McGraw-Hill OnlineMcGraw-Hill Higher EducationLearning Center
Student Center | Instructor Center | Information Center | Home
Glossary
Acronyms
Exercise Files
Link to Jerry Post
Additional Appendixes
Discussion Issues
Rolling Thunder
End of Text Cases
Additional Models
Chapter Objectives
PowerPoint Presentations
Chapter Outline
Chapter Summary
Multiple Choice Quiz
True or False
Fill in the Blanks
Chapter Exercises
Internet Links/References
Chapter Review Questions
Feedback
Help Center


Management Information Systems: Solving Business Problems with Information Technology, 3/e
Gerald V. Post, University of the Pacific
David L. Anderson, DePaul U/McGowan Center

Security, Privacy, and Anonymity

Chapter 4 Multiple Choice



1

Three security aspects affect all businesses, but particularly those engaged in e-commerce:
A)Employee trustworthiness, unethical business partners, interception of messages.
B)Attacks on servers, firewall breakdowns, outdated encryption programs.
C)Interception of messages, attacks on servers, monitoring to identify attacks.
D)Failure to make frequent backups, interception of messages, employee errors.
2

A computer virus that attaches itself to your e-mail and then gets loose within your computer tends to do two things:
A)Wipe the hard drives clean and destroy the operating system.
B)Release confidential files to hackers and destroy your e-mail contact list.
C)Leave a time bomb or Trojan horse for future trouble.
D)It attaches itself to other files in your computer, and it sends itself to everyone in your contact list using your name.
3

Common techniques to identify a person based on biological characteristics that can be useful for computer security are:
A)Fingerprints, handprints, retinal scanners.
B)DNA scanners, tooth patterns, handprints.
C)Voiceprints, DNA scanners, fingerprints.
D)Retinal scanners, DNA scanners, photographs.
4

For a fee, there are several websites too help smaller businesses:
A)Check potential employee references.
B)Check credit references before the companies agree to work with other small companies.
C)Conduct merges on the Internet.
D)Perform basic background checks to verify SSNs and check public criminal records.
5

One problem for persons sending credit card numbers over the Internet is that:
A)You don't know who is on the other end.
B)Automated tools can be set to monitor transfers through one piece of the Internet, looking or card numbers.
C)Security is not as good as ones hopes it might be.
D)Internet transactions are not covered by credit card insurance.
6

Any time you open a connection from the Internet to your company data:
A)Re-check the firewall.
B)Require a password from the outside connection.
C)Record all interactions.
D)Be very careful to maintain strict control of that interaction.
7

A recent misuse of cookies was attempted by the company:
A)Amazon.com
B)Doubleclick.com
C)Plug and Play.com
D)Trackemnow.com
8

Which of the following is a key aspect of security and encryption?
A)Authenticating and identifying the user
B)Monitoring systems to identify arracks
C)Intercepting transmissions
D)Preventing attacks on the server
9

How has the internet and e-commerce added challenges for security?
A)Increased amounts of employees add the amount of exposure to corporate data.
B)More websites utilize corporate data like inventory levels.
C)Today’s huge computer capacity has the higher potential for outside attacks by hackers.
D)It is increasingly more difficult to authenticate transmission of corporate data.
10

What poses the biggest threat to information systems?
A)Hackers
B)Hurricanes
C)Developers
D)Inadequate backup systems
11

Which option is not a part of a disaster recovery service?
A)Data mirroring
B)Backup power generators
C)Hot centers
D)Cold centers
12

Identifying and preventing unscrupulous MIS employees from attacking or stealing is a complicated task. The only viable solution is to:
A)Run extensive background checks.
B)Check for “fire bombs” in software code on a regular basis.
C)Have backups of data readily available.
D)Don’t trust your programmers and analysts.
13

It’s generally a good practice to separate staff programmers and users because:
A)It prevents the opportunity for data theft.
B)There’s no transaction processing auditing otherwise.
C)It prevents the creation of timebombs in software.
D)Programmers and users have a conflict of interests.
14

Unscrupulous and criminal programmers have various ways of sabotaging software for their gain. Which of the following is not a method?
A)UCITA
B)Tospdoors
C)Time Bombs
D)Secret passwords
15

The electronic interexchange of financial and business data between businesses is identified as:
A)ASP
B)UCITA
C)EDI
D)MIS
16

The acronym ASP stands for:
A)Application Scripts Protocol.
B)Action Scripted pages.
C)Active Server Page.
D)Application Service Provider.
17

There are many advantages of using an ASP. Which of the following is not one of them?
A)Availability of company data on the Internet.
B)Export advice and maintenance of data.
C)Options of scalability.
D)Security of having all company maintenance by an outside party.
18

Outside hackers have invented many methods to gain access to company data. Which method involves scanning software searching for holes in security and software?
A)Time bombs
B)Trap doors
C)Script kiddies
D)Social engineers
19

Which Microsoft programming language offers a potential for stolen data?
A)C++
B)Java
C)Visual Basic
D)Visual Age
20

The most prevalent way of acquiring a computer virus is:
A)Email attachments.
B)Macro programs.
C)Trojans.
D)Worms.
21

There are many ways to prevent the download of worms onto your computer.
A)Avoid suspect email attachments.
B)Use a virus software kit.
C)Utilize email filters.
D)Avoid using software from the Internet.
22

When a program replicates and embeds itself, and is usually is benign to the host computer, this is an example of a:
A)Virus.
B)Trojan.
C)Script kiddy.
D)Worm.
23

Denial of service is often related to the problems of
A)Unauthorized withholding
B)Unauthorized disclosure
C)Unauthorized modification
D)Unauthorized access
24

17. Which area of industry has led to the strongest developments in data security?
A)banking
B)healthcare
C)military
D)home/private security
25

Probably the most effective means of protecting data is:
A)An uninterruptible power supply.
B)A trusted IT staff.
C)firewalls and data encryption
D)formal backups
26

Which of the following is not part of an effective backup plan?
A)An off site storage area
B)Uninterruptible power supply
C)Access controls to data
D)Daily and weekly backup procedure
27

Some general rules of good password does not include the following:
A)Using a combination of letters and numbers
B)Never writing down passwords
C)Changing your password often
D)Using words that are easy to remember
28

Kerbers is an example of a:
A)Biometric system used to identify fingerprints
B)System cover used to authenticate other servers
C)Password generator
D)Transportable backup system.
29

Other than cost, what seems to be the biggest impediment to using biometric systems?
A)Possible bodily endangerment
B)The unreliability of certain devises
C)The lack of standards
D)The lack of industry knowledge and acceptance
30

Audits are an effective way of preventing fraud, but they do have drawbacks such as:
A)Extra operational costs to a firm
B)Inability of auditors to detect all fraud
C)Lack of auditory standards among auditing organizations
D)Threat of being audited not great enough to thwart fraud
31

Steganography can be defined as:
A)a type of shorthand used for note taking
B)A teletype machine for encryption
C)Hidden messages within communications
D)a means of generating passwords
32

Producing an audit trail of all file changes made is an example of what security measure?
A)Hiring and employee evaluation
B)Physical access tracking and prevention
C)Access controls
D)Data monitoring
33

The concept of brute force attacks is associated with
A)Encryption
B)data monitoring
C)Access controls
D)Stegonography
34

Which encryption standard allows for the choices of three key lengths?
A)Triple DES
B)DES 3.0
C)AES
D)PKI
35

When sending and receiving messages through dual key encryption, what is needed besides a public and private key?
A)RSA
B)PGP
C)AES
D)PKI
36

Besides military applications, what's a more common use for dual encryption data?
A)Secure email messaging
B)Credit card processing
C)Internet financial data processing
D)Password authentication
37

In order for digital signatures to work, digital certificates are needed for what reason?
A)Internetaccess keys always work in pairs.
B)Public keys need to accurately reflect the user.
C)Federal law won't recognize digital signatures alone.
D)there are no regulations or rules for PKI
38

Many companies create a _____ to improve security in their internet connection:
A)PKI
B)AES
C)VPN
D)PGP
39

Public networks and _____ represent the two primary types of wireless systems:
A)VPNs
B)Private LANs
C)PGPs
D)DES
40

Which of the following is not an example of data capture technology?
A)Echelon
B)Escrow-key
C)DCS-10000
D)Kerberos.
41

The use of zombie machines in a flood attack is associated with:
A)denial of service attacks
B)wireless networks attacks
C)echelon interceptions
D)virtual private network attacks
42

Firewalls essentially work by:
A)Examining network data before passing through routers
B)Encrypts content and sends it via internet
C)Verifies the identity of user before letting data transmit
D)Provides authentication to all authorized servers
43

For more sophisticated firewall protection, an intrusion detection system may be the best solution. Why are they better than regular firewalls?
A)They enable all unnecessary ports of the router to the internet
B)They use a set of rules to monitor internet traffic
C)They incorporate dual key encryption
D)They prevent data packet loss
44

Web cookies are usually used to:
A)monitor employee internet use
B)track users returning to a site
C)track location of cell phones
D)ensure online privacy
45

Which law prohibits video stores from releasing rental data?
A)1994 Privacy Act
B)1974 Privacy Act
C)Bork Bill
D)Family Values Act
46

As an Internet user, if you are truly concerned about online and consumer privacy, then the best country to live in is:
A)United States
B)Canada
C)Japan
D)France
47

With anonymous internet usage made possible, which group of users would likely abuse this concept?
A)Telemarketers
B)Terrorists
C)Government
D)Hackers




McGraw-Hill/Irwin