Unit 4/ Chapter 6,9&10- Online Security and The Role of People in Technology
Which of the following is false about firewalls? All of the answers are false about firewall. A firewall can be software. A firewall can be hardware. A firewall cannot restrict the flow of packets leaving the organization. A firewall can increase network security.
A firewall cannot restrict the flow of packets leaving the organization.
Which of the following are disadvantages of purchasing software from a vendor instead of building software in-house? The company will not have control over the upgrades of the purchased software. The purchased software may be difficult to customize. It may be difficult for the company to differentiate itself based on a business process that is in the purchased software. All of the answers are correct. The purchased software may not integrate with existing systems.
All of the answers are correct.
Which of the following are information security tools? Access control tools Comprehensive backup plans All of the answers are information security tools. Authentication tools Encryption tools
All of the answers are information security tools.
Which of the following is true about agile methods? Agile methods involve small cross-functional teams that include development-team members and users. Agile methods utilize incremental changes with a focus on quality and attention to detail. All of the answers are true about agile methods. Agile methods provide the flexibility of an iterative approach while ensuring a quality product. Agile methods emphasize iterative development, user interaction, and ability to change.
All of the answers are true about agile methods.
____________ tools allow a designer to develop software with little or no programming. IDE CASE CSS Visual Studio HTML
CASE
____________________ are those who adopt innovation after a technology has been introduced and proven. Early Adopters Innovators Laggards Early Majority Late Majority
Early Adopters
A strong password should include your social security number. True False
False
Confidentiality is not a member of the Information Security Triad. True False
False
Cost is not a member of the Quality Triangle. True False
False
Project managers are in charge of setting organizations' information-security policies, and then overseeing the implementation of those policies. True False
False
Technical feasibility determines if a system development project is affordable. True False
False
The CIO, or chief information officer, requires a lot of technical expertise with no management skills. True False
False
The late majority will adopt an innovation after a varying degree of time. True False
False
_____________________ are in charge of setting organizations' information-security policies, and then overseeing the implementation of those policies. Data analysts Project Managers Trainers Information-security officers Mobile-technology specialists
Information-security officers
Which of the following is NOT a member of the Quality Triangle? Quality Cost None of the answers are a member of the Quality Triangle. Time People
People
______ occurs when a user receives an e-mail that looks as if it is from a trusted source, such as their bank, or their employer. In the e-mail, the user is asked to click a link and log in to a website that mimics the genuine website and enter their ID and password, which are then captured by the attacker. Extortion Vandalism Espionage Phishing Pretexting
Phishing
The systems development life cycle proceeds in which order: System Analysis - System Design - Preliminary Analysis - Maintenance - Programming - Testing - Implementation Preliminary Analysis - System Analysis - System Design - Programming - Testing - Maintenance - Implementation Preliminary Analysis - System Analysis - System Design - Programming - Testing - Implementation - Maintenance Preliminary Analysis - System Design - System Analysis - Programming - Testing - Implementation - Maintenance Preliminary Analysis - Implementation - System Analysis - Programming - Testing - System Design - Maintenance
Preliminary Analysis - System Analysis - System Design - Programming - Testing - Implementation - Maintenance
Which of the following is false about role-based access control? Role-based access control simplifies administration and improves security. With role-based access control, users are assigned to roles and then those roles are assigned the access. All the answers are false about role-based access control. Role-based access control allows the administrators to manage users and roles separately. Role-based access control gives specific users access rights to an information resource.
Role-based access control gives specific users access rights to an information resource.
A computer trainer conducts classes to teach people specific computer skills. True False
True
Biometrics involves identifying someone through his/her physical characteristics. True False
True
CASE refers to computer-aided software-engineering. True False
True
Functional managers will report to the CIO and manage the employees specific to their function. True False
True
Integrity is a member of the Information Security Triad. True False
True
Laggards are individuals who are last to adopt an innovation. True False
True
Programming is the process of creating a set of logical instructions for a digital device to follow using a programming language. True False
True
The most common form of authentication is the user ID and password. True False
True
Time is a member of the Quality Triangle. True False
True
The job of a CIO is to ____________________. keep the information systems running and up-to-date implement any changes to the ERP that are needed align the plans and operations of the information systems with the strategic goals of the organization manage the day-to-day operations of IT None of the answers are the job of a CIO.
align the plans and operations of the information systems with the strategic goals of the organization
The duties of _______________ include keeping the operating system up to date, ensuring available memory and disk storage, and overseeing the physical environment of the computer. system analysts computer engineers computer operators hardware engineers project managers
computer operators
Mary is using public key encryption to send a message to Mike. Mary encrypts the message with Mike's _______key, and Mike decrypts the message using his _________key. public, public public, private None of the answers are correct. private, public private, private
public, private