Student Center
|
Instructor Center
|
Information Center
|
Home
Glossary
Acronyms
Exercise Files
Link to Jerry Post
Additional Appendixes
Discussion Issues
Rolling Thunder
End of Text Cases
Additional Models
Choose a Chapter
Chapter 1
Chapter 2
Chapter 3
Chapter 4
Chapter 5
Chapter 6
Chapter 7
Chapter 8
Chapter 9
Chapter 10
Chapter 11
Chapter 12
Chapter 13
Chapter 14
Chapter Objectives
PowerPoint Presentations
Chapter Outline
Chapter Summary
Multiple Choice Quiz
True or False
Fill in the Blanks
Chapter Exercises
Internet Links/References
Chapter Review Questions
Feedback
Help Center
Management Information Systems: Solving Business Problems with Information Technology, 3/e
Gerald V. Post, University of the Pacific
David L. Anderson, DePaul U/McGowan Center
Security, Privacy, and Anonymity
Chapter 4 True or False
1
More money can be stolen at gunpoint in a bank than can be stolen by computer finagling.
A)
True
B)
False
2
Microsoft's Visual Basic for Applications is a major vulnerable point to the Office suite of programs.
A)
True
B)
False
3
It is much easier to locate hidden data within written files stored in locked storage areas than it is to locate it on a computer system.
A)
True
B)
False
4
US government top-secret information is stored on computers that generate incredibly complex passwords.
A)
True
B)
False
5
Free steganography tools can be found on the Internet.
A)
True
B)
False
6
One way to encrypt messages is with the RSA algorithm, which uses super-keys to protect your message from all comers, so that nothing can happen to it between source and target.
A)
True
B)
False
7
With good encryption techniques more common, a major target of computer criminals has become servers.
A)
True
B)
False
2003 McGraw-Hill Higher Education
Any use is subject to the
Terms of Use
and
Privacy Policy
.
McGraw-Hill Higher Education
is one of the many fine businesses of
The McGraw-Hill Companies
.