管理信息系统第9版精要版原书英文版题库答案第7章.docx
《管理信息系统第9版精要版原书英文版题库答案第7章.docx》由会员分享,可在线阅读,更多相关《管理信息系统第9版精要版原书英文版题库答案第7章.docx(27页珍藏版)》请在冰豆网上搜索。
管理信息系统第9版精要版原书英文版题库答案第7章
EssentialsofManagementInformationSystems,9e(Laudon/Laudon)
Chapter7SecuringInformationSystems
1)Thepotentialforunauthorizedaccessisusuallylimitedtothecommunicationslinesofanetwork.
Answer:
FALSE
Diff:
2PageRef:
235
AACSB:
UseofIT
CASE:
Comprehension
2)ComputersusingcablemodemstoconnecttotheInternetaremoreopentopenetrationthanthoseconnectingviadial-up.
Answer:
TRUE
Diff:
2PageRef:
236
AACSB:
UseofIT
CASE:
Comprehension
3)Wirelessnetworksarevulnerabletopenetrationbecauseradiofrequencybandsareeasytoscan.
Answer:
TRUE
Diff:
2PageRef:
237
AACSB:
UseofIT
CASE:
Comprehension
4)TherangeofWi-Finetworkscanbeextendeduptotwomilesbyusingexternalantennae.
Answer:
FALSE
Diff:
3PageRef:
237
AACSB:
UseofIT
CASE:
Comprehension
5)TheWEPspecificationcallsforanaccesspointanditsuserstosharethesame40-bitencryptedpassword.
Answer:
TRUE
Diff:
3PageRef:
238
AACSB:
UseofIT
CASE:
Comprehension
6)Virusescanbespreadthroughe-mail.
Answer:
TRUE
Diff:
1PageRef:
238
AACSB:
ReflectiveThinking
CASE:
Comprehension
7)Computerwormsspreadmuchmorerapidlythancomputerviruses.
Answer:
TRUE
Diff:
2PageRef:
238
AACSB:
ReflectiveThinking
CASE:
Comprehension
8)Oneformofspoofinginvolvesforgingthereturnaddressonane-mailsothatthee-mailmessageappearstocomefromsomeoneotherthanthesender.
Answer:
TRUE
Diff:
2PageRef:
240
AACSB:
ReflectiveThinking
CASE:
Comprehension
9)Sniffersenablehackerstostealproprietaryinformationfromanywhereonanetwork,includinge-mailmessages,companyfiles,andconfidentialreports.
Answer:
TRUE
Diff:
2PageRef:
240
AACSB:
ReflectiveThinking
CASE:
Comprehension
10)DoSattacksareusedtodestroyinformationandaccessrestrictedareasofacompany’sinformationsystem.
Answer:
FALSE
Diff:
2PageRef:
241
AACSB:
UseofIT
CASE:
Comprehension
11)DOSattacksareoneofthemosteconomicallydamagingkindsofcomputercrime.
Answer:
TRUE
Diff:
3PageRef:
241
AACSB:
UseofIT
CASE:
Comprehension
12)Zerodefectscannotbeachievedinlargersoftwareprogramsbecausefullytestingprogramsthatcontainthousandsofchoicesandmillionsofpathswouldrequirethousandsofyears.
Answer:
TRUE
Diff:
2PageRef:
245
AACSB:
UseofIT
CASE:
Comprehension
13)Anacceptableusepolicydefinestheacceptablelevelofaccesstoinformationassetsfordifferentusers.
Answer:
FALSE
Diff:
2PageRef:
250
AACSB:
UseofIT
CASE:
Comprehension
14)Biometricauthenticationistheuseofphysicalcharacteristicssuchasretinalimagestoprovideidentification.
Answer:
TRUE
Diff:
1PageRef:
253
AACSB:
ReflectiveThinking
CASE:
Comprehension
15)Packetfilteringcatchesmosttypesofnetworkattacks.
Answer:
FALSE
Diff:
2PageRef:
254
AACSB:
UseofIT
CASE:
Comprehension
16)NATconcealstheIPaddressesoftheorganization’sinternalhostcomputerstodetersnifferprograms.
Answer:
TRUE
Diff:
2PageRef:
254-255
AACSB:
UseofIT
CASE:
Comprehension
17)SSLisaprotocolusedtoestablishasecureconnectionbetweentwocomputers.
Answer:
TRUE
Diff:
2PageRef:
256
AACSB:
UseofIT
CASE:
Comprehension
18)Publickeyencryptionusestwokeys.
Answer:
TRUE
Diff:
2PageRef:
256
AACSB:
ReflectiveThinking
CASE:
Comprehension
19)High-availabilitycomputingisalsoreferredtoasfaulttolerance.
Answer:
FALSE
Diff:
2PageRef:
258
AACSB:
UseofIT
CASE:
Comprehension
20)Smartphonestypicallyfeaturestate-of-the-artencryptionandsecurityfeatures,makingthemhighlysecuretoolsforbusinesses.
Answer:
FALSE
Diff:
2PageRef:
259
AACSB:
UseofIT
CASE:
Comprehension
21)________referstopolicies,procedures,andtechnicalmeasuresusedtopreventunauthorizedaccess,alternation,theft,orphysicaldamagetoinformationsystems.
A)"Security"
B)"Controls"
C)"Benchmarking"
D)"Algorithms"
Answer:
A
Diff:
2PageRef:
235
AACSB:
UseofIT
CASE:
Comprehension
22)________referstoallofthemethods,policies,andorganizationalproceduresthatensurethesafetyoftheorganization'sassets,theaccuracyandreliabilityofitsaccountingrecords,andoperationaladherencetomanagementstandards.
A)"Legacysystems"
B)"SSIDstandards"
C)"Vulnerabilities"
D)"Controls"
Answer:
D
Diff:
2PageRef:
235
AACSB:
UseofIT
CASE:
Comprehension
23)Largeamountsofdatastoredinelectronicformare________thanthesamedatainmanualform.
A)lessvulnerabletodamage
B)moresecure
C)vulnerabletomanymorekindsofthreats
D)morecriticaltomostbusinesses
Answer:
C
Diff:
1PageRef:
235
AACSB:
AnalyticSkills
CASE:
Evaluationintermsofassess
24)Electronicdataaremoresusceptibletodestruction,fraud,error,andmisusebecauseinformationsystemsconcentratedataincomputerfilesthat:
A)areusuallyboundupinlegacysystemsthataredifficulttoaccessanddifficulttocorrectincaseoferror.
B)arenotsecurebecausethetechnologytosecurethemdidnotexistatthetimethefileswerecreated.
C)havethepotentialtobeaccessedbylargenumbersofpeopleandbygroupsoutsideoftheorganization.
D)arefrequentlyavailableontheInternet.
Answer:
C
Diff:
2PageRef:
236-237
AACSB:
AnalyticSkills
CASE:
Analysisintermsofcompare
25)Specificsecuritychallengesthatthreatenthecommunicationslinesinaclient/serverenvironmentinclude:
A)tapping;sniffing;messagealteration;radiation.
B)hacking;vandalism;denialofserviceattacks.
C)theft,copying,alterationofdata;hardwareorsoftwarefailure.
D)unauthorizedaccess;errors;spyware.
Answer:
A
Diff:
3PageRef:
236
AACSB:
AnalyticSkills
CASE:
Analysisintermsofexamine
26)Specificsecuritychallengesthatthreatenclientsinaclient/serverenvironmentinclude:
A)tapping;sniffing;messagealteration;radiation.
B)hacking;vandalism;denialofserviceattacks.
C)theft,copying,alterationofdata;hardwareorsoftwarefailure.
D)unauthorizedaccess;errors;spyware.
Answer:
D
Diff:
2PageRef:
236
AACSB:
AnalyticSkills
CASE:
Analysisintermsofexamine
27)Specificsecuritychallengesthatthreatencorporateserversinaclient/serverenvironmentinclude:
A)tapping;sniffing;messagealteration;radiation.
B)hacking;vandalism;denialofserviceattacks.
C)theft,copying,alterationofdata;hardwareorsoftwarefailure.
D)unauthorizedaccess;errors;spyware.
Answer:
B
Diff:
3PageRef:
236
AACSB:
AnalyticSkills
CASE:
Analysisintermsofexamine
28)TheInternetposesspecificsecurityproblemsbecause:
A)itwasdesignedtobeeasilyaccessible.
B)Internetdataisnotrunoversecurelines.
C)Internetstandardsareuniversal.
D)itchangessorapidly.
Answer:
A
Diff:
2PageRef:
236
AACSB:
UseofIT
CASE:
Comprehension
29)WhichofthefollowingstatementsabouttheInternetsecurityisnottrue?
A)TheuseofP2Pnetworkscanexposeacorporatecomputertooutsiders.
B)AcorporatenetworkwithoutaccesstotheInternetismoresecurethanoneprovidesaccess.
C)VoIPismoresecurethantheswitchedvoicenetwork.
D)Instantmessagingcanprovidehackersaccesstoanotherwisesecurenetwork.
Answer:
C
Diff:
2PageRef:
236-237
AACSB:
AnalyticSkills
CASE:
Analysisintermsofappraise
30)Anindependentcomputerprogramthatcopiesitselffromonecomputertoanotheroveranetworkiscalleda:
A)worm.
B)Trojanhorse.
C)bug.
D)pest.
Answer:
A
Diff:
2PageRef:
238
AACSB:
ReflectiveThinking
CASE:
Comprehension
31)Asalespersonclicksrepeatedlyontheonlineadsofacompetitor'sinordertodrivethecompetitor'sadvertisingcostsup.Thisisanexampleof:
A)phishing.
B)pharming.
C)spoofing.
D)clickfraud.
Answer:
D
Diff:
2PageRef:
244
AACSB:
AnalyticSkills
CASE:
Analysisintermsofcategorize
32)In2004,ICQuserswereenticedbyasalesmessagefromasupposedanti-virusvendor.Onthevendor’ssite,asmallprogramcalledMitgliederwasdownloadedtotheuser’smachine.Theprogramenabledoutsiderstoinfiltratetheuser’smachine.Whattypeofmalwareisthisanexampleof?
A)Trojanhorse
B)Virus
C)Worm
D)Spyware
Answer:
A
Diff:
2PageRef:
238-239
AACSB:
AnalyticSkills
CASE:
Analysisintermsofcategorize
33)RedirectingaWeblinktoadifferentaddressisaformof:
A)snooping.
B)spoofing.
C)sniffing.
D)wardriving.
Answer:
B
Diff:
2PageRef:
240
AACSB:
ReflectiveThinking
CASE:
Comprehension
34)Akeyloggerisatypeof:
A)worm.
B)Trojanhorse.
C)virus.
D)spyware.
Answer:
D
Diff:
1PageRef:
240
AACSB:
ReflectiveThinking
CASE:
Comprehension
35)Hackerscreateabotnetby:
A)infectingWebsearchbotswithmalware.
B)byusingWebsearchbotstoinfectothercomputers.
C)bycausingotherpeople’scomputerstobecome“zombie”PCsfollowingamastercomputer.
D)byinfectingcorporateserverswith“zombie”Trojanhorsesthatallowundetectedaccessthroughabackdoor.
Answer:
C
Diff:
2PageRef:
241
AACSB:
ReflectiveThinking
CASE:
Comprehension
36)Usingnumerouscomputerstoinundateandoverwhelmthenetworkfromnumerouslaunchpointsiscalleda________attack.
A)DDoS
B)DoS
C)SQLinjection
D)phishing
Answer:
A
Diff:
2PageRef:
241
AACSB:
UseofIT
CASE:
Comprehension
37)Whichofthefollowingisnotanexampleofacomputerusedasatargetofcrime?
A)Knowinglyaccessingaprotectedcomputertocommitfraud
B)Accessingacomputersystemwithoutauthority
C)Illegallyaccessingstoredelectroniccommunication
D)Threateningtocausedamagetoaprotectedcomputer
Answer:
C
Diff:
2PageRef:
242
AACSB:
AnalyticSkills
CASE:
Analysisintermsofcategorize
38)Whichofthefollowingisnotanexampleofacom