Chapter 8
DoS attacks are used to destroy information and access restricted areas of a company's information system
FALSE
an acceptable use policy defines the acceptable level of access to information assets for different users
FALSE
authorization refers to the ability to know that person is who he or she claims to be
FALSE
malicious software programs referred to as spyware include a variety of threats such as computer viruses, worms, and Trojan horses
FALSE
over 70 percent of malware today is aimed at small businesses
FALSE
packet filtering catches most types of network attacks
FALSE
smartphones typically feature state-of-the-art encryptions and security features, making them highly secure tools for businesses
FALSE
the distributed nature of cloud computing makes it somewhat easier to track unauthorized access
FALSE
the termer cracker is used to identify a hacker whose speciality is breaking open security systems
FALSE
NAT conceals the IP addresses of the organization's internal host computers to deter sniffer programs
TRUE
SSL is a protocol used to establish a secure connection between two computers
TRUE
a walkthrough is a type of software testing used before software is even written
TRUE
biometric authentication is the use of physical characteristics such as retinal images to provide identification
TRUE
computer worms spread much more rapidly than computer viruses
TRUE
in 2013, the security firm McAfee identified approximately 35,000 kinds of mobile malware
TRUE
one form of spoofing involves forging the return address on an email so that the email message appears to come from someone other than the sender
TRUE
public key encryption uses two keys
TRUE
smartphones have the same security flaws as other internet-connected devices
TRUE
sniffers enable hackers to steal proprietary information from anywhere on a network, including email messages, company files, and confidential reports
TRUE
to secure mobile devices, a company will need to implement special mobile device management software
TRUE
viruses can be spread through email
TRUE
when errors are discovered in software programs, the sources of the errors are found eliminated through a process called debugging
TRUE
wireless networks are vulnerable to penetration because radio frequency bands are easy to scan
TRUE
zero defects cannot be achieved in larger software programs because fully testing programs that contain thousands of choices and millions of paths would require thousands of years
TRUE