Chapter 8

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

DoS attacks are used to destroy information and access restricted areas of a company's information system

FALSE

an acceptable use policy defines the acceptable level of access to information assets for different users

FALSE

authorization refers to the ability to know that person is who he or she claims to be

FALSE

malicious software programs referred to as spyware include a variety of threats such as computer viruses, worms, and Trojan horses

FALSE

over 70 percent of malware today is aimed at small businesses

FALSE

packet filtering catches most types of network attacks

FALSE

smartphones typically feature state-of-the-art encryptions and security features, making them highly secure tools for businesses

FALSE

the distributed nature of cloud computing makes it somewhat easier to track unauthorized access

FALSE

the termer cracker is used to identify a hacker whose speciality is breaking open security systems

FALSE

NAT conceals the IP addresses of the organization's internal host computers to deter sniffer programs

TRUE

SSL is a protocol used to establish a secure connection between two computers

TRUE

a walkthrough is a type of software testing used before software is even written

TRUE

biometric authentication is the use of physical characteristics such as retinal images to provide identification

TRUE

computer worms spread much more rapidly than computer viruses

TRUE

in 2013, the security firm McAfee identified approximately 35,000 kinds of mobile malware

TRUE

one form of spoofing involves forging the return address on an email so that the email message appears to come from someone other than the sender

TRUE

public key encryption uses two keys

TRUE

smartphones have the same security flaws as other internet-connected devices

TRUE

sniffers enable hackers to steal proprietary information from anywhere on a network, including email messages, company files, and confidential reports

TRUE

to secure mobile devices, a company will need to implement special mobile device management software

TRUE

viruses can be spread through email

TRUE

when errors are discovered in software programs, the sources of the errors are found eliminated through a process called debugging

TRUE

wireless networks are vulnerable to penetration because radio frequency bands are easy to scan

TRUE

zero defects cannot be achieved in larger software programs because fully testing programs that contain thousands of choices and millions of paths would require thousands of years

TRUE


Set pelajaran terkait

BEGINNING THE ACCOUNTING CYCLE - CHAPTER 3

View Set

The Antepartum period ( Physiological changes in mother)

View Set

Anatomy and Physiology Chapter 5,6,7,8

View Set

French phrases 1664 out of 5000 (3/3)

View Set

Movement-How Are People, Goods And Ideas Moved From Place To Place?

View Set

1 - La familia (Chapter 3) Look at the family tree and describe the relationships between these people.

View Set