click below
click below
Normal Size Small Size show me how
test 4 isys 317 fina
test 4 final ?'s
| questions | answers |
|---|---|
| Systems analysis and design is the process of creating and maintaining information systems. | t |
| Systems analysts are IT professionals who understand both business and technology. | t |
| People who intentionally gain unauthorized access to computer systems are called hackers. | t |
| Denial of service always occurs because of malicious attacks on the system. | f |
| When a hacker floods a Web server with millions of bogus service requests so it cannot service legitimate requests, this is called a denial of service attack. | t |
| Any action, device, procedure, technique, or other measure that reduces a system’s vulnerability to a threat is a safeguard. | f |
| A retinal scan would be considered a biometric authentication technique. | t |
| Technical safeguards involve the hardware and software components of an information system. | y |
| People who intentionally gain unauthorized access to computer systems are called hackers. | t |
| Denial of service always occurs because of malicious attacks on the system. | f |
| When a hacker floods a Web server with millions of bogus service requests so it cannot service legitimate requests, this is called a denial of service attack. | t |
| Any action, device, procedure, technique, or other measure that reduces a system’s vulnerability to a threat is a safeguard. | f |
| A retinal scan would be considered a biometric authentication technique. | t |
| Technical safeguards involve the hardware and software components of an information system. | y |
| Systems analysis and design is the process of creating and maintaining information systems. | t |
| Systems analysts are IT professionals who understand both business and technology. | t |