Chapter 8 - True/False

Ace your homework & exams now with Quizwiz!

An acceptable use policy defines the acceptable level of access to information assets for different users.

FALSE

DoS attacks are used to destroy information and access restricted areas of a company's information system.

FALSE

High-availability computing is also referred to as fault tolerance.

FALSE

Packet filtering catches most types of network attacks.

FALSE

The range of Wi-Fi networks can be extended up to two miles by using external antennae.

FALSE

Biometric authentication is the use of physical characteristics such as retinal images to provide identification.

TRUE

Both software metrics and software testing are techniques used to improve software quality.

TRUE

Computer worms spread much more rapidly than computer viruses.

TRUE

Computers using cable modems to connect to the internet are more open to penetration than those connecting via dial-up.

TRUE

DoS attacks are one of the most economically damaging kinds of computer crime.

TRUE

In addition to e-mail, instant messages and P2P file-sharing can also pose security threats to computer systems and networks.

TRUE

NAT conceals the IP addresses of the organization's internal host computers to deter sniffer programs.

TRUE

One form of spoofing involves forging the return address on an e-mail so that the e-mail messages appears to come from someone other than the sender.

TRUE

Public key encryption uses two keys.

TRUE

SSL is a protocol used to establish a secure connection between two computers.

TRUE

Sniffers enable hackers to steal proprietary information from anywhere on a network, including e-mail messages, company files, and confidential reports.

TRUE

The WEP specification calls for an access point and its users to share the same 40-bit encrypted password.

TRUE

Viruses can be spread through e-mail.

TRUE

Wireless networks are vulnerable to penetration because radio frequency bands are easy to scan.

TRUE

Zero defects cannot be achieved in larger programs because fully testing programs that contain thousands of choices and millions of paths would require thousands of years.

TRUE


Related study sets

Helpdesk: Evaluating Your CPU and RAM (Ch.6)

View Set

Chapter 19 - Senses: General and Special

View Set

Chapter 40 Legal Issues, Quality Assurance, & Infection Control-D26

View Set

Fundamentals of Nursing - Basic Physical Assessment

View Set