Content

Report 3 Downloads 276 Views
Content Ali Seifi User ITM102 - Business Information Systems 1 - F2012 Course Quiz 6 Test 11/8/12 7:49 PM Started Submitted 11/8/12 8:12 PM Completed Status 18 out of 20 points Score Time Elapsed 22 minutes out of 35 minutes. Instructions 

Question 1 1 out of 1 points

Authentication refers to the ability to know that a person is who he or she claims to be. Answer Selected Answer: True 

Question 2 1 out of 1 points

Application controls Answer Selected Answer: 

can be classified as input controls, processing controls, and output controls.

Question 3 1 out of 1 points

Jimmy Clark is sitting home one night and is very bored. He gets on his computer and starts to surf the net. He comes to a military site. He thinks he might be able to get around the security of the site and into the military computer system. He spends the next two hours trying to find his way into their system. Jimmy is ________. Answer Selected Answer: a hacker 

Question 4 0 out of 1 points

An authentication token is a(n) Answer Selected Answer: device the size of a credit card that contains access permission data. 

Question 5 1 out of 1 points

DoS attacks are used to destroy information and access restricted areas of a company's information system. Answer Selected Answer: False 

Question 6 1 out of 1 points

A firewall is a combination of hardware and software that controls the flow of incoming and outgoing network traffic. Answer Selected Answer: True 

Question 7 1 out of 1 points

General controls govern the design, security, and use of computer programs and the security of data files throughout the organization's IT infrastructure. Answer Selected Answer: True 

Question 8 1 out of 1 points

The WEP specification calls for an access point and its users to share the same 40-bit encrypted password. Answer Selected Answer: True 

Question 9 0 out of 1 points

Analysis of an information system that rates the likelihood of a security incident occurring and its cost is included in a(n) Answer

Selected Answer: security policy. 

Question 10 1 out of 1 points

________ use scanning software to look for known problems such as bad passwords, the removal of important files, security attacks in progress, and system administration errors. Answer Selected Answer: Intrusion detection systems 

Question 11 1 out of 1 points

________ consists of business processes and software tools for identifying the valid users of a system and controlling their access to system resources. Answer Selected Answer: Identity management 

Question 12 1 out of 1 points

An analysis of the firm's most critical systems and the impact a system's outage would have on the business is included in a(n) Answer Selected Answer: business impact analysis. 

Question 13 1 out of 1 points

Popular IM applications for consumers do not use a secure layer for text messages, so they can be intercepted and read by outsiders during transmission over the public Internet. Answer Selected Answer: True 

Question 14 1 out of 1 points

The potential for unauthorized access is usually limited to the communications lines of a network.

Answer Selected Answer: False 

Question 15 1 out of 1 points

Downtime refers to periods of time in which a Answer Selected Answer: computer system is not operational. 

Question 16 1 out of 1 points

SSL is a protocol used to establish a secure connection between two computers. Answer Selected Answer: True 

Question 17 1 out of 1 points

Fault-tolerant computers contain redundant hardware, software, and power supply components. Answer Selected Answer: True 

Question 18 1 out of 1 points

Many firms spend heavily on security because it is directly related to sales revenue. Answer Selected Answer: False 

Question 19 1 out of 1 points

Businesses must protect not only their own information assets but also those of ________. Answer Selected Answer: customers. employees, and business partners 

Question 20 1 out of 1 points

John clicks into his online banking Web site. He is all ready to type in his password when he notices that something is just not right. Upon further examination he notices that it is not the actual bank site but one that looks almost identical. John was almost a victim of ________. Answer Selected Answer: spoofing