Exam 13: Security and Ethical Challenges

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

According to the text, companies can use ________________ to attack the problem of unauthorized use of computer systems and networks, to monitor network traffic in order to reveal evidence of improper use.

(Multiple Choice)
4.9/5
(27)

Security monitors can control the use of the hardware, software, and data resources of a computer system.

(True/False)
4.9/5
(32)

Many times, an electronic audit trail takes the form of _______________ that automatically record all computer network activity on magnetic disk or tape devices.

(Short Answer)
4.7/5
(36)

People who sit at PC workstations or visual display terminals in fast-paced, repetitive-keystroke jobs can suffer from a variety of health problems, known collectively as computer trauma disorders (CTDs).

(True/False)
5.0/5
(41)

________________ is software that, while purporting to serve some useful function, also allows Internet advertisers to display advertisements as banners and pop-up ads without the consent of the computer user.

(Short Answer)
4.7/5
(44)

The text defines ________________ as the science and technology emphasizing the safety, comfort, and ease of use of human-operated machines, such as computers. It is also called human factors engineering.

(Short Answer)
4.8/5
(31)

The use of information technologies is causing a significant reduction in some types of job opportunities.

(True/False)
4.9/5
(41)

Governments around the world are debating privacy issues and considering various forms of legislation. One area central to the privacy debate is opt-in versus opt-out. Those preferring the opt-in standard do so because this standard would:

(Multiple Choice)
4.7/5
(42)

The stakeholder theory maintains that:

(Multiple Choice)
4.7/5
(35)

Which of the following best describes the ethical principle of informed consent?

(Multiple Choice)
4.8/5
(32)

The most widely used encryption method uses a pair of public and private keys unique to each individual.

(True/False)
4.8/5
(36)

Computer monitoring has been criticized as an invasion of employee privacy because:

(Multiple Choice)
4.8/5
(45)

Software that is not copyrighted is called:

(Multiple Choice)
4.8/5
(33)

A company may use computer systems that have redundant processors, peripherals, and software to obtain a ________________ capability, where the computer system continues to operate at the same level even if there is a major hardware or software failure.

(Short Answer)
4.8/5
(37)

Which of the following is a method used to defend against denial of service attacks at the victim's website?

(Multiple Choice)
4.8/5
(43)

Computer monitoring has been criticized as unethical because no one is overseeing the person who monitors the workers.

(True/False)
4.8/5
(50)

Using office resources, such as networks and computers, to search for side jobs is generally not considered workplace Internet abuse.

(True/False)
4.7/5
(37)

Biometric control devices use special-purpose sensors to measure and digitize a biometric profile of an individual's fingerprints, voice, or other physical trait.

(True/False)
4.9/5
(35)

_______________ means getting access to a computer system, reading some files, but neither stealing nor damaging anything.

(Multiple Choice)
4.8/5
(46)

The text refers to the unauthorized use of computer systems and networks. To attack this problem, companies can use ________________ to monitor network traffic in order to reveal evidence of improper use.

(Short Answer)
4.9/5
(40)
Showing 81 - 100 of 116
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)