MIS10E_testbank_CH08

MIS10E_testbank_CH08 - Chapter 8 Securing Information...

Info iconThis preview shows pages 1–3. Sign up to view the full content.

View Full Document Right Arrow Icon
Chapter 8 Securing Information Systems True-False Questions 1. The potential for unauthorized access is usually limited to the entry points of a network. Answer: False Difficulty: Easy Reference: p. 316 2. Computers using a DSL line are generally more vulnerable to outside intruders than older dial-up lines. Answer: True Difficulty: Easy Reference: p. 317 3. The WEP specification calls for users to create unique 40-bit encrypted passwords. Answer: False Difficulty: Hard Reference: p. 319 4. Viruses cannot be spread through e-mail. Answer: False Difficulty: Easy Reference: p. 319 5. A worm is a computer virus that replicates and spreads itself, not only from file to file, but also from computer to computer via e-mail and other Internet traffic. Answer: True Difficulty: Easy Reference: p. 319 6. Trojan horse software is designed to record keystrokes and mouse clicks performed at the computer. Answer: False Difficulty: Medium Reference: p. 320 7. One form of spoofing involves forging the return address on an e-mail so that the e-mail message appears to come from someone other than the sender. Answer: True Difficulty: Medium Reference: p. 321 8. Sniffers enable hackers to steal proprietary information from anywhere on a network, including e-mail messages, company files, and confidential reports. Answer: True Difficulty: Medium Reference: p. 321 9. In a DDoS attack, numerous computers are used to inundate and overwhelm a network from numerous launch points. Answer: True Difficulty: Medium Reference: p. 322 123
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
10. Analysis Bot attacks can be prevented by using antivirus and antispyware software. Answer: False Difficulty: Medium Reference: p. 323 Analysis in terms of examine 11. The most economically damaging kinds of computer crime are e-mail viruses. Answer: False Difficulty: Hard Reference: p. 325 12. Computer forensics experts try to recover ambient data, which are not visible to the average computer user. Answer: True Difficulty: Medium Reference: pp. 329–330 13. An acceptable use policy defines the acceptable level of access to information assets for different users. Answer: False Difficulty: Medium Reference: p. 331 14. Fault-tolerant computers contain redundant hardware, software, and power supply components. Answer: True Difficulty: Easy Reference: p. 333 15. A disaster recovery plan details what you are going to do if disaster strikes and threatens to or actually does knock out your IT system. Answer: True Difficulty: Easy Reference: p. 333 16. Biometric authentication is the use of physical characteristics such as retinal images to provide identification. Answer: True Difficulty: Easy Reference: p. 336 17. NAT conceals the IP addresses of the organization’s internal host computers to deter sniffer programs. Answer: True Difficulty: Medium Reference: p. 338 18. Antivirus software can detect and eliminate viruses that are trying to enter your system.
Background image of page 2
Image of page 3
This is the end of the preview. Sign up to access the rest of the document.

This note was uploaded on 02/14/2012 for the course MIS 213 taught by Professor Shymic during the Spring '11 term at Emporia.

Page1 / 20

MIS10E_testbank_CH08 - Chapter 8 Securing Information...

This preview shows document pages 1 - 3. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online