Chapter 8 Flashcards

1
Q

1) Smartphones have the same security flaws as other Internet-connected devices.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

2) In 2013, the security firm McAfee identified approximately 35,000 kinds of mobile malware.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

3) Viruses can be spread through e-mail.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

4) The term cracker is used to identify a hacker whose specialty is breaking open security systems.

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

5) To secure mobile devices, a company will need to implement special mobile device management software.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

6) Wireless networks are vulnerable to penetration because radio frequency bands are easy to scan.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

7) Computer worms spread much more rapidly than computer viruses.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

8) One form of spoofing involves forging the return address on an e-mail so that the e-mail message appears to come from someone other than the sender.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

9) Sniffers enable hackers to steal proprietary information from anywhere on a network, including e-mail messages, company files, and confidential reports.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

10) DoS attacks are used to destroy information and access restricted areas of a company’s information system.

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

11) The distributed nature of cloud computing makes it somewhat easier to track unauthorized access.

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

12) Zero defects cannot be achieved in larger software programs because fully testing programs that contain thousands of choices and millions of paths would require thousands of years.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

13) An acceptable use policy defines the acceptable level of access to information assets for different users.

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

14) Biometric authentication is the use of physical characteristics such as retinal images to provide identification.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

15) Packet filtering catches most types of network attacks.

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

16) NAT conceals the IP addresses of the organization’s internal host computers to deter sniffer programs.

A

True

17
Q

17) SSL is a protocol used to establish a secure connection between two computers.

A

True

18
Q

18) Public key encryption uses two keys.

A

True

19
Q

19) Over 70 percent of malware today is aimed at small businesses.

A

False

20
Q

20) Smartphones typically feature state-of-the-art encryption and security features, making them highly secure tools for businesses.

A

False

21
Q
21) \_\_\_\_\_\_\_\_ refers to policies, procedures, and technical measures used to prevent unauthorized access, alteration, theft, or physical damage to information systems.
A) "Security"
B) "Controls"
C) "Benchmarking"
D) "Algorithms"
A

A) “Security”

22
Q
22) \_\_\_\_\_\_\_\_ refers to all of the methods, policies, and organizational procedures that ensure the safety of the organization's assets, the accuracy and reliability of its accounting records, and operational adherence to management standards.
A) "Legacy systems"
B) "SSID standards"
C) "Vulnerabilities"
D) "Controls"
A

D) “Controls”

23
Q

23) Large amounts of data stored in electronic form are ________ than the same data in manual form.
A) less vulnerable to damage
B) more secure
C) vulnerable to many more kinds of threats
D) more critical to most businesses

A

C) vulnerable to many more kinds of threats

24
Q

24) Electronic data are more susceptible to destruction, fraud, error, and misuse because information systems concentrate data in computer files that:
A) are easily decrypted.
B) can be opened with easily available software.
C) may be accessible by anyone who has access to the same network.
D) are unprotected by up-to-date security systems.

A

C) may be accessible by anyone who has access to the same network.

25
Q

25) Specific security challenges that threaten the communications lines in a client/server environment include:
A) tapping; sniffing; message alteration; radiation.
B) hacking; vandalism; denial of service attacks.
C) theft, copying, alteration of data; hardware or software failure.
D) unauthorized access; errors; spyware.

A

A) tapping; sniffing; message alteration; radiation.

26
Q

26) Specific security challenges that threaten clients in a client/server environment include:
A) tapping; sniffing; message alteration; radiation.
B) hacking; vandalism; denial of service attacks.
C) theft, copying, alteration of data; hardware or software failure.
D) unauthorized access; errors; spyware.

A

D) unauthorized access; errors; spyware.

27
Q

27) Specific security challenges that threaten corporate servers in a client/server environment include:
A) tapping; sniffing; message alteration; radiation.
B) hacking; vandalism; denial of service attacks.
C) theft, copying, alteration of data; hardware or software failure.
D) unauthorized access; errors; spyware.

A

B) hacking; vandalism; denial of service attacks.

28
Q

28) The Internet poses specific security problems because:
A) it was designed to be easily accessible.
B) Internet data is not run over secure lines.
C) Internet standards are universal.
D) it changes so rapidly.

A

A) it was designed to be easily accessible.

29
Q

29) Which of the following statements about the Internet security is not true?
A) The use of P2P networks can expose a corporate computer to outsiders.
B) A corporate network without access to the Internet is more secure than one that provides access.
C) VoIP is more secure than the switched voice network.
D) Instant messaging can provide hackers access to an otherwise secure network.

A

C) VoIP is more secure than the switched voice network.

30
Q
30) An independent computer program that copies itself from one computer to another over a network is called a:
A) worm.
B) Trojan horse.
C) bug.
D) pest.
A

A) worm.