Chapter 8 Securing Information Systems
1) The potential for unauthorized access is usually limited to the communications lines of a network.
Answer: FALSE
Diff: 2 Type: TF Page Ref: 247
AACSB: Use of information technology
CASE: Content
A-level Heading: 8.1 System Vulnerability and Abuse
2) Large public networks, such as the Internet, are less vulnerable than internal networks because they are virtually open to anyone.
Answer: FALSE
Diff: 2 Type: TF Page Ref: v
AACSB: Reflective thinking skills
CASE: Content
A-level Heading: 8.1 System Vulnerability and Abuse
3) Malicious software programs are referred to as badware and include a variety of threats, such as computer viruses, worms, and Trojan horses.
Answer: FALSE
Diff: 2 Type: TF Page Ref: 249
AACSB: Reflective thinking skills
CASE: Content
A-level Heading: 8.1 System Vulnerability and Abuse
4) A computer bacteria is a rogue software program that attaches itself to other software programs or data files in order to be executed, usually without user knowledge or permission.
Answer: FALSE
Diff: 2 Type: TF Page Ref: 349
AACSB: Reflective thinking skills
CASE: Content
A-level Heading: 8.1 System Vulnerability and Abuse
5) Web 2.0 applications, such as blogs, wikis, and social networking sites such as Facebook and MySpace, have are not conduits for malware or spyware.
Answer: FALSE
Diff: 2 Type: TF Page Ref: 250
AACSB: Reflective thinking skills
CASE: Content
A-level Heading: 8.1 System Vulnerability and Abuse
6) A Trojan horse is a software program that appears threatening but is really benign.
Answer: FALSE
Diff: 2 Type: TF Page Ref: 250
AACSB: Reflective thinking skills
CASE: Content
A-level Heading: 8.1 System Vulnerability and Abuse
7) Keyloggers record every keystroke made on a computer to steal serial numbers for software, to launch Internet attacks, to gain access to e-mail