Chapter 8 Securing Information Systems
1) In addition to e-mail, instant messages and P2P file-sharing can also pose security threats to computer systems and networks.
Answer: TRUE
Diff: 1 Page Ref: 294
AACSB: Use of IT
CASE: Comprehension
Objective: 8.1
2) Computers using cable modems to connect to the Internet are more open to penetration than those connecting via dial-up.
Answer: TRUE
Diff: 2 Page Ref: 294
AACSB: Use of IT
CASE: Comprehension
Objective: 8.1
3) Wireless networks are vulnerable to penetration because radio frequency bands are easy to scan.
Answer: TRUE
Diff: 2 Page Ref: 295
AACSB: Use of IT
CASE: Comprehension
Objective: 8.1
4) The range of Wi-Fi networks can be extended up to two miles by using external antennae.
Answer: FALSE
Diff: 3 Page Ref: 295
AACSB: Use of IT
CASE: Comprehension
Objective: 8.1
5) The WEP specification calls for an access point and its users to share the same 40-bit encrypted password.
Answer: TRUE
Diff: 3 Page Ref: 296
AACSB: Use of IT
CASE: Comprehension
Objective: 8.1
6) Viruses can be spread through e-mail.
Answer: TRUE
Diff: 1 Page Ref: 296
AACSB: Reflective Thinking
CASE: Comprehension
Objective: 8.1
7) Computer worms spread much more rapidly than computer viruses.
Answer: TRUE
Diff: 2 Page Ref: 296
AACSB: Reflective Thinking
CASE: Comprehension
Objective: 8.1
8) One form of spoofing involves forging the return address on an e-mail so that the e-mail message appears to come from someone other than the sender.
Answer: TRUE
Diff: 2 Page Ref: 299
AACSB: Reflective Thinking
CASE: Comprehension
Objective: 8.1
9) Sniffers enable hackers to steal proprietary information from anywhere on a network, including e-mail messages, company files, and confidential reports.
Answer: TRUE
Diff: 2 Page Ref: 299
AACSB: Reflective Thinking
CASE: Comprehension
Objective: 8.2
10) DoS