mis12-信息系统复习参考8.doc

上传人:b****1 文档编号:134114 上传时间:2022-10-04 格式:DOC 页数:24 大小:101KB
下载 相关 举报
mis12-信息系统复习参考8.doc_第1页
第1页 / 共24页
mis12-信息系统复习参考8.doc_第2页
第2页 / 共24页
mis12-信息系统复习参考8.doc_第3页
第3页 / 共24页
mis12-信息系统复习参考8.doc_第4页
第4页 / 共24页
mis12-信息系统复习参考8.doc_第5页
第5页 / 共24页
点击查看更多>>
下载资源
资源描述

mis12-信息系统复习参考8.doc

《mis12-信息系统复习参考8.doc》由会员分享,可在线阅读,更多相关《mis12-信息系统复习参考8.doc(24页珍藏版)》请在冰豆网上搜索。

mis12-信息系统复习参考8.doc

ManagementInformationSystems,12e(Laudon)

Chapter8SecuringInformationSystems

1)Inadditiontoe-mail,instantmessagesandP2Pfile-sharingcanalsoposesecuritythreatstocomputersystemsandnetworks.

Answer:

TRUE

Diff:

1 PageRef:

294

AACSB:

UseofIT

CASE:

Comprehension

Objective:

8.1

2)ComputersusingcablemodemstoconnecttotheInternetaremoreopentopenetrationthanthoseconnectingviadial-up.

Answer:

TRUE

Diff:

2 PageRef:

294

AACSB:

UseofIT

CASE:

Comprehension

Objective:

8.1

3)Wirelessnetworksarevulnerabletopenetrationbecauseradiofrequencybandsareeasytoscan.

Answer:

TRUE

Diff:

2 PageRef:

295

AACSB:

UseofIT

CASE:

Comprehension

Objective:

8.1

4)TherangeofWi-Finetworkscanbeextendeduptotwomilesbyusingexternalantennae.

Answer:

FALSE

Diff:

3 PageRef:

295

AACSB:

UseofIT

CASE:

Comprehension

Objective:

8.1

5)TheWEPspecificationcallsforanaccesspointanditsuserstosharethesame40-bitencryptedpassword.

Answer:

TRUE

Diff:

3 PageRef:

296

AACSB:

UseofIT

CASE:

Comprehension

Objective:

8.1

6)Virusescanbespreadthroughe-mail.

Answer:

TRUE

Diff:

1 PageRef:

296

AACSB:

ReflectiveThinking

CASE:

Comprehension

Objective:

8.1

7)Computerwormsspreadmuchmorerapidlythancomputerviruses.

Answer:

TRUE

Diff:

2 PageRef:

296

AACSB:

ReflectiveThinking

CASE:

Comprehension

Objective:

8.1

8)Oneformofspoofinginvolvesforgingthereturnaddressonane-mailsothatthee-mailmessageappearstocomefromsomeoneotherthanthesender.

Answer:

TRUE

Diff:

2 PageRef:

299

AACSB:

ReflectiveThinking

CASE:

Comprehension

Objective:

8.1

9)Sniffersenablehackerstostealproprietaryinformationfromanywhereonanetwork,includinge-mailmessages,companyfiles,andconfidentialreports.

Answer:

TRUE

Diff:

2 PageRef:

299

AACSB:

ReflectiveThinking

CASE:

Comprehension

Objective:

8.2

10)DoSattacksareusedtodestroyinformationandaccessrestrictedareasofacompany’sinformationsystem.

Answer:

FALSE

Diff:

2 PageRef:

299

AACSB:

UseofIT

CASE:

Comprehension

Objective:

8.2

11)DoSattacksareoneofthemosteconomicallydamagingkindsofcomputercrime.

Answer:

TRUE

Diff:

3 PageRef:

300-301

AACSB:

UseofIT

CASE:

Comprehension

Objective:

8.2

12)Zerodefectscannotbeachievedinlargersoftwareprogramsbecausefullytestingprogramsthatcontainthousandsofchoicesandmillionsofpathswouldrequirethousandsofyears.

Answer:

TRUE

Diff:

2 PageRef:

303

AACSB:

UseofIT

CASE:

Comprehension

Objective:

8.2

13)Anacceptableusepolicydefinestheacceptablelevelofaccesstoinformationassetsfordifferentusers.

Answer:

FALSE

Diff:

2 PageRef:

310

AACSB:

UseofIT

CASE:

Comprehension

Objective:

8.3

14)Biometricauthenticationistheuseofphysicalcharacteristicssuchasretinalimagestoprovideidentification.

Answer:

TRUE

Diff:

1 PageRef:

313

AACSB:

ReflectiveThinking

CASE:

Comprehension

Objective:

8.4

15)Packetfilteringcatchesmosttypesofnetworkattacks.

Answer:

FALSE

Diff:

2 PageRef:

315

AACSB:

UseofIT

CASE:

Comprehension

Objective:

8.4

16)NATconcealstheIPaddressesoftheorganization’sinternalhostcomputerstodetersnifferprograms.

Answer:

TRUE

Diff:

2 PageRef:

315

AACSB:

UseofIT

CASE:

Comprehension

Objective:

8.4

17)SSLisaprotocolusedtoestablishasecureconnectionbetweentwocomputers.

Answer:

TRUE

Diff:

2 PageRef:

317

AACSB:

UseofIT

CASE:

Comprehension

Objective:

8.4

18)Publickeyencryptionusestwokeys.

Answer:

TRUE

Diff:

2 PageRef:

3127

AACSB:

ReflectiveThinking

CASE:

Comprehension

Objective:

8.4

19)High-availabilitycomputingisalsoreferredtoasfaulttolerance.

Answer:

FALSE

Diff:

2 PageRef:

319

AACSB:

UseofIT

CASE:

Comprehension

Objective:

8.2

20)Bothsoftwaremetricsandsoftwaretestingaretechniquesusedtoimprovesoftwarequality.

Answer:

TRUE

Diff:

2 PageRef:

320

AACSB:

UseofIT

CASE:

Comprehension

Objective:

8.4

21)________referstopolicies,procedures,andtechnicalmeasuresusedtopreventunauthorizedaccess,alternation,theft,orphysicaldamagetoinformationsystems.

A)"Security"

B)"Controls"

C)"Benchmarking"

D)"Algorithms"

Answer:

A

Diff:

2 PageRef:

293

AACSB:

UseofIT

CASE:

Comprehension

Objective:

8.3

22)________referstoallofthemethods,policies,andorganizationalproceduresthatensurethesafetyoftheorganization'sassets,theaccuracyandreliabilityofitsaccountingrecords,andoperationaladherencetomanagementstandards.

A)"Legacysystems"

B)"SSIDstandards"

C)"Vulnerabilities"

D)"Controls"

Answer:

D

Diff:

2 PageRef:

293

AACSB:

UseofIT

CASE:

Comprehension

Objective:

8.3

23)Whichofthefollowingdoesnotposeasecuritythreattowirelessnetw

展开阅读全文
相关资源
猜你喜欢
相关搜索

当前位置:首页 > 党团工作 > 党团建设

copyright@ 2008-2022 冰豆网网站版权所有

经营许可证编号:鄂ICP备2022015515号-1