Exam 13: Security and Ethical Challenges

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Which of the following statements about adware and spyware is true?

Free
(Multiple Choice)
4.8/5
(40)
Correct Answer:
Verified

A

Talking unsuspecting company employees out of valuable information such as passwords is called:

Free
(Multiple Choice)
4.7/5
(36)
Correct Answer:
Verified

D

In the United States, opt-out is the default position, whereas in Europe consumers must opt-in or their personal information cannot be used.

Free
(True/False)
4.9/5
(46)
Correct Answer:
Verified

True

Security suites integrate virus protection with firewalls, Web security, and encrypted e-mail.

(True/False)
4.9/5
(29)

Hammering a Web site's equipment with too many requests for information, slowing performance or even crashing the site is called:

(Multiple Choice)
4.7/5
(32)

Spyware is annoying, but generally no threat to your privacy.

(True/False)
4.8/5
(37)

A sniffer is a program that covertly searches individual packets of data as they pass through the Internet, capturing passwords or content.

(True/False)
4.8/5
(29)

Most companies don't reveal that they have been targets or victims of computer crime.

(True/False)
5.0/5
(42)

Lawsuits by monitored workers against employers are:

(Multiple Choice)
4.7/5
(42)

One of the major principles of technology ethics is that even if judged acceptable by the other three guidelines, the technology must be implemented so as to avoid all unnecessary risk. This principle is:

(Multiple Choice)
4.9/5
(31)

Many companies and organizations have established guidelines for ethical conduct, but very few specify that company computer workstations and networks are company resources to be used for work-related uses only.

(True/False)
4.8/5
(38)

Sending extremely critical, derogatory, and often vulgar e-mail messages is called _______________.

(Multiple Choice)
4.9/5
(42)

In 2000, hackers broke into hundreds of servers and planted Trojan horse .exe programs, which were then used to launch a barrage of service requests in a concerted attack at e-commerce websites, such as Yahoo! and eBay. This is an example of a distributed ________________ attack.

(Multiple Choice)
4.9/5
(34)

Information technologies have caused a significant reduction in the following types of job opportunities, except:

(Multiple Choice)
4.7/5
(20)

Laws intended to regulate activities over the Internet or via the use of electronic data communications are collectively referred to as ________________ law.

(Short Answer)
4.9/5
(27)

The text describes a/an _______________ as a "gatekeeper" system that protects a company's intranets and other computer networks from intrusion by providing a filter and safe transfer point for access to and from the Internet and other networks.

(Multiple Choice)
4.8/5
(36)

According to the text, which are the four basic categories of ethical business issues where information technology has caused ethical controversy?

(Multiple Choice)
4.8/5
(40)

Computer monitoring has been criticized as unethical because:

(Multiple Choice)
4.8/5
(29)

_______________ software is not copyrighted.

(Short Answer)
4.9/5
(36)

According to the text case, about two-thirds of the companies surveyed monitor their Internet connections, but only two states require informing employees that they do so.

(True/False)
4.9/5
(37)
Showing 1 - 20 of 116
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)