[Skip Breadcrumb Navigation]
:
[Skip Breadcrumb Navigation]
Home
Chapter 7
Study Guide
Study Guide
Student Objectives
After completing this chapter, you will be able to:
Analyze why information systems need special protection from destruction, error, and abuse.
Assess the business value of security and control.
Design an organizational framework for security and control.
Evaluate the most important tools and technologies for safeguarding information resources.
This activity contains 35 questions.
Common threats against information systems come from all of the following factors
except
technical.
organizational.
governmental.
environmental.
Eavesdroppers driving by buildings and trying to intercept wireless network traffic is called
encryption breaking.
war driving.
Trojan horses.
worming.
Malware includes all of the following
except
worms.
Trojan horses.
viruses.
spoofing.
An eavesdropping program that monitors information traveling over a network is called a program.
denial-of-service.
botnet.
sniffer.
spoofer.
Sending email messages that look like those of legitimate businesses to ask users for personal data is called
phishing.
pharming.
evil twin.
spamming.
The single greatest cause of network security breaches is
poor system patch management.
pharming.
users' lack of knowledge.
absence of security programs.
Firms providing financial services must comply with the ______________ for electronic records management.
Health Insurance Portability and Accountability Act (HIPAA)
Gramm-Leach-Bliley Act
Sarbanes-Oxley Act
National Security Policy Act
Which of the following ensures that internal controls are in place to govern the creation and documentation of information in financial statements?
HIPAA
Gramm-Leach-Bliley Act
Sarbanes-Oxley Act
National Security Policy Act
Which of the following is
not
a problem that computer forensics deals with?
System patch management
Recovering data from computers
Securely storing recovered data
Presenting information in court
Determining different levels of access to information assets for different levels of users is covered by a firm's
security policy.
acceptable use policy.
authorization policy.
business continuity plan.
Which type of system eliminates recovery time altogether?
Fault tolerant
High-availability
Wireless Encryption Protocol (WEP)-enabled
Wireless Application Protocol (WAP)-enabled
Which of the following identifies all of the controls that govern individual information systems and assesses their effectiveness?
HIPAA
MIS audits
Business continuity plans
Security policies
Security systems based on physical or behavioral traits are called
smart cards.
tokens.
firewalls.
biometrics.
The firewall screening technology that determines whether packets are part of an ongoing dialogue between a sender and receiver is called
packet filtering.
stateful inspection.
network address translation.
application proxy filtering.
Which type of encryption verifies the origin and content of a message and provides a way to associate a message with a sender?
Digital signature
Symmetric key encryption
Public key encryption
Digital certificate
Internal networks are more vulnerable to security breaches than the Internet.
True
False
Radio frequency bands for wireless networks are easy to scan.
True
False
The security standard for Wi-Fi called Wired Equivalent Privacy (WEP) is extremely secure.
True
False
E-mail worms are currently the most problematic form of malware.
True
False
Key logger programs can be used to gain access to e-mail accounts.
True
False
Denial-of-service attacks often destroy valuable company information.
True
False
Many companies are reluctant to report computer crimes.
True
False
Many firms spend heavily on security because it significantly increases sales revenue.
True
False
Data that has been deleted from computer storage media can be recovered even if it is not visible to the average user.
True
False
High-availability computing systems help firms recover quickly from a system crash.
True
False
Disaster recovery planning identifies critical business processes and determines action plans for handling mission-critical functions if systems go down.
True
False
Smart cards used in security systems display passcodes that change frequently.
True
False
In large organizations, a firewall often resides on a specially designated computer separate from the rest of the network.
True
False
Wi-Fi Protected Access (WPA) improves data encryption for wireless networks by using 128-bit keys that continually change.
True
False
Digital certificates are used to encrypt network traffic on the Web.
True
False
Discuss why information systems and networks are vulnerable to security threats.
To create paragraphs in your essay response, type <p> at the beginning of the paragraph, and </p> at the end.
Discuss the system security threats employees pose.
To create paragraphs in your essay response, type <p> at the beginning of the paragraph, and </p> at the end.
Describe what a risk assessment is and why it's necessary.
To create paragraphs in your essay response, type <p> at the beginning of the paragraph, and </p> at the end.
Describe policies a firm should develop to help protect its information assets.
To create paragraphs in your essay response, type <p> at the beginning of the paragraph, and </p> at the end.
Describe three new authentication technologies for information systems and the necessity for them.
To create paragraphs in your essay response, type <p> at the beginning of the paragraph, and </p> at the end.
The Submit Answers for Grading feature requires scripting to function. Your browser either does not support scripting or you have turned scripting off.
So, the Submit Answers for Grading button below will not work.
The following Submit Answers for Grading button is provided in its place and will clear your answers:
The Clear Answers and Start Over feature requires scripting to function. Your browser either does not support scripting or you have turned scripting off.
So, the Clear Answers and Start Over button below will not work.
The following Clear Answers button is provided in its place and will clear your answers:
Copyright © 1995 - 2010
Pearson Education
. All rights reserved. Pearson Prentice Hall is an imprint of
Pearson
.
Legal Notice
|
Privacy Policy
|
Permissions
[Return to the Top of this Page]
: [Return to the Top of this Page]