版权说明:本文档由用户提供并上传,收益归属内容提供方,若内容存在侵权,请进行举报或认领
文档简介
1、管理信息系统(第7版)章节练习题及答案chapter 10管理信息系统(第7版)章节练习题及答案chapter 10 Copyright 2017 Pearson Education, Inc.管理信息系统(第7版)章节练习题及答案chapter 10Experiencing MIS, 7e (Kroenke)Chapter 10 Information Systems Security1) A(n) _ is a measure that individuals or organizations take to block a threat from obtaining an asset.A
2、) denial of serviceB) safeguardC) information siloD) third-party cookieAnswer: BAACSB: Information TechnologyDifficulty: 1: EasyCourse LO: Describe different methods of managing IS security.Learning Obj: LO 10.1: What is the goal of information systems security?Classification: Concept2) _ occurs whe
3、n a threat obtains data that is supposed to be protected.A) Unauthorized data disclosureB) Incorrect data modificationC) Faulty serviceD) Denial of serviceAnswer: AAACSB: Information TechnologyDifficulty: 1: EasyCourse LO: Describe different methods of managing IS security.Learning Obj: LO 10.1: Wha
4、t is the goal of information systems security?Classification: Concept3) A person calls the Stark residence and pretends to represent a credit card company. He asks Mrs. Stark to confirm her credit card number. This is an example of _.A) hackingB) data miningC) pretextingD) sniffingAnswer: CAACSB: Re
5、flective ThinkingDifficulty: 1: EasyCourse LO: Describe different methods of managing IS security.Learning Obj: LO 10.1: What is the goal of information systems security?Classification: Application4) A _ pretends to be a legitimate company and sends emails requesting confidential data.A) hackerB) ph
6、isherC) wardriverD) snifferAnswer: BAACSB: Information TechnologyDifficulty: 1: EasyCourse LO: Describe different methods of managing IS security.Learning Obj: LO 10.1: What is the goal of information systems security?Classification: Concept5) Mark receives an email from his bank asking him to updat
7、e and verify his credit card details. He replies to the email with all the requested details. Mark later learns that the email was not actually sent by his bank and that the information he had shared has been misused. Mark is a victim of _.A) hackingB) sniffingC) data miningD) phishingAnswer: DAACSB
8、: Reflective ThinkingDifficulty: 1: EasyCourse LO: Describe different methods of managing IS security.Learning Obj: LO 10.1: What is the goal of information systems security?Classification: Application6) Which of the following is a synonym for phishing?A) pretextingB) email spoofingC) hardeningD) sy
9、stem hackingAnswer: BAACSB: Information TechnologyDifficulty: 1: EasyCourse LO: Describe different methods of managing IS security.Learning Obj: LO 10.1: What is the goal of information systems security?Classification: Concept7) _ is a technique for intercepting computer communications.A) SpoofingB)
10、 PhishingC) PretextingD) SniffingAnswer: DAACSB: Information TechnologyDifficulty: 1: EasyCourse LO: Describe different methods of managing IS security.Learning Obj: LO 10.1: What is the goal of information systems security?Classification: Concept8) _ take computers with wireless connections through
11、 an area and search for unprotected wireless networks.A) WardriversB) PretextersC) HackersD) PhishersAnswer: AAACSB: Information TechnologyDifficulty: 1: EasyCourse LO: Describe different methods of managing IS security.Learning Obj: LO 10.1: What is the goal of information systems security?Classifi
12、cation: Concept9) Breaking into computers, servers, or networks to steal proprietary and confidential data is referred to as _.A) pretextingB) spoofingC) hackingD) phishingAnswer: CAACSB: Information TechnologyDifficulty: 1: EasyCourse LO: Describe different methods of managing IS security.Learning
13、Obj: LO 10.1: What is the goal of information systems security?Classification: Concept10) Which of the following occurs when millions of bogus service requests flood a Web server and prevent it from servicing legitimate requests?A) spoofingB) incorrect data modificationC) usurpationD) denial of serv
14、iceAnswer: DAACSB: Information TechnologyDifficulty: 1: EasyCourse LO: Describe different methods of managing IS security.Learning Obj: LO 10.1: What is the goal of information systems security?Classification: Concept11) _ occurs when computer criminals invade a computer system and replace legitimat
15、e programs with their own unauthorized ones.A) UsurpationB) Cyber stalkingC) SpoofingD) SniffingAnswer: AAACSB: Information TechnologyDifficulty: 1: EasyCourse LO: Describe different methods of managing IS security.Learning Obj: LO 10.1: What is the goal of information systems security?Classificatio
16、n: Concept12) A(n) _ is a sophisticated, possibly long-running computer hack that is perpetrated by large, well-funded organizations like governments.A) advanced persistent threatB) identity threatC) copyright theftD) network sniffer attackAnswer: AAACSB: Information TechnologyDifficulty: 1: EasyCou
17、rse LO: Describe different methods of managing IS security.Learning Obj: LO 10.1: What is the goal of information systems security?Classification: Concept13) A threat is a person or an organization that seeks to obtain or alter data illegally, without the owners permission or knowledge.Answer: TRUEA
18、ACSB: Information TechnologyDifficulty: 1: EasyCourse LO: Describe different methods of managing IS security.Learning Obj: LO 10.1: What is the goal of information systems security?Classification: Concept14) Pretexting occurs when someone deceives by pretending to be someone else.Answer: TRUEAACSB:
19、Information TechnologyDifficulty: 1: EasyCourse LO: Describe different methods of managing IS security.Learning Obj: LO 10.1: What is the goal of information systems security?Classification: Concept15) Spoofing is a technique for intercepting computer communications.Answer: FALSEAACSB: Information T
20、echnologyDifficulty: 1: EasyCourse LO: Describe different methods of managing IS security.Learning Obj: LO 10.1: What is the goal of information systems security?Classification: Concept16) IP spoofing occurs when an intruder uses another sites IP address to masquerade as that other site.Answer: TRUE
21、AACSB: Information TechnologyDifficulty: 1: EasyCourse LO: Describe different methods of managing IS security.Learning Obj: LO 10.1: What is the goal of information systems security?Classification: Concept17) Wardrivers are those who engage in phishing to obtain unauthorized access to data.Answer: F
22、ALSEAACSB: Information TechnologyDifficulty: 1: EasyCourse LO: Describe different methods of managing IS security.Learning Obj: LO 10.1: What is the goal of information systems security?Classification: Concept18) Incorrectly increasing a customers discount is an example of incorrect data modificatio
23、n.Answer: TRUEAACSB: Information TechnologyDifficulty: 1: EasyCourse LO: Describe different methods of managing IS security.Learning Obj: LO 10.1: What is the goal of information systems security?Classification: Concept19) Advanced persistent threats can be a means to engage in cyber warfare and cyb
24、er espionage.Answer: TRUEAACSB: Information TechnologyDifficulty: 1: EasyCourse LO: Describe different methods of managing IS security.Learning Obj: LO 10.1: What is the goal of information systems security?Classification: Concept20) Explain the types of events that result in faulty service, a type
25、of security loss.Answer: Faulty service includes problems that result because of incorrect system operation. It could include incorrect data modification. It also could include systems that work incorrectly by sending wrong goods to a customer or the ordered goods to a wrong customer, inaccurately b
26、illing customers, or sending the wrong information to employees. Humans can inadvertently cause faulty service by making procedural mistakes. System developers can write programs incorrectly or make errors during installation of hardware, software programs, and data. Usurpation is also a type of fau
27、lty service. Faulty service can also result when a service is improperly restored during recovery from natural disasters.AACSB: Information TechnologyDifficulty: 1: EasyCourse LO: Describe different methods of managing IS security.Learning Obj: LO 10.1: What is the goal of information systems securi
28、ty?Classification: Concept21) Explain the concept of denial of service (DOS) in information management.Answer: Human errors in a procedure or a lack of procedures in information management can result in denial of service (DOS). For example, humans can inadvertently shut down a Web server or corporat
29、e gateway router by starting a computationally intensive application. Denial-of-service attacks can be launched maliciously. A malicious hacker can flood a Web server, for example, with millions of bogus service requests that so occupy the server that it cannot service legitimate requests. Computer
30、worms can infiltrate a network with so much artificial traffic that legitimate traffic cannot get through. Natural disasters may also cause systems to fail, resulting in denial of service.AACSB: Information TechnologyDifficulty: 1: EasyCourse LO: Describe different methods of managing IS security.Le
31、arning Obj: LO 10.1: What is the goal of information systems security?Classification: Concept22) Which of the following statements is true of the financial losses due to computer crimes?A) All studies on the costs of computer crimes are based on surveys.B) There are several set standards for tallyin
32、g computer crime costs and financial losses.C) Companies are legally required to calculate their financial losses due to computer crime every month.D) Knowledge about the cost of computer crimes is restricted to large companies.Answer: AAACSB: Information TechnologyDifficulty: 2: ModerateCourse LO:
33、Describe different methods of managing IS security.Learning Obj: LO 10.2: How big is the computer security problem?Classification: Concept23) Damages to security systems caused by natural disasters are minimal when compared to the damages due to human errors.Answer: FALSEAACSB: Information Technolog
34、yDifficulty: 1: EasyCourse LO: Describe different methods of managing IS security.Learning Obj: LO 10.2: How big is the computer security problem?Classification: Concept24) There are no standards for tallying costs of computer crime.Answer: TRUEAACSB: Information TechnologyDifficulty: 1: EasyCourse
35、LO: Describe different methods of managing IS security.Learning Obj: LO 10.2: How big is the computer security problem?Classification: Concept25) A(n) _ is a computer program that senses when another computer is attempting to scan a disk or access a computer.A) intrusion detection systemB) adwareC)
36、packet-filtering firewallD) network security systemAnswer: AAACSB: Information TechnologyDifficulty: 1: EasyCourse LO: Describe different methods of managing IS security.Learning Obj: LO 10.3: How should you respond to security threats?Classification: Concept26) Which of the following is considered
37、a personal security safeguard?A) creating backup of cookies and temporary filesB) removing high-value assets from computersC) using a single valid password for all accountsD) conducting transactions using http rather than httpsAnswer: BAACSB: Information TechnologyDifficulty: 1: EasyCourse LO: Descr
38、ibe different methods of managing IS security.Learning Obj: LO 10.3: How should you respond to security threats?Classification: Concept27) Davian, a professional hacker, tries every possible combination of characters to crack his victims email password. Using this technique, he can crack a six-chara
39、cter password of either upper- or lowercase letters in about ten minutes. Which of the following techniques is used by Davian to obtain access to his victims email?A) denial-of-service attackB) brute force attackC) pretextingD) spoofingAnswer: BAACSB: Reflective ThinkingDifficulty: 1: EasyCourse LO:
40、 Describe different methods of managing IS security.Learning Obj: LO 10.3: How should you respond to security threats?Classification: Application28) _ are small files that browsers store on users computers when they visit Web sites.A) CookiesB) HoneypotsC) MashupsD) Entity tagsAnswer: AAACSB: Inform
41、ation TechnologyDifficulty: 1: EasyCourse LO: Describe different methods of managing IS security.Learning Obj: LO 10.3: How should you respond to security threats?Classification: Concept29) In a brute force attack, a password cracker tries every possible combination of characters.Answer: TRUEAACSB:
42、Information TechnologyDifficulty: 1: EasyCourse LO: Describe different methods of managing IS security.Learning Obj: LO 10.3: How should you respond to security threats?Classification: Concept30) As one of the safeguards against security threats, a person should preferably use the same password for
43、different sites so as to avoid confusion.Answer: FALSEAACSB: Information TechnologyDifficulty: 1: EasyCourse LO: Describe different methods of managing IS security.Learning Obj: LO 10.3: How should you respond to security threats?Classification: Concept31) While making online purchases, a person sho
44、uld buy only from vendors who support https.Answer: TRUEAACSB: Information TechnologyDifficulty: 1: EasyCourse LO: Describe different methods of managing IS security.Learning Obj: LO 10.3: How should you respond to security threats?Classification: Concept32) What are some of the recommended personal
45、 security safeguards against security threats?Answer: Some of the recommended personal security safeguards against security threats include the following:1. Strong passwords should be created.2. Multiple passwords should be used.3. Valuable data must not be sent via email or IM.4. The https at trust
46、ed, reputable vendors should be used.5. High-value assets from computers must be removed.6. The browsing history, temporary files, and cookies must be cleared.7. The antivirus software should be updated.8. Security concern to fellow workers should be demonstrated.9. The organizational security direc
47、tives and guidelines must be followed.10. The security for all business initiatives should be considered.AACSB: Information TechnologyDifficulty: 1: EasyCourse LO: Describe different methods of managing IS security.Learning Obj: LO 10.3: How should you respond to security threats?Classification: Con
48、cept33) Which of the following is a human safeguard against security threats?A) encryptionB) firewallC) physical securityD) procedure designAnswer: DAACSB: Information TechnologyDifficulty: 1: EasyCourse LO: Describe different methods of managing IS security.Learning Obj: LO 10.4: How should organiz
49、ations respond to security threats?Classification: Concept34) Which of the following is a technical safeguard against security threats?A) passwordB) accountabilityC) complianceD) firewallAnswer: DAACSB: Information TechnologyDifficulty: 1: EasyCourse LO: Describe different methods of managing IS sec
50、urity.Learning Obj: LO 10.4: How should organizations respond to security threats?Classification: Concept35) Which of the following is a data safeguard against security threats?A) application designB) accountabilityC) physical securityD) malware protectionAnswer: CAACSB: Information TechnologyDiffic
51、ulty: 1: EasyCourse LO: Describe different methods of managing IS security.Learning Obj: LO 10.4: How should organizations respond to security threats?Classification: Concept36) Backup and recovery against computer security threats are _.A) technical safeguardsB) data safeguardsC) human safeguardsD)
52、 hardware safeguardsAnswer: BAACSB: Information TechnologyDifficulty: 1: EasyCourse LO: Describe different methods of managing IS security.Learning Obj: LO 10.4: How should organizations respond to security threats?Classification: Concept37) Risk management is a critical security function addressed
53、by an organizations senior management.Answer: TRUEAACSB: Information TechnologyDifficulty: 1: EasyCourse LO: Describe different methods of managing IS security.Learning Obj: LO 10.4: How should organizations respond to security threats?Classification: Concept38) Financial institutions must invest he
54、avily in security safeguards because they are obvious targets for theft.Answer: TRUEAACSB: Information TechnologyDifficulty: 1: EasyCourse LO: Describe different methods of managing IS security.Learning Obj: LO 10.4: How should organizations respond to security threats?Classification: Concept39) Mal
55、ware protection is an example of a technical safeguard.Answer: TRUEAACSB: Information TechnologyDifficulty: 1: EasyCourse LO: Describe different methods of managing IS security.Learning Obj: LO 10.4: How should organizations respond to security threats?Classification: Concept40) Hiring, training, an
56、d educating employees in an organization is a technical safeguard.Answer: FALSEAACSB: Information TechnologyDifficulty: 1: EasyCourse LO: Describe different methods of managing IS security.Learning Obj: LO 10.4: How should organizations respond to security threats?Classification: Concept41) Technica
57、l safeguards include encryption and usage of passwords.Answer: FALSEAACSB: Information TechnologyDifficulty: 1: EasyCourse LO: Describe different methods of managing IS security.Learning Obj: LO 10.4: How should organizations respond to security threats?Classification: Concept42) What are the two cr
58、itical security functions that an organizations senior management needs to address?Answer: Senior management in an organization needs to address two critical security functions: security policy and risk management. Considering the first, senior management must establish company-wide security policie
59、s. Take, for example, a data security policy that states the organizations posture regarding data it gathers about its customers, suppliers, partners, and employees. At a minimum, the policy should stipulate: what sensitive data the organization will store, how it will process that data, whether dat
60、a will be shared with other organizations, how employees and others can obtain copies of data stored about them, and how employees and others can request changes to inaccurate data. The specifics of a policy depend on whether the organization is governmental or nongovernmental, on whether it is publ
温馨提示
- 1. 本站所有资源如无特殊说明,都需要本地电脑安装OFFICE2007和PDF阅读器。图纸软件为CAD,CAXA,PROE,UG,SolidWorks等.压缩文件请下载最新的WinRAR软件解压。
- 2. 本站的文档不包含任何第三方提供的附件图纸等,如果需要附件,请联系上传者。文件的所有权益归上传用户所有。
- 3. 本站RAR压缩包中若带图纸,网页内容里面会有图纸预览,若没有图纸预览就没有图纸。
- 4. 未经权益所有人同意不得将文件中的内容挪作商业或盈利用途。
- 5. 人人文库网仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对用户上传分享的文档内容本身不做任何修改或编辑,并不能对任何下载内容负责。
- 6. 下载文件中如有侵权或不适当内容,请与我们联系,我们立即纠正。
- 7. 本站不保证下载资源的准确性、安全性和完整性, 同时也不承担用户因使用这些下载资源对自己和他人造成任何形式的伤害或损失。
最新文档
- 广西贵港市覃塘区2023-2024学年七年级下学期4月期中考试英语试题(含答案)
- 开放作文之观点看法类-2024年中考英语写作常考题型专项突破
- 视频系统的实时性优化
- 宜君养猪场改扩建项目可行性研究报告
- 成都2024年07版小学三年级下册英语第3单元真题试卷
- 重庆2024年09版小学五年级英语第六单元期中试卷
- 名著阅读(讲练)-2023年部编版中考语文一轮复习(原卷版)
- 2024年医用液氧贮槽项目投资申请报告代可行性研究报告
- 2023年固态地振动强度记录仪投资申请报告
- 三维数字内容制作-三维动画毛发制作流程规范
- 体育大单元教学计划(18课时)
- 蓝色简约风中国空军成立75周年纪念日
- 期中考试卷(试题)-2024-2025学年苏教版二年级数学上册
- 2024年全国企业员工全面质量管理知识竞赛题库(含答案)(共132题)
- 知识创业思维与方法智慧树知到答案2024年湖南师范大学
- 钣金与焊接工艺规范
- 最新X线诊断报告模板(干货分享)
- 坐标纸(可下载打印)
- 华东理工大学PPT模板
- 一年级上册语文期中考试试卷分析
- 中药知识文库:冬葵子
评论
0/150
提交评论