管理信息系统第9版精要版原书英文版题库答案第7章.docx

上传人:b****6 文档编号:5965922 上传时间:2023-01-02 格式:DOCX 页数:27 大小:26.86KB
下载 相关 举报
管理信息系统第9版精要版原书英文版题库答案第7章.docx_第1页
第1页 / 共27页
管理信息系统第9版精要版原书英文版题库答案第7章.docx_第2页
第2页 / 共27页
管理信息系统第9版精要版原书英文版题库答案第7章.docx_第3页
第3页 / 共27页
管理信息系统第9版精要版原书英文版题库答案第7章.docx_第4页
第4页 / 共27页
管理信息系统第9版精要版原书英文版题库答案第7章.docx_第5页
第5页 / 共27页
点击查看更多>>
下载资源
资源描述

管理信息系统第9版精要版原书英文版题库答案第7章.docx

《管理信息系统第9版精要版原书英文版题库答案第7章.docx》由会员分享,可在线阅读,更多相关《管理信息系统第9版精要版原书英文版题库答案第7章.docx(27页珍藏版)》请在冰豆网上搜索。

管理信息系统第9版精要版原书英文版题库答案第7章.docx

管理信息系统第9版精要版原书英文版题库答案第7章

EssentialsofManagementInformationSystems,9e(Laudon/Laudon)

Chapter7SecuringInformationSystems

1)Thepotentialforunauthorizedaccessisusuallylimitedtothecommunicationslinesofanetwork.

Answer:

FALSE

Diff:

2PageRef:

235

AACSB:

UseofIT

CASE:

Comprehension

2)ComputersusingcablemodemstoconnecttotheInternetaremoreopentopenetrationthanthoseconnectingviadial-up.

Answer:

TRUE

Diff:

2PageRef:

236

AACSB:

UseofIT

CASE:

Comprehension

3)Wirelessnetworksarevulnerabletopenetrationbecauseradiofrequencybandsareeasytoscan.

Answer:

TRUE

Diff:

2PageRef:

237

AACSB:

UseofIT

CASE:

Comprehension

4)TherangeofWi-Finetworkscanbeextendeduptotwomilesbyusingexternalantennae.

Answer:

FALSE

Diff:

3PageRef:

237

AACSB:

UseofIT

CASE:

Comprehension

5)TheWEPspecificationcallsforanaccesspointanditsuserstosharethesame40-bitencryptedpassword.

Answer:

TRUE

Diff:

3PageRef:

238

AACSB:

UseofIT

CASE:

Comprehension

6)Virusescanbespreadthroughe-mail.

Answer:

TRUE

Diff:

1PageRef:

238

AACSB:

ReflectiveThinking

CASE:

Comprehension

7)Computerwormsspreadmuchmorerapidlythancomputerviruses.

Answer:

TRUE

Diff:

2PageRef:

238

AACSB:

ReflectiveThinking

CASE:

Comprehension

8)Oneformofspoofinginvolvesforgingthereturnaddressonane-mailsothatthee-mailmessageappearstocomefromsomeoneotherthanthesender.

Answer:

TRUE

Diff:

2PageRef:

240

AACSB:

ReflectiveThinking

CASE:

Comprehension

9)Sniffersenablehackerstostealproprietaryinformationfromanywhereonanetwork,includinge-mailmessages,companyfiles,andconfidentialreports.

Answer:

TRUE

Diff:

2PageRef:

240

AACSB:

ReflectiveThinking

CASE:

Comprehension

10)DoSattacksareusedtodestroyinformationandaccessrestrictedareasofacompany’sinformationsystem.

Answer:

FALSE

Diff:

2PageRef:

241

AACSB:

UseofIT

CASE:

Comprehension

11)DOSattacksareoneofthemosteconomicallydamagingkindsofcomputercrime.

Answer:

TRUE

Diff:

3PageRef:

241

AACSB:

UseofIT

CASE:

Comprehension

12)Zerodefectscannotbeachievedinlargersoftwareprogramsbecausefullytestingprogramsthatcontainthousandsofchoicesandmillionsofpathswouldrequirethousandsofyears.

Answer:

TRUE

Diff:

2PageRef:

245

AACSB:

UseofIT

CASE:

Comprehension

13)Anacceptableusepolicydefinestheacceptablelevelofaccesstoinformationassetsfordifferentusers.

Answer:

FALSE

Diff:

2PageRef:

250

AACSB:

UseofIT

CASE:

Comprehension

14)Biometricauthenticationistheuseofphysicalcharacteristicssuchasretinalimagestoprovideidentification.

Answer:

TRUE

Diff:

1PageRef:

253

AACSB:

ReflectiveThinking

CASE:

Comprehension

15)Packetfilteringcatchesmosttypesofnetworkattacks.

Answer:

FALSE

Diff:

2PageRef:

254

AACSB:

UseofIT

CASE:

Comprehension

16)NATconcealstheIPaddressesoftheorganization’sinternalhostcomputerstodetersnifferprograms.

Answer:

TRUE

Diff:

2PageRef:

254-255

AACSB:

UseofIT

CASE:

Comprehension

17)SSLisaprotocolusedtoestablishasecureconnectionbetweentwocomputers.

Answer:

TRUE

Diff:

2PageRef:

256

AACSB:

UseofIT

CASE:

Comprehension

18)Publickeyencryptionusestwokeys.

Answer:

TRUE

Diff:

2PageRef:

256

AACSB:

ReflectiveThinking

CASE:

Comprehension

19)High-availabilitycomputingisalsoreferredtoasfaulttolerance.

Answer:

FALSE

Diff:

2PageRef:

258

AACSB:

UseofIT

CASE:

Comprehension

20)Smartphonestypicallyfeaturestate-of-the-artencryptionandsecurityfeatures,makingthemhighlysecuretoolsforbusinesses.

Answer:

FALSE

Diff:

2PageRef:

259

AACSB:

UseofIT

CASE:

Comprehension

21)________referstopolicies,procedures,andtechnicalmeasuresusedtopreventunauthorizedaccess,alternation,theft,orphysicaldamagetoinformationsystems.

A)"Security"

B)"Controls"

C)"Benchmarking"

D)"Algorithms"

Answer:

A

Diff:

2PageRef:

235

AACSB:

UseofIT

CASE:

Comprehension

22)________referstoallofthemethods,policies,andorganizationalproceduresthatensurethesafetyoftheorganization'sassets,theaccuracyandreliabilityofitsaccountingrecords,andoperationaladherencetomanagementstandards.

A)"Legacysystems"

B)"SSIDstandards"

C)"Vulnerabilities"

D)"Controls"

Answer:

D

Diff:

2PageRef:

235

AACSB:

UseofIT

CASE:

Comprehension

23)Largeamountsofdatastoredinelectronicformare________thanthesamedatainmanualform.

A)lessvulnerabletodamage

B)moresecure

C)vulnerabletomanymorekindsofthreats

D)morecriticaltomostbusinesses

Answer:

C

Diff:

1PageRef:

235

AACSB:

AnalyticSkills

CASE:

Evaluationintermsofassess

24)Electronicdataaremoresusceptibletodestruction,fraud,error,andmisusebecauseinformationsystemsconcentratedataincomputerfilesthat:

A)areusuallyboundupinlegacysystemsthataredifficulttoaccessanddifficulttocorrectincaseoferror.

B)arenotsecurebecausethetechnologytosecurethemdidnotexistatthetimethefileswerecreated.

C)havethepotentialtobeaccessedbylargenumbersofpeopleandbygroupsoutsideoftheorganization.

D)arefrequentlyavailableontheInternet.

Answer:

C

Diff:

2PageRef:

236-237

AACSB:

AnalyticSkills

CASE:

Analysisintermsofcompare

25)Specificsecuritychallengesthatthreatenthecommunicationslinesinaclient/serverenvironmentinclude:

A)tapping;sniffing;messagealteration;radiation.

B)hacking;vandalism;denialofserviceattacks.

C)theft,copying,alterationofdata;hardwareorsoftwarefailure.

D)unauthorizedaccess;errors;spyware.

Answer:

A

Diff:

3PageRef:

236

AACSB:

AnalyticSkills

CASE:

Analysisintermsofexamine

26)Specificsecuritychallengesthatthreatenclientsinaclient/serverenvironmentinclude:

A)tapping;sniffing;messagealteration;radiation.

B)hacking;vandalism;denialofserviceattacks.

C)theft,copying,alterationofdata;hardwareorsoftwarefailure.

D)unauthorizedaccess;errors;spyware.

Answer:

D

Diff:

2PageRef:

236

AACSB:

AnalyticSkills

CASE:

Analysisintermsofexamine

27)Specificsecuritychallengesthatthreatencorporateserversinaclient/serverenvironmentinclude:

A)tapping;sniffing;messagealteration;radiation.

B)hacking;vandalism;denialofserviceattacks.

C)theft,copying,alterationofdata;hardwareorsoftwarefailure.

D)unauthorizedaccess;errors;spyware.

Answer:

B

Diff:

3PageRef:

236

AACSB:

AnalyticSkills

CASE:

Analysisintermsofexamine

28)TheInternetposesspecificsecurityproblemsbecause:

A)itwasdesignedtobeeasilyaccessible.

B)Internetdataisnotrunoversecurelines.

C)Internetstandardsareuniversal.

D)itchangessorapidly.

Answer:

A

Diff:

2PageRef:

236

AACSB:

UseofIT

CASE:

Comprehension

29)WhichofthefollowingstatementsabouttheInternetsecurityisnottrue?

A)TheuseofP2Pnetworkscanexposeacorporatecomputertooutsiders.

B)AcorporatenetworkwithoutaccesstotheInternetismoresecurethanoneprovidesaccess.

C)VoIPismoresecurethantheswitchedvoicenetwork.

D)Instantmessagingcanprovidehackersaccesstoanotherwisesecurenetwork.

Answer:

C

Diff:

2PageRef:

236-237

AACSB:

AnalyticSkills

CASE:

Analysisintermsofappraise

30)Anindependentcomputerprogramthatcopiesitselffromonecomputertoanotheroveranetworkiscalleda:

A)worm.

B)Trojanhorse.

C)bug.

D)pest.

Answer:

A

Diff:

2PageRef:

238

AACSB:

ReflectiveThinking

CASE:

Comprehension

31)Asalespersonclicksrepeatedlyontheonlineadsofacompetitor'sinordertodrivethecompetitor'sadvertisingcostsup.Thisisanexampleof:

A)phishing.

B)pharming.

C)spoofing.

D)clickfraud.

Answer:

D

Diff:

2PageRef:

244

AACSB:

AnalyticSkills

CASE:

Analysisintermsofcategorize

32)In2004,ICQuserswereenticedbyasalesmessagefromasupposedanti-virusvendor.Onthevendor’ssite,asmallprogramcalledMitgliederwasdownloadedtotheuser’smachine.Theprogramenabledoutsiderstoinfiltratetheuser’smachine.Whattypeofmalwareisthisanexampleof?

A)Trojanhorse

B)Virus

C)Worm

D)Spyware

Answer:

A

Diff:

2PageRef:

238-239

AACSB:

AnalyticSkills

CASE:

Analysisintermsofcategorize

33)RedirectingaWeblinktoadifferentaddressisaformof:

A)snooping.

B)spoofing.

C)sniffing.

D)wardriving.

Answer:

B

Diff:

2PageRef:

240

AACSB:

ReflectiveThinking

CASE:

Comprehension

34)Akeyloggerisatypeof:

A)worm.

B)Trojanhorse.

C)virus.

D)spyware.

Answer:

D

Diff:

1PageRef:

240

AACSB:

ReflectiveThinking

CASE:

Comprehension

35)Hackerscreateabotnetby:

A)infectingWebsearchbotswithmalware.

B)byusingWebsearchbotstoinfectothercomputers.

C)bycausingotherpeople’scomputerstobecome“zombie”PCsfollowingamastercomputer.

D)byinfectingcorporateserverswith“zombie”Trojanhorsesthatallowundetectedaccessthroughabackdoor.

Answer:

C

Diff:

2PageRef:

241

AACSB:

ReflectiveThinking

CASE:

Comprehension

36)Usingnumerouscomputerstoinundateandoverwhelmthenetworkfromnumerouslaunchpointsiscalleda________attack.

A)DDoS

B)DoS

C)SQLinjection

D)phishing

Answer:

A

Diff:

2PageRef:

241

AACSB:

UseofIT

CASE:

Comprehension

37)Whichofthefollowingisnotanexampleofacomputerusedasatargetofcrime?

A)Knowinglyaccessingaprotectedcomputertocommitfraud

B)Accessingacomputersystemwithoutauthority

C)Illegallyaccessingstoredelectroniccommunication

D)Threateningtocausedamagetoaprotectedcomputer

Answer:

C

Diff:

2PageRef:

242

AACSB:

AnalyticSkills

CASE:

Analysisintermsofcategorize

38)Whichofthefollowingisnotanexampleofacom

展开阅读全文
相关资源
猜你喜欢
相关搜索

当前位置:首页 > 经管营销 > 公共行政管理

copyright@ 2008-2022 冰豆网网站版权所有

经营许可证编号:鄂ICP备2022015515号-1