Quiz 6.docx

5 Pages
166 Views
Unlock Document

Department
Information Technology Management
Course
ITM 102
Professor
Anne Hardacre
Semester
Fall

Description
Content User Ali Seifi Course ITM102 - Business Information Systems 1 - F2012 Test Quiz 6 Started 11/8/12 7:49 PM Submitted 11/8/12 8:12 PM Status Completed Score 18 out of 20 points Time Elapsed 22 minutes out of 35 minutes. Instructions  Question 1 1 out of 1 points Authentication refers to the ability to know that a person is who he or she claims to be. Answer Selected Answer: True  Question 2 1 out of 1 points Application controls Answer Selected Answer: can be classified as input controls, processing controls, and output controls.  Question 3 1 out of 1 points Jimmy Clark is sitting home one night and is very bored. He gets on his computer and starts to surf the net. He comes to a military site. He thinks he might be able to get around the security of the site and into the military computer system. He spends the next two hours trying to find his way into their system. Jimmy is ________. Answer Selected Answer: a hacker  Question 4 0 out of 1 points An authentication token is a(n) Answer Selected Answer: device the size of a credit card that contains access permission data.  Question 5 1 out of 1 points DoS attacks are used to destroy information and access restricted areas of a company's information system. Answer Selected Answer: False  Question 6 1 out of 1 points A firewall is a combination of hardware and software that controls the flow of incoming and outgoing network traffic. Answer Selected Answer: True  Question 7 1 out of 1 points General controls govern the design, security, and use of computer programs and the security of data files throughout the organization's IT infrastructure. Answer Selected Answer: True  Question 8 1 out of 1 points The WEP specification calls for an access point and its users to share the same 40-bit encrypted password. Answer Selected Answer: True  Question 9 0 out of 1 points Analysis of an information system that rates the likelihood of a security incident occurring and its cost is included in a(n) Answer Selected Answer: security policy.  Question 10 1 out of 1 points ________ use scanning software to look for know
More Less

Related notes for ITM 102

Log In


OR

Join OneClass

Access over 10 million pages of study
documents for 1.3 million courses.

Sign up

Join to view


OR

By registering, I agree to the Terms and Privacy Policies
Already have an account?
Just a few more details

So we can recommend you notes for your school.

Reset Password

Please enter below the email address you registered with and we will send you a link to reset your password.

Add your courses

Get notes from the top students in your class.


Submit