Exam 13: Security and Ethical Challenges

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

The social contract theory maintains that:

(Multiple Choice)
4.8/5
(40)

Spyware is annoying, but generally no threat to your privacy.

(True/False)
4.8/5
(39)

A _______________ is software that can guess passwords.

(Multiple Choice)
4.9/5
(34)

Firewall software has become essential for individuals connecting to the Internet with DSL or cable modems:

(Multiple Choice)
4.7/5
(39)

Which of the following statements about adware and spyware is true?

(Multiple Choice)
4.9/5
(31)

A hacker is a person who maintains knowledge of the vulnerabilities and exploits he or she finds for private advantage, and does not reveal them either to the general public or to the manufacturer for correction.

(True/False)
4.9/5
(34)

People who sit at PC workstations or visual display terminals in fast-paced, repetitive-keystroke jobs can suffer from a variety of health problems, known collectively as _______________.

(Multiple Choice)
5.0/5
(41)

Which of the following is not a health issue commonly related to the use of information technology in the workplace?

(Multiple Choice)
4.9/5
(37)

In the United States, opt-out is the default position, whereas in Europe consumers must opt-in or their personal information cannot be used.

(True/False)
4.8/5
(38)

According to the Real World case, CIOs should look at _______________ as a supplemental tool to limit communication of sensitive data.

(Multiple Choice)
4.7/5
(36)

Many computer crimes involve the theft of money. In the majority of these cases they are ________________ that involve unauthorized network entry and fraudulent alteration of computer database to cover the tracks of the employees involved.

(Short Answer)
4.7/5
(36)

According to the text, GIGO stands for:

(Multiple Choice)
4.8/5
(38)

According to the text case, about two-thirds of the companies surveyed monitor their Internet connections, but only two states require informing employees that they do so.

(True/False)
4.7/5
(36)

In 2000, hackers broke into hundreds of servers and planted Trojan horse .exe programs, which were then used to launch a barrage of service requests in a concerted attack at e-commerce websites, such as Yahoo! and eBay. This is an example of a distributed ________________ attack.

(Multiple Choice)
4.9/5
(41)

Computer monitoring has been criticized as an invasion of employee privacy because:

(Multiple Choice)
4.9/5
(37)

________________ file sharing software enables direct MP3 audio file transfers of specified tracks of music between your PC and those of other users on the Internet.

(Short Answer)
4.7/5
(44)

According to the text, all of the following statements are included in the definition of computer crime except:

(Multiple Choice)
4.9/5
(41)

A ________________ plan is a method for ensuring that an organization recovers from natural and human-caused disasters that affect its computer-based operations. These plans specify items such as hardware, software, employee duties, and facilities to be used.

(Short Answer)
4.8/5
(41)

________________ is software that, while purporting to serve some useful function, also allows Internet advertisers to display advertisements as banners and pop-up ads without the consent of the computer user.

(Short Answer)
4.8/5
(41)
Showing 101 - 119 of 119
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)