mis12-信息系统复习参考8.doc
- 文档编号:134114
- 上传时间:2022-10-04
- 格式:DOC
- 页数:24
- 大小:101KB
mis12-信息系统复习参考8.doc
《mis12-信息系统复习参考8.doc》由会员分享,可在线阅读,更多相关《mis12-信息系统复习参考8.doc(24页珍藏版)》请在冰豆网上搜索。
ManagementInformationSystems,12e(Laudon)
Chapter8SecuringInformationSystems
1)Inadditiontoe-mail,instantmessagesandP2Pfile-sharingcanalsoposesecuritythreatstocomputersystemsandnetworks.
Answer:
TRUE
Diff:
1 PageRef:
294
AACSB:
UseofIT
CASE:
Comprehension
Objective:
8.1
2)ComputersusingcablemodemstoconnecttotheInternetaremoreopentopenetrationthanthoseconnectingviadial-up.
Answer:
TRUE
Diff:
2 PageRef:
294
AACSB:
UseofIT
CASE:
Comprehension
Objective:
8.1
3)Wirelessnetworksarevulnerabletopenetrationbecauseradiofrequencybandsareeasytoscan.
Answer:
TRUE
Diff:
2 PageRef:
295
AACSB:
UseofIT
CASE:
Comprehension
Objective:
8.1
4)TherangeofWi-Finetworkscanbeextendeduptotwomilesbyusingexternalantennae.
Answer:
FALSE
Diff:
3 PageRef:
295
AACSB:
UseofIT
CASE:
Comprehension
Objective:
8.1
5)TheWEPspecificationcallsforanaccesspointanditsuserstosharethesame40-bitencryptedpassword.
Answer:
TRUE
Diff:
3 PageRef:
296
AACSB:
UseofIT
CASE:
Comprehension
Objective:
8.1
6)Virusescanbespreadthroughe-mail.
Answer:
TRUE
Diff:
1 PageRef:
296
AACSB:
ReflectiveThinking
CASE:
Comprehension
Objective:
8.1
7)Computerwormsspreadmuchmorerapidlythancomputerviruses.
Answer:
TRUE
Diff:
2 PageRef:
296
AACSB:
ReflectiveThinking
CASE:
Comprehension
Objective:
8.1
8)Oneformofspoofinginvolvesforgingthereturnaddressonane-mailsothatthee-mailmessageappearstocomefromsomeoneotherthanthesender.
Answer:
TRUE
Diff:
2 PageRef:
299
AACSB:
ReflectiveThinking
CASE:
Comprehension
Objective:
8.1
9)Sniffersenablehackerstostealproprietaryinformationfromanywhereonanetwork,includinge-mailmessages,companyfiles,andconfidentialreports.
Answer:
TRUE
Diff:
2 PageRef:
299
AACSB:
ReflectiveThinking
CASE:
Comprehension
Objective:
8.2
10)DoSattacksareusedtodestroyinformationandaccessrestrictedareasofacompany’sinformationsystem.
Answer:
FALSE
Diff:
2 PageRef:
299
AACSB:
UseofIT
CASE:
Comprehension
Objective:
8.2
11)DoSattacksareoneofthemosteconomicallydamagingkindsofcomputercrime.
Answer:
TRUE
Diff:
3 PageRef:
300-301
AACSB:
UseofIT
CASE:
Comprehension
Objective:
8.2
12)Zerodefectscannotbeachievedinlargersoftwareprogramsbecausefullytestingprogramsthatcontainthousandsofchoicesandmillionsofpathswouldrequirethousandsofyears.
Answer:
TRUE
Diff:
2 PageRef:
303
AACSB:
UseofIT
CASE:
Comprehension
Objective:
8.2
13)Anacceptableusepolicydefinestheacceptablelevelofaccesstoinformationassetsfordifferentusers.
Answer:
FALSE
Diff:
2 PageRef:
310
AACSB:
UseofIT
CASE:
Comprehension
Objective:
8.3
14)Biometricauthenticationistheuseofphysicalcharacteristicssuchasretinalimagestoprovideidentification.
Answer:
TRUE
Diff:
1 PageRef:
313
AACSB:
ReflectiveThinking
CASE:
Comprehension
Objective:
8.4
15)Packetfilteringcatchesmosttypesofnetworkattacks.
Answer:
FALSE
Diff:
2 PageRef:
315
AACSB:
UseofIT
CASE:
Comprehension
Objective:
8.4
16)NATconcealstheIPaddressesoftheorganization’sinternalhostcomputerstodetersnifferprograms.
Answer:
TRUE
Diff:
2 PageRef:
315
AACSB:
UseofIT
CASE:
Comprehension
Objective:
8.4
17)SSLisaprotocolusedtoestablishasecureconnectionbetweentwocomputers.
Answer:
TRUE
Diff:
2 PageRef:
317
AACSB:
UseofIT
CASE:
Comprehension
Objective:
8.4
18)Publickeyencryptionusestwokeys.
Answer:
TRUE
Diff:
2 PageRef:
3127
AACSB:
ReflectiveThinking
CASE:
Comprehension
Objective:
8.4
19)High-availabilitycomputingisalsoreferredtoasfaulttolerance.
Answer:
FALSE
Diff:
2 PageRef:
319
AACSB:
UseofIT
CASE:
Comprehension
Objective:
8.2
20)Bothsoftwaremetricsandsoftwaretestingaretechniquesusedtoimprovesoftwarequality.
Answer:
TRUE
Diff:
2 PageRef:
320
AACSB:
UseofIT
CASE:
Comprehension
Objective:
8.4
21)________referstopolicies,procedures,andtechnicalmeasuresusedtopreventunauthorizedaccess,alternation,theft,orphysicaldamagetoinformationsystems.
A)"Security"
B)"Controls"
C)"Benchmarking"
D)"Algorithms"
Answer:
A
Diff:
2 PageRef:
293
AACSB:
UseofIT
CASE:
Comprehension
Objective:
8.3
22)________referstoallofthemethods,policies,andorganizationalproceduresthatensurethesafetyoftheorganization'sassets,theaccuracyandreliabilityofitsaccountingrecords,andoperationaladherencetomanagementstandards.
A)"Legacysystems"
B)"SSIDstandards"
C)"Vulnerabilities"
D)"Controls"
Answer:
D
Diff:
2 PageRef:
293
AACSB:
UseofIT
CASE:
Comprehension
Objective:
8.3
23)Whichofthefollowingdoesnotposeasecuritythreattowirelessnetw
- 配套讲稿:
如PPT文件的首页显示word图标,表示该PPT已包含配套word讲稿。双击word图标可打开word文档。
- 特殊限制:
部分文档作品中含有的国旗、国徽等图片,仅作为作品整体效果示例展示,禁止商用。设计者仅对作品中独创性部分享有著作权。
- 关 键 词:
- mis12 信息系统 复习 参考
![提示](https://static.bdocx.com/images/bang_tan.gif)