Unit 4/ Chapter 6,9&10- Online Security and The Role of People in Technology

Ace your homework & exams now with Quizwiz!

Which of the following is false about firewalls? All of the answers are false about firewall. A firewall can be software. A firewall can be hardware. A firewall cannot restrict the flow of packets leaving the organization. A firewall can increase network security.

A firewall cannot restrict the flow of packets leaving the organization.

Which of the following are disadvantages of purchasing software from a vendor instead of building software in-house? The company will not have control over the upgrades of the purchased software. The purchased software may be difficult to customize. It may be difficult for the company to differentiate itself based on a business process that is in the purchased software. All of the answers are correct. The purchased software may not integrate with existing systems.

All of the answers are correct.

Which of the following are information security tools? Access control tools Comprehensive backup plans All of the answers are information security tools. Authentication tools Encryption tools

All of the answers are information security tools.

Which of the following is true about agile methods? Agile methods involve small cross-functional teams that include development-team members and users. Agile methods utilize incremental changes with a focus on quality and attention to detail. All of the answers are true about agile methods. Agile methods provide the flexibility of an iterative approach while ensuring a quality product. Agile methods emphasize iterative development, user interaction, and ability to change.

All of the answers are true about agile methods.

____________ tools allow a designer to develop software with little or no programming. IDE CASE CSS Visual Studio HTML

CASE

____________________ are those who adopt innovation after a technology has been introduced and proven. Early Adopters Innovators Laggards Early Majority Late Majority

Early Adopters

A strong password should include your social security number. True False

False

Confidentiality is not a member of the Information Security Triad. True False

False

Cost is not a member of the Quality Triangle. True False

False

Project managers are in charge of setting organizations' information-security policies, and then overseeing the implementation of those policies. True False

False

Technical feasibility determines if a system development project is affordable. True False

False

The CIO, or chief information officer, requires a lot of technical expertise with no management skills. True False

False

The late majority will adopt an innovation after a varying degree of time. True False

False

_____________________ are in charge of setting organizations' information-security policies, and then overseeing the implementation of those policies. Data analysts Project Managers Trainers Information-security officers Mobile-technology specialists

Information-security officers

Which of the following is NOT a member of the Quality Triangle? Quality Cost None of the answers are a member of the Quality Triangle. Time People

People

______ occurs when a user receives an e-mail that looks as if it is from a trusted source, such as their bank, or their employer. In the e-mail, the user is asked to click a link and log in to a website that mimics the genuine website and enter their ID and password, which are then captured by the attacker. Extortion Vandalism Espionage Phishing Pretexting

Phishing

The systems development life cycle proceeds in which order: System Analysis - System Design - Preliminary Analysis - Maintenance - Programming - Testing - Implementation Preliminary Analysis - System Analysis - System Design - Programming - Testing - Maintenance - Implementation Preliminary Analysis - System Analysis - System Design - Programming - Testing - Implementation - Maintenance Preliminary Analysis - System Design - System Analysis - Programming - Testing - Implementation - Maintenance Preliminary Analysis - Implementation - System Analysis - Programming - Testing - System Design - Maintenance

Preliminary Analysis - System Analysis - System Design - Programming - Testing - Implementation - Maintenance

Which of the following is false about role-based access control? Role-based access control simplifies administration and improves security. With role-based access control, users are assigned to roles and then those roles are assigned the access. All the answers are false about role-based access control. Role-based access control allows the administrators to manage users and roles separately. Role-based access control gives specific users access rights to an information resource.

Role-based access control gives specific users access rights to an information resource.

A computer trainer conducts classes to teach people specific computer skills. True False

True

Biometrics involves identifying someone through his/her physical characteristics. True False

True

CASE refers to computer-aided software-engineering. True False

True

Functional managers will report to the CIO and manage the employees specific to their function. True False

True

Integrity is a member of the Information Security Triad. True False

True

Laggards are individuals who are last to adopt an innovation. True False

True

Programming is the process of creating a set of logical instructions for a digital device to follow using a programming language. True False

True

The most common form of authentication is the user ID and password. True False

True

Time is a member of the Quality Triangle. True False

True

The job of a CIO is to ____________________. keep the information systems running and up-to-date implement any changes to the ERP that are needed align the plans and operations of the information systems with the strategic goals of the organization manage the day-to-day operations of IT None of the answers are the job of a CIO.

align the plans and operations of the information systems with the strategic goals of the organization

The duties of _______________ include keeping the operating system up to date, ensuring available memory and disk storage, and overseeing the physical environment of the computer. system analysts computer engineers computer operators hardware engineers project managers

computer operators

Mary is using public key encryption to send a message to Mike. Mary encrypts the message with Mike's _______key, and Mike decrypts the message using his _________key. public, public public, private None of the answers are correct. private, public private, private

public, private


Related study sets

Chapter 21: Nursing Care of the Child With an Alteration in Urinary Elimination/Genitourinary Disorder

View Set

Molybdenum-99 / 99-Mo / 66 hours / 181keV, 740keV, 778keV (γ), Thallium-201 / 201-Tl / 73 Hours / 135keV & 167keV, Xenon-133 / 133-Xe / 5.3 Days / 81kEv, Technetium-99m / 99m-Tc / 6hrs / 140KeV

View Set

Med Surg 2 Finals Study Questions

View Set