Test 3 Materials
-
Upload
subash1111gmailcom -
Category
Documents
-
view
217 -
download
0
Transcript of Test 3 Materials
-
7/29/2019 Test 3 Materials
1/29
Chapter 10
Multiple Choice
1. IT applications can be developed in which of the following ways?
a) build the system in-house
b) buy an application and install it
c) lease software from an application service providerd) outsource it
e) all of the above
Ans: e
Response: See page 302
2. The information systems planning process proceeds in which order?a) organization mission organization strategic plan IS strategic plan new IT architecture
b) organization mission IS strategic plan organization strategic plan IS operational plan
c) organization strategic plan organization mission IS strategic plan new IT architecture
d) IT architecture IS strategic plan organization strategic plan organization mission
e) IS development projects IS operational plan new IT architecture organization mission
Ans: a
Response: See page 306-307
3. A typical IS operational plan contains which of the following elements?
a) mission of the IS functionb) summary of the information needs of the functional areas and of the entire organization
c) IS functions estimate of its goals
d) application portfolio
e) all of the above
Ans: e
Response: See page 306-307
4. Which of the following is not a part of the typical IS operational plan?
a) mission of the IS function
b) organizational missionc) IT architecture
d) application portfolio
e) IS functions estimate of its goals
Ans: b
Response: See page 307
-
7/29/2019 Test 3 Materials
2/29
5. Evaluating the benefits of IT projects is more complex than evaluating their costs for which of the
following reasons?
a) benefits are harder to quantify
b) benefits are often intangible
c) IT can be used for several different purposesd) probability of obtaining a return from an IT investment is based on the probability of implementation
successe) all of the above
Ans: e
Response: See page 308
6. Evaluating the benefits of IT projects is more complex than evaluating their costs for all of the following
reasons except:
a) benefits are harder to quantify
b) benefits are often tangible
c) IT can be used for several different purposes
d) probability of obtaining a return from an IT investment is based on the probability of implementation
success
Ans: bResponse: See page 308
7. The _____ method converts future values of benefits to todays value by discounting them at the
organizations cost of funds.
a) net present value
b) cost-benefit analysisc) return on investment
d) internal rate of return
e) business case approach
Ans: a
Response: See page 308
8. The _____ method measures the effectiveness of management in generating profits with its available
assets.
a) net present value
b) cost-benefit analysis
c) return on investment
d) internal rate of return
e) business case approach
Ans: cResponse: See page 308
9. Which of the following are advantages of the buy option for acquiring IS applications?
a) many different types of off-the-shelf software are available
b) software can be tried out
-
7/29/2019 Test 3 Materials
3/29
c) saves time
d) company will know what it is getting
e) all of the above
Ans: eResponse: See page 309
10. Which of the following is not an advantage of the buy option for acquiring IS applications?
a) few types of off-the-shelf software are available, thus limiting confusion
b) software can be tried out
c) saves timed) company will know what it is getting
e) all of the above
Ans: a
Response: See page 309
11. Which of the following are disadvantages of the buy option for acquiring IS applications?
a) software may not exactly meet the companys needsb) software may be impossible to modify
c) company will not have control over software improvements
d) software may not integrate with existing systems
e) all of the above
Ans: e
Response: See page 310
12. Which of the following systems acquisition methods results in software that can be tried out, has beenused for similar problems in other organizations, and can save time?
a) systems development life cycle
b) prototyping
c) end-user development
d) buy optione) object-oriented development
Ans: d
Response: See page 310
13. Which of the following systems acquisition methods results in software that is controlled by anothercompany, may be difficult to enhance or modify, and may not support desired business processes?
a) systems development life cycleb) prototyping
c) end-user development
d) buy option
e) component-based development
Ans: d
Response: See page 310
-
7/29/2019 Test 3 Materials
4/29
14. Which of the following systems acquisition methods forces staff to systematically go through every
step in the development process and has a lower probability of missing important user requirements?a) systems development life cycle
b) prototypingc) end-user development
d) external acquisition
e) object-oriented development
Ans: a
Response: See page 311
15. Which of the following systems acquisition methods is time-consuming, costly, and may produce
excessive documentation?
a) systems development life cycle
b) prototyping
c) end-user developmentd) external acquisition
e) object-oriented development
Ans: a
Response: See page 311
16. Place the stages of the systems development life cycle in order:
a) investigation analysis design programming testing implementation operation maintenanceb) investigation design analysis programming testing implementation maintenance operation
c) analysis design investigation operation maintenance programming testing implementation
d) investigation analysis design programming testing maintenance operation implementation
Ans: a
Response: See page 312
17. The feasibility study addresses which of the following issues?
a) economic feasibility
b) technical feasibility
c) behavioral feasibility
d) all of the above
Ans: dResponse: See page 313
18. The _____ that changes are made in the systems development life cycle, the _____ expensive these
changes become.
a) sooner, less
b) later, less
c) more frequently, more
-
7/29/2019 Test 3 Materials
5/29
d) more extensively, more
e) sooner, more
Ans: a
Response: See page 313
19. ____ feasibility determines if the hardware, software, and communications components can be
developed and/or acquired to solve the business problem.
a) technical
b) economic
c) organizationald) behavioral
Ans: a
Response: See page 313
20. _____ feasibility determines if the project is an acceptable financial risk and if the organization canafford the expense and time needed to complete the project.
a) technicalb) economic
c) organizational
d) behavioral
Ans: b
Response: See page 313
21. _____ feasibility addresses the human issues of an information systems project.
a) technicalb) economic
c) organizational
d) behavioral
Ans: dResponse: See page 313
22. _____ feasibility concerns a firms policies and politics, power structures, and business relationships.
a) technical
b) economic
c) organizationald) behavioral
Ans: c
Response: See page 314
23. Which of the following is not a part of systems analysis?
a) definition of the business problem
-
7/29/2019 Test 3 Materials
6/29
b) identification of the causes of, and solution to, the business problem
c) identification of the information requirements that the solution must satisfy
d) identification of the technical specifications of the solution
Ans: dResponse: See page 314
24. Systems analysts use which of the following techniques to obtain the information requirements for the
new system?
a) direct observation
b) structured interviewsc) unstructured interviews
d) document analysis
e) all of the above
Ans: e
Response: See page 314
25. Which of the following is not a technique used to obtain the information requirements for the newsystem?
a) direct observation
b) structured interviews
c) unstructured interviews
d) use the system themselves
e) document analysis
Ans: dResponse: See page 314
26. Which of the following are problems associated with eliciting information requirements?
a) business problem may be poorly defined
b) users may not know exactly what the business problem is
c) users may disagree with each otherd) the problem may not be related to information systems
e) all of the above
Ans: e
Response: See page 314
27. _____ is the systems development stage that determines how the information system will do what is
needed to solve the business problem.a) systems design
b) systems analysis
c) systems implementation
d) systems development
e) operation and maintenance
Ans: a
-
7/29/2019 Test 3 Materials
7/29
Response: See page 314
28. Logical systems design refers to _____, while physical systems design refers to _____.a) the collection of user requirements, the development of software
b) what the system will do, how the tasks are accomplishedc) how the tasks are accomplished, what the system will do
d) the order of task accomplishment, how the tasks are accomplished
e) operation of the system, debugging the system
Ans: b
Response: See page 315
29. Systems design answers the question, _____:
a) How will the information system do what it must to obtain a solution to the business problem?
b) Why must the information system do what it must to obtain a solution to the business problem?
c) What is the problem the information system must address?
d) Who will benefit from use of the information system being developed?e) What is the effective operational life of the system?
Ans: a
Response: See page 315
30. When users ask for added functionality during a systems development project, this is called:
a) user-defined software
b) scope creepc) bloatware
d) out-of-control project
e) runaway project
Ans: b
Response: See page 315
31. Structured design advocates the use of software modules. Which of the following items are advantages
of this approach?
a) modules can be reused
b) modules cost less to develop
c) modules are easier to modify
d) all of the above
Ans: d
Response: See page 316
32. Structured programming includes which of the following restrictions?
a) each module has one, and only one, function
b) each module has one entrance and one exit
c) no GOTO statements allowed
-
7/29/2019 Test 3 Materials
8/29
d) has only three techniques: sequence, decision, loop
e) all of the above
Ans: d
Response: See page 316
33. Which of the following is not a restriction of structured programming?
a) each module has multiple functions
b) each module has one entrance and one exit
c) no GOTO statements allowed
d) has only three techniques: sequence, decision, loope) none of the above
Ans: a
Response: See page 316
34. In structured programmings _____ structure, the logic flow branches depending on certain conditionsbeing met.
a) decisionb) sequence
c) decision
d) return
e) parallel
Ans: a
Response: See page 316
35. In structured programmings _____ structure, the software executes the same program, or parts of it,until certain conditions are met.
a) decision
b) sequence
c) decision
d) returne) parallel
Ans: c
Response: See page 316
36. _____conversion is the process where the old system and the new system operate simultaneously for aperiod of time.
a) parallelb) direct
c) pilot
d) phased
Ans: a
Response: See page 317
-
7/29/2019 Test 3 Materials
9/29
37. _____ conversion is the process where the old system is cut off and the new system is turned on at a
certain point in time.
a) parallelb) direct
c) pilotd) phased
Ans: b
Response: See page 317
38. _____ conversion is the process where the new system is introduced in one part of the organization.
a) parallel
b) direct
c) pilot
d) phased
Ans: cResponse: See page 318
39. _____ conversion is the process where components of the new system are introduced in stages.
a) parallel
b) direct
c) pilot
d) phased
Ans: d
Response: See page 318
40. The riskiest type of conversion process is:
a) parallel
b) directc) pilot
d) phased
Ans: b
Response: See page 317
41. If a firm shuts down its old COBOL legacy system and starts up the new PeopleSoft ERP system
immediately, this is called _____:a) phased conversion
b) direct conversion
c) parallel conversion
d) pilot conversion
Ans: b
Response: See page 317
-
7/29/2019 Test 3 Materials
10/29
42. As systems age, maintenance costs _____:
a) decreaseb) increase
c) stay the samed) remain negligible
e) are not considered
Ans: b
Response: See page 318
43. Maintenance includes which of the following types of activities?
a) debugging
b) updating the system to accommodate changes in business conditions, but not adding functionality
c) adding new functionality to the system
d) all of the above
Ans: d
Response: See page 318
44. Which of the following systems acquisition methods helps clarify user requirements, promotes genuine
user participation, and may produce part of the final system?
a) systems development life cycle
b) prototyping
c) end-user developmentd) external acquisition
e) component-based development
Ans: b
Response: See page 318
45. Which of the following systems acquisition methods may encourage inadequate problem analysis, is
not practical with large numbers of users, and may result in a system with lower quality.
a) systems development life cycle
b) prototyping
c) end-user development
d) external acquisition
e) component-based development
Ans: b
Response: See page 318
46. The _____ approach to systems development defines an initial list of user requirements, then develops
the system in an iterative fashion.
a) integrated computer-assisted software engineering
b) joint application design
-
7/29/2019 Test 3 Materials
11/29
c) rapid application development
d) prototyping
e) systems development life cycle
Ans: dResponse: See page 318
47. The _____ approach to systems development is a group-based tool for collecting user requirements.
a) integrated computer-assisted software engineering
b) joint application design
c) rapid application developmentd) prototyping
e) systems development life cycle
Ans: b
Response: See page 319
48. The _____ approach to systems development uses specialized tools to automate many of the tasks in the
systems development life cycle.a) integrated computer-assisted software engineering
b) joint application design
c) rapid application development
d) prototyping
Ans: a
Response: See page 319
49. Which of the following is not an advantage of the Joint Application Design approach to systemsdevelopment?
a) involves fewer users in the development process
b) saves time
c) greater user acceptance of the new system
d) can produce a system of higher quality
Ans: a
Response: See page 319
50. Computer-aided software engineering tools provide which of the following advantages?
a) can produce systems with longer effective operational livesb) can produce systems that more closely meet user requirements
c) can speed up the development processd) can produce systems that are more adaptable to changing business conditions
e) all of the above
Ans: e
Response: See page 319
-
7/29/2019 Test 3 Materials
12/29
51. Which of the following is not an advantage of computer-aided software engineering tools?
a) can produce systems with longer effective operational lives
b) can produce systems that more closely meet user requirements
c) can require fewer developersd) can speed up the development process
Ans: c
Response: See page 319
52. Computer-aided software engineering tools provide which of the following disadvantages?a) produce initial systems that are more expensive to build and maintain
b) require more extensive and accurate definition of user requirements
c) difficult to customize
d) difficult to use with existing systems
e) all of the above
Ans: e
Response: See page 319
53. Which of the following is not a disadvantage of computer-aided software engineering tools?
a) produce initial systems that are more expensive to build and maintain
b) require more extensive and accurate definition of user requirements
c) require more developers
d) difficult to customize
Ans: cResponse: See page 319
54. Advantages of Rapid Application Development include which of the following?
a) active involvement of users in the development process
b) faster development process
c) system better meets user needsd) reduction in training costs
e) all of the above
Ans: e
Response: See page 320
55. Which of the following systems acquisition methods bypasses the IT department, avoids delays, and
results in increased user acceptance of the new system?a) systems development life cycle
b) prototyping
c) end-user development
d) external acquisition
e) component-based development
Ans: c
-
7/29/2019 Test 3 Materials
13/29
Response: See page 320
56. Which of the following systems acquisition methods may eventually require maintenance assistancefrom the IT department, produce inadequate documentation, and result in a system with inadequate
interfaces to existing systems?a) systems development life cycle
b) prototyping
c) end-user development
d) external acquisition
e) component-based development
Ans: c
Response: See page 320
57. Which of the following is the most difficult and crucial task in evaluating a vendor and a software
package?
a) identifying potential vendorsb) determining the evaluation criteria
c) evaluating vendors and packagesd) choosing the vendor and package
e) negotiating a contract
Ans: b
Response: See page 325-326
Chapter 3
1. Various organizations that promote fair and responsible use of information systemsoften develop _____:
a) a code of ethics
b) a strategic planc) a mission statement
d) responsibility charters
e) a goals outline
Ans: a
Response: See page 62
2. A_____ is intellectual work that is known only to a company and is not based onpublic information.
a) copyright
b) patent
c) trade secret
-
7/29/2019 Test 3 Materials
14/29
d) knowledge base
e) private property
Ans: c
Response: See page 62
3. A_____ is a document that grants the holder exclusive rights on an invention for 17years.
a) copyright
b) patent
c) trade secretd) knowledge base
e) private property notice
Ans: bResponse: See page 629
4. _____ is a statutory grant that provides the creators of intellectual property withownership of it for 28 years.
a) copyright
b) patent
c) trade secretd) knowledge base
e) private property
Ans: a
Response: See page 62
5. Which of the following is not an ethical issue?
a) privacyb) accuracy
c) transferability
d) propertye) accessibility
Ans: cResponse: See page 62
-
7/29/2019 Test 3 Materials
15/29
6. _____ issues involve collecting, storing and disseminating information about
individuals.
a) privacyb) accuracy
c) transferability
d) propertye) accessibility
Ans: aResponse: See page 62
7. _____ issues involve the authenticity and fidelity of information that is collected and
processed.
a) privacy
b) accuracyc) transferability
d) propertye) accessibility
Ans: bResponse: See page 62
8. _____ issues involve the ownership and value of information.
a) privacy
b) accuracyc) transferability
d) property
e) accessibility
Ans: d
Response: See page 62
9. _____ issues involve who may obtain information and how much they should pay forthis information.
a) privacy
b) accuracyc) transferability
d) property
e) accessibility
-
7/29/2019 Test 3 Materials
16/29
Ans: e
Response: See page 62
10. Which of the following factors are increasing the threats to information security?a) smaller computing devices
b) cheaper computing devices
c) the Internetd) increased computer literacy
e) all of the above
Ans: eResponse: See page 68
11. Which of the following factors are not increasing the threats to information security?
a) smaller computing devicesb) cheaper computing devices
c) the Internet
d) decreased computer literacye) intranets
Ans: d
Response: See page 68
12. A _____ is any danger to which an information resource may be exposed.
a) vulnerability
b) riskc) control
d) threat
e) compromise
Ans: d
Response: See page 68
13. A(n) _____ is the harm, loss, or damage that can result if an information resource iscompromised.
a) vulnerability
b) risk
c) control
-
7/29/2019 Test 3 Materials
17/29
d) threat
e) exposure
Ans: e
Response: See page 68
14. An information systems _____ is the possibility that the system will suffer harm bya threat.
a) vulnerability
b) risk
c) controld) danger
e) compromise
Ans: aResponse: See page 68
15. Earthquakes, floods, power failures, and fires are examples of which type of threat?a) intentional
b) environmental
c) social engineering
d) disasterse) none of the above
Ans: bResponse: See page 70
16. Unintentional threats to information systems include all of the following except:
a) malicious software
b) fire and floodc) computer system failures
d) lack of user experience
d) all of the above
Ans: a
Response: See pages 69-70
17. Which of the following is not an unintentional threat to information systems?
-
7/29/2019 Test 3 Materials
18/29
a) human errors
b) viruses
c) environmental hazardsd) computer system failures
e) none of the above
Ans: b
Response: See page 69-70
18. Which of the following is not an intentional threat to information systems?
a) environmental hazardsb) theft of data
c) deliberate manipulation in processing data
d) destruction from viruses and denial of service attacks
e) none of the above
Ans: aResponse: See page 69-70
19. Rank the following in terms of dollar value of the crime, from highest to lowest.
a) robbery white collar crime cybercrime
b) white collar crime extortion robberyc) cybercrime white collar crime robbery
d) cybercrime robbery white collar crime
e) white collar crime burglary robbery
Ans: c
Response: See page 70
20. An employee used his computer to steal 10,000 credit card numbers from a creditcard company. He is a_____:
a) hacker
b) crackerc) jacker
d) trespasser
e) none of the above
Ans: b
Response: See page 70
-
7/29/2019 Test 3 Materials
19/29
21. _____ involves building an inappropriate trust relationship with employees for thepurpose of gaining sensitive information or unauthorized access privileges.
a) cracking
b) hackingc) spoofing
d) social engineering
e) spamming
Ans: d
Response: See page 70
22. The fastest growing white collar crime is _____ :
a) extortionb) identity theft
c) insider tradingd) stock fraud
e) software piracy
Ans: b
Response: See page 71
23. _____ are segments of computer code that attach to existing computer programs and
perform malicious acts.a) viruses
b) worms
c) Trojan horsesd) back doors
e) alien software
Ans: aResponse: See page 72
24. _____ are destructive computer programs that replicate themselves without requiring
a host program.a) viruses
b) worms
c) Trojan horses
d) back doors
-
7/29/2019 Test 3 Materials
20/29
e) alien software
Ans: bResponse: See page 73
25. _____ are software programs that hide in other computer programs and reveal their
designed behavior only when they are activated.a) viruses
b) worms
c) Trojan horses
d) back doorse) alien software
Ans: c
Response: See page 73
26. _____ are segments of computer code embedded within an organizations existing
computer programs, that activate and perform a destructive action at a certain time ordate.
a) viruses
b) worms
c) Trojan horsesd) back doors
e) logic bomb
Ans: e
Response: See page 72
27. _____ is/are usually a password that allows an attacker to bypass any security
procedures.a) viruses
b) worms
c) Trojan horsesd) back doors
e) alien software
Ans: d
Response: See page 73
-
7/29/2019 Test 3 Materials
21/29
28. In a_____ attack, the attacker sends so many information requests to a target that the
target cannot handle them all and may crash.a) phishing
b) denial-of-service
c) wormd) back door
e) Trojan horse
Ans: b
Response: See page 73
29. In a_____ attack, a coordinated stream of requests is launched against a target system
from many compromised computers at the same time.
a) phishingb) denial-of-service
c) wormd) back door
e) distributed denial-of-service
Ans: e
Response: See page 73
30. _____ is clandestine software that is installed on your PC through duplicitous
channels, but is not very malicious.a) pestware
b) virus
c) wormd) back door
e) logic bomb
Ans: aResponse: See page 74
31. The vast majority of pestware is _____ :
a) spywareb) spamware
c) adware
d) virus
e) worm
-
7/29/2019 Test 3 Materials
22/29
Ans: c
Response: See page 74
32. A(n) _____ is an automated computer program that removes a particular software
package entirely.
a) removerb) uninstaller
c) cancellation program
d) eraser
e) worm
Ans: b
Response: See page 74
33. _____ is designed to help pop-up advertisements appear on your screen.
a) spyware
b) spamwarec) adware
d) virus
e) worm
Ans: c
Response: See page 74
34. Keylogger programs are examples of _____:a) spyware
b) spamware
c) adware
d) viruse) worm
Ans: aResponse: See page 74
35. Password capture programs are examples of _____:
a) spyware
b) spamware
-
7/29/2019 Test 3 Materials
23/29
c) adware
d) virus
e) worm
Ans: a
Response: See page 74
36. _____ is designed to use your computer as a launch pad for sending unsolicited e-
mail to other computers.
a) spyware
b) spamwarec) adware
d) virus
e) worm
Ans: b
Response: See page 74
37. _____ uses deception to fraudulently acquire sensitive personal information by
masquerading as an official e-mail.
a) pharming
b) denial-of-servicec) distributed denial-of-service
d) phishing
e) brute force dictionary attack
Ans: d
Response: See page 75
38. In a _____ attack, the attacker fraudulently acquires the Domain Name for acompanys Web site, so that when victims type in that companys URL, they are directed
to the attackers site.
a) pharmingb) denial-of-service
c) distributed denial-of-service
d) phishinge) brute force dictionary attack
Ans: a
Response: See page 75
-
7/29/2019 Test 3 Materials
24/29
39. A(n) _____ is an intellectual work that is a company secret and is not based on public
information.
a) patentb) trade secret
c) copyright
d) insider informatione) none of the above
Ans: b
Response: See page 76
40. A(n) _____ is a document that grants the holder exclusive rights on an invention orprocess for 20 years.
a) patentb) trade secret
c) copyright
d) insider informatione) none of the above
Ans: a
Response: See page 76
41. A(n) _____ is a statutory grant that provides the creators of intellectual property with
ownership of the property for the life of the creator plus 70 years.
a) patentb) trade secret
c) copyright
d) insider information
e) none of the above
Ans: c
Response: See page 76
42. _____ is the process in which an organization assesses the value of each asset being
protected, estimates the probability that each asset might be compromised, and compares
the probable costs of each being compromised with the costs of protecting it.
a) risk management
-
7/29/2019 Test 3 Materials
25/29
b) risk analysis
c) risk mitigation
d) risk acceptancee) risk transference
Ans: bResponse: See page 78
43. In _____, the organization takes concrete actions against risks.
a) risk management
b) risk analysisc) risk mitigation
d) risk acceptance
e) risk transference
Ans: c
Response: See page 78
44. In _____, the organization continues operating without controls and plans to absorb
any damages that occur.
a) risk management
b) risk analysisc) risk mitigation
d) risk acceptance
e) risk transference
Ans: d
Response: See page 78
45. In _____, the organization implements controls that minimize the impact of a threat.a) risk limitation
b) risk analysis
c) risk mitigationd) risk acceptance
e) risk transference
Ans: a
Response: See page 78
-
7/29/2019 Test 3 Materials
26/29
46. In _____, the organization purchases insurance as a means to compensate for any
loss.a) risk management
b) risk analysis
c) risk mitigationd) risk acceptance
e) risk transference
Ans: e
Response: See page 78
47. _____ prevent unauthorized individuals from gaining access to a companys
computer facilities.
a) access controlsb) physical controls
c) data security controlsd) administrative controls
e) input controls
Ans: b
Response: See page 79
48. _____ restrict unauthorized individuals from using information resources and are
concerned with user identification.a) access controls
b) physical controls
c) data security controlsd) administrative controls
e) input controls
Ans: aResponse: See page 79
49. Biometrics are an example of:
a) something the user isb) something the user wants
c) something the user has
d) something the user knows
e) something the user does
-
7/29/2019 Test 3 Materials
27/29
Ans: a
Response: See page 79
50. Retina scans and fingerprints are examples of:
a) something the user is
b) something the user wantsc) something the user has
d) something the user knows
e) something the user does
Ans: a
Response: See page 79
51. ID cards, smart cards, and tokens are examples of:a) something the user is
b) something the user wants
c) something the user hasd) something the user knows
e) something the user does
Ans: cResponse: See page 79
52. Voice and signature recognition are examples of:
a) something the user isb) something the user wants
c) something the user has
d) something the user knows
e) something the user does
Ans: e
Response: See page 79
53. Passwords and passphrases are examples of:
a) something the user is
b) something the user wants
c) something the user has
-
7/29/2019 Test 3 Materials
28/29
d) something the user knows
e) something the user does
Ans: d
Response: See page 79
54. _____ passwords will always overcome _____ security.a) strong, strong
b) weak, weak
c) weak, strong
d) strong, weake) none of the above
Ans: c
Response: See page 79
55. Which of the following is not a characteristic of strong passwords?
a) should be difficult to guessb) should contain special characters
c) should not be a recognizable word
d) should not be a recognizable string of numbers
e) should be shorter rather than longer
Ans: e
Response: See page 81
56. Bob is using public key encryption to send a message to Ted. Bob encrypts the
message with Teds _____ key and Ted decrypts the message using his _____ key.
a) public, public
b) public, privatec) private, private,
d) private, public
Ans: b
Response: See page 83
57. Information systems auditing consists of which of the following?
a) auditing around the computer
-
7/29/2019 Test 3 Materials
29/29
b) auditing through the computer
c) auditing with the computer
d) all of the above
Ans: d
Response: See page 85
58. Which of the following is not a part of information systems auditing?
a) auditing around the computer
b) auditing through the computer
c) auditing with the computerd) auditing without the computer
e) none of the above
Ans: dResponse: See page 85
59. _____ means verifying processing by checking for known outputs using specificinputs.
a) auditing around the computer
b) auditing through the computer
c) auditing with the computerd) auditing without the computer
Ans: aResponse: See page 389
60. _____ means using a combination of client data, auditor software, and client and
auditor hardware.
a) auditing around the computerb) auditing through the computer
c) auditing with the computer
d) auditing without the computer
Ans: c
Response: See page 389-391