978-0134238241 Chapter 8 Part 3

subject Type Homework Help
subject Pages 9
subject Words 2321
subject Authors Jane P. Laudon, Kenneth C. Laudon

Unlock document.

This document is partially blurred.
Unlock all pages and 1 million more documents.
Get Access
page-pf1
21
71) How does disaster recovery planning differ from business continuity planning?
AACSB: Application of Knowledge; Written and Oral Communication
LO: 8.3: What are the components of an organizational framework for security and control?
72) What is the role of an information systems audit?
AACSB: Application of Knowledge; Written and Oral Communication
LO: 8.3: What are the components of an organizational framework for security and control?
73) Which of the following specifications replaced WEP with a stronger security standard that
features changing encryption keys?
A) TLS
B) AUP
C) VPN
D) WPA2
E) S-HTTP
AACSB: Information Technology
LO: 8.4: What are the most important tools and technologies for safeguarding information
resources?
page-pf2
22
74) Which of the following statements about passwords is not true?
A) Authentication cannot be established by the use of a password.
B) Password systems that are too rigorous may hinder employee productivity.
C) Passwords can be stolen through social engineering.
D) Passwords are often disregarded by employees.
E) Passwords can be sniffed when being transmitted over a network.
AACSB: Application of Knowledge
LO: 8.4: What are the most important tools and technologies for safeguarding information
resources?
75) An authentication token:
A) is a device the size of a credit card that contains access permission data.
B) is a type of smart card.
C) is a device that displays passcodes.
D) is an electronic marker attached to a digital authorization file.
E) compares a person's unique characteristics against a stored profile of these characteristics to
determine any differences between these characteristics and the stored profile.
AACSB: Information Technology
LO: 8.4: What are the most important tools and technologies for safeguarding information
resources?
76) All of the following are currently being used as traits that can be profiled by biometric
authentication except:
A) fingerprints.
B) facial characteristics.
C) body odor.
D) retinal images.
E) voice.
AACSB: Information Technology
LO: 8.4: What are the most important tools and technologies for safeguarding information
resources?
page-pf3
23
77) A firewall allows the organization to:
A) enforce a security policy on data exchanged between its network and the Internet.
B) check the accuracy of all transactions between its network and the Internet.
C) create an enterprise system on the Internet.
D) check the content of all incoming and outgoing email messages.
E) authenticate users.
AACSB: Information Technology
LO: 8.4: What are the most important tools and technologies for safeguarding information
resources?
78) ________ use scanning software to look for known problems such as bad passwords, the
removal of important files, security attacks in progress, and system administration errors.
A) Stateful inspections
B) Intrusion detection systems
C) Application proxy filtering technologies
D) Packet filtering technologies
E) Firewalls
AACSB: Information Technology
LO: 8.4: What are the most important tools and technologies for safeguarding information
resources?
79) Currently, the protocols used for secure information transfer over the Internet are:
A) TCP/IP, SSL and CA.
B) S-HTTP, TCP/IP, and CA.
C) HTTP, TLS, and TCP/IP.
D) SSL, TLS, and S-HTTP.
E) TLS, S-HTTP, and TCP/IP
AACSB: Information Technology
LO: 8.4: What are the most important tools and technologies for safeguarding information
resources?
page-pf4
24
80) In which method of encryption is a single encryption key sent to the receiver so both sender
and receiver share the same key?
A) SSL
B) Symmetric key encryption
C) Public key encryption
D) Private key encryption
E) TLS
AACSB: Information Technology
LO: 8.4: What are the most important tools and technologies for safeguarding information
resources?
81) A digital certificate system:
A) uses third-party CAs to validate a user's identity.
B) uses digital signatures to validate a user's identity.
C) uses tokens to validate a user's identity.
D) is used primarily by individuals for personal correspondence.
E) uses deep packet inspection to validate a user's identity.
AACSB: Information Technology
LO: 8.4: What are the most important tools and technologies for safeguarding information
resources?
82) For 100 percent availability, online transaction processing requires:
A) high-capacity storage.
B) a multi-tier server network.
C) fault-tolerant computer systems.
D) dedicated phone lines.
E) deep packet inspection.
AACSB: Information Technology
LO: 8.4: What are the most important tools and technologies for safeguarding information
resources?
page-pf5
25
83) In controlling network traffic to minimize slow-downs, a technology called ________ is used
to examine data files and sort low-priority data from high-priority data.
A) high availability computing
B) deep packet inspection
C) application proxy filtering
D) stateful inspection
E) fault-tolerant computing
AACSB: Information Technology
LO: 8.4: What are the most important tools and technologies for safeguarding information
resources?
84) Comprehensive security management products, with tools for firewalls, VPNs, intrusion
detection systems, and more, are called ________ systems.
A) DPI
B) MSSP
C) NSP
D) UTM
E) SSL
AACSB: Information Technology
LO: 8.4: What are the most important tools and technologies for safeguarding information
resources?
85) Which of the following provides additional security by determining whether packets are part
of an ongoing dialogue between a sender and receiver?
A) NAT
B) Packet filtering
C) Deep packet inspection
D) Stateful inspection
E) Application proxy filtering
AACSB: Information Technology
LO: 8.4: What are the most important tools and technologies for safeguarding information
resources?
86) To secure mobile devices, a company will need to implement special mobile device
management software.
AACSB: Information Technology
LO: 8.4: What are the most important tools and technologies for safeguarding information
resources?
page-pf6
26
87) The distributed nature of cloud computing makes it somewhat easier to track unauthorized
access.
AACSB: Information Technology
LO: 8.4: What are the most important tools and technologies for safeguarding information
resources?
88) Biometric authentication is the use of physical characteristics such as retinal images to
provide identification.
AACSB: Information Technology
LO: 8.4: What are the most important tools and technologies for safeguarding information
resources?
89) Packet filtering catches most types of network attacks.
AACSB: Information Technology
LO: 8.4: What are the most important tools and technologies for safeguarding information
resources?
90) NAT conceals the IP addresses of the organization's internal host computers to deter sniffer
programs.
AACSB: Information Technology
LO: 8.4: What are the most important tools and technologies for safeguarding information
resources?
91) SSL is a protocol used to establish a secure connection between two computers.
AACSB: Information Technology
LO: 8.4: What are the most important tools and technologies for safeguarding information
resources?
92) Public key encryption uses two keys.
AACSB: Information Technology
LO: 8.4: What are the most important tools and technologies for safeguarding information
resources?
page-pf7
27
93) Smartphones are not vulnerable to browser-based malware.
AACSB: Information Technology
LO: 8.4: What are the most important tools and technologies for safeguarding information
resources?
94) Authorization refers to the ability to know that a person is who he or she claims to be.
AACSB: Application of Knowledge
LO: 8.4: What are the most important tools and technologies for safeguarding information
resources?
95) A walkthrough is a type of software testing used before software is even written.
AACSB: Information Technology
LO: 8.4: What are the most important tools and technologies for safeguarding information
resources?
96) When errors are discovered in software programs, the sources of the errors are found and
eliminated through a process called debugging.
AACSB: Information Technology
LO: 8.4: What are the most important tools and technologies for safeguarding information
resources?
97) Is the cloud a safer and more secure computing environment than an in-house network? Why
or why not?
AACSB: Information Technology; Written and Oral Communication
LO: 8.4: What are the most important tools and technologies for safeguarding information
resources?
page-pf8
28
98) What is a digital certificate? How does it work?
AACSB: Information Technology; Written and Oral Communication
LO: 8.4: What are the most important tools and technologies for safeguarding information
resources?
99) Name and describe four firewall screening technologies.
AACSB: Information Technology; Written and Oral Communication
LO: 8.4: What are the most important tools and technologies for safeguarding information
resources?
page-pf9
29
100) Explain how two-factor authentication increases security.
AACSB: Information Technology; Written and Oral Communication
LO: 8.4: What are the most important tools and technologies for safeguarding information
resources?

Trusted by Thousands of
Students

Here are what students say about us.

Copyright ©2022 All rights reserved. | CoursePaper is not sponsored or endorsed by any college or university.