Essential Software Development

Name:______________________________

CHAPTER 11 TEST

Multiple-choice questions

1 Malicious software includes:

A viruses, bacteria, worms, kernels

B malware, spyware, adware, parasites

C active-X, malware, ad-aware, viruses

D viruses, spyware, trojans, worms

2 The Internet is not an anonymous medium because:

A the Internet police track down every activity performed by every user

B spy agencies use spyware to track down all illegal activity

C every computer on the internet has a unique IP address that can be traced back to an ISP user account

D all of the above

3 Asymmetric encryption software:

A uses three keys, one for each of two communicating users and a public key

B uses one key shared by the users of the software

C uses two keys – a public key and a private key

D scrambles file data so that it is impossible to read and it is impossible for hackers to crack the code

4 Spam is seen as a great threat to the Internet because:

A an enormous amount of Internet traffic is made up of spam

B email servers may be overloaded when processing spam

C automated spam generators may cause spam traffic to continue to grow

D all of the above

5 Physical security measures include:

A firewall software

B system monitoring software

C biometric recognition devices

D encryption

6 The best security policy does not include:

A regularly applying operating system patches

B closing all unnecessary ports

C using routers to control network traffic

D outsourcing system administration

Short-answer questions

1 Briefly describe the visible physical security measures in use at your school. Are they effective? Explain.

2 In your opinion, are hacking threats a mythical or a genuine risk? Explain.

3 What is a firewall and how does it work? Should a home computer have a firewall? Why or why not?

4 Describe the risks to computer users from malicious software. What can be done to minimise these risks?

5 Briefly describe the logical security measures in use at your school. Are they effective? Explain.

6 Local users are often described as the greatest security threat to an organisation. Explain why they pose a greater threat than intrusion or hacking attempts from outside the organisation.

Extended-response questions

1 a Outline the types of data which must be protected by an organisation. For each type describe how it can be protected.

b What data is of vital importance to an organisation?

2 Why should all major organisations have a disaster recovery plan? Outline what must be included in a disaster recovery plan.

3 Describe in detail the main security threats to an organisation that uses online trading facilities, such as a bank.

© David Dawson and Adrian Janson Cambridge University Press 1