MIS 5th Edition by Hossein Bidgoli -Test Bank

MIS 5th Edition by Hossein Bidgoli -Test Bank   Instant Download - Complete Test Bank With Answers     Sample Questions Are Posted Below   Chapter 5: Protecting Information Resources   TRUE/FALSE   Phishing is different from pharming as phishing usually involves hijacking an official Web site address by hacking a Domain Name System server. …

$19.99

MIS 5th Edition by Hossein Bidgoli -Test Bank

 

Instant Download – Complete Test Bank With Answers

 

 

Sample Questions Are Posted Below

 

Chapter 5: Protecting Information Resources

 

TRUE/FALSE

 

  1. Phishing is different from pharming as phishing usually involves hijacking an official Web site address by hacking a Domain Name System server.

 

Answer: False

Chapter Learning Outcome: 5.1: Describe information technologies that could be used in computer crimes.

Topic: Risks Associated With Information Technologies

BUSPROG: Technology

Bloom’s: Remember

Difficulty Level: Easy

Page: 86

Feedback: The difference between phishing and pharming is that pharmers usually hijack an official Web site address by hacking a Domain Name System server, then alter the legitimate Web site IP address so that users who enter the correct Web address are directed to the pharmers’s fraudulent Web site.

 

  1. Spoofing is sending fraudulent e-mails that seem to come from legitimate sources, such as a bank or university.

 

Answer: False

Chapter Learning Outcome: 5.1: Describe information technologies that could be used in computer crimes.

Topic: Risks Associated with Information Technologies

BUSPROG: Technology

Bloom’s: Remember

Difficulty Level: Easy

Page: 86

Feedback: Phishing is sending fraudulent e-mails that seem to come from legitimate sources, such as a bank or university. Spoofing is an attempt to gain access to a network by posing as an authorized user in order to find sensitive information, such as passwords and credit card information.

 

 

  1. Keystroke loggers can be used for malicious purposes, such as collecting the credit card numbers that users enter while shopping online.

 

Answer: True

Chapter Learning Outcome: 5.1: Describe information technologies that could be used in computer crimes.

Topic: Risks Associated With Information Technologies

BUSPROG: Technology

Bloom’s: Remember

Difficulty Level: Easy

Page: 86

Feedback: Keystroke loggers can be used for malicious purposes, such as collecting the credit card numbers that users enter while shopping online.

 

  1. Confidentiality, integrity, and availability are collectively referred to as the CIA triangle.

 

Answer: True

Chapter Learning Outcome: 5.2: Describe basic safeguards in computer and network security.

Topic: Computer and Network Security: Basic Safeguards

BUSPROG: Technology

Bloom’s: Remember

Difficulty Level: Easy

Page: 89

Feedback: There are three important aspects of computer and network security: confidentiality, integrity, and availability, collectively referred to as the CIA triangle.

 

  1. Part of ensuring integrity is identifying authorized users and granting them access privileges.

 

Answer: True

Chapter Learning Outcome: 5.2: Describe basic safeguards in computer and network security.

Topic: Computer and Network Security: Basic Safeguards

BUSPROG: Technology

Bloom’s: Remember

Difficulty Level: Easy

Page: 89

Feedback: Part of ensuring integrity is identifying authorized users and granting them access privileges.

 

  1. Level 1 security protects the back-end systems to ensure confidentiality, accuracy, and integrity of data.

 

Answer: False

Chapter Learning Outcome: 5.2: Describe basic safeguards in computer and network security.

Topic: Computer and Network Security: Basic Safeguards

BUSPROG: Technology

Bloom’s: Remember

Difficulty Level: Easy

Page: 89

Feedback: Level 2 security protects the back-end systems to ensure confidentiality, accuracy, and integrity of data. Level 1 security protects front-end servers.

 

  1. If a drive in a redundant array of independent disks (RAID) system fails, data stored on it can be reconstructed from data stored on the remaining drives.

 

Answer: True

Chapter Learning Outcome: 5.2: Describe basic safeguards in computer and network security.

Topic: Computer and Network Security: Basic Safeguards

BUSPROG: Technology

Bloom’s: Remember

Difficulty Level: Easy

Page: 90

Feedback: If a drive in a redundant array of independent disks (RAID) system fails, data stored on it can be reconstructed from data stored on the remaining drives. RAID systems vary in cost, performance, and reliability.

 

  1. When using mirror disks, if one of the two disks containing the same data fails, the other disk also fails.

 

Answer: False

Chapter Learning Outcome: 5.2: Describe basic safeguards in computer and network security.

Topic: Computer and Network Security: Basic Safeguards

BUSPROG: Technology

Bloom’s: Remember

Difficulty Level: Easy

Page: 90

Feedback: When using mirror disks, if one of the two disks containing the same data fails, the other is available, allowing operations to continue.

 

  1. Social engineering is an example of an unintentional security threat.

 

Answer: False

Chapter Learning Outcome: 5.3: Explain the major security threats.

Topic: Security Threats: An Overview

BUSPROG: Technology

Bloom’s: Remember

Difficulty Level: Easy

Page: 90

Feedback: Social engineering is an example of an intentional security threat.

 

  1. When a program containing a virus is used, the virus attaches itself to other files, and the cycle continues.

 

Answer: True

Chapter Learning Outcome: 5.3: Explain the major security threats.

Topic: Security Threats: An Overview

BUSPROG: Technology

Bloom’s: Remember

Difficulty Level: Easy

Page: 90

Feedback: When a program or operating system containing a virus is used, the virus attaches itself to other files, and the cycle continues.

 

  1. Viruses can only be transmitted through sharing of infected files directly from one computer to another.

 

Answer: False

Chapter Learning Outcome: 5.3: Explain the major security threats.

Topic: Security Threats: An Overview

BUSPROG: Technology

Bloom’s: Remember

Difficulty Level: Easy

Page: 91

Feedback: Viruses can be transmitted through a network or through e-mail attachments.

 

  1. Trojan programs replicate themselves as viruses and worms do.

 

Answer: False

Chapter Learning Outcome: 5.3: Explain the major security threats.

Topic: Security Threats: An Overview

BUSPROG: Technology

Bloom’s: Remember

Difficulty Level: Easy

Page: 92

Feedback: Trojan programs can erase data and wreak havoc on computers and networks, but they do not replicate themselves, as viruses and worms do.

 

  1. A distributed denial-of-service (DDoS) attack involves hundreds of computers working together to bombard a Web site with thousands of requests for information in a short period.

 

Answer: True

Chapter Learning Outcome: 5.3: Explain the major security threats.

Topic: Security Threats: An Overview

BUSPROG: Technology

Bloom’s: Remember

Difficulty Level: Easy

Page: 92

Feedback: A distributed denial-of-service (DDoS) attack occurs when hundreds or thousands of computers work together to bombard a Web site with thousands of requests for information in a short period, causing it to grind to a halt.

 

  1. Social engineering is an attack that takes advantage of the backdoors in security systems.

 

Answer: False

Chapter Learning Outcome: 5.3: Explain the major security threats.

Topic: Security Threats: An Overview

BUSPROG: Technology

Bloom’s: Remember

Difficulty Level: Easy

Page: 93

Feedback: In the context of security, social engineering means using “people skills”—such as being a good listener and assuming a friendly, unthreatening air—to trick others into revealing private information. This is an attack that takes advantage of the human element of security systems.

 

  1. In the context of security, social engineering protects the integrity of information resources.

 

Answer: False

Chapter Learning Outcome: 5.3: Explain the major security threats.

Topic: Security Threats: An Overview

BUSPROG: Technology

Bloom’s: Remember

Difficulty Level: Easy

Page: 93

Feedback: Social engineers use the private information they have gathered to break into servers and networks and steal data, thus compromising the integrity of information resources.

 

  1. Hand geometry is an example of a biometric security measure.

 

Answer: True

Chapter Learning Outcome: 5.4: Describe security and enforcement measures.

Topic: Security Measures and Enforcement: An Overview

BUSPROG: Technology

Bloom’s: Remember

Difficulty Level: Easy

Page: 94

Feedback: Hand geometry is an example of a biometric security measure.

 

  1. After examining an incoming packet, a firewall cannot reject that packet.

 

Answer: False

Chapter Learning Outcome: 5.4: Describe security and enforcement measures.

Topic: Security Measures and Enforcement: An Overview

BUSPROG: Technology

Bloom’s: Remember

Difficulty Level: Easy

Page: 96

Feedback: Information being transmitted is stored in what’s called a packet, and after examining a packet, a firewall can reject the incoming packet.

 

  1. Application-filtering firewalls are less expensive than packet-filtering firewalls.

 

Answer: False

Chapter Learning Outcome: 5.4: Describe security and enforcement measures.

Topic: Security Measures and Enforcement: An Overview

BUSPROG: Technology

Bloom’s: Remember

Difficulty Level: Easy

Page: 96

Feedback: Application-filtering firewalls are generally more secure and flexible than packet-filtering firewalls, but they are also more expensive.

 

  1. A proxy server is often used to help protect the network against unauthorized access from outside the network by hiding the network addresses of internal systems.

 

Answer: True

Chapter Learning Outcome: 5.4: Describe security and enforcement measures.

Topic: Security Measures and Enforcement: An Overview

BUSPROG: Technology

Bloom’s: Remember

Difficulty Level: Easy

Page: 97

Feedback: A proxy server is often used to help protect the network against unauthorized access from outside the network by hiding the network addresses of internal systems.

 

  1. An intrusion detection system (IDS) can protect networks against both external and internal access.

 

Answer: True

Chapter Learning Outcome: 5.4: Describe security and enforcement measures.

Topic: Security Measures and Enforcement: An Overview

BUSPROG: Technology

Bloom’s: Remember

Difficulty Level: Easy

Page: 97

Feedback: An intrusion detection system (IDS) can protect against both external and internal access.

 

  1. An intrusion detection system (IDS) cannot prevent denial-of-service (DoS) attacks.

 

Answer: False

Chapter Learning Outcome: 5.4: Describe security and enforcement measures.

Topic: Security Measures and Enforcement: An Overview

BUSPROG: Technology

Bloom’s: Remember

Difficulty Level: Easy

Page: 97

Feedback: An intrusion detection system (IDS) can prevent denial-of-service (DoS) attacks. It monitors network traffic and uses the “prevent, detect, and react” approach to security.

 

  1. Corner bolts are an expensive way to secure a computer to a desktop or a counter.

 

Answer: False

Chapter Learning Outcome: 5.4: Describe security and enforcement measures.

Topic: Security Measures and Enforcement: An Overview

BUSPROG: Technology

Bloom’s: Remember

Difficulty Level: Easy

Page: 98

Feedback: Corner bolts are an inexpensive way to secure a computer to a desktop or counter. These often have locks as an additional protection against theft.

 

  1. Terminal resource security is a software feature that erases the screen and signs the user off automatically after a specified length of inactivity.

 

Answer: True

Chapter Learning Outcome: 5.4: Describe security and enforcement measures.

Topic: Security Measures and Enforcement: An Overview

BUSPROG: Technology

Bloom’s: Remember

Difficulty Level: Easy

Page: 99

Feedback: Terminal resource security is a software feature that erases the screen and signs the user off automatically after a specified length of inactivity.

 

  1. An ideal password should be eight characters or longer.

 

Answer: True

Chapter Learning Outcome: 5.4: Describe security and enforcement measures.

Topic: Security Measures and Enforcement: An Overview

BUSPROG: Technology

Bloom’s: Remember

Difficulty Level: Easy

Page: 99

Feedback: To increase the effectiveness of passwords, they should be made eight characters or longer.

 

  1. The cost of setting up a virtual private network (VPN) is usually high.

 

Answer: False

Chapter Learning Outcome: 5.4: Describe security and enforcement measures.

Topic: Security Measures and Enforcement: An Overview

BUSPROG: Technology

Bloom’s: Remember

Difficulty Level: Easy

Page: 100

Feedback: The cost of setting up a virtual private network (VPN) is usually low, but transmission speeds can be slow, and lack of standardization can be a problem.

 

  1. Data encryption transforms data into a scrambled form called ciphertext.

 

Answer: True

Chapter Learning Outcome: 5.4: Describe security and enforcement measures.

Topic: Security Measures and Enforcement: An Overview

BUSPROG: Technology

Bloom’s: Remember

Difficulty Level: Easy

Page: 100

Feedback: Data encryption transforms data, called plaintext or cleartext, into a scrambled form called ciphertext that cannot be read by others.

 

  1. The main advantage of asymmetric encryption is that it is faster and requires only a small amount of processing power.

 

Answer: False

Chapter Learning Outcome: 5.4: Describe security and enforcement measures.

Topic: Security Measures and Enforcement: An Overview

BUSPROG: Technology

Bloom’s: Remember

Difficulty Level: Easy

Page: 101

Feedback: The main drawback of asymmetric encryption is that it is slower and requires a large amount of processing power.

 

  1. Symmetric encryption is also called public key encryption.

 

Answer: False

Chapter Learning Outcome: 5.4: Describe security and enforcement measures.

Topic: Security Measures and Enforcement: An Overview

BUSPROG: Technology

Bloom’s: Remember

Difficulty Level: Easy

Page: 101

Feedback: Asymmetric encryption is also called public key encryption. Symmetric encryption is also called secret key encryption.

 

  1. In symmetric encryption, the same key is used to encrypt and decrypt a message.

 

Answer: True

Chapter Learning Outcome: 5.4: Describe security and enforcement measures.

Topic: Security Measures and Enforcement: An Overview

BUSPROG: Technology

Bloom’s: Remember

Difficulty Level: Easy

Page: 101–102

Feedback: In symmetric encryption, the same key is used to encrypt and decrypt a message. The sender and receiver must agree on the key and keep it secret.

 

  1. Backup facilities should never be shared in an attempt to reduce costs.

 

Answer: False

Chapter Learning Outcome: 5.4: Describe security and enforcement measures.

Topic: Guidelines for a Comprehensive Security System

BUSPROG: Technology

Bloom’s: Remember

Difficulty Level: Easy

Page: 104

Feedback: Backup facilities can be shared to reduce costs.

 

MULTIPLE CHOICE

 

  1. _____ can interfere with users’ control of their computers, through such methods as installing additional software and redirecting Web browsers.
a. Kernels c. Cookies
b. Spyware d. Log files

 

 

Answer: B

Chapter Learning Outcome: 5.1: Describe information technologies that could be used in computer crimes.

Topic: Risks Associated with Information Technologies

BUSPROG: Technology

Bloom’s: Remember

Difficulty Level: Easy

Page: 86

Feedback: Spyware can interfere with users’ control of their computers, through such methods as installing additional software and redirecting Web browsers.

 

  1. _____ is the process of capturing and recording network traffic.
a. Sniffing c. Spoofing
b. Phishing d. Pharming

 

 

Answer: A

Chapter Learning Outcome: 5.1: Describe information technologies that could be used in computer crimes.

Topic: Risks Associated with Information Technologies

BUSPROG: Technology

Bloom’s: Remember

Difficulty Level: Easy

Page: 86

Feedback: Sniffing is capturing and recording network traffic. Although it can be done for legitimate reasons, such as monitoring network performance, hackers often use it to intercept information.

 

  1. Similar to phishing, _____ is directing Internet users to fraudulent Web sites with the intention of stealing their personal information, such as Social Security numbers, passwords, bank account numbers, and credit card numbers.
a. sniffing c. pharming
b. spoofing d. cybersquatting

 

 

Answer: C

Chapter Learning Outcome: 5.1: Describe information technologies that could be used in computer crimes.

Topic: Risks Associated with Information Technologies

BUSPROG: Technology

Bloom’s: Remember

Difficulty Level: Easy

Page: 86

Feedback: Pharming is similar to phishing in that Internet users are directed to fraudulent Web sites with the intention of stealing their personal information, such as Social Security numbers, passwords, bank account numbers, and credit card numbers.

 

  1. _____ is a computer crime that involves destroying or disrupting computer services.
a. Sabotage c. Libel
b. Slander d. Keystroke logging

 

 

Answer: A

Chapter Learning Outcome: 5.1: Describe information technologies that could be used in computer crimes.

Topic: Risks Associated with Information Technologies

BUSPROG: Technology

Bloom’s: Remember

Difficulty Level: Easy

Page: 87

Feedback: Sabotage is a computer crime that involves destroying or disrupting computer services. Computer criminals change, delete, hide, or use computer files for personal gain.

 

  1. In the context of computer and network security, _____ means that a system must not allow the disclosing of information by anyone who is not authorized to access it.
a. validity c. integrity
b. confidentiality d. availability

 

 

Answer: B

Chapter Learning Outcome: 5.2: Describe basic safeguards in computer and network security.

Topic: Computer and Network Security: Basic Safeguards

BUSPROG: Technology

Bloom’s: Remember

Difficulty Level: Easy

Page: 89

Feedback: Confidentiality means that a system must not allow the disclosing of information by anyone who is not authorized to access it.

 

  1. In the context of computer and network security, _____ refers to the accuracy of information resources within an organization.
a. validity c. integrity
b. confidentiality d. availability

 

 

Answer: C

Chapter Learning Outcome: 5.2: Describe basic safeguards in computer and network security.

Topic: Computer and Network Security: Basic Safeguards

BUSPROG: Technology

Bloom’s: Remember

Difficulty Level: Easy

Page: 89

Feedback: Integrity refers to the accuracy of information resources within an organization. In other words, the security system must not allow data to be corrupted or allow unauthorized changes to a corporate database.

 

  1. In the context of computer and network security, _____ means that computers and networks are operating and authorized users can access the information they need.
a. validity c. integrity
b. confidentiality d. availability

 

 

Answer: D

Chapter Learning Outcome: 5.2: Describe basic safeguards in computer and network security.

Topic: Computer and Network Security: Basic Safeguards

BUSPROG: Technology

Bloom’s: Remember

Difficulty Level: Easy

Page: 89

Feedback: Availability means that computers and networks are operating and authorized users can access the information they need. It also means a quick recovery in the event of a system failure or disaster.

 

  1. A level 1 security system is used to protect _____ against unauthorized access.
a. users’ work stations c. internal database servers
b. corporate networks d. front-end servers

 

 

Answer: D

Chapter Learning Outcome: 5.2: Describe basic safeguards in computer and network security.

Topic: Computer and Network Security: Basic Safeguards

BUSPROG: Technology

Bloom’s: Remember

Difficulty Level: Easy

Page: 89

Feedback: In level 1 security, front-end servers, those available to both internal and external users, must be protected against unauthorized access. Typically, these systems are e-mail and Web servers.

 

  1. A level 2 security system protects _____.
a. back-end systems c. Web servers
b. corporate networks d. e-mail servers

 

 

Answer: A

Chapter Learning Outcome: 5.2: Describe basic safeguards in computer and network security.

Topic: Computer and Network Security: Basic Safeguards

BUSPROG: Technology

Bloom’s: Remember

Difficulty Level: Easy

Page: 89

Feedback: In level 2 security, back-end systems (such as users’ workstations and internal database servers) must be protected to ensure confidentiality, accuracy, and integrity of data.

 

  1. A level 3 security system focuses on protecting _____.
a. back-end systems c. users’ work stations
b. corporate networks d. front-end servers

 

 

Answer: B

Chapter Learning Outcome: 5.2: Describe basic safeguards in computer and network security.

Topic: Computer and Network Security: Basic Safeguards

BUSPROG: Technology

Bloom’s: Remember

Difficulty Level: Easy

Page: 90

Feedback: In level 3 security, the corporate network must be protected against intrusion, denial-of-service attacks, and unauthorized access.

 

  1. Which of the following is considered an intentional security threat?
a. Floods c. Backdoors
b. A user’s accidental deletion of data d. Power outages

 

 

Answer: C

Chapter Learning Outcome: 5.3: Explain the major security threats.

Topic: Security Threats: An Overview

BUSPROG: Technology

Bloom’s: Remember

Difficulty Level: Easy

Page: 90

Feedback: Backdoors are considered an intentional security threat.

 

  1. A (n) _____ travels from computer to computer in a network, but it does not usually erase data.
a. Trojan program c. applet
b. worm d. backdoor

 

 

Answer: B

Chapter Learning Outcome: 5.3: Explain the major security threats.

Topic: Security Threats: An Overview

BUSPROG: Technology

Bloom’s: Remember

Difficulty Level: Easy

Page: 91

Feedback: A worm travels from computer to computer in a network, but it does not usually erase data.

 

  1. A logic bomb is a type of _____.
a. Trojan program c. blended threat
b. worm d. backdoor

 

 

Answer: A

Chapter Learning Outcome: 5.3: Explain the major security threats.

Topic: Security Threats: An Overview

BUSPROG: Technology

Bloom’s: Remember

Difficulty Level: Easy

Page: 92

Feedback: A logic bomb is a type of Trojan program used to release a virus, worm, or other destructive code.

 

  1. A _____ is a programming routine built into a system by its designer or programmer.
a. logic bomb c. virus
b. worm d. backdoor

 

 

Answer: A

Chapter Learning Outcome: 5.3: Explain the major security threats.

Topic: Security Threats: An Overview

BUSPROG: Technology

Bloom’s: Remember

Difficulty Level: Easy

Page: 92

Feedback: A backdoor (also called a trapdoor) is a programming routine built into a system by its designer or programmer. This routine enables the designer or programmer to bypass system security and sneak back into the system later to access programs or files.

 

  1. A _____ attack floods a network or server with service requests to prevent legitimate users’ access to the system.
a. social engineering c. backdoor
b. denial-of-service d. phishing

 

 

Answer: B

Chapter Learning Outcome: 5.3: Explain the major security threats.

Topic: Security Threats: An Overview

BUSPROG: Technology

Bloom’s: Remember

Difficulty Level: Easy

Page: 92

Feedback: A denial-of-service (DoS) attack floods a network or server with service requests to prevent legitimate users’ access to the system.

 

 

  1. _____ take advantage of the human element of security systems.
a. Denial-of-service attacks c. Blended threats
b. Trojan programs d. Social engineering attacks

 

 

Answer: D

Chapter Learning Outcome: 5.3: Explain the major security threats.

Topic: Security Threats: An Overview

BUSPROG: Technology

Bloom’s: Remember

Difficulty Level: Easy

Page: 93

Feedback: In the context of security, social engineering means using “people skills”—such as being a good listener and assuming a friendly, unthreatening air—to trick others into revealing private information. Social engineering attacks take advantage of the human element of security systems.

 

  1. _____ use a physiological element to enhance security measures.
a. Modems c. Intrusion detection systems
b. Firewalls d. Biometric security measures

 

 

Answer: D

Chapter Learning Outcome: 5.4: Describe security and enforcement measures.

Topic: Security Measures and Enforcement: An Overview

BUSPROG: Technology

Bloom’s: Remember

Difficulty Level: Easy

Page: 94

Feedback: Biometric security measures use a physiological element that is unique to a person and cannot be stolen, lost, copied, or passed on to others.

 

  1. Which of the following is a biometric security measure?
a. Electronic trackers c. Firewalls
b. Passwords d. Signature analysis

 

 

Answer: D

Chapter Learning Outcome: 5.4: Describe security and enforcement measures.

Topic: Security Measures and Enforcement: An Overview

BUSPROG: Technology

Bloom’s: Remember

Difficulty Level: Easy

Page: 94

Feedback: Signature analysis is a biometric security measure. It involves checking the user’s signature as well as deviations in pen pressure, speed, and length of time used to sign the name.

 

  1. Which of the following is a nonbiometric security measure?
a. Electronic trackers c. Firewalls
b. Passwords d. Signature analysis

 

 

Answer: C

Chapter Learning Outcome: 5.4: Describe security and enforcement measures.

Topic: Security Measures and Enforcement: An Overview

BUSPROG: Technology

Bloom’s: Remember

Difficulty Level: Easy

Page: 94

Feedback: The three main nonbiometric security measures are callback modems, firewalls, and intrusion detection systems.

 

  1. A _____ is the software that acts as an intermediary between two systems.
a. database c. proxy server
b. backdoor d. Trojan program

 

 

Answer: C

Chapter Learning Outcome: 5.4: Describe security and enforcement measures.

Topic: Security Measures and Enforcement: An Overview

BUSPROG: Technology

Bloom’s: Remember

Difficulty Level: Easy

Page: 96

Feedback: A proxy server is the software that acts as an intermediary between two systems—between network users and the Internet, for example.

 

  1. _____ are usually placed in front of a firewall and can identify attack signatures and trace patterns.
a. Intrusion detection systems c. Physical security measures
b. Proxy servers d. Biometric security measures

 

 

Answer: A

Chapter Learning Outcome: 5.4: Describe security and enforcement measures.

Topic: Security Measures and Enforcement: An Overview

BUSPROG: Technology

Bloom’s: Remember

Difficulty Level: Easy

Page: 97

Feedback: An intrusion detection system (IDS) can protect against both external and internal access. It is usually placed in front of a firewall and can identify attack signatures, trace patterns, generate alarms for the network administrator, and cause routers to terminate connections with suspicious sources.

 

 

  1. _____ security measures primarily control access to computers and networks, and they include devices for securing computers and peripherals from theft.
a. Nonbiometric c. Biometric
b. Physiological d. Physical

 

 

Answer: D

Chapter Learning Outcome: 5.4: Describe security and enforcement measures.

Topic: Security Measures and Enforcement: An Overview

BUSPROG: Technology

Bloom’s: Remember

Difficulty Level: Easy

Page: 97

Feedback: Physical security measures primarily control access to computers and networks, and they include devices for securing computers and peripherals from theft.

 

  1. Which of the following is a physical security measure?
a. Fitting electronic trackers to a computer c. Filtering data packets using a firewall
b. Restricting access through passwords d. Checking a user’s signature

 

 

Answer: A

Chapter Learning Outcome: 5.4: Describe security and enforcement measures.

Topic: Security Measures and Enforcement: An Overview

BUSPROG: Technology

Bloom’s: Remember

Difficulty Level: Easy

Page: 98

Feedback: Electronic trackers are a physical security measure. These devices are secured to a computer at the power outlet. If the power cord is disconnected, a transmitter sends a message to an alarm that goes off or to a camera that records what happens.

 

  1. Which of the following is a type of access control used to protect systems from unauthorized access?
a. Steel encasements c. Firewalls
b. Passwords d. Identification badges

 

 

Answer: B

Chapter Learning Outcome: 5.4: Describe security and enforcement measures.

Topic: Security Measures and Enforcement: An Overview

BUSPROG: Technology

Bloom’s: Remember

Difficulty Level: Easy

Page: 99

Feedback: The two widely used access controls are terminal resource security and passwords.

 

  1. A(n) _____ is often used, so remote users have a secure connection to an organization’s network.
a. biometric security system c. virtual private network
b. intrusion detection system d. terminal resource network

 

 

Answer: C

Chapter Learning Outcome: 5.4: Describe security and enforcement measures.

Topic: Security Measures and Enforcement: An Overview

BUSPROG: Technology

Bloom’s: Remember

Difficulty Level: Easy

Page: 100

Feedback: A virtual private network (VPN) provides a secure tunnel through the Internet for transmitting messages and data via a private network. It is often used so remote users have a secure connection to the organization’s network.

 

  1. Data sent through a virtual private network (VPN) can be encrypted using the _____ protocol.
a. User Datagram c. Secured Sockets layer
b. Transmission Control d. Layer Two Tunneling

 

 

Answer: D

Chapter Learning Outcome: 5.4: Describe security and enforcement measures.

Topic: Security Measures and Enforcement: An Overview

BUSPROG: Technology

Bloom’s: Remember

Difficulty Level: Easy

Page: 100

Feedback: Data is encrypted before it is sent through the virtual private network (VPN) with a protocol, such as Layer Two Tunneling Protocol (L2TP) or Internet Protocol Security (IPSec).

 

  1. Which of the following forms of text used in an encryption algorithm is unreadable without a decryption key?
a. Plaintext c. Codetext
b. Cleartext d. Ciphertext

 

 

Answer: D

Chapter Learning Outcome: 5.4: Describe security and enforcement measures.

Topic: Security Measures and Enforcement: An Overview

BUSPROG: Technology

Bloom’s: Remember

Difficulty Level: Easy

Page: 100

Feedback: Data encryption transforms data, called plaintext or cleartext, into a scrambled form called ciphertext that cannot be read by others. The receiver then unscrambles the data by using a decryption key.

 

  1. _____ is a commonly used encryption protocol that manages transmission security on the Internet.
a. Applications Layer c. Transmission Control Protocol
b. Secure Sockets Layer d. User Datagram Protocol

 

 

Answer: B

Chapter Learning Outcome: 5.4: Describe security and enforcement measures.

Topic: Security Measures and Enforcement: An Overview

BUSPROG: Technology

Bloom’s: Remember

Difficulty Level: Easy

Page: 101

Feedback: A commonly used encryption protocol is Secure Sockets layer (SSL), which manages transmission security on the Internet.

 

  1. _____ ensures data security and integrity over public networks, such as the Internet.
a. Transport Layer Security c. Transmission Control Protocol
b. Terminal Resource Security d. User Datagram Protocol

 

 

Answer: A

Chapter Learning Outcome: 5.4: Describe security and enforcement measures.

Topic: Security Measures and Enforcement: An Overview

BUSPROG: Technology

Bloom’s: Remember

Difficulty Level: Easy

Page: 101

Feedback: Transport Layer Security (TLS) is a recent cryptographic protocol, which ensures data security and integrity over public networks, such as the Internet.

 

  1. _____ encryption uses a public key known to everyone and a private key known only to the recipient.
a. Symmetric c. Synchronous
b. Asymmetric d. Asynchronous

 

 

Answer: B

Chapter Learning Outcome: 5.4: Describe security and enforcement measures.

Topic: Security Measures and Enforcement: An Overview

BUSPROG: Technology

Bloom’s: Remember

Difficulty Level: Easy

Page: 101

Feedback: Asymmetric encryption uses two keys: a public key known to everyone and a private or secret key known only to the recipient.

 

  1. A(n) _____ encryption usually works better for public networks, such as the Internet.
a. symmetric c. synchronous
b. asymmetric d. asynchronous

 

 

Answer: B

Chapter Learning Outcome: 5.4: Describe security and enforcement measures.

Topic: Security Measures and Enforcement: An Overview

BUSPROG: Technology

Bloom’s: Remember

Difficulty Level: Easy

Page: 101

Feedback: Asymmetric encryption usually works better for public networks, such as the Internet. Each company conducting transactions or sending messages gets a private key and a public key; a company keeps its private key and publishes its public key for others to use.

 

  1. In _____ encryption, the same key is used to encrypt and decrypt a message.
a. symmetric c. synchronous
b. asymmetric d. asynchronous

 

 

Answer: A

Chapter Learning Outcome: 5.4: Describe security and enforcement measures.

Topic: Security Measures and Enforcement: An Overview

BUSPROG: Technology

Bloom’s: Remember

Difficulty Level: Easy

Page: 101-102

Feedback: In symmetric encryption (also called secret key encryption), the same key is used to encrypt and decrypt a message.

 

  1. The main function of Cyber Incident Response Capability (CIRT) is to:
a. provide level 1 security. c. provide information on security incidents.
b. restrict access controls to unauthorized personnel. d. create backdoors to bypass security protocols.

 

 

Answer: C

Chapter Learning Outcome: 5.4: Describe security and enforcement measures.

Topic: Security Measures and Enforcement: An Overview

BUSPROG: Technology

Bloom’s: Remember

Difficulty Level: Easy

Page: 102

Feedback: Cyber Incident Response Capability’s (CIRC’s) main function is to provide information on security incidents, including information systems’ vulnerabilities, viruses, and malicious programs.

 

  1. _____ outlines procedures for keeping an organization operational in the event of a natural disaster or a network attack or intrusion.
a. Social engineering c. An intrusion detection system
b. Business continuity planning d. Terminal resource security

 

 

Answer: B

Chapter Learning Outcome: 5.5: Summarize the guidelines for a comprehensive security system, including business continuity planning.

Topic: Guidelines for a Comprehensive Security System

BUSPROG: Technology

Bloom’s: Remember

Difficulty Level: Easy

Page: 104

Feedback: To lessen the effects of a natural disaster or a network attack or intrusion, planning the recovery is important. This should include business continuity planning, which outlines procedures for keeping an organization operational.

 

  1. A _____ plan lists the tasks that must be performed to restore damaged data and equipment.
a. risk assessment c. disaster recovery
b. systems engineering d. security compliance

 

 

Answer: C

Chapter Learning Outcome: 5.5: Summarize the guidelines for a comprehensive security system, including business continuity planning.

Topic: Guidelines for a Comprehensive Security System

BUSPROG: Technology

Bloom’s: Remember

Difficulty Level: Easy

Page: 104

Feedback: A disaster recovery plan lists the tasks that must be performed to restore damaged data and equipment as well as steps to prepare for disaster.

 

COMPLETION

 

  1. _____ is software that secretly gathers information about users while they browse the Web.

 

Answer: Spyware

Chapter Learning Outcome: 5.1: Describe information technologies that could be used in computer crimes.

Topic: Risks Associated With Information Technologies

BUSPROG: Technology

Bloom’s: Remember

Difficulty Level: Easy

Page: 86

Feedback: Spyware is software that secretly gathers information about users while they browse the Web. This information could be used for malicious purposes.

 

  1. _____ is a form of spyware that collects information about a user (without the user’s consent) to determine which advertisements to display in the user’s Web browser.

 

Answer: Adware

Chapter Learning Outcome: 5.1: Describe information technologies that could be used in computer crimes.

Topic: Risks Associated With Information Technologies

BUSPROG: Technology

Bloom’s: Remember

Difficulty Level: Easy

Page: 86

Feedback: Adware is a form of spyware that collects information about the user (without the user’s consent) to determine which advertisements to display in the user’s Web browser.

 

  1. _____ is sending fraudulent e-mails that seem to come from legitimate sources, such as a bank or university.

 

Answer: Phishing

Chapter Learning Outcome: 5.1: Describe information technologies that could be used in computer crimes.

Topic: Risks Associated With Information Technologies

BUSPROG: Technology

Bloom’s: Remember

Difficulty Level: Easy

Page: 86

Feedback: Phishing is sending fraudulent e-mails that seem to come from legitimate sources, such as a bank or university. The e-mails usually direct recipients to false Web sites that look like the real thing for the purpose of capturing personal information, such as Social Security numbers, passwords, bank account numbers, and credit card numbers.

 

  1. _____ is an attempt to gain access to a network by posing as an authorized user in order to find sensitive information, such as passwords and credit card information.

 

Answer: Spoofing

Chapter Learning Outcome: 5.1: Describe information technologies that could be used in computer crimes.

Topic: Risks Associated With Information Technologies

BUSPROG: Technology

Bloom’s: Remember

Difficulty Level: Easy

Page: 86

Feedback: Spoofing is an attempt to gain access to a network by posing as an authorized user in order to find sensitive information, such as passwords and credit card information. Spoofing is also when an illegitimate program poses as a legitimate one.

 

  1. _____ monitor and record the keys pressed on a keyboard and can be software or hardware devices.

 

Answer: Keystroke loggers

Chapter Learning Outcome: 5.1: Describe information technologies that could be used in computer crimes.

Topic: Risks Associated With Information Technologies

BUSPROG: Technology

Bloom’s: Remember

Difficulty Level: Easy

Page: 86

Feedback: Keystroke loggers monitor and record keystrokes and can be software or hardware devices. Sometimes, companies use these devices to track employees’ use of e-mail and the Internet, and this use is legal.

 

  1. _____ is the unauthorized use of computer data for personal gain, such as transferring money from another’s account or charging purchases to someone else’s account.

 

Answer: Computer fraud

Chapter Learning Outcome: 5.1: Describe information technologies that could be used in computer crimes.

Topic: Risks Associated With Information Technologies

BUSPROG: Technology

Bloom’s: Remember

Difficulty Level: Easy

Page: 87

Feedback: Computer fraud is the unauthorized use of computer data for personal gain, such as transferring money from another’s account or charging purchases to someone else’s account.

 

  1. When planning a comprehensive security system, the first step is designing _____, which use a combination of hardware and software for improving reliability—a way of ensuring availability in case of a system failure.

 

Answer: fault-tolerant systems

Chapter Learning Outcome: 5.2: Describe basic safeguards in computer and network security.

Topic: Computer and Network Security: Basic Safeguards

BUSPROG: Technology

Bloom’s: Remember

Difficulty Level: Easy

Page: 90

Feedback: When planning a comprehensive security system, the first step is designing fault-tolerant systems, which use a combination of hardware and software for improving reliability—a way of ensuring availability in case of a system failure.

 

  1. A(n) _____ consists of self-propagating program code that is triggered by a specified time or event.

 

Answer: virus

Chapter Learning Outcome: 5.3: Explain the major security threats.

Topic: Security Threats: An Overview

BUSPROG: Technology

Bloom’s: Remember

Difficulty Level: Easy

Page: 90

Feedback: A virus consists of self-propagating program code that is triggered by a specified time or event. When the program or operating system containing the virus is used, the virus attaches itself to other files, and the cycle continues.

 

  1. _____ are independent programs that can spread themselves without having to be attached to a host program.

 

Answer: Worms

 

Chapter Learning Outcome: 5.3: Explain the major security threats.

Topic: Security Threats: An Overview

BUSPROG: Technology

Bloom’s: Remember

Difficulty Level: Easy

Page: 91

Feedback: Unlike viruses, worms are independent programs that can spread themselves without having to be attached to a host program.

 

  1. A(n) _____ contains code intended to disrupt a computer, network, or Web site, and it is usually hidden inside a popular program.

 

Answer: Trojan program

Chapter Learning Outcome: 5.3: Explain the major security threats.

Topic: Security Threats: An Overview

BUSPROG: Technology

Bloom’s: Remember

Difficulty Level: Easy

Page: 92

Feedback: A Trojan program (named after the Trojan horse that the Greeks used to enter Troy during the Trojan War) contains code intended to disrupt a computer, network, or Web site, and it is usually hidden inside a popular program.

 

  1. A(n) _____ is a security threat that combines the characteristics of computer viruses, worms, and other malicious codes with vulnerabilities found on public and private networks.

 

Answer: blended threat

Chapter Learning Outcome: 5.3: Explain the major security threats.

Topic: Security Threats: An Overview

BUSPROG: Technology

Bloom’s: Remember

Difficulty Level: Easy

Page: 92

Feedback: A blended threat is a security threat that combines the characteristics of computer viruses, worms, and other malicious codes with vulnerabilities found on public and private networks.

 

  1. In the context of security, _____ means using “people skills”—such as being a good listener and assuming a friendly, unthreatening air—to trick others into revealing private information.

 

Answer: social engineering

Chapter Learning Outcome: 5.3: Explain the major security threats.

Topic: Security Threats: An Overview

BUSPROG: Technology

Bloom’s: Remember

Difficulty Level: Easy

Page: 93

Feedback: In the context of security, social engineering means using “people skills”—such as being a good listener and assuming a friendly, unthreatening air—to trick others into revealing private information.

 

  1. The _____ biometric security measure translates words into digital patterns, which are recorded and examined for tone and pitch.

 

Answer: voice recognition

Chapter Learning Outcome: 5.4: Describe security and enforcement measures.

Topic: Security Measures and Enforcement: An Overview

BUSPROG: Technology

Bloom’s: Remember

Difficulty Level: Easy

Page: 94

Feedback: The voice recognition biometric security measure translates words into digital patterns, which are recorded and examined for tone and pitch.

 

 

  1. A(n) _____ is a combination of hardware and software that acts as a filter or barrier between a private network and external computers or networks.

 

Answer: firewall

Chapter Learning Outcome: 5.4: Describe security and enforcement measures.

Topic: Security Measures and Enforcement: An Overview

BUSPROG: Technology

Bloom’s: Remember

Difficulty Level: Easy

Page: 95

Feedback: A firewall is a combination of hardware and software that acts as a filter or barrier between a private network and external computers or networks, including the Internet.

 

  1. _____ is a software feature that erases the screen and signs the user off automatically after a specified length of inactivity.

 

Answer: Terminal resource security

Chapter Learning Outcome: 5.4: Describe security and enforcement measures.

Topic: Security Measures and Enforcement: An Overview

BUSPROG: Technology

Bloom’s: Remember

Difficulty Level: Easy

Page: 99

Feedback: Terminal resource security is a software feature that erases the screen and signs the user off automatically after a specified length of inactivity. This method of access control prevents unauthorized users from using an unattended computer to access the network and data.

 

SHORT ANSWER

 

  1. What is the McCumber cube?

 

Answer: The Committee on National Security Systems (CNSS) proposed a model called the “McCumber cube.” John McCumber created this framework for evaluating information security. Represented as a three-dimensional cube, it defines nine characteristics of information security, which are transaction, storage, processing, confidentiality, integrity, availability, human factors, policy and practices, and technology.

 

Chapter Learning Outcome: 5.2: Describe basic safeguards in computer and network security.

Topic: Computer and Network Security: Basic Safeguards

BUSPROG: Technology

Bloom’s: Understand

Difficulty Level: Moderate

Page: 89

 

  1. Explain the concept of mirror disks.

 

Answer: Mirror disks are a fault-tolerant method that uses two disks containing the same data so that if one fails, the other is available, allowing operations to continue. Mirror disks are usually a less expensive, level-1 redundant array of independent disks (RAID) system and can be a suitable solution for small organizations.

 

Chapter Learning Outcome: 5.2: Describe basic safeguards in computer and network security.

Topic: Computer and Network Security: Basic Safeguards

BUSPROG: Technology

Bloom’s: Understand

Difficulty Level: Moderate

Page: 90

 

  1. List nine types of intentional computer and network threats.

 

Answer: Intentional computer and network threats include:

 

  1. Viruses
  2. Worms
  3. Trojan programs
  4. Logic bombs
  5. Backdoors
  6. Blended threats (e.g., a worm launched by Trojan)
  7. Rootkits
  8. Denial-of-service attacks
  9. Social engineering

 

Chapter Learning Outcome: 5.3: Explain the major security threats.

Topic: Security Threats: An Overview

BUSPROG: Technology

Bloom’s: Remember

Difficulty Level: Easy

Page: 90

 

  1. How does a worm disrupt computing services?

 

Answer: A worm might corrupt data, but it usually replicates itself into a full-blown version that eats up computing resources, eventually bringing a computer or network to a halt.

 

Chapter Learning Outcome: 5.3: Explain the major security threats.

Topic: Security Threats: An Overview

BUSPROG: Technology

Bloom’s: Understand

Difficulty Level: Moderate

Page: 91

 

  1. Describe how blended threats work.

 

Answer: Blended threats search for vulnerabilities in computer networks and then take advantage of these vulnerabilities by embedding malicious codes in the server’s HTML files or by sending unauthorized e-mails from compromised servers with a worm attachment. They may launch a worm through a Trojan horse or launch a denial-of-service (DoS) attack at a targeted IP address. Their goal is not just to start and transmit an attack but to spread it.

 

Chapter Learning Outcome: 5.3: Explain the major security threats.

Topic: Security Threats: An Overview

BUSPROG: Technology

Bloom’s: Understand

Difficulty Level: Moderate

Page: 92

 

  1. What is shoulder surfing? Provide an example.

 

Answer: Shoulder surfing—in other words, looking over someone’s shoulder—is the easiest form of collecting information. Social engineers use this technique to observe an employee entering a password or a person entering a PIN at the cash register, for example.

 

Chapter Learning Outcome: 5.3: Explain the major security threats.

Topic: Security Threats: An Overview

BUSPROG: Technology

Bloom’s: Understand

Difficulty Level: Moderate

Page: 93

 

  1. Describe the process of vein analysis in biometric security measures.

 

Answer: The vein analysis method analyzes the pattern of veins in the wrist and back of the hand without making any direct contact with the veins.

 

Chapter Learning Outcome: 5.4: Describe security and enforcement measures.

Topic: Security Measures and Enforcement: An Overview

BUSPROG: Technology

Bloom’s: Understand

Difficulty Level: Moderate

Page: 94

 

  1. Explain the use of callback modems as a nonbiometric security measure.

 

Answer: Callback modems verify whether a user’s access is valid by logging the user off and then calling the user back at a predetermined number. They are useful in organizations with many employees who work off-site and who need to connect to the network from remote locations.

 

Chapter Learning Outcome: 5.4: Describe security and enforcement measures.

Topic: Security Measures and Enforcement: An Overview

BUSPROG: Technology

Bloom’s: Understand

Difficulty Level: Moderate

Page: 95

 

  1. What are the actions that a firewall might take after examining a packet?

 

Answer: After examining a packet, a firewall can take one of the following actions:

 

  1. Reject the incoming packet.
  2. Send a warning to the network administrator.
  3. Send a message to the packet’s sender that the attempt failed.
  4. Allow the packet to enter (or leave) the private network.

 

Chapter Learning Outcome: 5.4: Describe security and enforcement measures.

Topic: Security Measures and Enforcement: An Overview

BUSPROG: Technology

Bloom’s: Understand

Difficulty Level: Moderate

Page: 96

 

  1. How is a sender notified of packet delivery using a packet-filtering firewall?

 

Answer: A packet-filtering firewall informs senders if packets are rejected but does nothing if packets are dropped; senders have to wait until their requests time out to learn that the packets they sent were not received.

 

Chapter Learning Outcome: 5.4: Describe security and enforcement measures.

Topic: Security Measures and Enforcement: An Overview

BUSPROG: Technology

Bloom’s: Understand

Difficulty Level: Moderate

Page: 96

 

  1. What is an intrusion detection system (IDS)?

 

Answer: An intrusion detection system (IDS) can protect against both external and internal access. It is usually placed in front of a firewall and can identify attack signatures, trace patterns, generate alarms for the network administrator, and cause routers to terminate connections with suspicious sources.

 

Chapter Learning Outcome: 5.4: Describe security and enforcement measures.

Topic: Security Measures and Enforcement: An Overview

BUSPROG: Technology

Bloom’s: Understand

Difficulty Level: Moderate

Page: 97

 

  1. How are identification (ID) badges used as a physical security measure against thefts?

 

Answer: ID badges are checked against a list of authorized personnel, which must be updated regularly to reflect changes in personnel.

 

Chapter Learning Outcome: 5.4: Describe security and enforcement measures.

Topic: Security Measures and Enforcement: An Overview

BUSPROG: Technology

Bloom’s: Understand

Difficulty Level: Easy

Page: 98

 

  1. What is the function of a virtual private network (VPN)?

 

Answer: A VPN provides a secure “tunnel” through the Internet for transmitting messages and data via a private network. It is often used so remote users have a secure connection to the organization’s network.

 

Chapter Learning Outcome: 5.4: Describe security and enforcement measures.

Topic: Security Measures and Enforcement: An Overview

BUSPROG: Technology

Bloom’s: Knowledge

Difficulty Level: Easy

Page: 100

 

  1. What is data encryption?

 

Answer: Data encryption transforms data, called plaintext or cleartext, into a scrambled form called ciphertext that cannot be read by others. The rules for encryption, known as the encryption algorithm, determine how simple or complex the transformation process should be. The receiver then unscrambles the data by using a decryption key.

 

Chapter Learning Outcome: 5.4: Describe security and enforcement measures.

Topic: Security Measures and Enforcement: An Overview

BUSPROG: Technology

Bloom’s: Knowledge

Difficulty Level: Easy

Page: 100

 

  1. What are the functions of a computer emergency response team (CERT)?

 

Answer: Currently, CERT focuses on security breaches and DoS attacks and offers guidelines on handling and preventing these incidents. CERT also conducts a public awareness campaign and researches Internet security vulnerabilities and ways to improve security systems.

 

Chapter Learning Outcome: 5.4: Describe security and enforcement measures.

Topic: Security Measures and Enforcement: An Overview

BUSPROG: Technology

Bloom’s: Understand

Difficulty Level: Moderate

Page: 102

 

ESSAY

 

  1. Describe how uninterruptible power supply (UPS) is used as part of a comprehensive security system.

 

Answer: Uninterruptible power supply (UPS) is a backup power unit that continues to provide electrical power in the event of blackouts and other power interruptions and is most often used to protect servers. It performs two crucial tasks: It serves as a power source to continue running the server (usually for a short period), and it safely shuts down the server. More sophisticated UPS units can prevent users from accessing the server and send an alert to the network administrator.

 

Chapter Learning Outcome: 5.2: Describe basic safeguards in computer and network security.

Topic: Computer and Network Security: Basic Safeguards

BUSPROG: Technology

Bloom’s: Understand

Difficulty Level: Moderate

Page: 90

 

  1. How are computer viruses transmitted? Where do the most dangerous one come from and what viruses pose the most risk to national security?

 

Answer: Viruses can be transmitted through a network or through e-mail attachments. Some of the most dangerous ones come through bulletin boards or message boards because they can infect any system using the board. Experts believe that viruses infecting large servers, such as those used by air traffic control systems, pose the most risk to national security.

 

Chapter Learning Outcome: 5.3: Explain the major security threats.

Topic: Security Threats: An Overview

BUSPROG: Technology

Bloom’s: Understand

Difficulty Level: Moderate

Page: 91

 

  1. Discuss the guidelines for improving a firewall’s capabilities.

 

Answer: Guidelines for improving a firewall’s capabilities include the following:

 

  1. Identify what data must be secured, and conduct a risk analysis to assess the costs and benefits of a firewall.

 

  1. Compare a firewall’s features with the organization’s security needs. For example, if a person’s organization uses e-mail and FTP frequently, he or she must make sure that the application-filtering firewall he or she is considering can handle these network applications.

 

  1. Compare features of packet-filtering firewalls, application-filtering firewalls, and proxy servers to determine which of these types addresses one’s network’s security needs the best.

 

  1. Examine the costs of firewalls, and remember that the most expensive firewall is not necessarily the best. Some inexpensive firewalls might be capable of handling everything one’s organization needs.

 

  1. Compare the firewall’s security with its ease of use. Some firewalls emphasize accuracy and security rather than ease of use and functionality. Determine what is most important to one’s organization when considering the trade-offs.

 

  1. Check the vendor’s reputation, technical support, and update policies before making a final decision. As the demand for firewalls has increased, so has the number of vendors, and not all vendors are equal. Keep in mind that one might have to pay more for a product from a vendor with a good reputation that offers comprehensive technical support.

 

Chapter Learning Outcome: 5.4: Describe security and enforcement measures.

Topic: Security Measures and Enforcement: An Overview

BUSPROG: Technology

Bloom’s: Understand

Difficulty Level: Moderate

Page: 97

 

  1. State any five physical security measures.

 

Answer: Common physical security measures can include the following:

 

  1. Cable shielding: Braided layers around the conductor cable protect it from electromagnetic interference (EMI), which could corrupt data or data transmissions.
  2. Corner bolts: An inexpensive way to secure a computer to a desktop or counter, these often have locks as an additional protection against theft.
  3. Electronic trackers: These devices are secured to a computer at the power outlet. If the power cord is disconnected, a transmitter sends a message to an alarm that goes off or to a camera that records what happens.
  4. Identification (ID) badges: These are checked against a list of authorized personnel, which must be updated regularly to reflect changes in personnel.
  5. Proximity-release door openers: These are an effective way to control access to the computer room. A small radio transmitter is placed in authorized employees’ ID badges, and when they come within a predetermined distance of the computer room’s door, a radio signal sends a key number to the receiver, which unlocks the door.

 

Chapter Learning Outcome: 5.4: Describe security and enforcement measures.

Topic: Security Measures and Enforcement: An Overview

BUSPROG: Technology

Bloom’s: Understand

Difficulty Level: Moderate

Page: 98

 

  1. Describe asymmetric encryption.

 

Answer: Asymmetric encryption uses two keys: a public key known to everyone and a private or secret key known only to the recipient. A message encrypted with a public key can be decrypted only with the same algorithm used by the public key and requires the recipient’s private key, too. Anyone intercepting the message cannot decrypt it, because he or she does not have the private key.

 

This encryption usually works better for public networks, such as the Internet. Each company conducting transactions or sending messages gets a private key and a public key; a company keeps its private key and publishes its public key for others to use.

 

Chapter Learning Outcome: 5.4: Describe security and enforcement measures.

Topic: Security Measures and Enforcement: An Overview

BUSPROG: Technology

Bloom’s: Understand

Difficulty Level: Moderate

Page: 101

 

Additional information

Add Review

Your email address will not be published. Required fields are marked *