Term
Smartphones have the same security flaws as other Internet-connected devices.
(True/False)
|
|
Definition
|
|
Term
In 2013, the security firm McAfee identified approximately 35,000 kinds of mobile malware.
(true/false)
|
|
Definition
|
|
Term
Viruses can be spread through e-mail.
(true/false)
|
|
Definition
|
|
Term
The term cracker is used to identify a hacker whose specialty is breaking open security systems.
(true/false)
|
|
Definition
|
|
Term
To secure mobile devices, a company will need to implement special mobile device management software.
(true/false)
|
|
Definition
|
|
Term
Wireless networks are vulnerable to penetration because radio frequency bands are easy to scan.
(true/false)
|
|
Definition
|
|
Term
Computer worms spread much more rapidly than computer viruses.
(true/false)
|
|
Definition
|
|
Term
One form of spoofing involves forging the return address on an e-mail so that the e-mail message appears to come from someone other than the sender.
(true/false)
|
|
Definition
|
|
Term
Sniffers enable hackers to steal proprietary information from anywhere on a network, including e-mail messages, company files, and confidential reports.
(true/false)
|
|
Definition
|
|
Term
DoS attacks are used to destroy information and access restricted areas of a company's information system.
(true/false)
|
|
Definition
|
|
Term
The distributed nature of cloud computing makes it somewhat easier to track unauthorized access.
(true/false)
|
|
Definition
|
|
Term
Zero defects cannot be achieved in larger software programs because fully testing programs that contain thousands of choices and millions of paths would require thousands of years.
(true/false)
|
|
Definition
|
|
Term
An acceptable use policy defines the acceptable level of access to information assets for different users.
(true/false)
|
|
Definition
|
|
Term
Biometric authentication is the use of physical characteristics such as retinal images to provide identification.
(true/false) |
|
Definition
|
|
Term
Packet filtering catches most types of network attacks.
(true/false) |
|
Definition
|
|
Term
NAT conceals the IP addresses of the organization's internal host computers to deter sniffer programs.
(true/false)
|
|
Definition
|
|
Term
SSL is a protocol used to establish a secure connection between two computers.
(true/false)
|
|
Definition
|
|
Term
Public key encryption uses two keys.
(true/false)
|
|
Definition
|
|
Term
Over 70 percent of malware today is aimed at small businesses.
(true/false)
|
|
Definition
|
|
Term
Smartphones typically feature state-of-the-art encryption and security features, making them highly secure tools for businesses.
(true/false)
|
|
Definition
|
|
Term
Malicious software programs referred to as spyware include a variety of threats such as computer viruses, worms, and Trojan horses.
(true/false)
|
|
Definition
|
|
Term
Authorization refers to the ability to know that a person is who he or she claims to be.
(true/false)
|
|
Definition
|
|
Term
A walkthrough is a type of software testing used before software is even written.
(true/false)
|
|
Definition
|
|
Term
When errors are discovered in software programs, the sources of the errors are found and eliminated through a process called debugging.
(true/false)
|
|
Definition
|
|