Management Information Systems, 12e (Laudon)Chapter 8 Securing Information Systems1) In addition to e-mail, instant messages and P2P file-sharing can also pose security threats to computer systems and networks.Answer: TRUEDiff: 1Page Ref: 294AACSB: Use of ITCASE: ComprehensionObjective: 8.12) Computers using cable modems to connect to the Internet are more open to penetration than those connecting via dial-up. Answer: TRUEDiff: 2Page Ref: 294AACSB: Use of IT