Deck 10: Ethics, Privacy, and Security

Full screen (f)
exit full mode
Question
Using fake names, nicknames, free e-mail, and public computers ensures that one is perfectly anonymous on the Internet.
Use Space or
up arrow
down arrow
to flip the card.
Question
All ethical actions are legal, but not all legal actions are ethical.
Question
Trade secrets, software, patents, and copyrighted works comprise intellectual property.
Question
Plagiarism refers to borrowing words of another and crediting the source.
Question
The downside of using surveillance techniques at work is that it pits management against staff, and undermines the bond of loyalty that might otherwise develop.
Question
Botnets are computers configured with specific vulnerabilities so they can attract different varieties
of malware in the wild, study their properties, and eradicate them.
Question
Which of the following principles is consistent with the natural laws and rights ethical framework?

A) "First, do no harm"
B) "Thou shalt not kill"
C) "The greatest good for the greatest number"
D) "The needs of the many outweigh the needs of the few"
Question
Honeypots are human-made threats that barrage servers and computers every day with automated attempts to install all types of malware.
Question
The single sign-on is a gateway service that permits users to log in once with a single user ID and password to gain access to multiple software applications.
Question
Phishing attacks tend to start with an e-mail luring users to click on a link.
Question
A drawback of using proxy servers for online anonymity is the need to rely on the company that operates the proxy servers and its promise to protect its customers' identities.
Question
Liability is a powerful driver for surveillance as employers are held responsible for employees' offensive e-mails or web-surfing habits.
Question
When a person tries to judge what action would create the greatest good for the greatest number, he or she is using a utilitarian scheme.
Question
________ is an ethical framework that judges the morality of an action based on how well it adheres to broadly accepted rules, regardless of the action's actual consequences.

A) Utilitarianism
B) Legal positivism
C) Natural laws and rights
D) Rationalism
Question
A cognitive obstacle for strong passwords is the capacity of human memory.
Question
Social engineering refers to extracting confidential information from information systems through legal procedures.
Question
Digitization of intellectual property results in better enforcement of IP laws.
Question
Biometric identifiers refer to something the user knows, such as a user ID, password, PIN, or answer to a security question.
Question
The incidence response plan is used by organizational staff to categorize threats, determine the cause, preserve evidence, and get the systems back online.
Question
A computer which is infected with malware and adds to a group's growing botnet is known as a "zombie."
Question
Which of the following is a drawback of using a proxy server to ensure online anonymity?

A) the parasitic and unauthorized use of hundreds of computer systems owned by individuals for masking online identity
B) the lack of uniform and binding legislation across different countries, defining the legality of using proxy servers
C) the need to rely on the promise of the company that operates the proxy to protect its customers' identity
D) the inability to consistently ensure online anonymity, especially when government agencies are one of the parties involved
Question
Which of the following is an element of privacy?

A) the right to be left alone
B) the right to view, correct, and edit private, protected information
C) the right to withhold information
D) the right to demand information
Question
________ consists of intangible assets which are expressions of the human mind that give the creator of the property the right to its commercial value.

A) Immovable property
B) Freehold property
C) Intellectual property
D) Public property
Question
Which of the following statements is true of information privacy?

A) It is most easily achieved online and is impossible to maintain on paper.
B) It is governed by laws which are universal in all countries.
C) It refers to the protection of data about individuals.
D) It emphasizes the importance of sharing data over protecting personally identifiable information.
Question
________ refers to technologies that intellectual property owners use to control access to their electronic content.

A) Online identity management
B) Digital rights management
C) Internet resource management
D) Total quality management
Question
Halcyon, an e-publisher, has recently decided to use an information system that administers the way its customers access its online publications. The system assigns each of the customers with a unique ID, maintains records of the books purchased by them, encrypts electronic documents for transmission, and includes options to order hard copies of the electronic documents they read online. Which of the following refers to the set of technologies used in this case?

A) online identity management
B) digital rights management
C) Internet resource management
D) inventory management
Question
Enforcing intellectual property laws becomes difficult when ________.

A) the intellectual property is used for commercial purposes
B) the protection of intellectual property involves immovable assets
C) the intellectual property is digitized
D) the intellectual property comprises of tangible assets
Question
Which of the following is a drawback of digital rights management encountered by users today?

A) DRM systems prevent legitimate duplication of digital content in the event of hardware failure.
B) DRM systems do not function efficiently across geographical borders.
C) DRM systems often violate intellectual property rights of creators of IP.
D) DRM systems do not consistently manage the different formats of digital content.
Question
A(n) ________ is an intermediary server that receives and analyzes requests from clients and then directs them to their destinations.

A) captive portal
B) proxy
C) firewall
D) keylogger
Question
A drawback of online anonymity is that it ________.

A) protects whistleblowers and oppressive governments
B) increases inhibitions in online communication
C) increases accountability in users
D) protects spammers and imposters
Question
Which of the following is an advantage of online anonymity?

A) It removes the fear of accountability that makes people feel responsible for their own actions.
B) It helps in the prosecution of spammers, astroturfers, and other cyber criminals.
C) It helps people participate in face-to-face meetings where they reveal personal details without fear of disclosure.
D) It protects corporate whistleblowers and political activists in oppressive regimes.
Question
Under which of the following circumstances is information privacy most difficult to achieve?

A) when information is stored on highly interconnected systems
B) when information is mainly on paper
C) when information maintained is maintained on isolated systems
D) when information is converted to code form using mathematical equations
Question
Margaret O'Connor is an upcoming poet from Georgia who recently updated her blog with her piece of writing titled, "Shadows." One of her readers copied her piece onto his own blog and passed it off as his original work. This is an example of ________.

A) online identity theft
B) private action
C) shadowing
D) plagiarism
Question
________ is a widely accepted ethical system that considers the greatest good for the greatest number and weighs consequences of an action, weighing its good effects against its harmful ones.

A) Structuralism
B) Individualism
C) Utilitarianism
D) Libertarianism
Question
________ refers to a system of moral principles that human beings use to judge right and wrong and to develop rules of conduct.

A) Religion
B) Ethics
C) Creativity
D) Theology
Question
Which of the following statements is true of natural laws and rights?

A) Natural laws and rights do not consider the actual consequences of an action when judging its morality.
B) Natural laws and rights is an ethical framework that takes into account the effects of an action, weighing its good effects against its harmful ones.
C) Natural laws and rights involves judging what action would create the greatest good for the greatest number of people.
D) Natural laws and rights are based on the central tenet that states, "the needs of the many outweigh the needs of the few."
Question
Which of the following principles is consistent with the utilitarian ethical framework?

A) "First, do no harm"
B) "Thou shalt not kill"
C) "Protect free speech"
D) "Liberté, égalité, fraternité"
Question
Which of the following would be an example of intellectual property owned by an IT firm?

A) software code
B) real estate
C) office stationery
D) legal documents
Question
As technologies develop, digital rights management offers IP holders the benefit of ________.

A) preventing loss of critical organization data
B) collaborating online to create open source products
C) adding visual appeal to their digital products
D) offering technological protection for their products
Question
________ is a type of intellectual property theft that involves reproducing the words of another and passing them off as one's own original work, without crediting the source.

A) Shadowing
B) Plagiarism
C) Private action
D) Embezzlement
Question
For which of the following reasons do employers adopt surveillance technologies to track online communications?

A) to increase employee productivity
B) to enable efficient data mining
C) to prevent data redundancy
D) to facilitate faster communication
Question
The term ________ refers to a collection of computers that have been compromised by malware, often through some vulnerability in their software or operating system.

A) honeypot
B) botnet
C) Trojan horse
D) black swan
Question
The term ________ refers to configured computers with specific vulnerabilities so they can attract different varieties of malware in the wild, study their properties, and find out who started them.

A) expert system
B) web crawler
C) honeypot
D) server farm
Question
Lora Jones is a security expert hired by a Manhattan-based law firm to perform a formal risk assessment of the firm's data assets. Which of the following steps should she undertake first in order to assess the firm's readiness to face any potential security breaches?

A) understanding which information assets need protection
B) evaluating controls and filling in security gaps
C) predicting future risks and devising strategies to prevent them
D) recovering existing systems from damage
Question
Evelyn Birch is a freelance content writer whose desktop computer has been infected with a software program that installed itself without her knowledge. The program monitors the websites she visits, her e-mail communications, etc. Data gathered from the monitoring activity is sent to a remotely placed hacker. Which of the following software programs is most likely to have infected Evelyn's computer?

A) spyware
B) web crawler
C) black swan
D) firewall
Question
For which of the following purposes are botnets most likely to be used?

A) capturing Internet users' sensitive information
B) attracting different types of malware to track their origins
C) encrypting critical information to protect from loss or corruption
D) track and eliminate computer worms and viruses
Question
Which of the following is a negative impact of surveillance in online communications?

A) lowered productivity of employees
B) compromised company security
C) increased levels of confidentiality
D) increased pressure on corporate e-mail systems
Question
Botnets function with the use of ________.

A) malware
B) middleware
C) application software
D) firmware
Question
The term ________ refers to a seemingly harmless or useful program that installs malicious code allowing remote access to the computer, as for a botnet.

A) honeypot
B) Trojan horse
C) firewall
D) black swan
Question
Z Category is a security firm based in Oakland, California. The firm provides security detail for major Hollywood events and also personal security services to some celebrities. Jackson Keynes is a systems administrator for the firm. He comes across a USB drive lying abandoned in the reception area at the company office and decides to check its contents. Unknown to him, a spyware program downloads itself onto Jackson's computer and infiltrates the central server system through the network. Which of the following is the most likely outcome in this case?

A) The program encodes all the information on the company's servers and other systems and renders it unreadable and useless.
B) A tabloid reporter who had planted the USB drive accesses scandalous information about celebrities and publishes stories about them.
C) The company's servers and individual computer systems are controlled by remotely located bots and are used to perform distributed denial of service attacks.
D) The spyware program replicates rapidly across the company network, clogs up the network speeds, and slows down the performance of the computers.
Question
Which of the following is an accurate definition of malware?

A) software for end-user applications such as word processors and ERP software
B) software for testing a hardware or software package
C) software used to track and prevent malicious attacks on systems
D) software designed to attack computer systems
Question
________ are used to monitor e-mail, web surfing, and other online communications in organizations.

A) Proxy servers
B) Surveillance technologies
C) Trojan horses
D) Subnetworks
Question
Which of the following is an accurate definition of keylogger?

A) a process which helps a user increase productivity by tracking the keys entered by him
B) a monitoring software that records a user's keystrokes
C) a software that prevents fraudsters from hacking into e-mail accounts
D) a program that controls permissions for web traffic into and out of a computer network
Question
________ refers to an attack in which computers in a botnet are directed to flood a single website server with rapid-fire page requests, causing it to slow down or crash.

A) Distributed denial of service
B) Social engineering
C) Keylogging
D) Phishing
Question
When does a computer become a "zombie"?

A) when it becomes immune to botnets
B) when it enters a secure site
C) when it is infected by malware
D) when it is hidden behind a firewall
Question
Janet Shulz received an e-mail that contained a link to a website that imitated the authentic website of her bank. The e-mail requested her to key in her credit card number, her Social Security Number, and her date of birth. She later found that her credit card was fraudulently charged for transactions she never made. It is inferred from this case that Janet is a victim of ________.

A) distributed denial of service
B) keylogging
C) phishing
D) cache poisoning
Question
Which of the following statements is true of honeypots?

A) They deny the entry or exit of specific IP addresses, products, Internet domains, and enforce other communication restrictions.
B) They are highly restrictive programs that permit communication only with approved entities and/or in an approved manner.
C) They traverse available web links in an attempt to discover documents for indexing and retrieval.
D) They have specific vulnerabilities that attract different varieties of malware in the wild, study their properties, and find out who started them.
Question
In Internet terminology, a worm refers to a(n)________.

A) e-mail program created not for communication, but to lure spam
B) software program that attracts malicious attacks in order to study their properties and origins
C) self-replicating program that sends copies to other nodes on a computer network
D) software tool used to inspect incoming and outgoing traffic to a computer network
Question
Which of the following is an accurate definition of a computer virus?

A) It is a software program that can damage files or other programs.
B) It is a software program that attracts potentially malicious attacks to study their origin.
C) It is a software program that masks the browsing history and preferences of Internet users.
D) It is a software program that inspects incoming or outgoing traffic to a computer network.
Question
What is the first step involved in risk management?

A) determining the cause of damage
B) evaluating controls and filling in security gaps
C) understanding what information assets need protection
D) recovering the system from damage
Question
Which of the following technologies is most likely to be used by organizations as authentication strategies?

A) intelligent character recognition
B) optical mark recognition
C) voice pattern recognition
D) blood group recognition
Question
What is the step involved in risk management after vulnerabilities of the organizations have been examined?

A) determination of the source of threats
B) assessment of threats
C) evaluation of controls that fill in security gaps
D) finalization of broadly defined goals
Question
An incidence response plan is created for the purpose of ________.

A) managing discussion forums efficiently
B) responding to customers' feedback
C) avoiding chaos and missteps
D) improvising communication modes
Question
Organizations use a(n) ________ to categorize a security threat, determine the cause, preserve any evidence, and get systems back online so that the organization can resume business.

A) risk matrix
B) incidence response plan
C) vulnerability assessment scheme
D) total quality management program
Question
________ refers to an attempt to steal passwords or other sensitive information by persuading the victim to enter the information into a fraudulent website that masquerades as the authentic version.

A) Whitelisting
B) Keylogging
C) Egress filtering
D) Phishing
Question
Which of the following administrative security controls is most likely to be adopted by a company which handles high-level sensitive information?

A) prohibiting downloading data to USB drives
B) restricting employee access to official mails
C) prohibiting public access to the company's website
D) prohibiting entry of employees in shared workspaces
Question
The term ________ refers to software that monitors a user's activity on the computer and on the Internet, often installed without the user's knowledge.

A) honeypot
B) browser
C) black swan
D) spyware
Question
Henley and Sons, a retail bank in England, recently had sensitive personal information belonging to their customers stolen by a group of fraudsters who simply walked into the bank's accounts section, copied the information onto pen drives, and left. Which of the following authentication strategies, if used by Henley and Sons, is most likely to have facilitated the security breach?

A) user knowledge
B) voice pattern recognition
C) iris configuration
D) fingerprint recognition
Question
________ is one way of recovering systems in an incidence response plan.

A) Prosecuting the offender for security risk
B) Reevaluating the risk matrix
C) Restricting system access
D) Restoring from media known to be good
Question
According to the incidence response plan, which of the following actions best contains any damage caused by a security threat?

A) preserve evidence of damage done
B) reevaluate risk matrix
C) restrict systems access
D) investigate system logs for evidence
Question
Which among the following authentication strategies is the easiest to compromise or crack?

A) iris configuration
B) reliance on user knowledge
C) fingerprint analysis
D) voice pattern recognition
Question
A(n) ________ is a self-replicating program that sends copies to other nodes on a computer network and may contain malicious code intended to cause damage.

A) honeypot
B) worm
C) Trojan horse
D) cookie
Question
Which among the following authentication strategies is the most difficult to forge, crack, or copy and is hence used for physical security?

A) passwords
B) RFID chips
C) biometric identifier
D) credit cards
Question
A(n) ________ lists out and estimates the vulnerabilities of an organization.

A) risk matrix
B) incidence response plan
C) public key encryption scheme
D) social engineering plan
Question
Which of the following technologies serves as a biometric identifier for physical security?

A) iris configuration
B) RFID chip
C) credit card
D) user ID-password combination
Question
Which of the following is true of phishing?

A) It is a process of stealing personal data from a victim by convincing him to disclose information.
B) It is useful in monitoring the web traffic into and out of an unsecured computer network.
C) It involves the use of several thousand computers to launch malicious attacks that can cripple websites.
D) It uses small pieces of code inserted into a browser that track an Internet user's activity and transmit the data to third parties.
Question
Which of the following is an accurate definition of multifactor authentication?

A) a process of assessing authentication of reports and manuals to prevent duplication
B) a process of combining two or more authentication strategies
C) a process of assessing authentication of multiple groups using a single strategy
D) a process of assigning unique authentication information to copyrighted content to prevent resale
Question
One way to identify a threat in an incident response plan is to ________.

A) prosecute the offender for security risk
B) improve systems efficiency
C) communicate with crisis management team
D) preserve evidence of security breach
Question
________ helps in determining the cause in an incidence response plan.

A) Reevaluating the risk matrix
B) Investigating system logs
C) Taking systems offline
D) Restricting system access
Question
Which of the following methods is often used for phishing purposes?

A) posting harmless videos on websites
B) monitoring a user's keystrokes
C) soliciting personal information through e-mail
D) infecting computers with self-replicating programs that slow down the system
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/120
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 10: Ethics, Privacy, and Security
1
Using fake names, nicknames, free e-mail, and public computers ensures that one is perfectly anonymous on the Internet.
False
2
All ethical actions are legal, but not all legal actions are ethical.
False
3
Trade secrets, software, patents, and copyrighted works comprise intellectual property.
True
4
Plagiarism refers to borrowing words of another and crediting the source.
Unlock Deck
Unlock for access to all 120 flashcards in this deck.
Unlock Deck
k this deck
5
The downside of using surveillance techniques at work is that it pits management against staff, and undermines the bond of loyalty that might otherwise develop.
Unlock Deck
Unlock for access to all 120 flashcards in this deck.
Unlock Deck
k this deck
6
Botnets are computers configured with specific vulnerabilities so they can attract different varieties
of malware in the wild, study their properties, and eradicate them.
Unlock Deck
Unlock for access to all 120 flashcards in this deck.
Unlock Deck
k this deck
7
Which of the following principles is consistent with the natural laws and rights ethical framework?

A) "First, do no harm"
B) "Thou shalt not kill"
C) "The greatest good for the greatest number"
D) "The needs of the many outweigh the needs of the few"
Unlock Deck
Unlock for access to all 120 flashcards in this deck.
Unlock Deck
k this deck
8
Honeypots are human-made threats that barrage servers and computers every day with automated attempts to install all types of malware.
Unlock Deck
Unlock for access to all 120 flashcards in this deck.
Unlock Deck
k this deck
9
The single sign-on is a gateway service that permits users to log in once with a single user ID and password to gain access to multiple software applications.
Unlock Deck
Unlock for access to all 120 flashcards in this deck.
Unlock Deck
k this deck
10
Phishing attacks tend to start with an e-mail luring users to click on a link.
Unlock Deck
Unlock for access to all 120 flashcards in this deck.
Unlock Deck
k this deck
11
A drawback of using proxy servers for online anonymity is the need to rely on the company that operates the proxy servers and its promise to protect its customers' identities.
Unlock Deck
Unlock for access to all 120 flashcards in this deck.
Unlock Deck
k this deck
12
Liability is a powerful driver for surveillance as employers are held responsible for employees' offensive e-mails or web-surfing habits.
Unlock Deck
Unlock for access to all 120 flashcards in this deck.
Unlock Deck
k this deck
13
When a person tries to judge what action would create the greatest good for the greatest number, he or she is using a utilitarian scheme.
Unlock Deck
Unlock for access to all 120 flashcards in this deck.
Unlock Deck
k this deck
14
________ is an ethical framework that judges the morality of an action based on how well it adheres to broadly accepted rules, regardless of the action's actual consequences.

A) Utilitarianism
B) Legal positivism
C) Natural laws and rights
D) Rationalism
Unlock Deck
Unlock for access to all 120 flashcards in this deck.
Unlock Deck
k this deck
15
A cognitive obstacle for strong passwords is the capacity of human memory.
Unlock Deck
Unlock for access to all 120 flashcards in this deck.
Unlock Deck
k this deck
16
Social engineering refers to extracting confidential information from information systems through legal procedures.
Unlock Deck
Unlock for access to all 120 flashcards in this deck.
Unlock Deck
k this deck
17
Digitization of intellectual property results in better enforcement of IP laws.
Unlock Deck
Unlock for access to all 120 flashcards in this deck.
Unlock Deck
k this deck
18
Biometric identifiers refer to something the user knows, such as a user ID, password, PIN, or answer to a security question.
Unlock Deck
Unlock for access to all 120 flashcards in this deck.
Unlock Deck
k this deck
19
The incidence response plan is used by organizational staff to categorize threats, determine the cause, preserve evidence, and get the systems back online.
Unlock Deck
Unlock for access to all 120 flashcards in this deck.
Unlock Deck
k this deck
20
A computer which is infected with malware and adds to a group's growing botnet is known as a "zombie."
Unlock Deck
Unlock for access to all 120 flashcards in this deck.
Unlock Deck
k this deck
21
Which of the following is a drawback of using a proxy server to ensure online anonymity?

A) the parasitic and unauthorized use of hundreds of computer systems owned by individuals for masking online identity
B) the lack of uniform and binding legislation across different countries, defining the legality of using proxy servers
C) the need to rely on the promise of the company that operates the proxy to protect its customers' identity
D) the inability to consistently ensure online anonymity, especially when government agencies are one of the parties involved
Unlock Deck
Unlock for access to all 120 flashcards in this deck.
Unlock Deck
k this deck
22
Which of the following is an element of privacy?

A) the right to be left alone
B) the right to view, correct, and edit private, protected information
C) the right to withhold information
D) the right to demand information
Unlock Deck
Unlock for access to all 120 flashcards in this deck.
Unlock Deck
k this deck
23
________ consists of intangible assets which are expressions of the human mind that give the creator of the property the right to its commercial value.

A) Immovable property
B) Freehold property
C) Intellectual property
D) Public property
Unlock Deck
Unlock for access to all 120 flashcards in this deck.
Unlock Deck
k this deck
24
Which of the following statements is true of information privacy?

A) It is most easily achieved online and is impossible to maintain on paper.
B) It is governed by laws which are universal in all countries.
C) It refers to the protection of data about individuals.
D) It emphasizes the importance of sharing data over protecting personally identifiable information.
Unlock Deck
Unlock for access to all 120 flashcards in this deck.
Unlock Deck
k this deck
25
________ refers to technologies that intellectual property owners use to control access to their electronic content.

A) Online identity management
B) Digital rights management
C) Internet resource management
D) Total quality management
Unlock Deck
Unlock for access to all 120 flashcards in this deck.
Unlock Deck
k this deck
26
Halcyon, an e-publisher, has recently decided to use an information system that administers the way its customers access its online publications. The system assigns each of the customers with a unique ID, maintains records of the books purchased by them, encrypts electronic documents for transmission, and includes options to order hard copies of the electronic documents they read online. Which of the following refers to the set of technologies used in this case?

A) online identity management
B) digital rights management
C) Internet resource management
D) inventory management
Unlock Deck
Unlock for access to all 120 flashcards in this deck.
Unlock Deck
k this deck
27
Enforcing intellectual property laws becomes difficult when ________.

A) the intellectual property is used for commercial purposes
B) the protection of intellectual property involves immovable assets
C) the intellectual property is digitized
D) the intellectual property comprises of tangible assets
Unlock Deck
Unlock for access to all 120 flashcards in this deck.
Unlock Deck
k this deck
28
Which of the following is a drawback of digital rights management encountered by users today?

A) DRM systems prevent legitimate duplication of digital content in the event of hardware failure.
B) DRM systems do not function efficiently across geographical borders.
C) DRM systems often violate intellectual property rights of creators of IP.
D) DRM systems do not consistently manage the different formats of digital content.
Unlock Deck
Unlock for access to all 120 flashcards in this deck.
Unlock Deck
k this deck
29
A(n) ________ is an intermediary server that receives and analyzes requests from clients and then directs them to their destinations.

A) captive portal
B) proxy
C) firewall
D) keylogger
Unlock Deck
Unlock for access to all 120 flashcards in this deck.
Unlock Deck
k this deck
30
A drawback of online anonymity is that it ________.

A) protects whistleblowers and oppressive governments
B) increases inhibitions in online communication
C) increases accountability in users
D) protects spammers and imposters
Unlock Deck
Unlock for access to all 120 flashcards in this deck.
Unlock Deck
k this deck
31
Which of the following is an advantage of online anonymity?

A) It removes the fear of accountability that makes people feel responsible for their own actions.
B) It helps in the prosecution of spammers, astroturfers, and other cyber criminals.
C) It helps people participate in face-to-face meetings where they reveal personal details without fear of disclosure.
D) It protects corporate whistleblowers and political activists in oppressive regimes.
Unlock Deck
Unlock for access to all 120 flashcards in this deck.
Unlock Deck
k this deck
32
Under which of the following circumstances is information privacy most difficult to achieve?

A) when information is stored on highly interconnected systems
B) when information is mainly on paper
C) when information maintained is maintained on isolated systems
D) when information is converted to code form using mathematical equations
Unlock Deck
Unlock for access to all 120 flashcards in this deck.
Unlock Deck
k this deck
33
Margaret O'Connor is an upcoming poet from Georgia who recently updated her blog with her piece of writing titled, "Shadows." One of her readers copied her piece onto his own blog and passed it off as his original work. This is an example of ________.

A) online identity theft
B) private action
C) shadowing
D) plagiarism
Unlock Deck
Unlock for access to all 120 flashcards in this deck.
Unlock Deck
k this deck
34
________ is a widely accepted ethical system that considers the greatest good for the greatest number and weighs consequences of an action, weighing its good effects against its harmful ones.

A) Structuralism
B) Individualism
C) Utilitarianism
D) Libertarianism
Unlock Deck
Unlock for access to all 120 flashcards in this deck.
Unlock Deck
k this deck
35
________ refers to a system of moral principles that human beings use to judge right and wrong and to develop rules of conduct.

A) Religion
B) Ethics
C) Creativity
D) Theology
Unlock Deck
Unlock for access to all 120 flashcards in this deck.
Unlock Deck
k this deck
36
Which of the following statements is true of natural laws and rights?

A) Natural laws and rights do not consider the actual consequences of an action when judging its morality.
B) Natural laws and rights is an ethical framework that takes into account the effects of an action, weighing its good effects against its harmful ones.
C) Natural laws and rights involves judging what action would create the greatest good for the greatest number of people.
D) Natural laws and rights are based on the central tenet that states, "the needs of the many outweigh the needs of the few."
Unlock Deck
Unlock for access to all 120 flashcards in this deck.
Unlock Deck
k this deck
37
Which of the following principles is consistent with the utilitarian ethical framework?

A) "First, do no harm"
B) "Thou shalt not kill"
C) "Protect free speech"
D) "Liberté, égalité, fraternité"
Unlock Deck
Unlock for access to all 120 flashcards in this deck.
Unlock Deck
k this deck
38
Which of the following would be an example of intellectual property owned by an IT firm?

A) software code
B) real estate
C) office stationery
D) legal documents
Unlock Deck
Unlock for access to all 120 flashcards in this deck.
Unlock Deck
k this deck
39
As technologies develop, digital rights management offers IP holders the benefit of ________.

A) preventing loss of critical organization data
B) collaborating online to create open source products
C) adding visual appeal to their digital products
D) offering technological protection for their products
Unlock Deck
Unlock for access to all 120 flashcards in this deck.
Unlock Deck
k this deck
40
________ is a type of intellectual property theft that involves reproducing the words of another and passing them off as one's own original work, without crediting the source.

A) Shadowing
B) Plagiarism
C) Private action
D) Embezzlement
Unlock Deck
Unlock for access to all 120 flashcards in this deck.
Unlock Deck
k this deck
41
For which of the following reasons do employers adopt surveillance technologies to track online communications?

A) to increase employee productivity
B) to enable efficient data mining
C) to prevent data redundancy
D) to facilitate faster communication
Unlock Deck
Unlock for access to all 120 flashcards in this deck.
Unlock Deck
k this deck
42
The term ________ refers to a collection of computers that have been compromised by malware, often through some vulnerability in their software or operating system.

A) honeypot
B) botnet
C) Trojan horse
D) black swan
Unlock Deck
Unlock for access to all 120 flashcards in this deck.
Unlock Deck
k this deck
43
The term ________ refers to configured computers with specific vulnerabilities so they can attract different varieties of malware in the wild, study their properties, and find out who started them.

A) expert system
B) web crawler
C) honeypot
D) server farm
Unlock Deck
Unlock for access to all 120 flashcards in this deck.
Unlock Deck
k this deck
44
Lora Jones is a security expert hired by a Manhattan-based law firm to perform a formal risk assessment of the firm's data assets. Which of the following steps should she undertake first in order to assess the firm's readiness to face any potential security breaches?

A) understanding which information assets need protection
B) evaluating controls and filling in security gaps
C) predicting future risks and devising strategies to prevent them
D) recovering existing systems from damage
Unlock Deck
Unlock for access to all 120 flashcards in this deck.
Unlock Deck
k this deck
45
Evelyn Birch is a freelance content writer whose desktop computer has been infected with a software program that installed itself without her knowledge. The program monitors the websites she visits, her e-mail communications, etc. Data gathered from the monitoring activity is sent to a remotely placed hacker. Which of the following software programs is most likely to have infected Evelyn's computer?

A) spyware
B) web crawler
C) black swan
D) firewall
Unlock Deck
Unlock for access to all 120 flashcards in this deck.
Unlock Deck
k this deck
46
For which of the following purposes are botnets most likely to be used?

A) capturing Internet users' sensitive information
B) attracting different types of malware to track their origins
C) encrypting critical information to protect from loss or corruption
D) track and eliminate computer worms and viruses
Unlock Deck
Unlock for access to all 120 flashcards in this deck.
Unlock Deck
k this deck
47
Which of the following is a negative impact of surveillance in online communications?

A) lowered productivity of employees
B) compromised company security
C) increased levels of confidentiality
D) increased pressure on corporate e-mail systems
Unlock Deck
Unlock for access to all 120 flashcards in this deck.
Unlock Deck
k this deck
48
Botnets function with the use of ________.

A) malware
B) middleware
C) application software
D) firmware
Unlock Deck
Unlock for access to all 120 flashcards in this deck.
Unlock Deck
k this deck
49
The term ________ refers to a seemingly harmless or useful program that installs malicious code allowing remote access to the computer, as for a botnet.

A) honeypot
B) Trojan horse
C) firewall
D) black swan
Unlock Deck
Unlock for access to all 120 flashcards in this deck.
Unlock Deck
k this deck
50
Z Category is a security firm based in Oakland, California. The firm provides security detail for major Hollywood events and also personal security services to some celebrities. Jackson Keynes is a systems administrator for the firm. He comes across a USB drive lying abandoned in the reception area at the company office and decides to check its contents. Unknown to him, a spyware program downloads itself onto Jackson's computer and infiltrates the central server system through the network. Which of the following is the most likely outcome in this case?

A) The program encodes all the information on the company's servers and other systems and renders it unreadable and useless.
B) A tabloid reporter who had planted the USB drive accesses scandalous information about celebrities and publishes stories about them.
C) The company's servers and individual computer systems are controlled by remotely located bots and are used to perform distributed denial of service attacks.
D) The spyware program replicates rapidly across the company network, clogs up the network speeds, and slows down the performance of the computers.
Unlock Deck
Unlock for access to all 120 flashcards in this deck.
Unlock Deck
k this deck
51
Which of the following is an accurate definition of malware?

A) software for end-user applications such as word processors and ERP software
B) software for testing a hardware or software package
C) software used to track and prevent malicious attacks on systems
D) software designed to attack computer systems
Unlock Deck
Unlock for access to all 120 flashcards in this deck.
Unlock Deck
k this deck
52
________ are used to monitor e-mail, web surfing, and other online communications in organizations.

A) Proxy servers
B) Surveillance technologies
C) Trojan horses
D) Subnetworks
Unlock Deck
Unlock for access to all 120 flashcards in this deck.
Unlock Deck
k this deck
53
Which of the following is an accurate definition of keylogger?

A) a process which helps a user increase productivity by tracking the keys entered by him
B) a monitoring software that records a user's keystrokes
C) a software that prevents fraudsters from hacking into e-mail accounts
D) a program that controls permissions for web traffic into and out of a computer network
Unlock Deck
Unlock for access to all 120 flashcards in this deck.
Unlock Deck
k this deck
54
________ refers to an attack in which computers in a botnet are directed to flood a single website server with rapid-fire page requests, causing it to slow down or crash.

A) Distributed denial of service
B) Social engineering
C) Keylogging
D) Phishing
Unlock Deck
Unlock for access to all 120 flashcards in this deck.
Unlock Deck
k this deck
55
When does a computer become a "zombie"?

A) when it becomes immune to botnets
B) when it enters a secure site
C) when it is infected by malware
D) when it is hidden behind a firewall
Unlock Deck
Unlock for access to all 120 flashcards in this deck.
Unlock Deck
k this deck
56
Janet Shulz received an e-mail that contained a link to a website that imitated the authentic website of her bank. The e-mail requested her to key in her credit card number, her Social Security Number, and her date of birth. She later found that her credit card was fraudulently charged for transactions she never made. It is inferred from this case that Janet is a victim of ________.

A) distributed denial of service
B) keylogging
C) phishing
D) cache poisoning
Unlock Deck
Unlock for access to all 120 flashcards in this deck.
Unlock Deck
k this deck
57
Which of the following statements is true of honeypots?

A) They deny the entry or exit of specific IP addresses, products, Internet domains, and enforce other communication restrictions.
B) They are highly restrictive programs that permit communication only with approved entities and/or in an approved manner.
C) They traverse available web links in an attempt to discover documents for indexing and retrieval.
D) They have specific vulnerabilities that attract different varieties of malware in the wild, study their properties, and find out who started them.
Unlock Deck
Unlock for access to all 120 flashcards in this deck.
Unlock Deck
k this deck
58
In Internet terminology, a worm refers to a(n)________.

A) e-mail program created not for communication, but to lure spam
B) software program that attracts malicious attacks in order to study their properties and origins
C) self-replicating program that sends copies to other nodes on a computer network
D) software tool used to inspect incoming and outgoing traffic to a computer network
Unlock Deck
Unlock for access to all 120 flashcards in this deck.
Unlock Deck
k this deck
59
Which of the following is an accurate definition of a computer virus?

A) It is a software program that can damage files or other programs.
B) It is a software program that attracts potentially malicious attacks to study their origin.
C) It is a software program that masks the browsing history and preferences of Internet users.
D) It is a software program that inspects incoming or outgoing traffic to a computer network.
Unlock Deck
Unlock for access to all 120 flashcards in this deck.
Unlock Deck
k this deck
60
What is the first step involved in risk management?

A) determining the cause of damage
B) evaluating controls and filling in security gaps
C) understanding what information assets need protection
D) recovering the system from damage
Unlock Deck
Unlock for access to all 120 flashcards in this deck.
Unlock Deck
k this deck
61
Which of the following technologies is most likely to be used by organizations as authentication strategies?

A) intelligent character recognition
B) optical mark recognition
C) voice pattern recognition
D) blood group recognition
Unlock Deck
Unlock for access to all 120 flashcards in this deck.
Unlock Deck
k this deck
62
What is the step involved in risk management after vulnerabilities of the organizations have been examined?

A) determination of the source of threats
B) assessment of threats
C) evaluation of controls that fill in security gaps
D) finalization of broadly defined goals
Unlock Deck
Unlock for access to all 120 flashcards in this deck.
Unlock Deck
k this deck
63
An incidence response plan is created for the purpose of ________.

A) managing discussion forums efficiently
B) responding to customers' feedback
C) avoiding chaos and missteps
D) improvising communication modes
Unlock Deck
Unlock for access to all 120 flashcards in this deck.
Unlock Deck
k this deck
64
Organizations use a(n) ________ to categorize a security threat, determine the cause, preserve any evidence, and get systems back online so that the organization can resume business.

A) risk matrix
B) incidence response plan
C) vulnerability assessment scheme
D) total quality management program
Unlock Deck
Unlock for access to all 120 flashcards in this deck.
Unlock Deck
k this deck
65
________ refers to an attempt to steal passwords or other sensitive information by persuading the victim to enter the information into a fraudulent website that masquerades as the authentic version.

A) Whitelisting
B) Keylogging
C) Egress filtering
D) Phishing
Unlock Deck
Unlock for access to all 120 flashcards in this deck.
Unlock Deck
k this deck
66
Which of the following administrative security controls is most likely to be adopted by a company which handles high-level sensitive information?

A) prohibiting downloading data to USB drives
B) restricting employee access to official mails
C) prohibiting public access to the company's website
D) prohibiting entry of employees in shared workspaces
Unlock Deck
Unlock for access to all 120 flashcards in this deck.
Unlock Deck
k this deck
67
The term ________ refers to software that monitors a user's activity on the computer and on the Internet, often installed without the user's knowledge.

A) honeypot
B) browser
C) black swan
D) spyware
Unlock Deck
Unlock for access to all 120 flashcards in this deck.
Unlock Deck
k this deck
68
Henley and Sons, a retail bank in England, recently had sensitive personal information belonging to their customers stolen by a group of fraudsters who simply walked into the bank's accounts section, copied the information onto pen drives, and left. Which of the following authentication strategies, if used by Henley and Sons, is most likely to have facilitated the security breach?

A) user knowledge
B) voice pattern recognition
C) iris configuration
D) fingerprint recognition
Unlock Deck
Unlock for access to all 120 flashcards in this deck.
Unlock Deck
k this deck
69
________ is one way of recovering systems in an incidence response plan.

A) Prosecuting the offender for security risk
B) Reevaluating the risk matrix
C) Restricting system access
D) Restoring from media known to be good
Unlock Deck
Unlock for access to all 120 flashcards in this deck.
Unlock Deck
k this deck
70
According to the incidence response plan, which of the following actions best contains any damage caused by a security threat?

A) preserve evidence of damage done
B) reevaluate risk matrix
C) restrict systems access
D) investigate system logs for evidence
Unlock Deck
Unlock for access to all 120 flashcards in this deck.
Unlock Deck
k this deck
71
Which among the following authentication strategies is the easiest to compromise or crack?

A) iris configuration
B) reliance on user knowledge
C) fingerprint analysis
D) voice pattern recognition
Unlock Deck
Unlock for access to all 120 flashcards in this deck.
Unlock Deck
k this deck
72
A(n) ________ is a self-replicating program that sends copies to other nodes on a computer network and may contain malicious code intended to cause damage.

A) honeypot
B) worm
C) Trojan horse
D) cookie
Unlock Deck
Unlock for access to all 120 flashcards in this deck.
Unlock Deck
k this deck
73
Which among the following authentication strategies is the most difficult to forge, crack, or copy and is hence used for physical security?

A) passwords
B) RFID chips
C) biometric identifier
D) credit cards
Unlock Deck
Unlock for access to all 120 flashcards in this deck.
Unlock Deck
k this deck
74
A(n) ________ lists out and estimates the vulnerabilities of an organization.

A) risk matrix
B) incidence response plan
C) public key encryption scheme
D) social engineering plan
Unlock Deck
Unlock for access to all 120 flashcards in this deck.
Unlock Deck
k this deck
75
Which of the following technologies serves as a biometric identifier for physical security?

A) iris configuration
B) RFID chip
C) credit card
D) user ID-password combination
Unlock Deck
Unlock for access to all 120 flashcards in this deck.
Unlock Deck
k this deck
76
Which of the following is true of phishing?

A) It is a process of stealing personal data from a victim by convincing him to disclose information.
B) It is useful in monitoring the web traffic into and out of an unsecured computer network.
C) It involves the use of several thousand computers to launch malicious attacks that can cripple websites.
D) It uses small pieces of code inserted into a browser that track an Internet user's activity and transmit the data to third parties.
Unlock Deck
Unlock for access to all 120 flashcards in this deck.
Unlock Deck
k this deck
77
Which of the following is an accurate definition of multifactor authentication?

A) a process of assessing authentication of reports and manuals to prevent duplication
B) a process of combining two or more authentication strategies
C) a process of assessing authentication of multiple groups using a single strategy
D) a process of assigning unique authentication information to copyrighted content to prevent resale
Unlock Deck
Unlock for access to all 120 flashcards in this deck.
Unlock Deck
k this deck
78
One way to identify a threat in an incident response plan is to ________.

A) prosecute the offender for security risk
B) improve systems efficiency
C) communicate with crisis management team
D) preserve evidence of security breach
Unlock Deck
Unlock for access to all 120 flashcards in this deck.
Unlock Deck
k this deck
79
________ helps in determining the cause in an incidence response plan.

A) Reevaluating the risk matrix
B) Investigating system logs
C) Taking systems offline
D) Restricting system access
Unlock Deck
Unlock for access to all 120 flashcards in this deck.
Unlock Deck
k this deck
80
Which of the following methods is often used for phishing purposes?

A) posting harmless videos on websites
B) monitoring a user's keystrokes
C) soliciting personal information through e-mail
D) infecting computers with self-replicating programs that slow down the system
Unlock Deck
Unlock for access to all 120 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 120 flashcards in this deck.