管理信息系统第9版精要版原书英文版题库答案第7章Word文件下载.docx

上传人:b****6 文档编号:18958176 上传时间:2023-01-02 格式:DOCX 页数:27 大小:26.86KB
下载 相关 举报
管理信息系统第9版精要版原书英文版题库答案第7章Word文件下载.docx_第1页
第1页 / 共27页
管理信息系统第9版精要版原书英文版题库答案第7章Word文件下载.docx_第2页
第2页 / 共27页
管理信息系统第9版精要版原书英文版题库答案第7章Word文件下载.docx_第3页
第3页 / 共27页
管理信息系统第9版精要版原书英文版题库答案第7章Word文件下载.docx_第4页
第4页 / 共27页
管理信息系统第9版精要版原书英文版题库答案第7章Word文件下载.docx_第5页
第5页 / 共27页
点击查看更多>>
下载资源
资源描述

管理信息系统第9版精要版原书英文版题库答案第7章Word文件下载.docx

《管理信息系统第9版精要版原书英文版题库答案第7章Word文件下载.docx》由会员分享,可在线阅读,更多相关《管理信息系统第9版精要版原书英文版题库答案第7章Word文件下载.docx(27页珍藏版)》请在冰豆网上搜索。

管理信息系统第9版精要版原书英文版题库答案第7章Word文件下载.docx

236

3)Wirelessnetworksarevulnerabletopenetrationbecauseradiofrequencybandsareeasytoscan.

237

4)TherangeofWi-Finetworkscanbeextendeduptotwomilesbyusingexternalantennae.

3PageRef:

5)TheWEPspecificationcallsforanaccesspointanditsuserstosharethesame40-bitencryptedpassword.

238

6)Virusescanbespreadthroughe-mail.

1PageRef:

ReflectiveThinking

7)Computerwormsspreadmuchmorerapidlythancomputerviruses.

8)Oneformofspoofinginvolvesforgingthereturnaddressonane-mailsothatthee-mailmessageappearstocomefromsomeoneotherthanthesender.

240

9)Sniffersenablehackerstostealproprietaryinformationfromanywhereonanetwork,includinge-mailmessages,companyfiles,andconfidentialreports.

10)DoSattacksareusedtodestroyinformationandaccessrestrictedareasofacompany’sinformationsystem.

241

11)DOSattacksareoneofthemosteconomicallydamagingkindsofcomputercrime.

12)Zerodefectscannotbeachievedinlargersoftwareprogramsbecausefullytestingprogramsthatcontainthousandsofchoicesandmillionsofpathswouldrequirethousandsofyears.

245

13)Anacceptableusepolicydefinestheacceptablelevelofaccesstoinformationassetsfordifferentusers.

250

14)Biometricauthenticationistheuseofphysicalcharacteristicssuchasretinalimagestoprovideidentification.

253

15)Packetfilteringcatchesmosttypesofnetworkattacks.

254

16)NATconcealstheIPaddressesoftheorganization’sinternalhostcomputerstodetersnifferprograms.

254-255

17)SSLisaprotocolusedtoestablishasecureconnectionbetweentwocomputers.

256

18)Publickeyencryptionusestwokeys.

19)High-availabilitycomputingisalsoreferredtoasfaulttolerance.

258

20)Smartphonestypicallyfeaturestate-of-the-artencryptionandsecurityfeatures,makingthemhighlysecuretoolsforbusinesses.

259

21)________referstopolicies,procedures,andtechnicalmeasuresusedtopreventunauthorizedaccess,alternation,theft,orphysicaldamagetoinformationsystems.

A)"

Security"

B)"

Controls"

C)"

Benchmarking"

D)"

Algorithms"

A

22)________referstoallofthemethods,policies,andorganizationalproceduresthatensurethesafetyoftheorganization'

sassets,theaccuracyandreliabilityofitsaccountingrecords,andoperationaladherencetomanagementstandards.

Legacysystems"

SSIDstandards"

Vulnerabilities"

D

23)Largeamountsofdatastoredinelectronicformare________thanthesamedatainmanualform.

A)lessvulnerabletodamage

B)moresecure

C)vulnerabletomanymorekindsofthreats

D)morecriticaltomostbusinesses

C

AnalyticSkills

Evaluationintermsofassess

24)Electronicdataaremoresusceptibletodestruction,fraud,error,andmisusebecauseinformationsystemsconcentratedataincomputerfilesthat:

A)areusuallyboundupinlegacysystemsthataredifficulttoaccessanddifficulttocorrectincaseoferror.

B)arenotsecurebecausethetechnologytosecurethemdidnotexistatthetimethefileswerecreated.

C)havethepotentialtobeaccessedbylargenumbersofpeopleandbygroupsoutsideoftheorganization.

D)arefrequentlyavailableontheInternet.

236-237

Analysisintermsofcompare

25)Specificsecuritychallengesthatthreatenthecommunicationslinesinaclient/serverenvironmentinclude:

A)tapping;

sniffing;

messagealteration;

radiation.

B)hacking;

vandalism;

denialofserviceattacks.

C)theft,copying,alterationofdata;

hardwareorsoftwarefailure.

D)unauthorizedaccess;

errors;

spyware.

Analysisintermsofexamine

26)Specificsecuritychallengesthatthreatenclientsinaclient/serverenvironmentinclude:

spyware.

27)Specificsecuritychallengesthatthreatencorporateserversinaclient/serverenvironmentinclude:

B

28)TheInternetposesspecificsecurityproblemsbecause:

A)itwasdesignedtobeeasilyaccessible.

B)Internetdataisnotrunoversecurelines.

C)Internetstandardsareuniversal.

D)itchangessorapidly.

29)WhichofthefollowingstatementsabouttheInternetsecurityisnottrue?

A)TheuseofP2Pnetworkscanexposeacorporatecomputertooutsiders.

B)AcorporatenetworkwithoutaccesstotheInternetismoresecurethanoneprovidesaccess.

C)VoIPismoresecurethantheswitchedvoicenetwork.

D)Instantmessagingcanprovidehackersaccesstoanotherwisesecurenetwork.

Analysisintermsofappraise

30)Anindependentcomputerprogramthatcopiesitselffromonecomputertoanotheroveranetworkiscalleda:

A)worm.

B)Trojanhorse.

C)bug.

D)pest.

31)Asalespersonclicksrepeatedlyontheonlineadsofacompetitor'

sinordertodrivethecompetitor'

sadvertisingcostsup.Thisisanexampleof:

A)phishing.

B)pharming.

C)spoofing.

D)clickfraud.

244

Analysisintermsofcategorize

32)In2004,ICQuserswereenticedbyasalesmessagefromasupposedanti-virusvendor.Onthevendor’ssite,asmallprogramcalledMitgliederwasdownloadedtotheuser’smachine.Theprogramenabledoutsiderstoinfiltratetheuser’smachine.Whattypeofmalwareisthisanexampleof?

A)Trojanhorse

B)Virus

C)Worm

D)Spyware

238-239

33)RedirectingaWeblinktoadifferentaddressisaformof:

A)snooping.

B)spoofing.

C)sniffing.

D)wardriving.

34)Akeyloggerisatypeof:

C)virus.

D)spyware.

35)Hackerscreateabotnetby:

A)infectingWebsearchbotswithmalware.

B)byusingWebsearchbotstoinfectothercomputers.

C)bycausingotherpeople’scomputerstobecome“zombie”PCsfollowingamastercomputer.

D)byinfectingcorporateserverswith“zombie”Trojanhorsesthatallowundetectedaccessthroughabackdoor.

36)Usingnumerouscomputerstoinundateandoverwhelmthenetworkfromnumerouslaunchpointsiscalleda________attack.

A)DDoS

B)DoS

C)SQLinjection

D)phishing

37)Whichofthefollowingisnotanexampleofacomputerusedasatargetofcrime?

A)Knowinglyaccessingaprotectedcomputertocommitfraud

B)Accessingacomputersystemwithoutauthority

C)Illegallyaccessingstoredelectroniccommunication

D)Threateningtocausedamagetoaprotectedcomputer

242

38)Whichofthefollowingisnotanexampleofacom

展开阅读全文
相关资源
猜你喜欢
相关搜索

当前位置:首页 > 外语学习 > 英语考试

copyright@ 2008-2022 冰豆网网站版权所有

经营许可证编号:鄂ICP备2022015515号-1