Chapter 8 Flashcards
1) Smartphones have the same security flaws as other Internet-connected devices.
True
2) In 2013, the security firm McAfee identified approximately 35,000 kinds of mobile malware.
True
3) Viruses can be spread through e-mail.
True
4) The term cracker is used to identify a hacker whose specialty is breaking open security systems.
False
5) To secure mobile devices, a company will need to implement special mobile device management software.
True
6) Wireless networks are vulnerable to penetration because radio frequency bands are easy to scan.
True
7) Computer worms spread much more rapidly than computer viruses.
True
8) One form of spoofing involves forging the return address on an e-mail so that the e-mail message appears to come from someone other than the sender.
True
9) Sniffers enable hackers to steal proprietary information from anywhere on a network, including e-mail messages, company files, and confidential reports.
True
10) DoS attacks are used to destroy information and access restricted areas of a company’s information system.
False
11) The distributed nature of cloud computing makes it somewhat easier to track unauthorized access.
False
12) Zero defects cannot be achieved in larger software programs because fully testing programs that contain thousands of choices and millions of paths would require thousands of years.
True
13) An acceptable use policy defines the acceptable level of access to information assets for different users.
False
14) Biometric authentication is the use of physical characteristics such as retinal images to provide identification.
True
15) Packet filtering catches most types of network attacks.
False