mis12-信息系统复习参考8.doc

上传人:wj 文档编号:356802 上传时间:2023-04-29 格式:DOC 页数:24 大小:101KB
下载 相关 举报
mis12-信息系统复习参考8.doc_第1页
第1页 / 共24页
mis12-信息系统复习参考8.doc_第2页
第2页 / 共24页
mis12-信息系统复习参考8.doc_第3页
第3页 / 共24页
mis12-信息系统复习参考8.doc_第4页
第4页 / 共24页
mis12-信息系统复习参考8.doc_第5页
第5页 / 共24页
mis12-信息系统复习参考8.doc_第6页
第6页 / 共24页
mis12-信息系统复习参考8.doc_第7页
第7页 / 共24页
mis12-信息系统复习参考8.doc_第8页
第8页 / 共24页
mis12-信息系统复习参考8.doc_第9页
第9页 / 共24页
mis12-信息系统复习参考8.doc_第10页
第10页 / 共24页
mis12-信息系统复习参考8.doc_第11页
第11页 / 共24页
mis12-信息系统复习参考8.doc_第12页
第12页 / 共24页
mis12-信息系统复习参考8.doc_第13页
第13页 / 共24页
mis12-信息系统复习参考8.doc_第14页
第14页 / 共24页
mis12-信息系统复习参考8.doc_第15页
第15页 / 共24页
mis12-信息系统复习参考8.doc_第16页
第16页 / 共24页
mis12-信息系统复习参考8.doc_第17页
第17页 / 共24页
mis12-信息系统复习参考8.doc_第18页
第18页 / 共24页
mis12-信息系统复习参考8.doc_第19页
第19页 / 共24页
mis12-信息系统复习参考8.doc_第20页
第20页 / 共24页
亲,该文档总共24页,到这儿已超出免费预览范围,如果喜欢就下载吧!
下载资源
资源描述

mis12-信息系统复习参考8.doc

《mis12-信息系统复习参考8.doc》由会员分享,可在线阅读,更多相关《mis12-信息系统复习参考8.doc(24页珍藏版)》请在冰点文库上搜索。

mis12-信息系统复习参考8.doc

ManagementInformationSystems,12e(Laudon)

Chapter8SecuringInformationSystems

1)Inadditiontoe-mail,instantmessagesandP2Pfile-sharingcanalsoposesecuritythreatstocomputersystemsandnetworks.

Answer:

TRUE

Diff:

1 PageRef:

294

AACSB:

UseofIT

CASE:

Comprehension

Objective:

8.1

2)ComputersusingcablemodemstoconnecttotheInternetaremoreopentopenetrationthanthoseconnectingviadial-up.

Answer:

TRUE

Diff:

2 PageRef:

294

AACSB:

UseofIT

CASE:

Comprehension

Objective:

8.1

3)Wirelessnetworksarevulnerabletopenetrationbecauseradiofrequencybandsareeasytoscan.

Answer:

TRUE

Diff:

2 PageRef:

295

AACSB:

UseofIT

CASE:

Comprehension

Objective:

8.1

4)TherangeofWi-Finetworkscanbeextendeduptotwomilesbyusingexternalantennae.

Answer:

FALSE

Diff:

3 PageRef:

295

AACSB:

UseofIT

CASE:

Comprehension

Objective:

8.1

5)TheWEPspecificationcallsforanaccesspointanditsuserstosharethesame40-bitencryptedpassword.

Answer:

TRUE

Diff:

3 PageRef:

296

AACSB:

UseofIT

CASE:

Comprehension

Objective:

8.1

6)Virusescanbespreadthroughe-mail.

Answer:

TRUE

Diff:

1 PageRef:

296

AACSB:

ReflectiveThinking

CASE:

Comprehension

Objective:

8.1

7)Computerwormsspreadmuchmorerapidlythancomputerviruses.

Answer:

TRUE

Diff:

2 PageRef:

296

AACSB:

ReflectiveThinking

CASE:

Comprehension

Objective:

8.1

8)Oneformofspoofinginvolvesforgingthereturnaddressonane-mailsothatthee-mailmessageappearstocomefromsomeoneotherthanthesender.

Answer:

TRUE

Diff:

2 PageRef:

299

AACSB:

ReflectiveThinking

CASE:

Comprehension

Objective:

8.1

9)Sniffersenablehackerstostealproprietaryinformationfromanywhereonanetwork,includinge-mailmessages,companyfiles,andconfidentialreports.

Answer:

TRUE

Diff:

2 PageRef:

299

AACSB:

ReflectiveThinking

CASE:

Comprehension

Objective:

8.2

10)DoSattacksareusedtodestroyinformationandaccessrestrictedareasofacompany’sinformationsystem.

Answer:

FALSE

Diff:

2 PageRef:

299

AACSB:

UseofIT

CASE:

Comprehension

Objective:

8.2

11)DoSattacksareoneofthemosteconomicallydamagingkindsofcomputercrime.

Answer:

TRUE

Diff:

3 PageRef:

300-301

AACSB:

UseofIT

CASE:

Comprehension

Objective:

8.2

12)Zerodefectscannotbeachievedinlargersoftwareprogramsbecausefullytestingprogramsthatcontainthousandsofchoicesandmillionsofpathswouldrequirethousandsofyears.

Answer:

TRUE

Diff:

2 PageRef:

303

AACSB:

UseofIT

CASE:

Comprehension

Objective:

8.2

13)Anacceptableusepolicydefinestheacceptablelevelofaccesstoinformationassetsfordifferentusers.

Answer:

FALSE

Diff:

2 PageRef:

310

AACSB:

UseofIT

CASE:

Comprehension

Objective:

8.3

14)Biometricauthenticationistheuseofphysicalcharacteristicssuchasretinalimagestoprovideidentification.

Answer:

TRUE

Diff:

1 PageRef:

313

AACSB:

ReflectiveThinking

CASE:

Comprehension

Objective:

8.4

15)Packetfilteringcatchesmosttypesofnetworkattacks.

Answer:

FALSE

Diff:

2 PageRef:

315

AACSB:

UseofIT

CASE:

Comprehension

Objective:

8.4

16)NATconcealstheIPaddressesoftheorganization’sinternalhostcomputerstodetersnifferprograms.

Answer:

TRUE

Diff:

2 PageRef:

315

AACSB:

UseofIT

CASE:

Comprehension

Objective:

8.4

17)SSLisaprotocolusedtoestablishasecureconnectionbetweentwocomputers.

Answer:

TRUE

Diff:

2 PageRef:

317

AACSB:

UseofIT

CASE:

Comprehension

Objective:

8.4

18)Publickeyencryptionusestwokeys.

Answer:

TRUE

Diff:

2 PageRef:

3127

AACSB:

ReflectiveThinking

CASE:

Comprehension

Objective:

8.4

19)High-availabilitycomputingisalsoreferredtoasfaulttolerance.

Answer:

FALSE

Diff:

2 PageRef:

319

AACSB:

UseofIT

CASE:

Comprehension

Objective:

8.2

20)Bothsoftwaremetricsandsoftwaretestingaretechniquesusedtoimprovesoftwarequality.

Answer:

TRUE

Diff:

2 PageRef:

320

AACSB:

UseofIT

CASE:

Comprehension

Objective:

8.4

21)________referstopolicies,procedures,andtechnicalmeasuresusedtopreventunauthorizedaccess,alternation,theft,orphysicaldamagetoinformationsystems.

A)"Security"

B)"Controls"

C)"Benchmarking"

D)"Algorithms"

Answer:

A

Diff:

2 PageRef:

293

AACSB:

UseofIT

CASE:

Comprehension

Objective:

8.3

22)________referstoallofthemethods,policies,andorganizationalproceduresthatensurethesafetyoftheorganization'sassets,theaccuracyandreliabilityofitsaccountingrecords,andoperationaladherencetomanagementstandards.

A)"Legacysystems"

B)"SSIDstandards"

C)"Vulnerabilities"

D)"Controls"

Answer:

D

Diff:

2 PageRef:

293

AACSB:

UseofIT

CASE:

Comprehension

Objective:

8.3

23)Whichofthefollowingdoesnotposeasecuritythreattowirelessnetworks?

A)broadcastedSSIDs

B)scannabilityofradiofrequencybands

C)SQLinjectionattacks

D)geographicrangeofwirelesssignals

Answer:

C

Diff:

1 PageRef:

295-296

AACSB:

AnalyticSkills

CASE:

Evaluationintermsofassess

Objective:

8.1

24)Electronicdataaremoresusceptibletodestruction,fraud,error,andmisusebecauseinformationsystemsconcentratedataincomputerfilesthat

A)areusuallyboundupinlegacysystemsthataredifficulttoaccessanddifficulttocorrectincaseoferror.

B)arenotsecurebecausethetechnologytosecurethemdidnotexistatthetimethefileswerecreated.

C)havethepotentialtobeaccessedbylargenumbersofpeopleandbygroupsoutsideoftheorganization.

D)arefrequentlyavailableontheInternet.

Answer:

C

Diff:

2 PageRef:

293-294

AACSB:

AnalyticSkills

CASE:

Analysisintermsofcompare

Objective:

8.1

25)Unauthorizedaccessisasecuritychallengethatismostlikelytooccurinwhichofthefollowingpointsofacorporatenetwork?

A)clientcomputer

B)communicationslines

C)corporateserver

D)internalcorporateback-endsystem

Answer:

A

Diff:

3 PageRef:

293

AACSB:

AnalyticSkills

CASE:

Analysisintermsofexamine

Objective:

8.1

26)Sniffingisasecuritychallengethatismostlikelytooccurinwhichofthefollowingpointsofacorporatenetwork?

A)clientcomputer

B)communicationslines

C)corporateservers

D)internalcorporateback-endsystem

Answer:

B

Diff:

2 PageRef:

293

AACSB:

AnalyticSkills

CASE:

Analysisintermsofexamine

Objective:

8.1

27)InputtingdataintoapoorlyprogrammedWebforminordertodisruptacompany'ssystemsandnetworksiscalled

A)aTrojanhorse.

B)anSQLinjectionattack.

C)keylogging.

D)aDDoSattack.

Answer:

B

Diff:

2 PageRef:

298

AACSB:

AnalyticSkills

CASE:

Analysisintermsofexamine

Objective:

8.1

28)TheInternetposesspecificsecurityproblemsbecause

A)itwasdesignedtobeeasilyaccessible.

B)Internetdataisnotrunoversecurelines.

C)Internetstandardsareuniversal.

D)itchangessorapidly.

Answer:

A

Diff:

2 PageRef:

294

AACSB:

UseofIT

CASE:

Comprehension

Objective:

8.1

29)WhichofthefollowingstatementsabouttheInternetsecurityisnottrue?

A)TheuseofP2Pnetworkscanexposeacorporatecomputertooutsiders.

B)AcorporatenetworkwithoutaccesstotheInternetismoresecurethanoneprovidesaccess.

C)VoIPismoresecurethantheswitchedvoicenetwork.

D)Instantmessagingcanprovidehackersaccesstoanotherwisesecurenetwork.

Answer:

C

Diff:

2 PageRef:

294-295

AACSB:

AnalyticSkills

CASE:

Analysisintermsofappraise

Objective:

8.1

30)Anindependentcomputerprogramthatcopiesitselffromonecomputertoanotheroveranetworkiscalleda

A)worm.

B)Trojanhorse.

C)bug.

D)pest.

Answer:

A

Diff:

2 PageRef:

296

AACSB:

ReflectiveThinking

CASE:

Comprehension

Objective:

8.1

31)Asalespersonclicksrepeatedlyontheonlineadsofacompetitorinordertodrivethecompetitor'sadvertisingcostsup.Thisisanexampleof

A)phishing.

B)pharming.

C)spoofing.

D)clickfraud.

Answer:

D

Diff:

2 PageRef:

302

AACSB:

AnalyticSkills

CASE:

Analysisintermsofcategorize

Objective:

8.2

32)In2004,ICQuserswereenticedbyasalesmessagefromasupposedanti-virusvendor.Onthevendor’ssite,asmallprogramcalledMitgliederwasdownloadedtotheuser’smachine.Theprogramenabledoutsiderstoinfiltratetheuser’smachine.Whattypeofmalwareisthisanexampleof?

A)Trojanhorse

B)virus

C)worm

D)spyware

Answer:

A

Diff:

2 PageRef:

298

AACSB:

AnalyticSkills

CASE:

Analysisintermsofcategorize

Objective:

8.1

33)RedirectingaWeblinktoadifferentaddressisaformof

A)snooping.

B)spoofing.

C)sniffing.

D)wardriving.

Answer:

B

Diff:

2 PageRef:

299

AACSB:

ReflectiveThinking

CASE:

Comprehension

Objective:

8.1

34)Akeyloggerisatypeof

A)worm.

B)Trojanhorse.

C)virus.

D)spyware.

Answer:

D

Diff:

1 PageRef:

298

AACSB:

ReflectiveThinking

CASE:

Comprehension

Objective:

8.1

35)Hackerscreateabotnetby

A)infectingWebsearchbotswithmalware.

B)byusingWebsearchbotstoinfectothercomputers.

C)bycausingotherpeople’scomputerstobecome"zombie"PCsfollowingamastercomputer.

D)byinfectingcorporateserverswith"zombie"Trojanhorsesthatallowundetectedaccessthroughabackdoor.

Answer:

C

Diff:

2 PageRef:

299

AACSB:

ReflectiveThinking

CASE:

Comprehension

Objective:

8.1

36)Usingnumerouscomputerstoinundateandoverwhelmthenetworkfromnumerouslaunchpointsiscalleda________attack.

A)DDoS

B)DoS

C)SQLinjection

D)phishing

Answer:

A

Diff:

2 PageRef:

299

AACSB:

UseofIT

CASE:

Comprehension

Objective:

8.1

37)Whichofthefollowingisnotanexampleofacomputerusedasatarge

展开阅读全文
相关资源
猜你喜欢
相关搜索
资源标签

当前位置:首页 > 自然科学 > 物理

copyright@ 2008-2023 冰点文库 网站版权所有

经营许可证编号:鄂ICP备19020893号-2