ITM 102 Study Guide - Quiz Guide: Identity Management, Online Banking, Information Technology Management
DepartmentInformation Technology Management
Course CodeITM 102
!!Jimmy Clark is sitting home one night and is very bored. He gets on his
computer and starts to surf the net. He comes to a military site. He thinks
he might be able to get around the security of the site and into the
military computer system. He spends the next two hours trying to find his
way into their system. Jimmy is ________.!
Answer: !a hacker!
Answer: !can be classified as input controls, processing controls, and
!!The potential for unauthorized access is usually limited to the
communications lines of a network.
!!Many firms spend heavily on security because it is directly related to sales
!!Fault-tolerant computers contain redundant hardware, software, and
power supply components.!
DoS attacks are used to destroy information and access restricted areas
of a company's information system.!
!!Popular IM applications for consumers do not use a secure layer for text
messages, so they can be intercepted and read by outsiders during
transmission over the public Internet.
!!SSL is a protocol used to establish a secure connection between two
!!________ consists of business processes and software tools for identifying
the valid users of a system and controlling their access to system
Answer: !Identity management!
!!________ use scanning software to look for known problems such as bad
passwords, the removal of important files, security attacks in progress,
and system administration errors.!
Answer: !Intrusion detection systems
!!The WEP specification calls for an access point and its users to share the
same 40-bit encrypted password.!
!!A firewall is a combination of hardware and software that controls the
flow of incoming and outgoing network traffic.
!!Authentication refers to the ability to know that a person is who he or she
claims to be
!!Downtime refers to periods of time in which a!
Answer: !computer system is not operational
!!Analysis of an information system that rates the likelihood of a security
incident occurring and its cost is included in a(n)!
Answer: !risk assessment
!!John clicks into his online banking Web site. He is all ready to type in his
password when he notices that something is just not right. Upon further
examination he notices that it is not the actual bank site but one that
looks almost identical. John was almost a victim of ________.!
!!An analysis of the firm's most critical systems and the impact a system's
outage would have on the business is included in a(n)!
Answer: !business impact analysis
!!Businesses must protect not only their own information assets but also
those of ________.
Answer: !customers. employees, and business partners!