LaudonEss6_TIF_ch15 - Chapter 15 Information System...

Info iconThis preview shows pages 1–3. Sign up to view the full content.

View Full Document Right Arrow Icon

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
This is the end of the preview. Sign up to access the rest of the document.

Unformatted text preview: Chapter 15 Information System Security and Control 15-1 Chapter 15 Information System Security and Control True-False Questions 1. It is only by careful attention to detail and careful testing that it is possible to achieve the goal of zero defects in large, complex pieces of software. Answer: False Difficulty: Medium Reference: p. 522 2. Automated data are less susceptible to destruction and misuse than paper data. Answer: False Difficulty: Easy Reference: p. 522 3. Firms relying on computers to process critical business transactions could experience a total loss of business function if they lose computer capability for more than a few days. Answer: True Difficulty: Medium Reference: p. 522 4. Advances in telecommunications and computer software have magnified the vulnerabilities of computerized information systems. Answer: True Difficulty: Easy Reference: p. 522 5. Wireless networks are more vulnerable to penetration because radio frequency bands are easy to scan. Answer: True Difficulty: Easy Reference: p. 523 6. A Trojan horse virus stays dormant until a specific time or date condition is met. Answer: False Difficulty: Medium Reference: p. 524 7. Wireless computing devices are not subject to viruses. Answer: False Difficulty: Medium Reference: p. 524 8. Management must continually update antivirus software. Answer: True Difficulty: Easy Reference: p. 524 9. Disaster recovery services offer backup for client/server systems as well as traditional mainframe applications. Answer: True Difficulty: Medium Reference: p. 526 10. One constant threat to information systems is defective software and the subsequent defective data. Answer: True Difficulty: Easy Reference: p. 529 11. It is virtually impossible to eliminate all bugs from large programs. Answer: True Difficulty: Easy Reference: p. 529 15-2 Information Systems Security and Control Chapter 15 12. There is currently no early warning system for cyberattacks or any liaison between the U.S. government and corporations for such warnings. Answer: False Difficulty: Hard Reference: p. 529 13. Maintenance of a system is the most expensive phase of the systems development process. Answer: True Difficulty: Medium Reference: p. 530 14. A majority of systems errors result from early analysis errors. Answer: True Difficulty: Hard Reference: p. 530 15. Errors not detected until after implementation of the information system can take up to 90 times as long to correct as they would if they were caught in the analysis and design stage. Answer: True Difficulty: Medium Reference: p. 530 16. The most common source of information system failure is electrical surges. Answer: False Difficulty: Easy Reference: p. 530 17. It is essential for the success of todays digital businesses that controls must be designed and implemented as early as possible, preferably in the design stage....
View Full Document

This note was uploaded on 06/09/2011 for the course CIS 101 taught by Professor Irenechen during the Spring '11 term at University of Southern Queensland, Ipswich.

Page1 / 18

LaudonEss6_TIF_ch15 - Chapter 15 Information System...

This preview shows document pages 1 - 3. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online