Essential Software Development
Name:______________________________
CHAPTER 11 TEST
Multiple-choice questions
1 Malicious software includes:
A viruses, bacteria, worms, kernels
B malware, spyware, adware, parasites
C active-X, malware, ad-aware, viruses
D viruses, spyware, trojans, worms
2 The Internet is not an anonymous medium because:
A the Internet police track down every activity performed by every user
B spy agencies use spyware to track down all illegal activity
C every computer on the internet has a unique IP address that can be traced back to an ISP user account
D all of the above
3 Asymmetric encryption software:
A uses three keys, one for each of two communicating users and a public key
B uses one key shared by the users of the software
C uses two keys – a public key and a private key
D scrambles file data so that it is impossible to read and it is impossible for hackers to crack the code
4 Spam is seen as a great threat to the Internet because:
A an enormous amount of Internet traffic is made up of spam
B email servers may be overloaded when processing spam
C automated spam generators may cause spam traffic to continue to grow
D all of the above
5 Physical security measures include:
A firewall software
B system monitoring software
C biometric recognition devices
D encryption
6 The best security policy does not include:
A regularly applying operating system patches
B closing all unnecessary ports
C using routers to control network traffic
D outsourcing system administration
Short-answer questions
1 Briefly describe the visible physical security measures in use at your school. Are they effective? Explain.
2 In your opinion, are hacking threats a mythical or a genuine risk? Explain.
3 What is a firewall and how does it work? Should a home computer have a firewall? Why or why not?
4 Describe the risks to computer users from malicious software. What can be done to minimise these risks?
5 Briefly describe the logical security measures in use at your school. Are they effective? Explain.
6 Local users are often described as the greatest security threat to an organisation. Explain why they pose a greater threat than intrusion or hacking attempts from outside the organisation.
Extended-response questions
1 a Outline the types of data which must be protected by an organisation. For each type describe how it can be protected.
b What data is of vital importance to an organisation?
2 Why should all major organisations have a disaster recovery plan? Outline what must be included in a disaster recovery plan.
3 Describe in detail the main security threats to an organisation that uses online trading facilities, such as a bank.
© David Dawson and Adrian Janson Cambridge University Press 1