mis12-信息系统复习参考8.doc
《mis12-信息系统复习参考8.doc》由会员分享,可在线阅读,更多相关《mis12-信息系统复习参考8.doc(24页珍藏版)》请在冰点文库上搜索。
ManagementInformationSystems,12e(Laudon)
Chapter8SecuringInformationSystems
1)Inadditiontoe-mail,instantmessagesandP2Pfile-sharingcanalsoposesecuritythreatstocomputersystemsandnetworks.
Answer:
TRUE
Diff:
1 PageRef:
294
AACSB:
UseofIT
CASE:
Comprehension
Objective:
8.1
2)ComputersusingcablemodemstoconnecttotheInternetaremoreopentopenetrationthanthoseconnectingviadial-up.
Answer:
TRUE
Diff:
2 PageRef:
294
AACSB:
UseofIT
CASE:
Comprehension
Objective:
8.1
3)Wirelessnetworksarevulnerabletopenetrationbecauseradiofrequencybandsareeasytoscan.
Answer:
TRUE
Diff:
2 PageRef:
295
AACSB:
UseofIT
CASE:
Comprehension
Objective:
8.1
4)TherangeofWi-Finetworkscanbeextendeduptotwomilesbyusingexternalantennae.
Answer:
FALSE
Diff:
3 PageRef:
295
AACSB:
UseofIT
CASE:
Comprehension
Objective:
8.1
5)TheWEPspecificationcallsforanaccesspointanditsuserstosharethesame40-bitencryptedpassword.
Answer:
TRUE
Diff:
3 PageRef:
296
AACSB:
UseofIT
CASE:
Comprehension
Objective:
8.1
6)Virusescanbespreadthroughe-mail.
Answer:
TRUE
Diff:
1 PageRef:
296
AACSB:
ReflectiveThinking
CASE:
Comprehension
Objective:
8.1
7)Computerwormsspreadmuchmorerapidlythancomputerviruses.
Answer:
TRUE
Diff:
2 PageRef:
296
AACSB:
ReflectiveThinking
CASE:
Comprehension
Objective:
8.1
8)Oneformofspoofinginvolvesforgingthereturnaddressonane-mailsothatthee-mailmessageappearstocomefromsomeoneotherthanthesender.
Answer:
TRUE
Diff:
2 PageRef:
299
AACSB:
ReflectiveThinking
CASE:
Comprehension
Objective:
8.1
9)Sniffersenablehackerstostealproprietaryinformationfromanywhereonanetwork,includinge-mailmessages,companyfiles,andconfidentialreports.
Answer:
TRUE
Diff:
2 PageRef:
299
AACSB:
ReflectiveThinking
CASE:
Comprehension
Objective:
8.2
10)DoSattacksareusedtodestroyinformationandaccessrestrictedareasofacompany’sinformationsystem.
Answer:
FALSE
Diff:
2 PageRef:
299
AACSB:
UseofIT
CASE:
Comprehension
Objective:
8.2
11)DoSattacksareoneofthemosteconomicallydamagingkindsofcomputercrime.
Answer:
TRUE
Diff:
3 PageRef:
300-301
AACSB:
UseofIT
CASE:
Comprehension
Objective:
8.2
12)Zerodefectscannotbeachievedinlargersoftwareprogramsbecausefullytestingprogramsthatcontainthousandsofchoicesandmillionsofpathswouldrequirethousandsofyears.
Answer:
TRUE
Diff:
2 PageRef:
303
AACSB:
UseofIT
CASE:
Comprehension
Objective:
8.2
13)Anacceptableusepolicydefinestheacceptablelevelofaccesstoinformationassetsfordifferentusers.
Answer:
FALSE
Diff:
2 PageRef:
310
AACSB:
UseofIT
CASE:
Comprehension
Objective:
8.3
14)Biometricauthenticationistheuseofphysicalcharacteristicssuchasretinalimagestoprovideidentification.
Answer:
TRUE
Diff:
1 PageRef:
313
AACSB:
ReflectiveThinking
CASE:
Comprehension
Objective:
8.4
15)Packetfilteringcatchesmosttypesofnetworkattacks.
Answer:
FALSE
Diff:
2 PageRef:
315
AACSB:
UseofIT
CASE:
Comprehension
Objective:
8.4
16)NATconcealstheIPaddressesoftheorganization’sinternalhostcomputerstodetersnifferprograms.
Answer:
TRUE
Diff:
2 PageRef:
315
AACSB:
UseofIT
CASE:
Comprehension
Objective:
8.4
17)SSLisaprotocolusedtoestablishasecureconnectionbetweentwocomputers.
Answer:
TRUE
Diff:
2 PageRef:
317
AACSB:
UseofIT
CASE:
Comprehension
Objective:
8.4
18)Publickeyencryptionusestwokeys.
Answer:
TRUE
Diff:
2 PageRef:
3127
AACSB:
ReflectiveThinking
CASE:
Comprehension
Objective:
8.4
19)High-availabilitycomputingisalsoreferredtoasfaulttolerance.
Answer:
FALSE
Diff:
2 PageRef:
319
AACSB:
UseofIT
CASE:
Comprehension
Objective:
8.2
20)Bothsoftwaremetricsandsoftwaretestingaretechniquesusedtoimprovesoftwarequality.
Answer:
TRUE
Diff:
2 PageRef:
320
AACSB:
UseofIT
CASE:
Comprehension
Objective:
8.4
21)________referstopolicies,procedures,andtechnicalmeasuresusedtopreventunauthorizedaccess,alternation,theft,orphysicaldamagetoinformationsystems.
A)"Security"
B)"Controls"
C)"Benchmarking"
D)"Algorithms"
Answer:
A
Diff:
2 PageRef:
293
AACSB:
UseofIT
CASE:
Comprehension
Objective:
8.3
22)________referstoallofthemethods,policies,andorganizationalproceduresthatensurethesafetyoftheorganization'sassets,theaccuracyandreliabilityofitsaccountingrecords,andoperationaladherencetomanagementstandards.
A)"Legacysystems"
B)"SSIDstandards"
C)"Vulnerabilities"
D)"Controls"
Answer:
D
Diff:
2 PageRef:
293
AACSB:
UseofIT
CASE:
Comprehension
Objective:
8.3
23)Whichofthefollowingdoesnotposeasecuritythreattowirelessnetworks?
A)broadcastedSSIDs
B)scannabilityofradiofrequencybands
C)SQLinjectionattacks
D)geographicrangeofwirelesssignals
Answer:
C
Diff:
1 PageRef:
295-296
AACSB:
AnalyticSkills
CASE:
Evaluationintermsofassess
Objective:
8.1
24)Electronicdataaremoresusceptibletodestruction,fraud,error,andmisusebecauseinformationsystemsconcentratedataincomputerfilesthat
A)areusuallyboundupinlegacysystemsthataredifficulttoaccessanddifficulttocorrectincaseoferror.
B)arenotsecurebecausethetechnologytosecurethemdidnotexistatthetimethefileswerecreated.
C)havethepotentialtobeaccessedbylargenumbersofpeopleandbygroupsoutsideoftheorganization.
D)arefrequentlyavailableontheInternet.
Answer:
C
Diff:
2 PageRef:
293-294
AACSB:
AnalyticSkills
CASE:
Analysisintermsofcompare
Objective:
8.1
25)Unauthorizedaccessisasecuritychallengethatismostlikelytooccurinwhichofthefollowingpointsofacorporatenetwork?
A)clientcomputer
B)communicationslines
C)corporateserver
D)internalcorporateback-endsystem
Answer:
A
Diff:
3 PageRef:
293
AACSB:
AnalyticSkills
CASE:
Analysisintermsofexamine
Objective:
8.1
26)Sniffingisasecuritychallengethatismostlikelytooccurinwhichofthefollowingpointsofacorporatenetwork?
A)clientcomputer
B)communicationslines
C)corporateservers
D)internalcorporateback-endsystem
Answer:
B
Diff:
2 PageRef:
293
AACSB:
AnalyticSkills
CASE:
Analysisintermsofexamine
Objective:
8.1
27)InputtingdataintoapoorlyprogrammedWebforminordertodisruptacompany'ssystemsandnetworksiscalled
A)aTrojanhorse.
B)anSQLinjectionattack.
C)keylogging.
D)aDDoSattack.
Answer:
B
Diff:
2 PageRef:
298
AACSB:
AnalyticSkills
CASE:
Analysisintermsofexamine
Objective:
8.1
28)TheInternetposesspecificsecurityproblemsbecause
A)itwasdesignedtobeeasilyaccessible.
B)Internetdataisnotrunoversecurelines.
C)Internetstandardsareuniversal.
D)itchangessorapidly.
Answer:
A
Diff:
2 PageRef:
294
AACSB:
UseofIT
CASE:
Comprehension
Objective:
8.1
29)WhichofthefollowingstatementsabouttheInternetsecurityisnottrue?
A)TheuseofP2Pnetworkscanexposeacorporatecomputertooutsiders.
B)AcorporatenetworkwithoutaccesstotheInternetismoresecurethanoneprovidesaccess.
C)VoIPismoresecurethantheswitchedvoicenetwork.
D)Instantmessagingcanprovidehackersaccesstoanotherwisesecurenetwork.
Answer:
C
Diff:
2 PageRef:
294-295
AACSB:
AnalyticSkills
CASE:
Analysisintermsofappraise
Objective:
8.1
30)Anindependentcomputerprogramthatcopiesitselffromonecomputertoanotheroveranetworkiscalleda
A)worm.
B)Trojanhorse.
C)bug.
D)pest.
Answer:
A
Diff:
2 PageRef:
296
AACSB:
ReflectiveThinking
CASE:
Comprehension
Objective:
8.1
31)Asalespersonclicksrepeatedlyontheonlineadsofacompetitorinordertodrivethecompetitor'sadvertisingcostsup.Thisisanexampleof
A)phishing.
B)pharming.
C)spoofing.
D)clickfraud.
Answer:
D
Diff:
2 PageRef:
302
AACSB:
AnalyticSkills
CASE:
Analysisintermsofcategorize
Objective:
8.2
32)In2004,ICQuserswereenticedbyasalesmessagefromasupposedanti-virusvendor.Onthevendor’ssite,asmallprogramcalledMitgliederwasdownloadedtotheuser’smachine.Theprogramenabledoutsiderstoinfiltratetheuser’smachine.Whattypeofmalwareisthisanexampleof?
A)Trojanhorse
B)virus
C)worm
D)spyware
Answer:
A
Diff:
2 PageRef:
298
AACSB:
AnalyticSkills
CASE:
Analysisintermsofcategorize
Objective:
8.1
33)RedirectingaWeblinktoadifferentaddressisaformof
A)snooping.
B)spoofing.
C)sniffing.
D)wardriving.
Answer:
B
Diff:
2 PageRef:
299
AACSB:
ReflectiveThinking
CASE:
Comprehension
Objective:
8.1
34)Akeyloggerisatypeof
A)worm.
B)Trojanhorse.
C)virus.
D)spyware.
Answer:
D
Diff:
1 PageRef:
298
AACSB:
ReflectiveThinking
CASE:
Comprehension
Objective:
8.1
35)Hackerscreateabotnetby
A)infectingWebsearchbotswithmalware.
B)byusingWebsearchbotstoinfectothercomputers.
C)bycausingotherpeople’scomputerstobecome"zombie"PCsfollowingamastercomputer.
D)byinfectingcorporateserverswith"zombie"Trojanhorsesthatallowundetectedaccessthroughabackdoor.
Answer:
C
Diff:
2 PageRef:
299
AACSB:
ReflectiveThinking
CASE:
Comprehension
Objective:
8.1
36)Usingnumerouscomputerstoinundateandoverwhelmthenetworkfromnumerouslaunchpointsiscalleda________attack.
A)DDoS
B)DoS
C)SQLinjection
D)phishing
Answer:
A
Diff:
2 PageRef:
299
AACSB:
UseofIT
CASE:
Comprehension
Objective:
8.1
37)Whichofthefollowingisnotanexampleofacomputerusedasatarge