Testbank ch7 PDF

Title Testbank ch7
Author Mohammad Faqeer
Course management information system
Institution German Jordanian University
Pages 4
File Size 96.3 KB
File Type PDF
Total Downloads 25
Total Views 196

Summary

Download Testbank ch7 PDF


Description

Smartphones have the same security flaws as other Internet-connected devices.

Definition

TRUE

(True/False)

Term

Definition

TRUE In 2013, the security firm McAfee identified approximately 35,000 kinds of mobile malware. (true/false)

Definition

Term

TRUE

Viruses can be spread through e-mail. (true/false)

Term

Definition

FALSE The term cracker is used to identify a hacker whose specialty is breaking open security systems. (true/false)

Term

Definition

TRUE To secure mobile devices, a company will need to implement special mobile device management software. (true/false)

Term

Definition

TRUE Wireless networks are vulnerable to penetration because radio frequency bands are easy to scan. (true/false)

Term

Definition

TRUE Computer worms spread much more rapidly than computer viruses.

(true/false)

Term

Definition

TRUE One form of spoofing involves forging the return address on an e-mail so that the e-mail message appears to come from someone other than the sender. (true/false)

Term

Definition

TRUE Sniffers enable hackers to steal proprietary information from anywhere on a network, including e-mail messages, company files, and confidential reports. (true/false)

Term

Definition

FALSE DoS attacks are used to destroy information and access restricted areas of a company's information system. (true/false)

Term

Definition

FALSE The distributed nature of cloud computing makes it somewhat easier to track unauthorized access. (true/false)

Term

Definition

TRUE Zero defects cannot be achieved in larger software programs because fully testing programs that contain thousands of choices and millions of paths would require thousands of years. (true/false)

Term

Definition

FALSE An acceptable use policy defines the acceptable level of access to information assets for different users. (true/false)

Term

Definition

TRUE

Biometric authentication is the use of physical characteristics such as retinal images to provide identification. (true/false) Term

Definition

FALSE Packet filtering catches most types of network attacks. (true/false)

Term

Definition

TRUE NAT conceals the IP addresses of the organization's internal host computers to deter sniffer programs. (true/false)

Term

Definition

SSL is a protocol used to establish a secure connection between two computers.

TRUE

(true/false)

Definition

Term

TRUE Public key encryption uses two keys. (true/false)

Term

Definition

Over 70 percent of malware today is aimed at small businesses.

FALSE

(true/false)

Term

Definition

FALSE Smartphones typically feature state-of-the-art encryption and security features, making them highly secure tools for businesses. (true/false)

Term

Definition

FALSE Malicious software programs referred to as spyware include a variety of threats such as computer viruses, worms, and Trojan horses. (true/false)

Term

Definition

FALSE Authorization refers to the ability to know that a person is who he or she claims to be. (true/false)

Term

Definition

A walkthrough is a type of software testing used before software is even written.

TRUE

(true/false)

When errors are discovered in software programs, the sources of the errors are found and eliminated through a process called debugging. (true/false)

Definition

TRUE...


Similar Free PDFs