weekly quiz 6.pdf

4 Pages
Unlock Document

Ryerson University
Information Technology Management
ITM 102
Vikraman Baskaran

Question 1 

Jimmy Clark is sitting home one night and is very bored. He gets on his computer and starts to surf the net. He comes to a military site. He thinks he might be able to get around the security of the site and into the military computer system. He spends the next two hours trying to find his way into their system. Jimmy is ________.
a hacker
Question 2 

Application controls Answer: 
can be classified as input controls, processing controls, and output controls Question 3 

The potential for unauthorized access is usually limited to the communications lines of a network. Answer: False 
Question 4 

Many firms spend heavily on security because it is directly related to sales revenue. Answer: False
Question 5 

Fault-tolerant computers contain redundant hardware, software, and power supply components.
 Answer: True
Question 6
 DoS attacks are used to destroy information and access restricted areas of a company's information system.
 Answer: False 
Question 7 

Popular IM applications for consumers do not use a secure layer for text messages, so they can be intercepted and read by outsiders during transmission over the public Internet. Answer: True 
Question 8

SSL is a protocol used to establish a secure connection between two computers Answer: True
Question 9 

________ consists of business processes and software tools for identifying the valid users of a system and controlling their access to system resources.
Identity management
 Question 10 

________ use scanning software to look for known problems such as bad passwords, the removal of important files, security attacks in progress, and syste
More Less

Related notes for ITM 102

Log In


Don't have an account?

Join OneClass

Access over 10 million pages of study
documents for 1.3 million courses.

Sign up

Join to view


By registering, I agree to the Terms and Privacy Policies
Already have an account?
Just a few more details

So we can recommend you notes for your school.

Reset Password

Please enter below the email address you registered with and we will send you a link to reset your password.

Add your courses

Get notes from the top students in your class.