mis12-信息系统复习参考8.doc
《mis12-信息系统复习参考8.doc》由会员分享,可在线阅读,更多相关《mis12-信息系统复习参考8.doc(24页珍藏版)》请在冰豆网上搜索。
![mis12-信息系统复习参考8.doc](https://file1.bdocx.com/fileroot1/2022-10/4/0721fa97-9e9a-4812-aecb-3e8e3cf9971c/0721fa97-9e9a-4812-aecb-3e8e3cf9971c1.gif)
ManagementInformationSystems,12e(Laudon)
Chapter8SecuringInformationSystems
1)Inadditiontoe-mail,instantmessagesandP2Pfile-sharingcanalsoposesecuritythreatstocomputersystemsandnetworks.
Answer:
TRUE
Diff:
1 PageRef:
294
AACSB:
UseofIT
CASE:
Comprehension
Objective:
8.1
2)ComputersusingcablemodemstoconnecttotheInternetaremoreopentopenetrationthanthoseconnectingviadial-up.
Answer:
TRUE
Diff:
2 PageRef:
294
AACSB:
UseofIT
CASE:
Comprehension
Objective:
8.1
3)Wirelessnetworksarevulnerabletopenetrationbecauseradiofrequencybandsareeasytoscan.
Answer:
TRUE
Diff:
2 PageRef:
295
AACSB:
UseofIT
CASE:
Comprehension
Objective:
8.1
4)TherangeofWi-Finetworkscanbeextendeduptotwomilesbyusingexternalantennae.
Answer:
FALSE
Diff:
3 PageRef:
295
AACSB:
UseofIT
CASE:
Comprehension
Objective:
8.1
5)TheWEPspecificationcallsforanaccesspointanditsuserstosharethesame40-bitencryptedpassword.
Answer:
TRUE
Diff:
3 PageRef:
296
AACSB:
UseofIT
CASE:
Comprehension
Objective:
8.1
6)Virusescanbespreadthroughe-mail.
Answer:
TRUE
Diff:
1 PageRef:
296
AACSB:
ReflectiveThinking
CASE:
Comprehension
Objective:
8.1
7)Computerwormsspreadmuchmorerapidlythancomputerviruses.
Answer:
TRUE
Diff:
2 PageRef:
296
AACSB:
ReflectiveThinking
CASE:
Comprehension
Objective:
8.1
8)Oneformofspoofinginvolvesforgingthereturnaddressonane-mailsothatthee-mailmessageappearstocomefromsomeoneotherthanthesender.
Answer:
TRUE
Diff:
2 PageRef:
299
AACSB:
ReflectiveThinking
CASE:
Comprehension
Objective:
8.1
9)Sniffersenablehackerstostealproprietaryinformationfromanywhereonanetwork,includinge-mailmessages,companyfiles,andconfidentialreports.
Answer:
TRUE
Diff:
2 PageRef:
299
AACSB:
ReflectiveThinking
CASE:
Comprehension
Objective:
8.2
10)DoSattacksareusedtodestroyinformationandaccessrestrictedareasofacompany’sinformationsystem.
Answer:
FALSE
Diff:
2 PageRef:
299
AACSB:
UseofIT
CASE:
Comprehension
Objective:
8.2
11)DoSattacksareoneofthemosteconomicallydamagingkindsofcomputercrime.
Answer:
TRUE
Diff:
3 PageRef:
300-301
AACSB:
UseofIT
CASE:
Comprehension
Objective:
8.2
12)Zerodefectscannotbeachievedinlargersoftwareprogramsbecausefullytestingprogramsthatcontainthousandsofchoicesandmillionsofpathswouldrequirethousandsofyears.
Answer:
TRUE
Diff:
2 PageRef:
303
AACSB:
UseofIT
CASE:
Comprehension
Objective:
8.2
13)Anacceptableusepolicydefinestheacceptablelevelofaccesstoinformationassetsfordifferentusers.
Answer:
FALSE
Diff:
2 PageRef:
310
AACSB:
UseofIT
CASE:
Comprehension
Objective:
8.3
14)Biometricauthenticationistheuseofphysicalcharacteristicssuchasretinalimagestoprovideidentification.
Answer:
TRUE
Diff:
1 PageRef:
313
AACSB:
ReflectiveThinking
CASE:
Comprehension
Objective:
8.4
15)Packetfilteringcatchesmosttypesofnetworkattacks.
Answer:
FALSE
Diff:
2 PageRef:
315
AACSB:
UseofIT
CASE:
Comprehension
Objective:
8.4
16)NATconcealstheIPaddressesoftheorganization’sinternalhostcomputerstodetersnifferprograms.
Answer:
TRUE
Diff:
2 PageRef:
315
AACSB:
UseofIT
CASE:
Comprehension
Objective:
8.4
17)SSLisaprotocolusedtoestablishasecureconnectionbetweentwocomputers.
Answer:
TRUE
Diff:
2 PageRef:
317
AACSB:
UseofIT
CASE:
Comprehension
Objective:
8.4
18)Publickeyencryptionusestwokeys.
Answer:
TRUE
Diff:
2 PageRef:
3127
AACSB:
ReflectiveThinking
CASE:
Comprehension
Objective:
8.4
19)High-availabilitycomputingisalsoreferredtoasfaulttolerance.
Answer:
FALSE
Diff:
2 PageRef:
319
AACSB:
UseofIT
CASE:
Comprehension
Objective:
8.2
20)Bothsoftwaremetricsandsoftwaretestingaretechniquesusedtoimprovesoftwarequality.
Answer:
TRUE
Diff:
2 PageRef:
320
AACSB:
UseofIT
CASE:
Comprehension
Objective:
8.4
21)________referstopolicies,procedures,andtechnicalmeasuresusedtopreventunauthorizedaccess,alternation,theft,orphysicaldamagetoinformationsystems.
A)"Security"
B)"Controls"
C)"Benchmarking"
D)"Algorithms"
Answer:
A
Diff:
2 PageRef:
293
AACSB:
UseofIT
CASE:
Comprehension
Objective:
8.3
22)________referstoallofthemethods,policies,andorganizationalproceduresthatensurethesafetyoftheorganization'sassets,theaccuracyandreliabilityofitsaccountingrecords,andoperationaladherencetomanagementstandards.
A)"Legacysystems"
B)"SSIDstandards"
C)"Vulnerabilities"
D)"Controls"
Answer:
D
Diff:
2 PageRef:
293
AACSB:
UseofIT
CASE:
Comprehension
Objective:
8.3
23)Whichofthefollowingdoesnotposeasecuritythreattowirelessnetw