Content Frame
Note for screen reader users: There is text between the form elements on this page. To be sure that you do not miss any text, use item by item navigation methods, rather than tabbing from form element to form element.
Skip Breadcrumb Navigation
Home  arrow Chapter 7  arrow Study Guide

Study Guide

Student Objectives

After completing this chapter, you will be able to:

  1. Analyze why information systems need special protection from destruction, error, and abuse.
  2. Assess the business value of security and control.
  3. Design an organizational framework for security and control.
  4. Evaluate the most important tools and technologies for safeguarding information resources.


This activity contains 35 questions.

Question 1.
Common threats against information systems come from all of the following factors except


Open Hint for Question 1 in a new window.
 
End of Question 1


Question 2.
Eavesdroppers driving by buildings and trying to intercept wireless network traffic is called


Open Hint for Question 2 in a new window.
 
End of Question 2


Question 3.
Malware includes all of the following except


Open Hint for Question 3 in a new window.
 
End of Question 3


Question 4.
An eavesdropping program that monitors information traveling over a network is called a program.


Open Hint for Question 4 in a new window.
 
End of Question 4


Question 5.
Sending email messages that look like those of legitimate businesses to ask users for personal data is called


Open Hint for Question 5 in a new window.
 
End of Question 5


Question 6.
The single greatest cause of network security breaches is


Open Hint for Question 6 in a new window.
 
End of Question 6


Question 7.
Firms providing financial services must comply with the ______________ for electronic records management.


Open Hint for Question 7 in a new window.
 
End of Question 7


Question 8.
Which of the following ensures that internal controls are in place to govern the creation and documentation of information in financial statements?


Open Hint for Question 8 in a new window.
 
End of Question 8


Question 9.
Which of the following is not a problem that computer forensics deals with?


Open Hint for Question 9 in a new window.
 
End of Question 9


Question 10.
Determining different levels of access to information assets for different levels of users is covered by a firm's


Open Hint for Question 10 in a new window.
 
End of Question 10


Question 11.
Which type of system eliminates recovery time altogether?


Open Hint for Question 11 in a new window.
 
End of Question 11


Question 12.
Which of the following identifies all of the controls that govern individual information systems and assesses their effectiveness?


Open Hint for Question 12 in a new window.
 
End of Question 12


Question 13.
Security systems based on physical or behavioral traits are called


Open Hint for Question 13 in a new window.
 
End of Question 13


Question 14.
The firewall screening technology that determines whether packets are part of an ongoing dialogue between a sender and receiver is called


Open Hint for Question 14 in a new window.
 
End of Question 14


Question 15.
Which type of encryption verifies the origin and content of a message and provides a way to associate a message with a sender?


Open Hint for Question 15 in a new window.
 
End of Question 15


Question 16.
Internal networks are more vulnerable to security breaches than the Internet.


Open Hint for Question 16 in a new window.
   
 
End of Question 16


Question 17.
Radio frequency bands for wireless networks are easy to scan.


Open Hint for Question 17 in a new window.
   
 
End of Question 17


Question 18.
The security standard for Wi-Fi called Wired Equivalent Privacy (WEP) is extremely secure.


Open Hint for Question 18 in a new window.
   
 
End of Question 18


Question 19.
E-mail worms are currently the most problematic form of malware.


Open Hint for Question 19 in a new window.
   
 
End of Question 19


Question 20.
Key logger programs can be used to gain access to e-mail accounts.


Open Hint for Question 20 in a new window.
   
 
End of Question 20


Question 21.
Denial-of-service attacks often destroy valuable company information.


Open Hint for Question 21 in a new window.
   
 
End of Question 21


Question 22.
Many companies are reluctant to report computer crimes.


Open Hint for Question 22 in a new window.
   
 
End of Question 22


Question 23.
Many firms spend heavily on security because it significantly increases sales revenue.


Open Hint for Question 23 in a new window.
   
 
End of Question 23


Question 24.
Data that has been deleted from computer storage media can be recovered even if it is not visible to the average user.


Open Hint for Question 24 in a new window.
   
 
End of Question 24


Question 25.
High-availability computing systems help firms recover quickly from a system crash.


Open Hint for Question 25 in a new window.
   
 
End of Question 25


Question 26.
Disaster recovery planning identifies critical business processes and determines action plans for handling mission-critical functions if systems go down.


Open Hint for Question 26 in a new window.
   
 
End of Question 26


Question 27.
Smart cards used in security systems display passcodes that change frequently.


Open Hint for Question 27 in a new window.
   
 
End of Question 27


Question 28.
In large organizations, a firewall often resides on a specially designated computer separate from the rest of the network.


Open Hint for Question 28 in a new window.
   
 
End of Question 28


Question 29.
Wi-Fi Protected Access (WPA) improves data encryption for wireless networks by using 128-bit keys that continually change.


Open Hint for Question 29 in a new window.
   
 
End of Question 29


Question 30.
Digital certificates are used to encrypt network traffic on the Web.


Open Hint for Question 30 in a new window.
   
 
End of Question 30


Question 31.




Open Hint for Question 31 in a new window.
 
To create paragraphs in your essay response, type <p> at the beginning of the paragraph, and </p> at the end.

End of Question 31


Question 32.




Open Hint for Question 32 in a new window.
 
To create paragraphs in your essay response, type <p> at the beginning of the paragraph, and </p> at the end.

End of Question 32


Question 33.




Open Hint for Question 33 in a new window.
 
To create paragraphs in your essay response, type <p> at the beginning of the paragraph, and </p> at the end.

End of Question 33


Question 34.




Open Hint for Question 34 in a new window.
 
To create paragraphs in your essay response, type <p> at the beginning of the paragraph, and </p> at the end.

End of Question 34


Question 35.




Open Hint for Question 35 in a new window.
 
To create paragraphs in your essay response, type <p> at the beginning of the paragraph, and </p> at the end.

End of Question 35





Pearson Copyright © 1995 - 2010 Pearson Education . All rights reserved. Pearson Prentice Hall is an imprint of Pearson .
Legal Notice | Privacy Policy | Permissions

Return to the Top of this Page