ch8.pdf

27 Pages
126 Views
Unlock Document

Department
Information Technology Management
Course
ITM 100
Professor
Catherine Middleton
Semester
Fall

Description
Exam Name TRUEFALSEWrite T if the statement is true and F if the statement is false1The potential for unauthorized access is usually limited to the communications lines of a 1network Answer TrueFalse2Large public networks such as the Internet are less vulnerable than internal networks because 2they are virtually open to anyone Answer TrueFalse3Malicious software programs are referred to as badware and include a variety of threats such as 3computer viruses worms and Trojan horses Answer TrueFalse4A computer bacteria is a rogue software program that attaches itself to other software programs 4or data files in order to be executed usually without user knowledge or permissionAnswer TrueFalse5Web 20 applications such as blogs wikis and social networking sites such as Facebook and 5MySpace have are not conduits for malware or spyware Answer TrueFalse6A Trojan horse is a software program that appears threatening but is really benign6Answer TrueFalse7Keyloggers record every keystroke made on a computer to steal serial numbers for software to 7launch Internet attacks to gain access to email accounts to obtain passwords to protected computer systems or to pick up personal information such as credit card numbersAnswer TrueFalse8A hacker is an individual who intends to gain unauthorized access to a computer system 8Answer TrueFalse9The term cracker is typically used to denote a hacker with criminal intent9Answer TrueFalse10The term cybervandalism is the intentional disruption defacement or even destruction of a 10Web site or corporate information system Answer TrueFalse11Computer crime is defined as any criminal activity involving the copy of use of removal of 11interference with access to manipulation of computer systems andor their related functions data or programs Answer TrueFalse12Identity theft is a crime in which an imposter obtains key pieces of personal information such as 12social insurance numbers drivers licence numbers or credit card numbers to impersonate someone else Answer TrueFalse13Pharming redirects users to a bogus Web page even when the individual types the correct Web 13page address into his or her browser Answer TrueFalseOne increasingly popular tactic is a form of spoofing called phishing 1414Answer TrueFalse15Social Bookmarking is tricking people into revealing their passwords or other information by 15pretending to be legitimate users or members of a company in need of informationAnswer TrueFalse16Software errors are no threat to information systems that could cause untold losses in 16productivity Answer TrueFalse17Many firms spend heavily on security because it is directly related to sales revenue17Answer TrueFalse18Computer forensics is the scientific collection examination authentication preservation and 18analysis of data held on or retrieved from computer storage media in such a way that the information can be used as evidence in a court of lawAnswer TrueFalse19General controls govern the design security and use of computer programs and the security of 19data files throughout the organizations IT infrastructureAnswer TrueFalse20Application controls are specific controls unique to each computerized application such as 20payroll or order processing Answer TrueFalse21Output controls check data for accuracy and completeness when they enter the system21Answer TrueFalse22A risk audit includes statements ranking information risks identifying acceptable security goals 22and identifying the mechanisms for achieving these goals Answer TrueFalse23Disaster recovery planning devises plans for the restoration of computing and communications 23services before they have been disruptedAnswer TrueFalse24An MIS audit examines the firms overall security environment as well as controls governing 24individual information systems Answer TrueFalse25Authentication refers to the ability to know that a person is who he or she claims to be 25Answer TrueFalse26An MIS audit examines the firms overall security environment as well as controls governing 26individual information systems Answer TrueFalse
More Less

Related notes for ITM 100

Log In


OR

Join OneClass

Access over 10 million pages of study
documents for 1.3 million courses.

Sign up

Join to view


OR

By registering, I agree to the Terms and Privacy Policies
Already have an account?
Just a few more details

So we can recommend you notes for your school.

Reset Password

Please enter below the email address you registered with and we will send you a link to reset your password.

Add your courses

Get notes from the top students in your class.


Submit