Search

In Stock

Managing And Using Information Systems A Strategic Approach 6th Edition By Keri E. Pearlson – Test Bank

Instant delivery only

 

$30.00

Compare
SKU:tb1002461

Managing And Using Information Systems A Strategic Approach 6th Edition By Keri E. Pearlson – Test Bank

File: 6e chapter7TextBank.docx, Chapter 7, Security

Multiple Choice

1. In the Office of Personnel Management’s case, the security breach made many people vulnerable to this.
a) Loss of personal property
b) Inaccurate personal data
c) Identity theft
d) Loss of access to personal data
e) Credit card fees

Ans: c (Hard)
Response: See page 148

2. When the Office of Personnel Management was hacked, all of the following are true except:
a) The hackers gained access to the building to steal the records
b) It took the Office of Personnel Management many months to detect the break-in
c) The hackers likely exploited a stolen password
d) The hackers did not need to escape in the blue turbocharged vehicle
e) None of the above (indicating that all are true)

Ans: a (Medium)
Response: See page 148

3. Many organizations and even consumers use this to control access to a network like the Internet, allowing only authorized traffic to pass.
a) Encryption
b) VPN
c) Firewall
d) Anonymizing tools
e) Filtering

Ans: c (Medium)
Response: See page 158

4. If you receive an email that says it is from Sam Johnson, your boss, with an odd EXE file as an attachment, it could be dangerous for all of the following reasons except:
a) It could be dangerous because the email might not really be from Sam.
b) It could be dangerous because the email might be from Sam’s computer without his or her knowledge.
c) It could be dangerous even if it was sent knowingly because Sam didn’t know a virus might be attached.
d) It could be dangerous because Sam gave someone his password once a long time ago
e) None of the above (indicating that all are true).

Ans: e (Medium)
Response: See page 162

5. It is estimated that ___ % of all firms have been breached:
a) 5% or less
b) 10% to 20%
c) 40% to 60%
d) 70% to 90%
e) Over 95%

Ans: e (Medium)
Response: See page 149

6. Who is responsible for decisions about security strategy?
a) IT people
b) Shared: IT leaders and business leaders
c) Business leaders
d) Consultants
e) Team of consultants and IT people

Ans: c (Medium)
Response: See page 149

7. Who is responsible for developing security education, awareness, and training programs?
a) IT people
b) Shared: IT leaders and business leaders
c) Business leaders
d) Consultants
e) Team of consultants and IT people

Ans: b (Medium)
Response: See page 149

8. In the Anthem Blue Cross breach, where 80 million names, birthdays, social security numbers, etc., were stolen, the hackers got in by:
a) Breaking into the building where they were stored
b) Obtaining passwords of five or more high-level employees
c) Making phone calls to insiders posing as IT people needing to log into their accounts
d) Emailing each of the 80 million patients asking for their private information
e) Recovering patient records from a large recycling bin

Ans: b (Medium)
Response: See page 151

9. ___ of breaches are caused by stealing a password
a) A very low percentage (somewhere around 1%)
b) A low percentage (around 10%)
c) A moderate percentage (around 25%)
d) A high percentage (around 50%)
e) A very high percentage (around 80%)

Ans: e (Medium)
Response: See page 151

10. The most common password of all in 2014 is:
a) Something complex that is hard to remember
b) None at all—they most commonly skip passwords and just press ENTER to continue
c) “password”
d) “123456”
e) “Rihanna”

Ans: d (Medium)
Response: See page 152

 

Reviews

There are no reviews yet.

Write a review

Your email address will not be published. Required fields are marked *

Back to Top
Product has been added to your cart