TRUE/FALSE
1. Information security’s primary mission is to ensure that systems and their contents retain their confidentiality at all costs.
ANS: F PTS: 1
2. Information security safeguards the technology assets in use at the organization.
ANS: T PTS: 1
3. A firewall is a mechanism that keeps certain kinds of network traffic out of a private network.
ANS: T PTS: 1
4. An act of theft performed by a hacker falls into the category of “theft,” but is also often accompanied by defacement actions to delay discovery and thus may also be placed within the category of “forces of nature.”
ANS: F PTS: 1
5. Two watchdog organizations that investigate allegations of software abuse: SIIA and NSA.
ANS: F PTS: 1
6. A number of technical mechanisms—digital watermarks and embedded code, copyright codes, and even the intentional placement of bad sectors on software media—have been used to enforce copyright laws.
ANS: T PTS: 1
7. A worm requires that another program is running before it can begin functioning.
ANS: F PTS: 1
8. A worm can deposit copies of itself onto all Web servers that the infected system can reach, so that users who subsequently visit those sites become infected.
ANS: T PTS: 1
9. Attacks conducted by scripts are usually unpredictable.
ANS: F PTS: 1
10. Expert hackers are extremely talented individuals who usually devote lots of time and energy to attempting to break into other people’s information systems.
ANS: T PTS: 1
11. With the removal of copyright protection, software can be easily distributed and installed.
ANS: T PTS: 1
12. Forces of nature, force majeure, or acts of God can present some of the most dangerous threats, because they are usually occur with very little warning and are beyond the control of people.
ANS: T PTS: 1
13. Much human error or failure can be prevented with training and ongoing awareness activities.
ANS: T PTS: 1
14. Compared to Web site defacement, vandalism