Chapter 15
Information System Security and Control
15
-
1
Chapter 15
Information System Security and Control
True-False Questions
1.
It is only by careful attention to detail and careful testing that it is possible to achieve the goal
of zero defects in large, complex pieces of software.
Answer: False
Difficulty: Medium
Reference: p. 522
2.
Automated data are less susceptible to destruction and misuse than paper data.
Answer: False
Difficulty: Easy
Reference: p. 522
3.
Firms relying on computers to process critical business transactions could experience a total
loss of business function if they lose computer capability for more than a few days.
Answer: True
Difficulty: Medium
Reference: p. 522
4.
Advances in telecommunications and computer software have magnified the vulnerabilities of
computerized information systems.
Answer: True
Difficulty: Easy
Reference: p. 522
5.
Wireless networks are more vulnerable to penetration because radio frequency bands are
easy to scan.
Answer: True
Difficulty: Easy
Reference: p. 523
6.
A Trojan horse virus stays dormant until a specific time or date condition is met.
Answer: False
Difficulty: Medium
Reference: p. 524
7.
Wireless computing devices are not subject to viruses.
Answer: False
Difficulty: Medium
Reference: p. 524
8.
Management must continually update antivirus software.
Answer: True
Difficulty: Easy
Reference: p. 524
9.
Disaster recovery services offer backup for client/server systems as well as traditional
mainframe applications.
Answer: True
Difficulty: Medium
Reference: p. 526
10.
One constant threat to information systems is defective software and the subsequent
defective data.
Answer: True
Difficulty: Easy
Reference: p. 529
11.
It is virtually impossible to eliminate all bugs from large programs.
Answer: True
Difficulty: Easy
Reference: p. 529
This
preview
has intentionally blurred sections.
Sign up to view the full version.
15-2
Information Systems Security and Control
Chapter 15
12.
There is currently no early warning system for cyberattacks or any liaison between the U.S.
government and corporations for such warnings.
Answer: False
Difficulty: Hard
Reference: p. 529
13.
Maintenance of a system is the most expensive phase of the systems development process.
Answer: True
Difficulty: Medium
Reference: p. 530
14.
A majority of systems errors result from early analysis errors.
Answer: True
Difficulty: Hard
Reference: p. 530
15.
Errors not detected until after implementation of the information system can take up to 90
times as long to correct as they would if they were caught in the analysis and design stage.
Answer: True
Difficulty: Medium
Reference: p. 530
16.
The most common source of information system failure is electrical surges.
Answer: False
Difficulty: Easy
Reference: p. 530
17.
It is essential for the success of today’s digital businesses that controls must be designed
and implemented as early as possible, preferably in the design stage.

This is the end of the preview.
Sign up
to
access the rest of the document.
- Spring '11
- IreneChen
- Information Security, Computer Security, 175, Difficulty
-
Click to edit the document details