管理信息系统第9版精要版原书英文版题库答案第7章Word文件下载.docx
《管理信息系统第9版精要版原书英文版题库答案第7章Word文件下载.docx》由会员分享,可在线阅读,更多相关《管理信息系统第9版精要版原书英文版题库答案第7章Word文件下载.docx(27页珍藏版)》请在冰豆网上搜索。
236
3)Wirelessnetworksarevulnerabletopenetrationbecauseradiofrequencybandsareeasytoscan.
237
4)TherangeofWi-Finetworkscanbeextendeduptotwomilesbyusingexternalantennae.
3PageRef:
5)TheWEPspecificationcallsforanaccesspointanditsuserstosharethesame40-bitencryptedpassword.
238
6)Virusescanbespreadthroughe-mail.
1PageRef:
ReflectiveThinking
7)Computerwormsspreadmuchmorerapidlythancomputerviruses.
8)Oneformofspoofinginvolvesforgingthereturnaddressonane-mailsothatthee-mailmessageappearstocomefromsomeoneotherthanthesender.
240
9)Sniffersenablehackerstostealproprietaryinformationfromanywhereonanetwork,includinge-mailmessages,companyfiles,andconfidentialreports.
10)DoSattacksareusedtodestroyinformationandaccessrestrictedareasofacompany’sinformationsystem.
241
11)DOSattacksareoneofthemosteconomicallydamagingkindsofcomputercrime.
12)Zerodefectscannotbeachievedinlargersoftwareprogramsbecausefullytestingprogramsthatcontainthousandsofchoicesandmillionsofpathswouldrequirethousandsofyears.
245
13)Anacceptableusepolicydefinestheacceptablelevelofaccesstoinformationassetsfordifferentusers.
250
14)Biometricauthenticationistheuseofphysicalcharacteristicssuchasretinalimagestoprovideidentification.
253
15)Packetfilteringcatchesmosttypesofnetworkattacks.
254
16)NATconcealstheIPaddressesoftheorganization’sinternalhostcomputerstodetersnifferprograms.
254-255
17)SSLisaprotocolusedtoestablishasecureconnectionbetweentwocomputers.
256
18)Publickeyencryptionusestwokeys.
19)High-availabilitycomputingisalsoreferredtoasfaulttolerance.
258
20)Smartphonestypicallyfeaturestate-of-the-artencryptionandsecurityfeatures,makingthemhighlysecuretoolsforbusinesses.
259
21)________referstopolicies,procedures,andtechnicalmeasuresusedtopreventunauthorizedaccess,alternation,theft,orphysicaldamagetoinformationsystems.
A)"
Security"
B)"
Controls"
C)"
Benchmarking"
D)"
Algorithms"
A
22)________referstoallofthemethods,policies,andorganizationalproceduresthatensurethesafetyoftheorganization'
sassets,theaccuracyandreliabilityofitsaccountingrecords,andoperationaladherencetomanagementstandards.
Legacysystems"
SSIDstandards"
Vulnerabilities"
D
23)Largeamountsofdatastoredinelectronicformare________thanthesamedatainmanualform.
A)lessvulnerabletodamage
B)moresecure
C)vulnerabletomanymorekindsofthreats
D)morecriticaltomostbusinesses
C
AnalyticSkills
Evaluationintermsofassess
24)Electronicdataaremoresusceptibletodestruction,fraud,error,andmisusebecauseinformationsystemsconcentratedataincomputerfilesthat:
A)areusuallyboundupinlegacysystemsthataredifficulttoaccessanddifficulttocorrectincaseoferror.
B)arenotsecurebecausethetechnologytosecurethemdidnotexistatthetimethefileswerecreated.
C)havethepotentialtobeaccessedbylargenumbersofpeopleandbygroupsoutsideoftheorganization.
D)arefrequentlyavailableontheInternet.
236-237
Analysisintermsofcompare
25)Specificsecuritychallengesthatthreatenthecommunicationslinesinaclient/serverenvironmentinclude:
A)tapping;
sniffing;
messagealteration;
radiation.
B)hacking;
vandalism;
denialofserviceattacks.
C)theft,copying,alterationofdata;
hardwareorsoftwarefailure.
D)unauthorizedaccess;
errors;
spyware.
Analysisintermsofexamine
26)Specificsecuritychallengesthatthreatenclientsinaclient/serverenvironmentinclude:
spyware.
27)Specificsecuritychallengesthatthreatencorporateserversinaclient/serverenvironmentinclude:
B
28)TheInternetposesspecificsecurityproblemsbecause:
A)itwasdesignedtobeeasilyaccessible.
B)Internetdataisnotrunoversecurelines.
C)Internetstandardsareuniversal.
D)itchangessorapidly.
29)WhichofthefollowingstatementsabouttheInternetsecurityisnottrue?
A)TheuseofP2Pnetworkscanexposeacorporatecomputertooutsiders.
B)AcorporatenetworkwithoutaccesstotheInternetismoresecurethanoneprovidesaccess.
C)VoIPismoresecurethantheswitchedvoicenetwork.
D)Instantmessagingcanprovidehackersaccesstoanotherwisesecurenetwork.
Analysisintermsofappraise
30)Anindependentcomputerprogramthatcopiesitselffromonecomputertoanotheroveranetworkiscalleda:
A)worm.
B)Trojanhorse.
C)bug.
D)pest.
31)Asalespersonclicksrepeatedlyontheonlineadsofacompetitor'
sinordertodrivethecompetitor'
sadvertisingcostsup.Thisisanexampleof:
A)phishing.
B)pharming.
C)spoofing.
D)clickfraud.
244
Analysisintermsofcategorize
32)In2004,ICQuserswereenticedbyasalesmessagefromasupposedanti-virusvendor.Onthevendor’ssite,asmallprogramcalledMitgliederwasdownloadedtotheuser’smachine.Theprogramenabledoutsiderstoinfiltratetheuser’smachine.Whattypeofmalwareisthisanexampleof?
A)Trojanhorse
B)Virus
C)Worm
D)Spyware
238-239
33)RedirectingaWeblinktoadifferentaddressisaformof:
A)snooping.
B)spoofing.
C)sniffing.
D)wardriving.
34)Akeyloggerisatypeof:
C)virus.
D)spyware.
35)Hackerscreateabotnetby:
A)infectingWebsearchbotswithmalware.
B)byusingWebsearchbotstoinfectothercomputers.
C)bycausingotherpeople’scomputerstobecome“zombie”PCsfollowingamastercomputer.
D)byinfectingcorporateserverswith“zombie”Trojanhorsesthatallowundetectedaccessthroughabackdoor.
36)Usingnumerouscomputerstoinundateandoverwhelmthenetworkfromnumerouslaunchpointsiscalleda________attack.
A)DDoS
B)DoS
C)SQLinjection
D)phishing
37)Whichofthefollowingisnotanexampleofacomputerusedasatargetofcrime?
A)Knowinglyaccessingaprotectedcomputertocommitfraud
B)Accessingacomputersystemwithoutauthority
C)Illegallyaccessingstoredelectroniccommunication
D)Threateningtocausedamagetoaprotectedcomputer
242
38)Whichofthefollowingisnotanexampleofacom