Content Ali Seifi User ITM102 - Business Information Systems 1 - F2012 Course Quiz 6 Test 11/8/12 7:49 PM Started Submitted 11/8/12 8:12 PM Completed Status 18 out of 20 points Score Time Elapsed 22 minutes out of 35 minutes. Instructions
Question 1 1 out of 1 points
Authentication refers to the ability to know that a person is who he or she claims to be. Answer Selected Answer: True
Question 2 1 out of 1 points
Application controls Answer Selected Answer:
can be classified as input controls, processing controls, and output controls.
Question 3 1 out of 1 points
Jimmy Clark is sitting home one night and is very bored. He gets on his computer and starts to surf the net. He comes to a military site. He thinks he might be able to get around the security of the site and into the military computer system. He spends the next two hours trying to find his way into their system. Jimmy is ________. Answer Selected Answer: a hacker
Question 4 0 out of 1 points
An authentication token is a(n) Answer Selected Answer: device the size of a credit card that contains access permission data.
Question 5 1 out of 1 points
DoS attacks are used to destroy information and access restricted areas of a company's information system. Answer Selected Answer: False
Question 6 1 out of 1 points
A firewall is a combination of hardware and software that controls the flow of incoming and outgoing network traffic. Answer Selected Answer: True
Question 7 1 out of 1 points
General controls govern the design, security, and use of computer programs and the security of data files throughout the organization's IT infrastructure. Answer Selected Answer: True
Question 8 1 out of 1 points
The WEP specification calls for an access point and its users to share the same 40-bit encrypted password. Answer Selected Answer: True
Question 9 0 out of 1 points
Analysis of an information system that rates the likelihood of a security incident occurring and its cost is included in a(n) Answer
Selected Answer: security policy.
Question 10 1 out of 1 points
________ use scanning software to look for known problems such as bad passwords, the removal of important files, security attacks in progress, and system administration errors. Answer Selected Answer: Intrusion detection systems
Question 11 1 out of 1 points
________ consists of business processes and software tools for identifying the valid users of a system and controlling their access to system resources. Answer Selected Answer: Identity management
Question 12 1 out of 1 points
An analysis of the firm's most critical systems and the impact a system's outage would have on the business is included in a(n) Answer Selected Answer: business impact analysis.
Question 13 1 out of 1 points
Popular IM applications for consumers do not use a secure layer for text messages, so they can be intercepted and read by outsiders during transmission over the public Internet. Answer Selected Answer: True
Question 14 1 out of 1 points
The potential for unauthorized access is usually limited to the communications lines of a network.
Answer Selected Answer: False
Question 15 1 out of 1 points
Downtime refers to periods of time in which a Answer Selected Answer: computer system is not operational.
Question 16 1 out of 1 points
SSL is a protocol used to establish a secure connection between two computers. Answer Selected Answer: True
Question 17 1 out of 1 points
Fault-tolerant computers contain redundant hardware, software, and power supply components. Answer Selected Answer: True
Question 18 1 out of 1 points
Many firms spend heavily on security because it is directly related to sales revenue. Answer Selected Answer: False
Question 19 1 out of 1 points
Businesses must protect not only their own information assets but also those of ________. Answer Selected Answer: customers. employees, and business partners
Question 20 1 out of 1 points
John clicks into his online banking Web site. He is all ready to type in his password when he notices that something is just not right. Upon further examination he notices that it is not the actual bank site but one that looks almost identical. John was almost a victim of ________. Answer Selected Answer: spoofing