Instant Download
Sample Chapters
Chapter 1: Information Systems: An Overview
TRUE/FALSE
- The most common personal digital assistant (PDA) is a smartphone.
Answer: True
Chapter Learning Outcome: 1.1: Discuss common applications of computers and information systems.
Topic: Computers and Information Systems in Daily Life
BUSPROG: Technology
Bloom’s: Remember
Difficulty Level: Easy
Page: 4
Feedback: The most common personal digital assistant (PDA) is a smartphone (such as an iPhone, Galaxy, Droid, or a Blackberry).
- Twitter is an example of a management information system.
Answer: False
Chapter Learning Outcome: 1.1: Discuss common applications of computers and information systems.
Topic: Computers and Information Systems in Daily Life
BUSPROG: Technology
Bloom’s: Remember
Difficulty Level: Easy
Page: 4
Feedback: Twitter (www.twitter.com) is a social networking and short-message service.
- Information systems are broader in scope than information technologies.
Answer: True
Chapter Learning Outcome: 1.1: Discuss common applications of computers and information systems.
Topic: Computers and Information Systems in Daily Life
BUSPROG: Technology
Bloom’s: Remember
Difficulty Level: Easy
Page: 6
Feedback: Information systems are broader in scope than information technologies, but the two overlap in many areas. Both are used to help organizations be more competitive and to improve their overall efficiency and effectiveness.
- Skill in using word processing software is an example of information literacy.
Answer: False
Chapter Learning Outcome: 1.2: Explain the differences between computer literacy and information literacy.
Topic: Computer Literacy and Information Literacy
BUSPROG: Technology
Bloom’s: Remember
Difficulty Level: Easy
Page: 6
Feedback: Skill in using word processing software is an example of computer literacy.
- Business Intelligence (BI) provides historical and predictive views of business operations.
Answer: True
Chapter Learning Outcome: 1.2: Explain the differences between computer literacy and information literacy.
Topic: Computer Literacy and Information Literacy
BUSPROG: Technology
Bloom’s: Remember
Difficulty Level: Easy
Page: 7
Feedback: Business Intelligence (BI) provides historical, current, and predictive views of business operations and environments and gives organizations a competitive advantage in the marketplace.
- Computers can be used in transaction-processing operations that involve enormous volumes of data.
Answer: True
Chapter Learning Outcome: 1.3: Define transaction-processing systems.
Topic: The Beginning: Transaction-Processing Systems
BUSPROG: Technology
Bloom’s: Remember
Difficulty Level: Easy
Page: 7
Feedback: Computers are most beneficial in transaction-processing operations. These operations are repetitive, such as printing numerous checks, or involve enormous volumes of data, such as inventory control in a multinational textile company.
- The software components of a management information system (MIS) include input, output, and memory devices.
Answer: False
Chapter Learning Outcome: 1.4: Define management information systems.
Topic: Management Information Systems
BUSPROG: Technology
Bloom’s: Remember
Difficulty Level: Easy
Page: 7
Feedback: The hardware components of the management information system (MIS) include input, output, and memory devices and vary depending on the application and the organization.
- In a management information system (MIS) application, processes are usually methods for performing a task.
Answer: True
Chapter Learning Outcome: 1.4: Define management information systems.
Topic: Management Information Systems
BUSPROG: Technology
Bloom’s: Remember
Difficulty Level: Easy
Page: 7
Feedback: In an MIS application, processes are usually methods for performing a task.
- In designing a management information system (MIS), the first task is to clearly define the system’s objectives.
Answer: True
Chapter Learning Outcome: 1.4: Define management information systems.
Topic: Management Information Systems
BUSPROG: Technology
Bloom’s: Remember
Difficulty Level: Easy
Page: 7
Feedback: In designing a management information system (MIS), the first task is to clearly define the system’s objectives.
- The data component of an information system is considered the output to the system.
Answer: False
Chapter Learning Outcome: 1.5: Describe the four major components of an information system.
Topic: Major Components of an Information System
BUSPROG: Technology
Bloom’s: Remember
Difficulty Level: Easy
Page: 8
Feedback: The data component of an information system is considered the input to the system
- Irrespective of organizational objectives, an information system should collect data from either an internal or an external source.
Answer: False
Chapter Learning Outcome: 1.5: Describe the four major components of an information system.
Topic: Major Components of an Information System
BUSPROG: Technology
Bloom’s: Remember
Difficulty Level: Easy
Page: 8
Feedback: An information system should collect data from both sources, although organizational objectives and the type of application also determine what sources to use.
- Customers, competitors, and suppliers are examples of internal data sources.
Answer: False
Chapter Learning Outcome: 1.5: Describe the four major components of an information system.
Topic: Major Components of an Information System
BUSPROG: Technology
Bloom’s: Remember
Difficulty Level: Easy
Page: 8
Feedback: Customers, competitors, and suppliers are examples of external data sources.
- A database management system (DBMS) is used to create, organize, and manage databases.
Answer: True
Chapter Learning Outcome: 1.5: Describe the four major components of an information system.
Topic: Major Components of an Information System
BUSPROG: Technology
Bloom’s: Remember
Difficulty Level: Easy
Page: 9
Feedback: To create, organize, and manage databases, a database management system (DBMS) is used, such as Microsoft Access or FileMaker Pro for home or small-office use.
- The quality of information is determined by its usefulness to management information system (MIS) users.
Answer: True
Chapter Learning Outcome: 1.5: Describe the four major components of an information system.
Topic: Major Components of an Information System
BUSPROG: Technology
Bloom’s: Remember
Difficulty Level: Easy
Page: 9
Feedback: The quality of information is determined by its usefulness to users, and its usefulness determines the success of an information system.
- To be useful, information must have the quality of being fragmented from other data and information.
Answer: False
Chapter Learning Outcome: 1.5: Describe the four major components of an information system.
Topic: Major Components of an Information System
BUSPROG: Technology
Bloom’s: Remember
Difficulty Level: Easy
Page: 9
Feedback: To be useful, information must have the ability to integrate with other data and information.
- Most information systems avoid using graphical user interfaces (GUIs).
Answer: False
Chapter Learning Outcome: 1.5: Describe the four major components of an information system.
Topic: Major Components of an Information System
BUSPROG: Technology
Bloom’s: Remember
Difficulty Level: Easy
Page: 9
Feedback: A factor affecting the usefulness of information is the information system’s user interface. Because this interface must be flexible and easy to use, most information systems make use of graphical user interfaces (GUIs), with features such as menus and buttons.
- When solving problems, the users of an information system must avoid using informal information—such as rumors, unconfirmed reports, and stories.
Answer: False
Chapter Learning Outcome: 1.5: Describe the four major components of an information system.
Topic: Major Components of an Information System
BUSPROG: Technology
Bloom’s: Remember
Difficulty Level: Easy
Page: 10
Feedback: In addition to the formal information that an information system generates, users need to be able to make use of informal information—such as rumors, unconfirmed reports, and stories—when solving problems.
- Timely, relevant, and accurate information is a critical tool for enhancing a company’s competitive position in the marketplace.
Answer: True
Chapter Learning Outcome: 1.6: Discuss the differences between data and information.
Topic: Using Information Systems and Information Technologies
BUSPROG: Technology
Bloom’s: Remember
Difficulty Level: Easy
Page: 11
Feedback: Timely, relevant, and accurate information is a critical tool for enhancing a company’s competitive position in the marketplace and managing the four Ms of resources: manpower, machinery, materials, and money.
- Intranets are often used to provide basic HR functions, such as employees checking how much vacation time they have left.
Answer: True
Chapter Learning Outcome: 1.6: Discuss the differences between data and information.
Topic: Using Information Systems and Information Technologies
BUSPROG: Technology
Bloom’s: Remember
Difficulty Level: Easy
Page: 11
Feedback: Intranets are often used to provide basic HR functions, such as employees checking how much vacation time they have left or looking up how much they have in their 401(k) plans.
- Human resource is the second most important resource after information in any organization.
Answer: False
Chapter Learning Outcome: 1.7: Explain the importance and applications of information systems in functional areas of a business.
Topic: Using Information Systems and Information Technologies
BUSPROG: Technology
Bloom’s: Remember
Difficulty Level: Easy
Page: 11
Feedback: Information is the second most important resource (after the human element) in any organization.
- A personnel information system (PIS) helps in choosing the best job candidate.
Answer: True
Chapter Learning Outcome: 1.6: Discuss the differences between data and information.
Topic: Using Information Systems and Information Technologies
BUSPROG: Technology
Bloom’s: Remember
Difficulty Level: Easy
Page: 12
Feedback: A personnel information system (PIS) helps in choosing the best job candidate.
- A logistics information system (LIS) provides reports and statistics on employee demographics.
Answer: False
Chapter Learning Outcome: 1.7: Explain the importance and applications of information systems in functional areas of a business.
Topic: Using Information Systems and Information Technologies
BUSPROG: Technology
Bloom’s: Remember
Difficulty Level: Easy
Page: 12
Feedback: A personnel information system (PIS) provides reports and statistics on employee demographics.
- An effective financial information system (FIS) should provide timely, accurate, and integrated information about the marketing mix.
Answer: False
Chapter Learning Outcome: 1.6: Discuss the differences between data and information.
Topic: Using Information Systems and Information Technologies
BUSPROG: Technology
Bloom’s: Remember
Difficulty Level: Easy
Page: 13
Feedback: An effective marketing information system (MKIS) should provide timely, accurate, and integrated information about the marketing mix- 4Ps: price, promotion, place, and product.
- The focus of a top-line strategy for successfully competing in a marketplace is improving efficiency by reducing overall costs.
Answer: False
Chapter Learning Outcome: 1.6: Discuss the differences between data and information.
Topic: Using Information Systems and Information Technologies
BUSPROG: Analytic
Bloom’s: Remember
Difficulty Level: Easy
Page: 14
Feedback: The focus of a bottom-line strategy for successfully competing in a marketplace is improving efficiency by reducing overall costs. A top-line strategy focuses on generating new revenue by offering new products and services to customers or increasing revenue by selling existing products and services to new customers.
- Buyer power is high when customers have few choices and low when they have many choices.
Answer: False
Chapter Learning Outcome: 1.6: Discuss the differences between data and information.
Topic: Using Information Systems and Information Technologies
BUSPROG: Analytic
Bloom’s: Remember
Difficulty Level: Easy
Page: 14
Feedback: Buyer power is high when customers have many choices and low when they have few choices.
- Rivalry among existing competitors is high when many competitors occupy the same marketplace position.
Answer: True
Chapter Learning Outcome: 1.9: Explain the Five Forces Model and strategies for gaining a competitive advantage.
Topic: Using Information Systems and Information Technologies
BUSPROG: Analytic
Bloom’s: Remember
Difficulty Level: Easy
Page: 16
Feedback: Rivalry among existing competitors is high when many competitors occupy the same marketplace position; it is low when there are few competitors.
- The threat of new entrants into the marketplace is high when duplicating a company’s product or service is difficult.
Answer: False
Chapter Learning Outcome: 1.9: Explain the Five Forces Model and strategies for gaining a competitive advantage.
Topic: Using Information Systems and Information Technologies
BUSPROG: Analytic
Bloom’s: Remember
Difficulty Level: Easy
Page: 16
Feedback: The threat of new entrants into the marketplace is low when duplicating a company’s product or service is difficult.
- In the context of an information systems job, a chief technology officer (CTO) oversees long-range planning and keeps an eye on new developments in the field that can affect a company’s success.
Answer: True
Chapter Learning Outcome: 1.10: Review the IT job market.
Topic: The IT Job Market
BUSPROG: Technology
Bloom’s: Remember
Difficulty Level: Easy
Page: 17
Feedback: The top information systems job belongs to either the chief technology officer (CTO) or the chief information officer (CIO). This person oversees long-range planning and keeps an eye on new developments in the field that can affect a company’s success.
- In the context of an information systems job, a database administrator is responsible for developing the entire information system by writing computer programs.
Answer: False
Chapter Learning Outcome: 1.10: Review the IT job market.
Topic: The IT Job Market
BUSPROG: Technology
Bloom’s: Remember
Difficulty Level: Easy
Page: 17
Feedback: A computer programmer writes computer programs or software segments that allow the information system to perform a specific task. A database administrator (DBA) is responsible for database design and implementation.
- It has been predicted that hardware and software costs will continue to increase in the future, so processing information will be more expensive.
Answer: False
Chapter Learning Outcome: 1.11: Summarize the future outlook of information systems.
Topic: Outlook for the Future
BUSPROG: Technology
Bloom’s: Remember
Difficulty Level: Easy
Page: 17
Feedback: It has been predicted that hardware and software costs will continue to decline, so processing information will be less expensive.
MULTIPLE CHOICE
- A typical personal digital assistant (PDA) includes a(n) _____.
a. | external monitor | c. | mouse |
b. | calendar | d. | external keyboard |
Answer: B
Chapter Learning Outcome: 1.1: Discuss common applications of computers and information systems.
Topic: Computers and Information Systems in Daily Life
BUSPROG: Technology
Bloom’s: Remember
Difficulty Level: Easy
Page: 4
Feedback: A typical personal digital assistant (PDA) includes a calendar, address book, and task-listing programs; more advanced PDAs often allow for wireless connection to the Internet and have built-in MP3 players.
- _____ sites help a person connect with friends, family, and colleagues online and meet people with similar interests and hobbies.
a. | Tender portal | c. | Archive |
b. | Social networking | d. | Classified ads |
Answer: B
Chapter Learning Outcome: 1.1: Discuss common applications of computers and information systems.
Topic: Computers and Information Systems in Daily Life
BUSPROG: Technology
Bloom’s: Remember
Difficulty Level: Easy
Page: 4
Feedback: With social networking sites—such as Facebook, Twitter, Google+, LinkedIn, and Foursquare—one can connect with friends, family, and colleagues online and meet people with similar interests and hobbies.
- _____ is a social networking Web site.
a. | c. | Bing | |
b. | Google chrome | d. | Android |
Answer: A
Chapter Learning Outcome: 1.1: Discuss common applications of computers and information systems.
Topic: Computers and Information Systems in Daily Life
BUSPROG: Technology
Bloom’s: Remember
Difficulty Level: Easy
Page: 4
Feedback: Twitter (www.twitter.com) is a social networking and short-message service.
- Social networking sites can reduce organizations’ costs by _____.
a. | giving customers more access to all sorts of data | c. | providing an inexpensive medium for targeting a large customer base |
b. | limiting buyers’ choices by offering services that make it difficult for customers to switch | d. | customizing the organization’s Web site and offering many options to customers |
Answer: C
Chapter Learning Outcome: 1.1: Discuss common applications of computers and information systems.
Topic: Computers and Information Systems in Daily Life
BUSPROG: Technology
Bloom’s: Remember
Difficulty Level: Moderate
Page: 4
Feedback: Organizations also use social networking sites to give customers up-to-date information and how-to support via videos. These sites can reduce organizations’ costs by providing an inexpensive medium for targeting a large customer base.
- _____ is skill in using productivity software, such as word processors, spreadsheets, database management systems, and presentation software.
a. | Network literacy | c. | Information literacy |
b. | Data literacy | d. | Computer literacy |
Answer: D
Chapter Learning Outcome: 1.2: Explain the differences between computer literacy and information literacy.
Topic: Computer Literacy and Information Literacy
BUSPROG: Technology
Bloom’s: Remember
Difficulty Level: Easy
Page: 6
Feedback: Computer literacy is skill in using productivity software, such as word processors, spreadsheets, database management systems, and presentation software, as well as having a basic knowledge of hardware and software, the Internet, and collaboration tools and technologies
- _____ refers to understanding the role of information in generating and using business intelligence.
a. | Computer literacy | c. | Information security |
b. | Information literacy | d. | Computer security |
Answer: B
Chapter Learning Outcome: 1.2: Explain the differences between computer literacy and information literacy.
Topic: Computer Literacy and Information Literacy
BUSPROG: Technology
Bloom’s: Remember
Difficulty Level: Easy
Page: 6
Feedback: Information literacy refers to understanding the role of information in generating and using business intelligence.
- To be competitive in a workplace, a knowledge worker should:
a. | know how and why data is collected. | c. | avoid the use of informal information. |
b. | be able to develop one’s own information system. | d. | refrain from using business intelligence (BI) tools. |
Answer: A
Chapter Learning Outcome: 1.2: Explain the differences between computer literacy and information literacy.
Topic: Computer Literacy and Information Literacy
BUSPROG: Technology
Bloom’s: Remember
Difficulty Level: Easy
Page: 6–7
Feedback: To be competitive in a workplace, knowledge workers should know how and why data is collected. Knowledge workers need two types of knowledge to be competitive in the workplace: computer literacy and information literacy.
- Which of the following statements is true of transaction-processing systems?
a. | They focus on data encapsulation. | c. | They can automate repetitive operations. |
b. | They pass on additional costs to organizations. | d. | They require maximum human involvement. |
Answer: C
Chapter Learning Outcome: 1.3: Define transaction-processing systems.
Topic: The Beginning: Transaction-Processing Systems
BUSPROG: Technology
Bloom’s: Understand
Difficulty Level: Moderate
Page: 7
Feedback: Computers are most beneficial in transaction-processing operations. These operations are repetitive, such as printing numerous checks, or involve enormous volumes of data, such as inventory control in a multinational textile company.
- In designing a management information system (MIS), after defining the system’s objectives, the second step is to _____.
a. | provide information in a useful format | c. | use information for decision-making |
b. | collect and analyze data | d. | integrate the hardware and software components |
Answer: B
Chapter Learning Outcome: 1.4: Define management information systems.
Topic: Management Information Systems
BUSPROG: Technology
Bloom’s: Remember
Difficulty Level: Easy
Page: 7
Feedback: In designing a management information system (MIS), the first task is to clearly define the system’s objectives. Second, data must be collected and analyzed. Finally, information must be provided in a useful format for decision-making purposes.
- The final task in designing a management information system (MIS) is:
a. | collecting and analyzing internal and external data for accuracy and relevancy. | c. | clearly defining the system’s objectives. |
b. | providing information in a useful format for decision-making purposes. | d. | integrating hardware and software components. |
Answer: B
Chapter Learning Outcome: 1.4: Define management information systems.
Topic: Management Information Systems
BUSPROG: Technology
Bloom’s: Remember
Difficulty Level: Easy
Page: 7
Feedback: In designing a management information system (MIS), the first task is to clearly define the system’s objectives. Second, data must be collected and analyzed. Finally, information must be provided in a useful format for decision-making purposes.
- _____ consists of raw facts and is a major component of information systems.
a. | Cache | c. | Data |
b. | Kernel | d. | Process |
Answer: C
Chapter Learning Outcome: 1.5: Describe the four major components of an information system.
Topic: Major Components of an Information System
BUSPROG: Technology
Bloom’s: Remember
Difficulty Level: Easy
Page: 8
Feedback: Data consists of raw facts and is a component of an information system.
- _____ are an internal data source for an information system.
a. | Personnel records | c. | Economic conditions |
b. | Population statistics | d. | Competitors |
Answer: A
Chapter Learning Outcome: 1.5: Describe the four major components of an information system.
Topic: Major Components of an Information System
BUSPROG: Technology
Bloom’s: Remember
Difficulty Level: Easy
Page: 8
Feedback: Internal data includes sales records, personnel records, and so forth.
Purchase For Continue….
Chapter 5: Protecting Information Resources
TRUE/FALSE
- Phishing is different from pharming as phishing usually involves hijacking an official Web site address by hacking a Domain Name System server.
Answer: False
Chapter Learning Outcome: 5.1: Describe information technologies that could be used in computer crimes.
Topic: Risks Associated With Information Technologies
BUSPROG: Technology
Bloom’s: Remember
Difficulty Level: Easy
Page: 86
Feedback: The difference between phishing and pharming is that pharmers usually hijack an official Web site address by hacking a Domain Name System server, then alter the legitimate Web site IP address so that users who enter the correct Web address are directed to the pharmers’s fraudulent Web site.
- Spoofing is sending fraudulent e-mails that seem to come from legitimate sources, such as a bank or university.
Answer: False
Chapter Learning Outcome: 5.1: Describe information technologies that could be used in computer crimes.
Topic: Risks Associated with Information Technologies
BUSPROG: Technology
Bloom’s: Remember
Difficulty Level: Easy
Page: 86
Feedback: Phishing is sending fraudulent e-mails that seem to come from legitimate sources, such as a bank or university. Spoofing is an attempt to gain access to a network by posing as an authorized user in order to find sensitive information, such as passwords and credit card information.
- Keystroke loggers can be used for malicious purposes, such as collecting the credit card numbers that users enter while shopping online.
Answer: True
Chapter Learning Outcome: 5.1: Describe information technologies that could be used in computer crimes.
Topic: Risks Associated With Information Technologies
BUSPROG: Technology
Bloom’s: Remember
Difficulty Level: Easy
Page: 86
Feedback: Keystroke loggers can be used for malicious purposes, such as collecting the credit card numbers that users enter while shopping online.
- Confidentiality, integrity, and availability are collectively referred to as the CIA triangle.
Answer: True
Chapter Learning Outcome: 5.2: Describe basic safeguards in computer and network security.
Topic: Computer and Network Security: Basic Safeguards
BUSPROG: Technology
Bloom’s: Remember
Difficulty Level: Easy
Page: 89
Feedback: There are three important aspects of computer and network security: confidentiality, integrity, and availability, collectively referred to as the CIA triangle.
- Part of ensuring integrity is identifying authorized users and granting them access privileges.
Answer: True
Chapter Learning Outcome: 5.2: Describe basic safeguards in computer and network security.
Topic: Computer and Network Security: Basic Safeguards
BUSPROG: Technology
Bloom’s: Remember
Difficulty Level: Easy
Page: 89
Feedback: Part of ensuring integrity is identifying authorized users and granting them access privileges.
- Level 1 security protects the back-end systems to ensure confidentiality, accuracy, and integrity of data.
Answer: False
Chapter Learning Outcome: 5.2: Describe basic safeguards in computer and network security.
Topic: Computer and Network Security: Basic Safeguards
BUSPROG: Technology
Bloom’s: Remember
Difficulty Level: Easy
Page: 89
Feedback: Level 2 security protects the back-end systems to ensure confidentiality, accuracy, and integrity of data. Level 1 security protects front-end servers.
- If a drive in a redundant array of independent disks (RAID) system fails, data stored on it can be reconstructed from data stored on the remaining drives.
Answer: True
Chapter Learning Outcome: 5.2: Describe basic safeguards in computer and network security.
Topic: Computer and Network Security: Basic Safeguards
BUSPROG: Technology
Bloom’s: Remember
Difficulty Level: Easy
Page: 90
Feedback: If a drive in a redundant array of independent disks (RAID) system fails, data stored on it can be reconstructed from data stored on the remaining drives. RAID systems vary in cost, performance, and reliability.
- When using mirror disks, if one of the two disks containing the same data fails, the other disk also fails.
Answer: False
Chapter Learning Outcome: 5.2: Describe basic safeguards in computer and network security.
Topic: Computer and Network Security: Basic Safeguards
BUSPROG: Technology
Bloom’s: Remember
Difficulty Level: Easy
Page: 90
Feedback: When using mirror disks, if one of the two disks containing the same data fails, the other is available, allowing operations to continue.
- Social engineering is an example of an unintentional security threat.
Answer: False
Chapter Learning Outcome: 5.3: Explain the major security threats.
Topic: Security Threats: An Overview
BUSPROG: Technology
Bloom’s: Remember
Difficulty Level: Easy
Page: 90
Feedback: Social engineering is an example of an intentional security threat.
- When a program containing a virus is used, the virus attaches itself to other files, and the cycle continues.
Answer: True
Chapter Learning Outcome: 5.3: Explain the major security threats.
Topic: Security Threats: An Overview
BUSPROG: Technology
Bloom’s: Remember
Difficulty Level: Easy
Page: 90
Feedback: When a program or operating system containing a virus is used, the virus attaches itself to other files, and the cycle continues.
- Viruses can only be transmitted through sharing of infected files directly from one computer to another.
Answer: False
Chapter Learning Outcome: 5.3: Explain the major security threats.
Topic: Security Threats: An Overview
BUSPROG: Technology
Bloom’s: Remember
Difficulty Level: Easy
Page: 91
Feedback: Viruses can be transmitted through a network or through e-mail attachments.
- Trojan programs replicate themselves as viruses and worms do.
Answer: False
Chapter Learning Outcome: 5.3: Explain the major security threats.
Topic: Security Threats: An Overview
BUSPROG: Technology
Bloom’s: Remember
Difficulty Level: Easy
Page: 92
Feedback: Trojan programs can erase data and wreak havoc on computers and networks, but they do not replicate themselves, as viruses and worms do.
- A distributed denial-of-service (DDoS) attack involves hundreds of computers working together to bombard a Web site with thousands of requests for information in a short period.
Answer: True
Chapter Learning Outcome: 5.3: Explain the major security threats.
Topic: Security Threats: An Overview
BUSPROG: Technology
Bloom’s: Remember
Difficulty Level: Easy
Page: 92
Feedback: A distributed denial-of-service (DDoS) attack occurs when hundreds or thousands of computers work together to bombard a Web site with thousands of requests for information in a short period, causing it to grind to a halt.
- Social engineering is an attack that takes advantage of the backdoors in security systems.
Answer: False
Chapter Learning Outcome: 5.3: Explain the major security threats.
Topic: Security Threats: An Overview
BUSPROG: Technology
Bloom’s: Remember
Difficulty Level: Easy
Page: 93
Feedback: In the context of security, social engineering means using “people skills”—such as being a good listener and assuming a friendly, unthreatening air—to trick others into revealing private information. This is an attack that takes advantage of the human element of security systems.
- In the context of security, social engineering protects the integrity of information resources.
Answer: False
Chapter Learning Outcome: 5.3: Explain the major security threats.
Topic: Security Threats: An Overview
BUSPROG: Technology
Bloom’s: Remember
Difficulty Level: Easy
Page: 93
Feedback: Social engineers use the private information they have gathered to break into servers and networks and steal data, thus compromising the integrity of information resources.
- Hand geometry is an example of a biometric security measure.
Answer: True
Chapter Learning Outcome: 5.4: Describe security and enforcement measures.
Topic: Security Measures and Enforcement: An Overview
BUSPROG: Technology
Bloom’s: Remember
Difficulty Level: Easy
Page: 94
Feedback: Hand geometry is an example of a biometric security measure.
- After examining an incoming packet, a firewall cannot reject that packet.
Answer: False
Chapter Learning Outcome: 5.4: Describe security and enforcement measures.
Topic: Security Measures and Enforcement: An Overview
BUSPROG: Technology
Bloom’s: Remember
Difficulty Level: Easy
Page: 96
Feedback: Information being transmitted is stored in what’s called a packet, and after examining a packet, a firewall can reject the incoming packet.
- Application-filtering firewalls are less expensive than packet-filtering firewalls.
Answer: False
Chapter Learning Outcome: 5.4: Describe security and enforcement measures.
Topic: Security Measures and Enforcement: An Overview
BUSPROG: Technology
Bloom’s: Remember
Difficulty Level: Easy
Page: 96
Feedback: Application-filtering firewalls are generally more secure and flexible than packet-filtering firewalls, but they are also more expensive.
- A proxy server is often used to help protect the network against unauthorized access from outside the network by hiding the network addresses of internal systems.
Answer: True
Chapter Learning Outcome: 5.4: Describe security and enforcement measures.
Topic: Security Measures and Enforcement: An Overview
BUSPROG: Technology
Bloom’s: Remember
Difficulty Level: Easy
Page: 97
Feedback: A proxy server is often used to help protect the network against unauthorized access from outside the network by hiding the network addresses of internal systems.
- An intrusion detection system (IDS) can protect networks against both external and internal access.
Answer: True
Chapter Learning Outcome: 5.4: Describe security and enforcement measures.
Topic: Security Measures and Enforcement: An Overview
BUSPROG: Technology
Bloom’s: Remember
Difficulty Level: Easy
Page: 97
Feedback: An intrusion detection system (IDS) can protect against both external and internal access.
- An intrusion detection system (IDS) cannot prevent denial-of-service (DoS) attacks.
Answer: False
Chapter Learning Outcome: 5.4: Describe security and enforcement measures.
Topic: Security Measures and Enforcement: An Overview
BUSPROG: Technology
Bloom’s: Remember
Difficulty Level: Easy
Page: 97
Feedback: An intrusion detection system (IDS) can prevent denial-of-service (DoS) attacks. It monitors network traffic and uses the “prevent, detect, and react” approach to security.
- Corner bolts are an expensive way to secure a computer to a desktop or a counter.
Answer: False
Chapter Learning Outcome: 5.4: Describe security and enforcement measures.
Topic: Security Measures and Enforcement: An Overview
BUSPROG: Technology
Bloom’s: Remember
Difficulty Level: Easy
Page: 98
Feedback: Corner bolts are an inexpensive way to secure a computer to a desktop or counter. These often have locks as an additional protection against theft.
- Terminal resource security is a software feature that erases the screen and signs the user off automatically after a specified length of inactivity.
Answer: True
Chapter Learning Outcome: 5.4: Describe security and enforcement measures.
Topic: Security Measures and Enforcement: An Overview
BUSPROG: Technology
Bloom’s: Remember
Difficulty Level: Easy
Page: 99
Feedback: Terminal resource security is a software feature that erases the screen and signs the user off automatically after a specified length of inactivity.
- An ideal password should be eight characters or longer.
Answer: True
Chapter Learning Outcome: 5.4: Describe security and enforcement measures.
Topic: Security Measures and Enforcement: An Overview
BUSPROG: Technology
Bloom’s: Remember
Difficulty Level: Easy
Page: 99
Feedback: To increase the effectiveness of passwords, they should be made eight characters or longer.
- The cost of setting up a virtual private network (VPN) is usually high.
Answer: False
Chapter Learning Outcome: 5.4: Describe security and enforcement measures.
Topic: Security Measures and Enforcement: An Overview
BUSPROG: Technology
Bloom’s: Remember
Difficulty Level: Easy
Page: 100
Feedback: The cost of setting up a virtual private network (VPN) is usually low, but transmission speeds can be slow, and lack of standardization can be a problem.
- Data encryption transforms data into a scrambled form called ciphertext.
Answer: True
Chapter Learning Outcome: 5.4: Describe security and enforcement measures.
Topic: Security Measures and Enforcement: An Overview
BUSPROG: Technology
Bloom’s: Remember
Difficulty Level: Easy
Page: 100
Feedback: Data encryption transforms data, called plaintext or cleartext, into a scrambled form called ciphertext that cannot be read by others.
- The main advantage of asymmetric encryption is that it is faster and requires only a small amount of processing power.
Answer: False
Chapter Learning Outcome: 5.4: Describe security and enforcement measures.
Topic: Security Measures and Enforcement: An Overview
BUSPROG: Technology
Bloom’s: Remember
Difficulty Level: Easy
Page: 101
Feedback: The main drawback of asymmetric encryption is that it is slower and requires a large amount of processing power.
- Symmetric encryption is also called public key encryption.
Answer: False
Chapter Learning Outcome: 5.4: Describe security and enforcement measures.
Topic: Security Measures and Enforcement: An Overview
BUSPROG: Technology
Bloom’s: Remember
Difficulty Level: Easy
Page: 101
Feedback: Asymmetric encryption is also called public key encryption. Symmetric encryption is also called secret key encryption.
- In symmetric encryption, the same key is used to encrypt and decrypt a message.
Answer: True
Chapter Learning Outcome: 5.4: Describe security and enforcement measures.
Topic: Security Measures and Enforcement: An Overview
BUSPROG: Technology
Bloom’s: Remember
Difficulty Level: Easy
Page: 101–102
Feedback: In symmetric encryption, the same key is used to encrypt and decrypt a message. The sender and receiver must agree on the key and keep it secret.
- Backup facilities should never be shared in an attempt to reduce costs.
Answer: False
Chapter Learning Outcome: 5.4: Describe security and enforcement measures.
Topic: Guidelines for a Comprehensive Security System
BUSPROG: Technology
Bloom’s: Remember
Difficulty Level: Easy
Page: 104
Feedback: Backup facilities can be shared to reduce costs.
MULTIPLE CHOICE
- _____ can interfere with users’ control of their computers, through such methods as installing additional software and redirecting Web browsers.
a. | Kernels | c. | Cookies |
b. | Spyware | d. | Log files |
Answer: B
Chapter Learning Outcome: 5.1: Describe information technologies that could be used in computer crimes.
Topic: Risks Associated with Information Technologies
BUSPROG: Technology
Bloom’s: Remember
Difficulty Level: Easy
Page: 86
Feedback: Spyware can interfere with users’ control of their computers, through such methods as installing additional software and redirecting Web browsers.
- _____ is the process of capturing and recording network traffic.
a. | Sniffing | c. | Spoofing |
b. | Phishing | d. | Pharming |
Answer: A
Chapter Learning Outcome: 5.1: Describe information technologies that could be used in computer crimes.
Topic: Risks Associated with Information Technologies
BUSPROG: Technology
Bloom’s: Remember
Difficulty Level: Easy
Page: 86
Feedback: Sniffing is capturing and recording network traffic. Although it can be done for legitimate reasons, such as monitoring network performance, hackers often use it to intercept information.
- Similar to phishing, _____ is directing Internet users to fraudulent Web sites with the intention of stealing their personal information, such as Social Security numbers, passwords, bank account numbers, and credit card numbers.
a. | sniffing | c. | pharming |
b. | spoofing | d. | cybersquatting |
Answer: C
Chapter Learning Outcome: 5.1: Describe information technologies that could be used in computer crimes.
Topic: Risks Associated with Information Technologies
BUSPROG: Technology
Bloom’s: Remember
Difficulty Level: Easy
Page: 86
Feedback: Pharming is similar to phishing in that Internet users are directed to fraudulent Web sites with the intention of stealing their personal information, such as Social Security numbers, passwords, bank account numbers, and credit card numbers.
- _____ is a computer crime that involves destroying or disrupting computer services.
a. | Sabotage | c. | Libel |
b. | Slander | d. | Keystroke logging |
Answer: A
Chapter Learning Outcome: 5.1: Describe information technologies that could be used in computer crimes.
Topic: Risks Associated with Information Technologies
BUSPROG: Technology
Bloom’s: Remember
Difficulty Level: Easy
Page: 87
Feedback: Sabotage is a computer crime that involves destroying or disrupting computer services. Computer criminals change, delete, hide, or use computer files for personal gain.
- In the context of computer and network security, _____ means that a system must not allow the disclosing of information by anyone who is not authorized to access it.
a. | validity | c. | integrity |
b. | confidentiality | d. | availability |
Answer: B
Chapter Learning Outcome: 5.2: Describe basic safeguards in computer and network security.
Topic: Computer and Network Security: Basic Safeguards
BUSPROG: Technology
Bloom’s: Remember
Difficulty Level: Easy
Page: 89
Feedback: Confidentiality means that a system must not allow the disclosing of information by anyone who is not authorized to access it.
Purchase For Continue….