Shared Flashcard Set

Details

Information Systems- Chapter 8
Chapter 8
24
Other
Undergraduate 3
03/29/2016

Additional Other Flashcards

 


 

Cards

Term

Smartphones have the same security flaws as other Internet-connected devices.

(True/False)

Definition
TRUE
Term

 

In 2013, the security firm McAfee identified approximately 35,000 kinds of mobile malware.

(true/false)

Definition
TRUE
Term

Viruses can be spread through e-mail.

(true/false)

Definition
TRUE
Term

 

The term cracker is used to identify a hacker whose specialty is breaking open security systems.

(true/false)

Definition
FALSE
Term

 

To secure mobile devices, a company will need to implement special mobile device management software.

(true/false)

Definition
TRUE
Term

 

Wireless networks are vulnerable to penetration because radio frequency bands are easy to scan.

(true/false)

Definition
TRUE
Term

 

Computer worms spread much more rapidly than computer viruses.

(true/false)

Definition
TRUE
Term

 

One form of spoofing involves forging the return address on an e-mail so that the e-mail message appears to come from someone other than the sender.

(true/false)

Definition
TRUE
Term

 

Sniffers enable hackers to steal proprietary information from anywhere on a network, including e-mail messages, company files, and confidential reports.

(true/false)

Definition
TRUE
Term

 

DoS attacks are used to destroy information and access restricted areas of a company's information system.

(true/false)

Definition
FALSE
Term

 

The distributed nature of cloud computing makes it somewhat easier to track unauthorized access.

(true/false)

Definition
FALSE
Term

 

Zero defects cannot be achieved in larger software programs because fully testing programs that contain thousands of choices and millions of paths would require thousands of years.

(true/false)

Definition
TRUE
Term

 

An acceptable use policy defines the acceptable level of access to information assets for different users.

(true/false)

Definition
FALSE
Term

 

 

 

Biometric authentication is the use of physical characteristics such as retinal images to provide identification.

 

(true/false)

Definition
TRUE
Term

 

Packet filtering catches most types of network attacks.

(true/false)

Definition
FALSE
Term

 

NAT conceals the IP addresses of the organization's internal host computers to deter sniffer programs.

(true/false)

Definition
TRUE
Term

SSL is a protocol used to establish a secure connection between two computers.

(true/false)

Definition
TRUE
Term

 

Public key encryption uses two keys.

(true/false)

Definition
TRUE
Term

Over 70 percent of malware today is aimed at small businesses.

(true/false)

Definition
FALSE
Term

 

Smartphones typically feature state-of-the-art encryption and security features, making them highly secure tools for businesses.

(true/false)

Definition
FALSE
Term

 

Malicious software programs referred to as spyware include a variety of threats such as computer viruses, worms, and Trojan horses.

(true/false)

Definition
FALSE
Term

 

Authorization refers to the ability to know that a person is who he or she claims to be.

(true/false)

Definition
FALSE
Term

A walkthrough is a type of software testing used before software is even written.

(true/false)

Definition
TRUE
Term

 

When errors are discovered in software programs, the sources of the errors are found and eliminated through a process called debugging.

(true/false)

Definition
TRUE
Supporting users have an ad free experience!