IS 3003 Chapter 8

True
Smartphones have the same security flaws as other Internet-connected devices.
True
In 2013, the security firm McAfee identified approximately 35,000 kinds of mobile malware.
True
Viruses can be spread through e-mail.
False
The term cracker is used to identify a hacker whose specialty is breaking open security systems.
True
To secure mobile devices, a company will need to implement special mobile device management software.
True
Wireless networks are vulnerable to penetration because radio frequency bands are easy to scan.
True
Computer worms spread much more rapidly than computer viruses.
True
One form of spoofing involves forging the return address on an e-mail so that the e-mail message appears to come from someone other than the sender.
True
Sniffers enable hackers to steal proprietary information from anywhere on a network, including e-mail messages, company files, and confidential reports.
False
DoS attacks are used to destroy information and access restricted areas of a company’s information system.
False
The distributed nature of cloud computing makes it somewhat easier to track unauthorized access.
True
Zero defects cannot be achieved in larger software programs because fully testing programs that contain thousands of choices and millions of paths would require thousands of years.
False
An acceptable use policy defines the acceptable level of access to information assets for different users.
True
Biometric authentication is the use of physical characteristics such as retinal images to provide identification.
False
Packet filtering catches most types of network attacks.
True
NAT conceals the IP addresses of the organization’s internal host computers to deter sniffer programs.
True
SSL is a protocol used to establish a secure connection between two computers.
True
Public key encryption uses two keys.
False
Over 70 percent of malware today is aimed at small businesses.
False
Smartphones typically feature state-of-the-art encryption and security features, making them highly secure tools for businesses.
False
Malicious software programs referred to as spyware include a variety of threats such as computer viruses, worms, and Trojan horses.
False
Authorization refers to the ability to know that a person is who he or she claims to be.
True
A walkthrough is a type of software testing used before software is even written.
True
When errors are discovered in software programs, the sources of the errors are found and eliminated through a process called debugging.