Chapter 1 Assessment Questions

In: Computers and Technology

Submitted By ellikit
Words 311
Pages 2
Chapter 1 Assessment Questions

1. Information security is specific to securing information, whereas information systems security is focused on the security of the systems that house the information.

A. True

2. Software manufacturers limit their liability when selling software using which of the following?

A. End-User License Agreement

3. The ___ tenet of information systems security is concerned with the recovery time objective.

C. Availability

4. Encrypting data on storage devices or hard drives is a main strategy to ensure data integrity.

B. False

5. Organizations that require customer-service representatives to access private customer data can best protect customer privacy and make it easy to access other customer data by using which of the following security controls?

B. Blocking out customer private data details and allowing access only to the last four digits of Social Security numbers or account numbers.

6. The ___ is the weakest link in an IT infrastructure.

E. User Domain

7. Which of the following security controls can help mitigate malicious e-mail attachments?

E. All of the above

8. You can help ensure confidentiality by implementing ___.

D. A virtual private network for remote access

9. Encrypting e-mail communication is needed if you are sending confidential information within an e-mail message through the public Internet.

A. True

10. Using security policies, standards, procedures, and guidelines helps organizations decrease risks and threats.

A. True

11. A data classification standard is usually part of which policy definition?

A. Asset protection policy

12. The SSCP profession certification is geared toward which of the following information systems security positions?

A. IT security practitioner

13. Maximizing availability primarily involves…...

Similar Documents

Chapter 1 Questions Ans Application

...Eva Diaz Chapter 1 Questions and applications #1,2,3,5,6,7,10,15,16 1. a. Some of the agency problems encountered with the MNC come with the conflict of goals between a firm’s managers and shareholders when making decisions. Agency costs are larger for an MNC than for a purely domestic firm because managers of foreign subsidiaries may be tempted to focus on making decisions to serve their subsidiaries rather than the overall MNC. b. MNC’s with subsidiaries scattered around the world may experience more agency costs because it is much more difficult to monitor managers in foreign countries, foreign subsidiaries may not follow the same uniform goals, the size of the subsidiaries themselves leads to more conflicts, as well as the beliefs that employees should come first in decision making prior to shareholders. 2. a. Explain how the theory of comparative advantage relates to the need for international business. The theory of comparative advantage relates to the need for international business because it suggests that each country should use its comparative advantage to specialize in its production and rely on other countries to meet other needs. Therefore all countries would need to trade with each other competitively for the products they are not able to produce. b. Explain how the product cycle theory relates to the growth of the MNC. The product cycle theory suggests that after firms are established in their home......

Words: 858 - Pages: 4

Lab 1 Assessment Questions

...Lab 1 Assessment Questions: 1. Relate how Windows Server 2008 R2 Active Directory and the configuration of access controls achieve CIA department LANs, departmental folders, and data. By establishing security principle within the Active Directory Domain. 2. Is it a good practice to include the account and user name in the password? Why or Why not? No it is not a good idea to include the account and user name in the password because there are Hackers out there who would use either a dictionary attack or brute force attacks which go though lists to find the correct combination of words, letters, numbers and characters in order to crack user names and passwords which depending on how simple or complex it is can take anywhere from 5 minutes or 5 months to decrypt, so it is a good practice to keep everything as unique as possible. 3. To enhance the strength of user passwords, what are some of the best practices to implement for user password definitions to maximize confidentiality? In this case the best way to ensure a strong password is to use 8 or more characters such as a mixture of Uppercase. Lowercase, numbers, and symbols in order to create a complex password that would be very difficult to crack. 4. Can a defined user in Active Directory access a shared drive if that user is not part of the domain? No they should not be able to access the shared folders unless they have authorized access. 5. Does Windows Server 2008 R2 require a user’s logon/password credentials prior...

Words: 469 - Pages: 2

Review Questions: Chapter 1

...Review Questions: Chapter 1 1.1. Define the following terms: data, database, DBMS, database system, database catalog, program-data independence, user view, DBA, end user, canned transaction, deductive database system, persistent object, meta-data, and transaction-processing application. • Data – known facts that can be recorded and that have implicit meaning. • Database – a collection of related data with an implicit meaning. • DBMS – a collection of programs that enables users to create and maintain a database • Database system – not only contains the database itself bit also a complete definition or description of the database structure and constrains. • Database catalog – the information about the database structure is stored in the Database Catalog which contains the structure of each file, the type and storage format of each data item, and various constrains of the data. • Program-Data Independence – DBMS access programs do not require changes in all programs due to the change in the structure of a file because the structure of data files is stored in the DBMS catalog separately from the access programs. • User View – a database typically has many users, and each of whom may require a different perspective or view of the database. A view may be a subset of the database or it may contain virtual data the is derived from the database files but is not explicitly stored. • DBA – a database administrator (short form DBA) is a......

Words: 2493 - Pages: 10

Chapter 1 Review Question

...Robert Jones Chapter 1 Review 1. Which of the following is true about 1 bit? 2. Which of the following terms means approximately 106 bytes 3. Which answer list the correct number of bits associated with each term 4. Which of the following answer are true about random-access memory (RAM) as it normally used inside a personal computer (Chose two answers) 5. This Chapter describes the concepts how a CPU reads the contents from RAM. Which of the following is true about the process off read data, as described in the chapter? 6. A user has opened up a word processor, typed the numbers 123456789, and stored the document as a file called report1. Which of the following determines, in part, what bits the computer stores the file to represent the text typed into the report? 7. A user has opened a calculator application, typed the numbers 123456789, and then done some math problems using this number. Which of the following determines, in part, what bits the computer stores in RAM to represents the number 123456789? 8. Which of the following is not a feature of a file system that might be used with a hard disk drive? 9. A student writes a report using a word processor, saving the report in a file called my_report. The student stores the file on his laptop hard disk drive. Later, he posts the file on a file-sharing site for a classmate to review the report. Then, he copies an updated version of the file to a flash drive to submit it to his instructor. Which of......

Words: 645 - Pages: 3

Chapter 1 Review Questions

...1. Which of the following is true about 1 bit? a. Can represent decimal values 0 through 9 b. Can be used to represent one character in the lowercase English alphabet | c. Represents one binary digit d. Represents four binary digits 2. Which of the following terms means approximately 106 bytes? a. Terabyte | b. Megabyte c. Gigabyte d. Kilobyte 3. Which answer lists the correct number of bits associated with each term? a. 8 bits per double word b. 32 bits per word | c. 64 bits per quadruple word d. 4 bits per byte 4. Which of the following answers are true about random-access memory (RAM) as it is normally used inside a personal computer? (Choose two answers.) | a. Used for short-term memory b. Used for long-term memory c. Used to process data d. Connects to the CPU over a bus using a cable |e. Is installed onto the motherboard 5. This chapter describes the concepts behind how a CPU reads the contents from RAM. Which of the following is true about the process of read data, as described in the chapter? a. The CPU tells the RAM which address holds the data that the CPU wants to read. b. The CPU reads all RAM sequentially, beginning with the first byte, until it happens to read the byte that the CPU wanted to read. c. The smallest unit of data that RAM supplies back to the CPU is 1 bit. |d. The CPU must first find the file in the file system before reading the data. 6. A user has......

Words: 1372 - Pages: 6

Lab 1 & Assessment Questions

...IT255 Lab 1 & Assessment Questions Starting Nmap 5.21 ( ) at 2012-03-28 19:38 Eastern Standard Time Nmap scan report for Host is up (0.0054s latency). Not shown: 92 closed ports PORT STATE SERVICE 53/tcp open domain 88/tcp open kerberos-sec 135/tcp open msrpc 139/tcp open netbios-ssn 389/tcp open ldap 445/tcp open microsoft-ds 1025/tcp open NFS-or-IIS 1027/tcp open IIS MAC Address: 00:0C:29:99:40:7B (VMware) Skipping SYN Stealth Scan against because Windows does not support scanning your own machine (localhost) this way. Nmap scan report for Host is up. PORT STATE SERVICE 7/tcp unknown echo 9/tcp unknown discard 13/tcp unknown daytime 21/tcp unknown ftp 22/tcp unknown ssh 23/tcp unknown telnet 25/tcp unknown smtp 26/tcp unknown rsftp 37/tcp unknown time 53/tcp unknown domain 79/tcp unknown finger 80/tcp unknown http 81/tcp unknown hosts2-ns 88/tcp unknown kerberos-sec 106/tcp unknown pop3pw 110/tcp unknown pop3 111/tcp unknown rpcbind 113/tcp unknown auth 119/tcp unknown nntp 135/tcp unknown msrpc 139/tcp unknown netbios-ssn 143/tcp unknown imap 144/tcp unknown news 179/tcp unknown bgp 199/tcp unknown smux 389/tcp unknown ldap 427/tcp unknown svrloc 443/tcp unknown......

Words: 1062 - Pages: 5

Chapter 1 Essay Questions

...Chapter 1 Essay Questions: 1. Explain the relationships among the four functions of management. The four basic management functions are planning, influencing, and controlling. a. Planning involves choosing tasks that must be performed to attain organizational goals, outlining how the tasks must be performed, and indicating when they should be performed. b. Organizing-can be thought of as assigning the tasks developed under the planning function to various individuals or groups within the organization. c. Influencing is referred to as motivating, leading, directing, or actuating. d. Controlling is the management function through which managers i. Gather information that measures recent performance within the organization ii. Compare present performance to pre-established performance standards. iii. From this comparison, determine whether the organization should be modified to meet pre-established standards. These functions are interrelated because the performance of one depends on the performance of the others. For example, organizing is based on well thought out plans developed during the planning process, and influencing systems must be tailored to reflect both these plans and the organizational design used to implement them. The fourth function, controlling, involves possible modification to existing plans, organizational structure, or the motivation system used to develop a more successful effort. ...

Words: 597 - Pages: 3

Nt1430 Chapter 1 Questions

...1. What is free software? List three characteristics of free software. -Free software is software that users have the freedom to distribute and change. The three main characteristics of free software are: The source code has to be distributed with the program, you cannot restrict people from redistributing/modifying/using the software, and users must be allowed to redistribute modified versions under the same terms/licensing. 2. Why is Linux popular? Why is it popular in academia? -Linux is popular for a number of different reasons. Its free software that is portable because it’s written in C, has an amazing range of supported "peripherals", has a lot of software available, and has standardization (POSIX). It’s generally popular in academia because it’s a free, open-source, portable, sophisticated programming environment that computer science students could use as a learning platform. 3. What are multiuser systems? Why are they successful? -A multiuser system is an operating system that allows multiple users to access a single computer's resources. It’s successful because it’s hard for a single user to use 100% of a modern computer’s resources, and allows for greater efficiency. 4. What is the Free Software Foundation/GNU? What is Linux? Which parts of the Linux operating system did each provide? Who else has helped build and refine this operating system? -GNU stands for "GNU'S Not Unix", and it was designed to be a UNIX-like operating system developed......

Words: 750 - Pages: 3

Chapter 1 Questions

...Chapter 1: Introduction to Project Management TRUE/FALSE 1. Until the 1980s, project management primarily focused on providing schedule and resource data to top management in the military, computer, and construction industries. ANS: T Until the 1980s, project management primarily focused on providing schedule and resource data to top management in the military, computer, and construction industries. Today’s project management involves much more, and people in every industry and every country manage projects. PTS: 1 DIF: Difficulty: Easy REF: p.2 OBJ: LO: 1-1 NAT: BUSPROG: Technology TOP: Introduction KEY: Bloom's: Knowledge 2. A difference between operations and projects is that operations end when their objectives have been reached, whereas projects do not. ANS: F Projects are different from operations in that they end when their objectives have been reached or the project has been terminated. PTS: 1 DIF: Difficulty: Moderate REF: p.4 OBJ: LO: 1-2 NAT: BUSPROG: Analytic TOP: What is a Project? KEY: Bloom's: Comprehension 3. Every project should have a well-defined objective. ANS: T A project has a unique purpose. Every project should have a well-defined objective. PTS: 1 DIF: Difficulty: Easy REF: p.6 OBJ: LO: 1-2 NAT: BUSPROG: Analytic TOP: What is a Project? KEY: Bloom's: Knowledge 4. Projects should be developed in increments. ANS: T A project is developed using progressive elaboration. Projects are often defined......

Words: 7714 - Pages: 31

Is3110 Chapter 1 Assessment

...Tony Yankey 22 Sep 14 IS3110 Chapter 1 Assessment 1. Which one of the following properly defines risk? D. Threat x Vulnerability 2. Which one of the following properly defines total risk? B. Threat x Vulnerability x Asset Value 3. You can completely eliminate risk in an IT environment. B. True 4. Which of the following are accurate pairings of threat categories? A. External and internal C. Intentional and accidental 5. A loss of client confidence or public trust is an example of a loss of _______. Intangible value 6. A _______ is used to reduce a vulnerability. Control 7. As long as a company is profitable, it does not need to consider survivability. B. False 8. What is the primary goal of an information security program? D. Reduce losses related to loss of confidentiality, integrity and availability 9. The _____ is an industry-recognized standard list of common vulnerabilities. CVE 10. Which of the following is a goal of a risk management? A. Identify the correct cost balance between risk and controls 11. If the benefits outweigh the cost, a control is implemented. Costs and benefits are identified by completing a _______. CBA 12. A company decided to reduce losses of a threat by purchasing insurance. This is known as risk ____. Transfer 13. What can you do to manage risk? A. Accept B. Transfer C. Avoid ......

Words: 262 - Pages: 2

Nt1230 Chapter 1 Questions

...NT1230 Chapter 1 questions. Fill in the Blank Complete the following sentences by writing the correct word or words in the blanks provided. 1. The general public in the United States will be able to purchase all of the Windows 7 editions in retail stores except Starter, Home Basic, and Enterprise 2. The core module that provides all of the Windows 7 capability that isn’t language- or edition-specific is called minwin. 3. When you copy a file to a library, Windows Explorer writes the file to the folder desig- nated as the save location. 4. To use federated search, you must download or create XML files for specific sites called Search connectors. 5. The only operating system edition that you can upgrade in-place to Windows 7 Professional is windows Vista Business. 6. Upgrading a computer running Windows 7 Starter to Windows 7 Ultimate using Windows Anytime Upgrade requires 0 megabytes of additional hard disk space. 7. To migrate a computer running Windows XP to Windows 7, you can use a utility called User State Migration Tool. 8. The new Windows 7 feature that renders all of the windows on the desktop transparent when you mouse over the right end of the taskbar is called Aero Peek. 9. The Windows 7 Starter edition is only available in a 32-bit version. 10. The maximum amount of system memory supported by Windows 7 Enterprise is 4 (32) & 192 (64). True / False Circle T if the statement is true or F if the statement is false. T F 1.......

Words: 520 - Pages: 3

Chapter 1 Review Questions

...1. What is the difference between a threat agent and a threat? A. A threat agent is the person who facilitates the attack while the threat is a constant danger to something. 2. What is the difference between vulnerability and exposure? A. Vulnerability is a flaw within the system or a weakness, usually where the attackers attack. While Exposure is a single situation when the system is prone to be harmed. 3. How is infrastructure protection (assuring the security of utility services) related to information security? A. Both infrastructure protection and information security share the same overall goal, which is to ensure that data is available when, where and how it is needed. 4. What type of security was dominant in the early years of computing? A. Early security was entirely physical security. 5. What are the three components of the C.I.A. Triangle? What are they used for? A. Confidentiality: Information should only be accessible to its intended recipients. B. Integrity: Information should arrive the same as it was sent. C. Availability: Information should be available to those authorized to use it. 6. If the C.I.A. triangle is incomplete, why is it so commonly used in security? A. The triangle would still be used because it addresses the major concerns with the vulnerability of information systems. 7. Describe the critical characteristics of information. How are they used in the study of computer security? A. Availability: Authorized users......

Words: 855 - Pages: 4

Chapter 1 Review Questions

...CHAPTER 1 REVIEW QUESTIONS 1. Define each of the following terms: a) Data: raw data not processed. This usually includes telephone numbers, a date of birth, customer name etc. It has little meaning until it is turned into information. b) Field: A character or group of characters that has a specific meaning. A field is used to define and store data. c) Record: A logically connected set of one or more fields that describes a person, place, or thing.  d) File: A collection of related records. 2. What is data redundancy, and which characteristics of the file system can lead to it? a. Data redundancy is when the same data are stored unnecessarily at different places. This can lead to poor data security, and data inconsistency. 3. What is data independence, and why is it lacking in file systems? b. Data independence is when you change the data storage characterizes and it doesn’t affect the program’s ability to access the data. 4. What is a DBMS, and what are its functions? c. A DBMS (database management system) is a collection of program that stores and manages data and control access to the data in the collection. It is responsible for creating, editing, deleting and maintain all the data inserted. 5. What is structural independence, and why is it important? d. Access to a file is dependent on the structure of the database. Without structural independence new changes such as adding a field, or a decimal in a......

Words: 1121 - Pages: 5

Chapter 1 Review Questions

...CHAPTER 1 SOLUTIONS 1-2 There is a demand for auditing in a free-market economy because in the agency relationship there is a natural conflict of interest between an absentee owner and a manager and due to the information asymmetry that exists between the owner and manager. As a result, the agent agrees to be monitored as part of his/her employment contract. Auditing appears to be a cost-effective form of monitoring. The empirical evidence suggests auditing was demanded prior to government regulation such as statutory audit requirements. Additionally, many private companies and other entities not subject to government auditing regulations also purchase various forms of auditing and assurance services. 1-3 There is a natural conflict of interest in the agency relationship between an owner and manager because of differences in the two parties’ goals. For example, the manager may spend funds on excessive personal benefits or favour entity growth at the expense of stockholders values. If both parties seek to maximize their own self-interest, it is likely that the manager will not act in the best interest of the owner and may manipulate the information provided to the owner accordingly. 1-7 Audit risk is defined as the risk that ‘the auditor expresses an inappropriate audit opinion when the financial statements are materially misstated’ (ISA 200). Materiality: ‘Misstatements, including omissions, are considered to be material if they, individually or in the......

Words: 857 - Pages: 4

Chapter 1 Question

...Chapter 1 Problems 1, 2, 3 = straightforward, intermediate, challenging Section 1.2 Matter and Model-Building Note: Consult the endpapers, appendices, and tables in the text whenever necessary in solving problems. For this chapter, Appendix B.3 may be particularly useful. Answers to odd-numbered problems appear in the back of the book. 1. A crystalline solid consists of atoms stacked up in a repeating lattice structure. Consider a crystal as shown in Figure P1.1a. The atoms reside at the corners of cubes of side L = 0.200 nm. One piece of evidence for the regular arrangement of atoms comes from the flat surfaces along which a crystal separates, or cleaves, when it is broken. Suppose this crystal cleaves along a face diagonal, as shown in Figure P1.1b. Calculate the spacing d between two adjacent atomic planes that separate when the crystal cleaves. [pic] Figure P1.1 Section 1.3 Density and Atomic Mass 2. Use information on the endpapers of this book to calculate the average density of the Earth. Where does the value fit among those listed in Tables 1.5 and 14.1? Look up the density of a typical surface rock like granite in another source and compare also to it. 3. The standard kilogram is a platinum-iridium cylinder 39.0 mm in height and 39.0 mm in diameter. What is the density of the material? 4. A major motor company displays a die-cast model of its first automobile, made from 9.35 kg of iron. To celebrate its......

Words: 4296 - Pages: 18

resolution Reichert Network Solutions GmbH | 10 to Midnight (1983) | Novelas Amar a muerte 1x13