preview

Computer Security and Page Ref

Decent Essays

Management Information Systems, 12e (Laudon)
Chapter 8 Securing Information Systems

1) In addition to e-mail, instant messages and P2P file-sharing can also pose security threats to computer systems and networks.
Answer: TRUE
Diff: 1 Page Ref: 294
AACSB: Use of IT
CASE: Comprehension
Objective: 8.1

2) Computers using cable modems to connect to the Internet are more open to penetration than those connecting via dial-up.
Answer: TRUE
Diff: 2 Page Ref: 294
AACSB: Use of IT
CASE: Comprehension
Objective: 8.1

3) Wireless networks are vulnerable to penetration because radio frequency bands are easy to scan.
Answer: TRUE
Diff: 2 Page Ref: 295
AACSB: Use of IT
CASE: Comprehension
Objective: 8.1

4) The …show more content…

A) "Security"
B) "Controls"
C) "Benchmarking"
D) "Algorithms"
Answer: A
Diff: 2 Page Ref: 293
AACSB: Use of IT
CASE: Comprehension
Objective: 8.3

22) ________ refers to all of the methods, policies, and organizational procedures that ensure the safety of the organization 's assets, the accuracy and reliability of its accounting records, and operational adherence to management standards.
A) "Legacy systems"
B) "SSID standards"
C) "Vulnerabilities"
D) "Controls"
Answer: D
Diff: 2 Page Ref: 293
AACSB: Use of IT
CASE: Comprehension
Objective: 8.3

23) Which of the following does not pose a security threat to wireless networks?
A) broadcasted SSIDs
B) scannability of radio frequency bands
C) SQL injection attacks
D) geographic range of wireless signals
Answer: C
Diff: 1 Page Ref: 295-296
AACSB: Analytic Skills
CASE: Evaluation in terms of assess
Objective: 8.1

24) Electronic data are more susceptible to destruction, fraud, error, and misuse because information systems concentrate data in computer files that
A) are usually bound up in legacy systems that are difficult to access and difficult to correct in case of error.
B) are not secure because the technology to secure them did not exist at

Get Access