BUR410Fall2010HW78NA

BUR410Fall2010HW78NA - BUS410 Home Work, Chapters 7, 8...

Info iconThis preview shows pages 1–2. Sign up to view the full content.

View Full Document Right Arrow Icon
BUS410 Home Work, Chapters 7, 8 Name___________________________________ MULTIPLE CHOICE. Choose the one alternative that best completes the statement or answers the question. 1) Instant messaging is a type of ________ service. 1) A) chat B) cellular C) Web D) wireless 2) The Sarbanes - Oxley Act 2) A) requires financial institutions to ensure the security of customer data. B) specifies best practices in information systems security and control. C) imposes responsibility on companies and management to safeguard the accuracy of financial information. D) outlines medical security and privacy rules. 3) Application controls 3) A) can be class ified as input controls, processing controls, and output controls. B) govern the design, security, and use of computer programs and the security of data files in general throughout the organization. C) apply to all computerized applications and consist of a combination of hardware, software, and manual procedures that create an overall control environment. D) include software controls, computer operations controls, and implementation controls. 4) A network that connects authorized customers, suppliers, and other business partners to portions of a firm's internal network is called a(n) 4) A) intranet. B) extranet. C) enterprise network. D) virtual private network. 5) Which of the following is NOT an example of a computer used as a target of crime? 5) A) knowingly accessing a protected computer to commit fraud B) accessing a computer system without authority C) illegally accessing stored electronic communication D) threatening to cause damage to a protected computer 6) You have been hired as a security consultant for a legal firm. Which of the following constitutes the greatest threat, in terms of security, to the firm? 6) A) wireless network B) employees C) authentication procedures D) lack of data encryption 7) Phishing involves 7) A) setting up bogus Wi - Fi hot spots. B) setting up fake Web sites to ask users for confidential information. C)
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Image of page 2
This is the end of the preview. Sign up to access the rest of the document.

Page1 / 5

BUR410Fall2010HW78NA - BUS410 Home Work, Chapters 7, 8...

This preview shows document pages 1 - 2. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online