Deck 8: Protecting People and Information: Threats and Safeguards

Full screen (f)
exit full mode
Question
An assessment of what is right or wrong can be made by considering _____ which focuses on the number of people that will be affected by one's action.

A)society's opinion
B)the consequences
C)the likelihood of effect
D)the reach of result
Use Space or
up arrow
down arrow
to flip the card.
Question
The management at Belle Cosmetics,a company headquartered in Jakarta,is contemplating whether or not to use palm oil extracts for their hair products.Though the extracts are proven to nourish hair,using palm oil for commercial products is a major cause of deforestation in Indonesia.They feel that using palm oil extracts will make their customers shift their loyalties to other brands.Which of the following considerations is the company taking into account while making their decision?

A)Likelihood of effect
B)Relatedness
C)Society's opinion
D)Time to consequences
Question
_____ refers to the extent to which one identifies with the person or persons who will receive the benefit or suffer the harm associated with a particular decision.

A)Reach of result
B)Tangibility
C)Likelihood of effect
D)Relatedness
Question
David works as process supervisor at an industrial plant.In his company,he is known by all his colleagues and superiors as an honest worker whose decisions are always guided by ethical values.Recently,David came to know that due to the irresponsible disposal of company waste,the local groundwater has been contaminated.Because of this,a large number of people living in close proximity to the plant have been suffering from severe ailments.However,in spite of knowing this,David does not take any action.Which of the following,if true,most likely explains David's decision not to act?

A)David's decision was guided by morality and ethical values.
B)David considered the impact of toxins on the environment while making the decision.
C)David's decision was influenced by the dilemma of losing his job at the plant.
D)David made the decision by considering the well-being of the people living in close proximity to the plant.
Question
Palmer Inc.recently found out that a senior researcher at the company,Jessica Hughes,has been selling the firm's trade secrets to a leading competitor.Though Jessica knew that her actions would result in serious consequences,she went ahead and shared the confidential information with the rival firm.Jessica's behavior relates to which of the following levels of her ethical structure?

A)Innermost
B)External
C)Outermost
D)Middle
Question
Kelly,who works at an advertising firm,regularly receives calls from friends and family during office hours.Though she knows that it is not right on her part to spend a lot of time answering personal calls,she feels that the management will not take any strict action against her because she always meets project deadlines and provides quality work.Which of the following is Kelly considering while making her decision to continue taking calls?

A)Time to consequences
B)Likelihood of effect
C)Relatedness
D)Reach of result
Question
Peter works as a quality inspection officer at a coffee factory.Due to personal obligations,he needs to leave work early one day,because of which certain consignments will be shipped without any quality checks.Peter is now thinking about the actions that the company will take against him if they find out about it.Which of the following is Peter considering before making his decision?

A)Reach of result
B)Relatedness
C)Time to consequences
D)Consequences
Question
Which of the following is true of ethics and ethical people?

A)Ethical people do not face ethical dilemmas since they know the difference between right and wrong.
B)Ethical people's values are free from the influence of their history,culture,and religion.
C)Ethical norms change radically because of society's dynamic nature.
D)Acting ethically means behaving in a principled fashion and treating others with dignity.
Question
Which of the following is part of the outermost level of an individual's ethical structure?

A)Actions that are considered serious ethical violations by both society and oneself.
B)Behavior that causes extreme ethical discomfort to the person.
C)Behavior that calls for stringent measures against the person.
D)Actions that most people would not consider unacceptable or unethical.
Question
The management at Corpus Inc.is weighing the pros and cons of moving their factory from Michigan to Vermont.They know that the move will lower their operating costs,however,they are also aware that several of their factory workers will be left without a job because of their inability to relocate.Which of the following considerations is the company taking into account while making their decision?

A)Time to consequences
B)Reach of result
C)Causes
D)Society's opinion
Question
An assessment of what is right or wrong can be determined by considering ____,which can be understood as the benefit or harm that will come from a particular decision.

A)the consequences
B)society's opinion
C)the time till the consequences take effect
D)the reach of the result
Question
Which of the following is true of an ethical dilemma?

A)It is faced exclusively by unethical,immoral people.
B)It occurs when one's responsibilities seem to lead in opposite directions.
C)It is the choice of whether or not to act ethically.
D)It involves choosing between compatible good outcomes.
Question
_____ can be defined as the principles and standards that guide our behavior toward other people.

A)Ethics
B)Models
C)Eugenics
D)Aesthetics
Question
Among the three levels of an individual's ethical structure,the _____ level involves things that most people would not consider bad,such as taking a couple of paper clips or sending an occasional personal e-mail on company time.

A)innermost
B)outermost
C)second
D)middle
Question
An assessment of what is right or wrong can be determined by considering ____,which refers to the probability that the harm or benefit will occur if one undertakes an action.

A)the likelihood of effect
B)society's opinion
C)the time to consequences
D)relatedness
Question
Which of the following is part of the innermost level of an individual's ethical structure?

A)Ethical violations that one would consider extremely serious.
B)Ethical behavior that a society considers acceptable.
C)Behavior that does not call for action against the person.
D)Actions that seem acceptable to one's values and morals.
Question
Michelle works as an engineer at a software firm and often checks her personal e-mail while at work.Due to the long hours she puts in at the office,she does not have any time to check her e-mail at home and hence,feels that her actions are acceptable.Michelle's behavior relates to which of the following levels of her ethical structure?

A)Innermost
B)Outermost
C)Inside
D)Middle
Question
Which of the following is an example of the unethical use of computers?

A)Employees failing to answer a large number of e-mail messages due to network problems.
B)Employees searching organizational databases for information on celebrities and friends.
C)Employees sending messages without spell checking and proofreading them.
D)Employees updating their passwords at the end of every month.
Question
An assessment of what is right or wrong can be determined by considering the ____,which may be defined as how long it will take for the benefit or harm to take effect.

A)likelihood of effect
B)reach of result
C)time to consequences
D)consequences
Question
Among the three levels of an individual's ethical structure,the _____ level involves ethical violations that one would consider very serious,such as embezzling funds or selling company records to a competitor.

A)innermost
B)outermost
C)external
D)middle
Question
Which of the following is a program that,when installed on a computer,records every mouse click?

A)Honeypot
B)Spear phishing
C)Clickstreaming
D)Key logger
Question
_____ refer(s)to devices on networks that connect computers to each other.

A)Packet sniffers
B)Routers
C)Adware
D)Modems
Question
_____ refers to intangible creative work that is embodied in physical form.

A)Real property
B)Public property
C)Intellectual property
D)Immovable property
Question
The software development team at Magnus Corporation recently created a unique mobile application that helps users locate themselves anywhere on the globe.In addition,the software provides information on traffic jams,fueling stations,restaurants,and hotels.This is an example of ____.

A)public property
B)intellectual property
C)real property
D)personal property
Question
_____ refers to programs that Web sites offer to help people monitor what is happening on a computer.

A)Abandonware
B)Snoopware
C)Freeware
D)Shareware
Question
Alice recently prepared a report on the impact of climate change on developing countries.While writing her report,she referred to several online articles and took excerpts from them.Which of the following should Alice provide in the report to indicate that these excerpts are not her original work?

A)Annotations
B)Citations
C)Watermarks
D)Inscriptions
Question
_____ is the right to be left alone when one wants to be,to have control over one's own personal possessions,and not to be observed without one's consent.

A)Non-disclosure
B)Intellectual property
C)Personalization
D)Privacy
Question
Starlit Corporation recently had an incident where one of their employees sent out confidential information to a competitor.The company has now decided to use a certain software which tracks their employees' online activities based on their mouse clicks.Which of the following is the company most likely planning to use?

A)Spear phishing
B)Spyware
C)Key trapper software
D)Clickstream
Question
Jeanne Sanders,a celebrity chef,recently published a book titled "Easy to Bake Cakes and Pastries." However,in spite of copyrighting her work,James Riley,a critic with News Today,used some excerpts from her book for his news article.Jeanne is upset and consults her lawyer who tells her that,according to law,James has the right to use excerpts from her book and has not violated any laws.This is an example of ____.

A)a Creative Commons license
B)the open-source rule
C)the Fair Use Doctrine
D)the First-Sale doctrine
Question
_____ is the unauthorized use,duplication,distribution,or sale of copyrighted software.

A)Pirated software
B)File sharing
C)Torrent poisoning
D)Phishing
Question
Sarah recently downloaded a few songs by her favorite artist a month before the artist's album was released.After downloading the songs,she distributed them to all her friends.Which of the following is Sarah doing?

A)Spamming
B)Phishing
C)Pirating
D)Spoofing
Question
A _____ refers to the legal protection offered for the expression of an idea,such as a song,video game,and some types of proprietary documents.

A)copyright
B)trademark
C)patent
D)fair use agreement
Question
_____ is a kind of identity theft where the victim knows the person who stole his/her identity.

A)Friendly fraud
B)PayPal
C)Peer-to-peer computing
D)Pretexting
Question
Janice works in the IT department of a multinational bank and is responsible for monitoring information that is being transmitted over a digital network.This helps her ensure that there is no breach in security.Which of the following is Janice most likely using?

A)Spyware
B)Key logger
C)Packet sniffer
D)Rootkit
Question
Katherine Wood,a critically acclaimed feminist poet,recently published her second anthology of poetry.Which of the following will protect her work from being used by other people without her permission?

A)Copyright law
B)Patent law
C)Trademark law
D)Fair use
Question
Ashley recently received an e-mail from a bank asking for her account number and verification of her password.The e-mail contained the bank's logo and was signed by the branch manager.She immediately replied to the e-mail,providing the requested details.However,a few days later,she noticed that her bank statement showed a zero balance.On checking with the bank authorities,she was told that the e-mail was not sent by them.Ashley was most likely a victim of which of the following types of fraud?

A)Brand spoofing
B)Key logging
C)Pirating
D)Pharming
Question
The _____ says that you may use copyrighted material in certain situations,for example,in the creation of new work or,within certain limits,for teaching purposes.

A)Fair Use Doctrine
B)First-Sale Doctrine
C)Orphan work rule
D)Open-source rule
Question
Claytons and Sons,a finance firm in Manhattan,has a large number of employees who handle huge amounts of online transactions everyday.The management feels that it is crucial to monitor their online activities.Which of the following can the company use for this purpose?

A)Snoopware
B)Sneakware
C)Spyware
D)Stealthware
Question
An architectural firm's blueprints,sketches and other proprietary documents are examples of ____.

A)public property
B)intellectual property
C)real property
D)immovable property
Question
_____ is a technique to gain personal information for the purpose of identity theft,usually by means of fraudulent e-mail.

A)Greylisting
B)Phishing
C)Sniffing
D)Wire fraud
Question
_____ refers to software that generates advertisements and installs itself on your computer when you download some other,usually free,program from the Web.

A)Antivirus software
B)Adware
C)Spyware
D)AdSense
Question
A(n)______ is hardware and/or software that protects a computer or a network from intruders.

A)Web log
B)worm
C)firewall
D)public key
Question
The most recent federal bill that addressed electronic monitoring of employees is the ____.

A)Homeland Security Act of 2002
B)Electronic Communications Privacy Act of 1986
C)Sarbanes-Oxley Act of 2002
D)USA Patriot Act of 2003
Question
The _____ sought to regulate interstate commerce by imposing limitations and penalties on businesses sending unsolicited e-mail to consumers.

A)USA Patriot Act
B)Identity Theft and Assumption Deterrence Act
C)Homeland Security Act
D)CAN-Spam Act
Question
Which of the following should a person do to protect their personal information?

A)Avoid using special characters in passwords.
B)Do not provide information to people who contact you by e-mail.
C)Avoid providing answers that are hard to guess as responses to security questions.
D)Do not enter those Web sites where https:// appears in the Web browser.
Question
_____ is the use of phishing targeted at senior business executives,government leaders,and other types of high-profile individuals.

A)Spamming
B)Whaling
C)Vishing
D)Keystroke logging
Question
_____ have philosophical and political reasons for breaking into systems and often deface Web sites as a sign of protest.

A)Zombies
B)White-hat hackers
C)Hacktivists
D)Screenagers
Question
Jennifer recently installed a free media player for downloading music onto her laptop.Without her knowledge,along with the media player,a software was installed on her system which constantly tracked her online activities in addition to the data saved on her laptop.Which of the following was most likely downloaded without Jennifer's knowledge?

A)Adware
B)Spyware
C)Firmware
D)Cookie
Question
The _____ provided new authority to government agencies to mine data on individuals and groups including e-mails and Web site visits,and put limits on the information available under the Freedom of Information Act.

A)CAN-Spam Act
B)Sarbanes-Oxley Act
C)Homeland Security Act
D)USA Patriot Act
Question
_____ refers to unsolicited e-mail (electronic junk mail)from businesses that advertise goods and services.

A)Adware
B)Spyware
C)Pharming
D)Spam
Question
A _____ is a small file that contains information about a person and his/her Web activities,which a Web site one visits places on their computer.

A)cookie
B)bot
C)cache
D)key logger
Question
A _____ consists of one line of information for every visitor to a Web site and is usually stored on a Web server.

A)Web log
B)firewall
C)cookie
D)copyright
Question
The _____ sought to protect investors by improving the accuracy and reliability of corporate disclosures and requires companies to implement extensive and detailed policies to prevent illegal activity within the company and respond in a timely manner to investigate illegal activity.

A)USA Patriot Act
B)Homeland Security Act
C)Sarbanes-Oxley Act
D)Fair and Accurate Credit Transactions Act
Question
A _____ floods a server or network with so many requests for service that it slows down or crashes.

A)rootkit
B)denial-of-service attack
C)wiki
D)Trojan horse
Question
_____ is a technique to gain personal information for the purpose of identity theft,where specific individuals are targeted and the creator of a fraudulent e-mail already has some of the victim's personal information and wants more.

A)Spear phishing
B)Vishing
C)Spy-phishing
D)Pharming
Question
_____ are types of hackers who break into other people's computer systems and may just look around.They may steal credit card numbers or destroy information,or otherwise do damage.

A)Zombies
B)White-hat hackers
C)Black-hat hackers
D)Drones
Question
A _____ records information about you during a Web surfing session such as what Web sites you visited,how long you were there,what ads you looked at,and what you bought.

A)copyright
B)key logger
C)firewall
D)clickstream
Question
_____ refers to malicious software that collects information about a person and his/her computer and reports it to someone without their permission.

A)Firmware
B)Spyware
C)Adware
D)Spam
Question
Spyware is also known as ____.

A)adware
B)malware
C)stealthware
D)firmware
Question
The _____ allows law enforcement to get access to almost any information,including library records,video rentals,bookstore purchases,and business records when investigating any act of terrorism or hostile intelligence activities.

A)USA Patriot Act
B)Sarbanes-Oxley Act
C)CAN-Spam Act
D)Homeland Security Act
Question
A unique cookie is one that started out as a common cookie,but the original site sold access to it to a third party.
Question
An ethical dilemma refers to the choice of whether or not to be ethical.
Question
Phishing is a technique which delays incoming e-mail messages for a long period of time to defend one's computer against viruses and worms.
Question
In order to monitor computer use,screen capture programs can be used to capture every single screen that a user views.
Question
One way to block cookies is to set one's browser to accept or reject all cookies.
Question
Copyright law completely forbids the use of intellectual property.
Question
Key logging refers to the rerouting of a person's request for a legitimate Web site to a fake site which then collects information from the person.
Question
_____ is a way of protecting messages and files by scrambling the contents of a file so that one cannot read it without having the right key.

A)Encryption
B)Feature creep
C)Biometrics
D)Encapsulation
Question
In the United States,making a copy of copyrighted software for backup purposes amounts to software piracy.
Question
A factor that affects how one makes a decision when faced with an ethical dilemma is one's basic ethical structure,which develops as one grows up.
Question
Intellectual property is defined as the principles and standards that guide our behavior toward other people.
Question
_____ refers to the use of physiological characteristics such as fingerprints,the blood vessels in the iris of the eye,and the sound of one's voice to provide identification.

A)Pharming
B)Biometrics
C)Intellectual property
D)Whaling
Question
Intellectual property refers to tangible creative work that is embodied in non-physical form.
Question
Identity theft is often for financial gain,and the stolen identity is used to apply for and use credit cards in the victim's name or to apply for loans.
Question
Log analysis is a monitoring tool that keeps track of logons,deletions,and so forth.
Question
Spammers can penetrate through spam filters by including nonprinting characters in their subject lines.
Question
The CAN-Spam Act is an anti-spam law passed by the Federal Government which bans spamming entirely.
Question
A reason that companies monitor employees' e-mail is that they can be sued for what their employees send to each other and to people outside the company.
Question
Pharming is accomplished by getting access to the giant databases that Internet providers use to route Web traffic.
Question
A hardware key logger cannot capture backspaces and deletions.
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/126
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 8: Protecting People and Information: Threats and Safeguards
1
An assessment of what is right or wrong can be made by considering _____ which focuses on the number of people that will be affected by one's action.

A)society's opinion
B)the consequences
C)the likelihood of effect
D)the reach of result
D
Explanation: An assessment of what is right or wrong can rarely be divorced from a variety of considerations.The reach of result refers to the number of people that will be affected by one's action.
2
The management at Belle Cosmetics,a company headquartered in Jakarta,is contemplating whether or not to use palm oil extracts for their hair products.Though the extracts are proven to nourish hair,using palm oil for commercial products is a major cause of deforestation in Indonesia.They feel that using palm oil extracts will make their customers shift their loyalties to other brands.Which of the following considerations is the company taking into account while making their decision?

A)Likelihood of effect
B)Relatedness
C)Society's opinion
D)Time to consequences
C
Explanation: An assessment of what is right or wrong can rarely be divorced from a variety of considerations.One of these considerations is society's opinion,that is,your perception of what society really thinks of your intended action.
3
_____ refers to the extent to which one identifies with the person or persons who will receive the benefit or suffer the harm associated with a particular decision.

A)Reach of result
B)Tangibility
C)Likelihood of effect
D)Relatedness
D
Explanation: An assessment of what is right or wrong can rarely be divorced from a variety of considerations.Relatedness refers to the extent to which one identifies with the person or persons who will receive the benefit or suffer the harm associated with a particular decision.
4
David works as process supervisor at an industrial plant.In his company,he is known by all his colleagues and superiors as an honest worker whose decisions are always guided by ethical values.Recently,David came to know that due to the irresponsible disposal of company waste,the local groundwater has been contaminated.Because of this,a large number of people living in close proximity to the plant have been suffering from severe ailments.However,in spite of knowing this,David does not take any action.Which of the following,if true,most likely explains David's decision not to act?

A)David's decision was guided by morality and ethical values.
B)David considered the impact of toxins on the environment while making the decision.
C)David's decision was influenced by the dilemma of losing his job at the plant.
D)David made the decision by considering the well-being of the people living in close proximity to the plant.
Unlock Deck
Unlock for access to all 126 flashcards in this deck.
Unlock Deck
k this deck
5
Palmer Inc.recently found out that a senior researcher at the company,Jessica Hughes,has been selling the firm's trade secrets to a leading competitor.Though Jessica knew that her actions would result in serious consequences,she went ahead and shared the confidential information with the rival firm.Jessica's behavior relates to which of the following levels of her ethical structure?

A)Innermost
B)External
C)Outermost
D)Middle
Unlock Deck
Unlock for access to all 126 flashcards in this deck.
Unlock Deck
k this deck
6
Kelly,who works at an advertising firm,regularly receives calls from friends and family during office hours.Though she knows that it is not right on her part to spend a lot of time answering personal calls,she feels that the management will not take any strict action against her because she always meets project deadlines and provides quality work.Which of the following is Kelly considering while making her decision to continue taking calls?

A)Time to consequences
B)Likelihood of effect
C)Relatedness
D)Reach of result
Unlock Deck
Unlock for access to all 126 flashcards in this deck.
Unlock Deck
k this deck
7
Peter works as a quality inspection officer at a coffee factory.Due to personal obligations,he needs to leave work early one day,because of which certain consignments will be shipped without any quality checks.Peter is now thinking about the actions that the company will take against him if they find out about it.Which of the following is Peter considering before making his decision?

A)Reach of result
B)Relatedness
C)Time to consequences
D)Consequences
Unlock Deck
Unlock for access to all 126 flashcards in this deck.
Unlock Deck
k this deck
8
Which of the following is true of ethics and ethical people?

A)Ethical people do not face ethical dilemmas since they know the difference between right and wrong.
B)Ethical people's values are free from the influence of their history,culture,and religion.
C)Ethical norms change radically because of society's dynamic nature.
D)Acting ethically means behaving in a principled fashion and treating others with dignity.
Unlock Deck
Unlock for access to all 126 flashcards in this deck.
Unlock Deck
k this deck
9
Which of the following is part of the outermost level of an individual's ethical structure?

A)Actions that are considered serious ethical violations by both society and oneself.
B)Behavior that causes extreme ethical discomfort to the person.
C)Behavior that calls for stringent measures against the person.
D)Actions that most people would not consider unacceptable or unethical.
Unlock Deck
Unlock for access to all 126 flashcards in this deck.
Unlock Deck
k this deck
10
The management at Corpus Inc.is weighing the pros and cons of moving their factory from Michigan to Vermont.They know that the move will lower their operating costs,however,they are also aware that several of their factory workers will be left without a job because of their inability to relocate.Which of the following considerations is the company taking into account while making their decision?

A)Time to consequences
B)Reach of result
C)Causes
D)Society's opinion
Unlock Deck
Unlock for access to all 126 flashcards in this deck.
Unlock Deck
k this deck
11
An assessment of what is right or wrong can be determined by considering ____,which can be understood as the benefit or harm that will come from a particular decision.

A)the consequences
B)society's opinion
C)the time till the consequences take effect
D)the reach of the result
Unlock Deck
Unlock for access to all 126 flashcards in this deck.
Unlock Deck
k this deck
12
Which of the following is true of an ethical dilemma?

A)It is faced exclusively by unethical,immoral people.
B)It occurs when one's responsibilities seem to lead in opposite directions.
C)It is the choice of whether or not to act ethically.
D)It involves choosing between compatible good outcomes.
Unlock Deck
Unlock for access to all 126 flashcards in this deck.
Unlock Deck
k this deck
13
_____ can be defined as the principles and standards that guide our behavior toward other people.

A)Ethics
B)Models
C)Eugenics
D)Aesthetics
Unlock Deck
Unlock for access to all 126 flashcards in this deck.
Unlock Deck
k this deck
14
Among the three levels of an individual's ethical structure,the _____ level involves things that most people would not consider bad,such as taking a couple of paper clips or sending an occasional personal e-mail on company time.

A)innermost
B)outermost
C)second
D)middle
Unlock Deck
Unlock for access to all 126 flashcards in this deck.
Unlock Deck
k this deck
15
An assessment of what is right or wrong can be determined by considering ____,which refers to the probability that the harm or benefit will occur if one undertakes an action.

A)the likelihood of effect
B)society's opinion
C)the time to consequences
D)relatedness
Unlock Deck
Unlock for access to all 126 flashcards in this deck.
Unlock Deck
k this deck
16
Which of the following is part of the innermost level of an individual's ethical structure?

A)Ethical violations that one would consider extremely serious.
B)Ethical behavior that a society considers acceptable.
C)Behavior that does not call for action against the person.
D)Actions that seem acceptable to one's values and morals.
Unlock Deck
Unlock for access to all 126 flashcards in this deck.
Unlock Deck
k this deck
17
Michelle works as an engineer at a software firm and often checks her personal e-mail while at work.Due to the long hours she puts in at the office,she does not have any time to check her e-mail at home and hence,feels that her actions are acceptable.Michelle's behavior relates to which of the following levels of her ethical structure?

A)Innermost
B)Outermost
C)Inside
D)Middle
Unlock Deck
Unlock for access to all 126 flashcards in this deck.
Unlock Deck
k this deck
18
Which of the following is an example of the unethical use of computers?

A)Employees failing to answer a large number of e-mail messages due to network problems.
B)Employees searching organizational databases for information on celebrities and friends.
C)Employees sending messages without spell checking and proofreading them.
D)Employees updating their passwords at the end of every month.
Unlock Deck
Unlock for access to all 126 flashcards in this deck.
Unlock Deck
k this deck
19
An assessment of what is right or wrong can be determined by considering the ____,which may be defined as how long it will take for the benefit or harm to take effect.

A)likelihood of effect
B)reach of result
C)time to consequences
D)consequences
Unlock Deck
Unlock for access to all 126 flashcards in this deck.
Unlock Deck
k this deck
20
Among the three levels of an individual's ethical structure,the _____ level involves ethical violations that one would consider very serious,such as embezzling funds or selling company records to a competitor.

A)innermost
B)outermost
C)external
D)middle
Unlock Deck
Unlock for access to all 126 flashcards in this deck.
Unlock Deck
k this deck
21
Which of the following is a program that,when installed on a computer,records every mouse click?

A)Honeypot
B)Spear phishing
C)Clickstreaming
D)Key logger
Unlock Deck
Unlock for access to all 126 flashcards in this deck.
Unlock Deck
k this deck
22
_____ refer(s)to devices on networks that connect computers to each other.

A)Packet sniffers
B)Routers
C)Adware
D)Modems
Unlock Deck
Unlock for access to all 126 flashcards in this deck.
Unlock Deck
k this deck
23
_____ refers to intangible creative work that is embodied in physical form.

A)Real property
B)Public property
C)Intellectual property
D)Immovable property
Unlock Deck
Unlock for access to all 126 flashcards in this deck.
Unlock Deck
k this deck
24
The software development team at Magnus Corporation recently created a unique mobile application that helps users locate themselves anywhere on the globe.In addition,the software provides information on traffic jams,fueling stations,restaurants,and hotels.This is an example of ____.

A)public property
B)intellectual property
C)real property
D)personal property
Unlock Deck
Unlock for access to all 126 flashcards in this deck.
Unlock Deck
k this deck
25
_____ refers to programs that Web sites offer to help people monitor what is happening on a computer.

A)Abandonware
B)Snoopware
C)Freeware
D)Shareware
Unlock Deck
Unlock for access to all 126 flashcards in this deck.
Unlock Deck
k this deck
26
Alice recently prepared a report on the impact of climate change on developing countries.While writing her report,she referred to several online articles and took excerpts from them.Which of the following should Alice provide in the report to indicate that these excerpts are not her original work?

A)Annotations
B)Citations
C)Watermarks
D)Inscriptions
Unlock Deck
Unlock for access to all 126 flashcards in this deck.
Unlock Deck
k this deck
27
_____ is the right to be left alone when one wants to be,to have control over one's own personal possessions,and not to be observed without one's consent.

A)Non-disclosure
B)Intellectual property
C)Personalization
D)Privacy
Unlock Deck
Unlock for access to all 126 flashcards in this deck.
Unlock Deck
k this deck
28
Starlit Corporation recently had an incident where one of their employees sent out confidential information to a competitor.The company has now decided to use a certain software which tracks their employees' online activities based on their mouse clicks.Which of the following is the company most likely planning to use?

A)Spear phishing
B)Spyware
C)Key trapper software
D)Clickstream
Unlock Deck
Unlock for access to all 126 flashcards in this deck.
Unlock Deck
k this deck
29
Jeanne Sanders,a celebrity chef,recently published a book titled "Easy to Bake Cakes and Pastries." However,in spite of copyrighting her work,James Riley,a critic with News Today,used some excerpts from her book for his news article.Jeanne is upset and consults her lawyer who tells her that,according to law,James has the right to use excerpts from her book and has not violated any laws.This is an example of ____.

A)a Creative Commons license
B)the open-source rule
C)the Fair Use Doctrine
D)the First-Sale doctrine
Unlock Deck
Unlock for access to all 126 flashcards in this deck.
Unlock Deck
k this deck
30
_____ is the unauthorized use,duplication,distribution,or sale of copyrighted software.

A)Pirated software
B)File sharing
C)Torrent poisoning
D)Phishing
Unlock Deck
Unlock for access to all 126 flashcards in this deck.
Unlock Deck
k this deck
31
Sarah recently downloaded a few songs by her favorite artist a month before the artist's album was released.After downloading the songs,she distributed them to all her friends.Which of the following is Sarah doing?

A)Spamming
B)Phishing
C)Pirating
D)Spoofing
Unlock Deck
Unlock for access to all 126 flashcards in this deck.
Unlock Deck
k this deck
32
A _____ refers to the legal protection offered for the expression of an idea,such as a song,video game,and some types of proprietary documents.

A)copyright
B)trademark
C)patent
D)fair use agreement
Unlock Deck
Unlock for access to all 126 flashcards in this deck.
Unlock Deck
k this deck
33
_____ is a kind of identity theft where the victim knows the person who stole his/her identity.

A)Friendly fraud
B)PayPal
C)Peer-to-peer computing
D)Pretexting
Unlock Deck
Unlock for access to all 126 flashcards in this deck.
Unlock Deck
k this deck
34
Janice works in the IT department of a multinational bank and is responsible for monitoring information that is being transmitted over a digital network.This helps her ensure that there is no breach in security.Which of the following is Janice most likely using?

A)Spyware
B)Key logger
C)Packet sniffer
D)Rootkit
Unlock Deck
Unlock for access to all 126 flashcards in this deck.
Unlock Deck
k this deck
35
Katherine Wood,a critically acclaimed feminist poet,recently published her second anthology of poetry.Which of the following will protect her work from being used by other people without her permission?

A)Copyright law
B)Patent law
C)Trademark law
D)Fair use
Unlock Deck
Unlock for access to all 126 flashcards in this deck.
Unlock Deck
k this deck
36
Ashley recently received an e-mail from a bank asking for her account number and verification of her password.The e-mail contained the bank's logo and was signed by the branch manager.She immediately replied to the e-mail,providing the requested details.However,a few days later,she noticed that her bank statement showed a zero balance.On checking with the bank authorities,she was told that the e-mail was not sent by them.Ashley was most likely a victim of which of the following types of fraud?

A)Brand spoofing
B)Key logging
C)Pirating
D)Pharming
Unlock Deck
Unlock for access to all 126 flashcards in this deck.
Unlock Deck
k this deck
37
The _____ says that you may use copyrighted material in certain situations,for example,in the creation of new work or,within certain limits,for teaching purposes.

A)Fair Use Doctrine
B)First-Sale Doctrine
C)Orphan work rule
D)Open-source rule
Unlock Deck
Unlock for access to all 126 flashcards in this deck.
Unlock Deck
k this deck
38
Claytons and Sons,a finance firm in Manhattan,has a large number of employees who handle huge amounts of online transactions everyday.The management feels that it is crucial to monitor their online activities.Which of the following can the company use for this purpose?

A)Snoopware
B)Sneakware
C)Spyware
D)Stealthware
Unlock Deck
Unlock for access to all 126 flashcards in this deck.
Unlock Deck
k this deck
39
An architectural firm's blueprints,sketches and other proprietary documents are examples of ____.

A)public property
B)intellectual property
C)real property
D)immovable property
Unlock Deck
Unlock for access to all 126 flashcards in this deck.
Unlock Deck
k this deck
40
_____ is a technique to gain personal information for the purpose of identity theft,usually by means of fraudulent e-mail.

A)Greylisting
B)Phishing
C)Sniffing
D)Wire fraud
Unlock Deck
Unlock for access to all 126 flashcards in this deck.
Unlock Deck
k this deck
41
_____ refers to software that generates advertisements and installs itself on your computer when you download some other,usually free,program from the Web.

A)Antivirus software
B)Adware
C)Spyware
D)AdSense
Unlock Deck
Unlock for access to all 126 flashcards in this deck.
Unlock Deck
k this deck
42
A(n)______ is hardware and/or software that protects a computer or a network from intruders.

A)Web log
B)worm
C)firewall
D)public key
Unlock Deck
Unlock for access to all 126 flashcards in this deck.
Unlock Deck
k this deck
43
The most recent federal bill that addressed electronic monitoring of employees is the ____.

A)Homeland Security Act of 2002
B)Electronic Communications Privacy Act of 1986
C)Sarbanes-Oxley Act of 2002
D)USA Patriot Act of 2003
Unlock Deck
Unlock for access to all 126 flashcards in this deck.
Unlock Deck
k this deck
44
The _____ sought to regulate interstate commerce by imposing limitations and penalties on businesses sending unsolicited e-mail to consumers.

A)USA Patriot Act
B)Identity Theft and Assumption Deterrence Act
C)Homeland Security Act
D)CAN-Spam Act
Unlock Deck
Unlock for access to all 126 flashcards in this deck.
Unlock Deck
k this deck
45
Which of the following should a person do to protect their personal information?

A)Avoid using special characters in passwords.
B)Do not provide information to people who contact you by e-mail.
C)Avoid providing answers that are hard to guess as responses to security questions.
D)Do not enter those Web sites where https:// appears in the Web browser.
Unlock Deck
Unlock for access to all 126 flashcards in this deck.
Unlock Deck
k this deck
46
_____ is the use of phishing targeted at senior business executives,government leaders,and other types of high-profile individuals.

A)Spamming
B)Whaling
C)Vishing
D)Keystroke logging
Unlock Deck
Unlock for access to all 126 flashcards in this deck.
Unlock Deck
k this deck
47
_____ have philosophical and political reasons for breaking into systems and often deface Web sites as a sign of protest.

A)Zombies
B)White-hat hackers
C)Hacktivists
D)Screenagers
Unlock Deck
Unlock for access to all 126 flashcards in this deck.
Unlock Deck
k this deck
48
Jennifer recently installed a free media player for downloading music onto her laptop.Without her knowledge,along with the media player,a software was installed on her system which constantly tracked her online activities in addition to the data saved on her laptop.Which of the following was most likely downloaded without Jennifer's knowledge?

A)Adware
B)Spyware
C)Firmware
D)Cookie
Unlock Deck
Unlock for access to all 126 flashcards in this deck.
Unlock Deck
k this deck
49
The _____ provided new authority to government agencies to mine data on individuals and groups including e-mails and Web site visits,and put limits on the information available under the Freedom of Information Act.

A)CAN-Spam Act
B)Sarbanes-Oxley Act
C)Homeland Security Act
D)USA Patriot Act
Unlock Deck
Unlock for access to all 126 flashcards in this deck.
Unlock Deck
k this deck
50
_____ refers to unsolicited e-mail (electronic junk mail)from businesses that advertise goods and services.

A)Adware
B)Spyware
C)Pharming
D)Spam
Unlock Deck
Unlock for access to all 126 flashcards in this deck.
Unlock Deck
k this deck
51
A _____ is a small file that contains information about a person and his/her Web activities,which a Web site one visits places on their computer.

A)cookie
B)bot
C)cache
D)key logger
Unlock Deck
Unlock for access to all 126 flashcards in this deck.
Unlock Deck
k this deck
52
A _____ consists of one line of information for every visitor to a Web site and is usually stored on a Web server.

A)Web log
B)firewall
C)cookie
D)copyright
Unlock Deck
Unlock for access to all 126 flashcards in this deck.
Unlock Deck
k this deck
53
The _____ sought to protect investors by improving the accuracy and reliability of corporate disclosures and requires companies to implement extensive and detailed policies to prevent illegal activity within the company and respond in a timely manner to investigate illegal activity.

A)USA Patriot Act
B)Homeland Security Act
C)Sarbanes-Oxley Act
D)Fair and Accurate Credit Transactions Act
Unlock Deck
Unlock for access to all 126 flashcards in this deck.
Unlock Deck
k this deck
54
A _____ floods a server or network with so many requests for service that it slows down or crashes.

A)rootkit
B)denial-of-service attack
C)wiki
D)Trojan horse
Unlock Deck
Unlock for access to all 126 flashcards in this deck.
Unlock Deck
k this deck
55
_____ is a technique to gain personal information for the purpose of identity theft,where specific individuals are targeted and the creator of a fraudulent e-mail already has some of the victim's personal information and wants more.

A)Spear phishing
B)Vishing
C)Spy-phishing
D)Pharming
Unlock Deck
Unlock for access to all 126 flashcards in this deck.
Unlock Deck
k this deck
56
_____ are types of hackers who break into other people's computer systems and may just look around.They may steal credit card numbers or destroy information,or otherwise do damage.

A)Zombies
B)White-hat hackers
C)Black-hat hackers
D)Drones
Unlock Deck
Unlock for access to all 126 flashcards in this deck.
Unlock Deck
k this deck
57
A _____ records information about you during a Web surfing session such as what Web sites you visited,how long you were there,what ads you looked at,and what you bought.

A)copyright
B)key logger
C)firewall
D)clickstream
Unlock Deck
Unlock for access to all 126 flashcards in this deck.
Unlock Deck
k this deck
58
_____ refers to malicious software that collects information about a person and his/her computer and reports it to someone without their permission.

A)Firmware
B)Spyware
C)Adware
D)Spam
Unlock Deck
Unlock for access to all 126 flashcards in this deck.
Unlock Deck
k this deck
59
Spyware is also known as ____.

A)adware
B)malware
C)stealthware
D)firmware
Unlock Deck
Unlock for access to all 126 flashcards in this deck.
Unlock Deck
k this deck
60
The _____ allows law enforcement to get access to almost any information,including library records,video rentals,bookstore purchases,and business records when investigating any act of terrorism or hostile intelligence activities.

A)USA Patriot Act
B)Sarbanes-Oxley Act
C)CAN-Spam Act
D)Homeland Security Act
Unlock Deck
Unlock for access to all 126 flashcards in this deck.
Unlock Deck
k this deck
61
A unique cookie is one that started out as a common cookie,but the original site sold access to it to a third party.
Unlock Deck
Unlock for access to all 126 flashcards in this deck.
Unlock Deck
k this deck
62
An ethical dilemma refers to the choice of whether or not to be ethical.
Unlock Deck
Unlock for access to all 126 flashcards in this deck.
Unlock Deck
k this deck
63
Phishing is a technique which delays incoming e-mail messages for a long period of time to defend one's computer against viruses and worms.
Unlock Deck
Unlock for access to all 126 flashcards in this deck.
Unlock Deck
k this deck
64
In order to monitor computer use,screen capture programs can be used to capture every single screen that a user views.
Unlock Deck
Unlock for access to all 126 flashcards in this deck.
Unlock Deck
k this deck
65
One way to block cookies is to set one's browser to accept or reject all cookies.
Unlock Deck
Unlock for access to all 126 flashcards in this deck.
Unlock Deck
k this deck
66
Copyright law completely forbids the use of intellectual property.
Unlock Deck
Unlock for access to all 126 flashcards in this deck.
Unlock Deck
k this deck
67
Key logging refers to the rerouting of a person's request for a legitimate Web site to a fake site which then collects information from the person.
Unlock Deck
Unlock for access to all 126 flashcards in this deck.
Unlock Deck
k this deck
68
_____ is a way of protecting messages and files by scrambling the contents of a file so that one cannot read it without having the right key.

A)Encryption
B)Feature creep
C)Biometrics
D)Encapsulation
Unlock Deck
Unlock for access to all 126 flashcards in this deck.
Unlock Deck
k this deck
69
In the United States,making a copy of copyrighted software for backup purposes amounts to software piracy.
Unlock Deck
Unlock for access to all 126 flashcards in this deck.
Unlock Deck
k this deck
70
A factor that affects how one makes a decision when faced with an ethical dilemma is one's basic ethical structure,which develops as one grows up.
Unlock Deck
Unlock for access to all 126 flashcards in this deck.
Unlock Deck
k this deck
71
Intellectual property is defined as the principles and standards that guide our behavior toward other people.
Unlock Deck
Unlock for access to all 126 flashcards in this deck.
Unlock Deck
k this deck
72
_____ refers to the use of physiological characteristics such as fingerprints,the blood vessels in the iris of the eye,and the sound of one's voice to provide identification.

A)Pharming
B)Biometrics
C)Intellectual property
D)Whaling
Unlock Deck
Unlock for access to all 126 flashcards in this deck.
Unlock Deck
k this deck
73
Intellectual property refers to tangible creative work that is embodied in non-physical form.
Unlock Deck
Unlock for access to all 126 flashcards in this deck.
Unlock Deck
k this deck
74
Identity theft is often for financial gain,and the stolen identity is used to apply for and use credit cards in the victim's name or to apply for loans.
Unlock Deck
Unlock for access to all 126 flashcards in this deck.
Unlock Deck
k this deck
75
Log analysis is a monitoring tool that keeps track of logons,deletions,and so forth.
Unlock Deck
Unlock for access to all 126 flashcards in this deck.
Unlock Deck
k this deck
76
Spammers can penetrate through spam filters by including nonprinting characters in their subject lines.
Unlock Deck
Unlock for access to all 126 flashcards in this deck.
Unlock Deck
k this deck
77
The CAN-Spam Act is an anti-spam law passed by the Federal Government which bans spamming entirely.
Unlock Deck
Unlock for access to all 126 flashcards in this deck.
Unlock Deck
k this deck
78
A reason that companies monitor employees' e-mail is that they can be sued for what their employees send to each other and to people outside the company.
Unlock Deck
Unlock for access to all 126 flashcards in this deck.
Unlock Deck
k this deck
79
Pharming is accomplished by getting access to the giant databases that Internet providers use to route Web traffic.
Unlock Deck
Unlock for access to all 126 flashcards in this deck.
Unlock Deck
k this deck
80
A hardware key logger cannot capture backspaces and deletions.
Unlock Deck
Unlock for access to all 126 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 126 flashcards in this deck.