information from anywhere on a network, including e-mail messages, company files, and confidential reports. Answer: TRUEDiff: 2Page Ref: 299AACSB: Reflective ThinkingCASE: Comprehension
7、Objective: 8.210) DoS attacks are used to destroy information and access restricted areas of a companys information system.Answer: FALSEDiff: 2Page Ref: 299AACSB: Use of ITCASE: ComprehensionObjective: 8.211) DoS attacks are one of the most economically damaging kinds of computer crime.Answer: TRUED
8、iff: 3Page Ref: 300-301AACSB: Use of ITCASE: ComprehensionObjective: 8.212) Zero defects cannot be achieved in larger software programs because fully testing programs that contain thousands of choices and millions of paths would require thousands of years.Answer: TRUEDiff: 2Page Ref: 303AACSB: Use o
9、f ITCASE: ComprehensionObjective: 8.213) An acceptable use policy defines the acceptable level of access to information assets for different users.Answer: FALSEDiff: 2Page Ref: 310AACSB: Use of ITCASE: ComprehensionObjective: 8.314) Biometric authentication is the use of physical characteristics suc
10、h as retinal images to provide identification. Answer: TRUEDiff: 1Page Ref: 313AACSB: Reflective ThinkingCASE: ComprehensionObjective: 8.415) Packet filtering catches most types of network attacks. Answer: FALSEDiff: 2Page Ref: 315AACSB: Use of ITCASE: ComprehensionObjective: 8.416) NAT conceals the
11、 IP addresses of the organizations internal host computers to deter sniffer programs.Answer: TRUEDiff: 2Page Ref: 315AACSB: Use of ITCASE: ComprehensionObjective: 8.417) SSL is a protocol used to establish a secure connection between two computers. Answer: TRUEDiff: 2Page Ref: 317AACSB: Use of ITCAS
12、E: ComprehensionObjective: 8.418) Public key encryption uses two keys. Answer: TRUEDiff: 2Page Ref: 3127AACSB: Reflective ThinkingCASE: ComprehensionObjective: 8.419) High-availability computing is also referred to as fault tolerance.Answer: FALSEDiff: 2Page Ref: 319AACSB: Use of ITCASE: Comprehensi
13、onObjective: 8.220) Both software metrics and software testing are techniques used to improve software quality.Answer: TRUEDiff: 2Page Ref: 320AACSB: Use of ITCASE: ComprehensionObjective: 8.421) _ refers to policies, procedures, and technical measures used to prevent unauthorized access, alternatio
14、n, theft, or physical damage to information systems. A) SecurityB) ControlsC) BenchmarkingD) AlgorithmsAnswer: ADiff: 2Page Ref: 293AACSB: Use of ITCASE: ComprehensionObjective: 8.322) _ refers to all of the methods, policies, and organizational procedures that ensure the safety of the organizations
15、 assets, the accuracy and reliability of its accounting records, and operational adherence to management standards.A) Legacy systemsB) SSID standardsC) VulnerabilitiesD) ControlsAnswer: DDiff: 2Page Ref: 293AACSB: Use of ITCASE: ComprehensionObjective: 8.323) Which of the following does not pose a security threat to wireless