Deck 8: Protecting People and Information
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/170
Play
Full screen (f)
Deck 8: Protecting People and Information
1
If you were concerned about how a person would feel because of something you did,you would be experiencing what type of influencing circumstance?
A)Consequences
B)Likelihood of effect
C)Relatedness
D)Reach of result
A)Consequences
B)Likelihood of effect
C)Relatedness
D)Reach of result
C
2
Which of the following protects the intangible creative work that is embodied in physical form?
A)Copyright
B)Intellectual property
C)Fair Use Doctrine
D)Pirating laws
A)Copyright
B)Intellectual property
C)Fair Use Doctrine
D)Pirating laws
B
3
Are ethical dilemmas easy to understand?
A)Yes,if you have a strong sense of self
B)Yes,if you are well educated
C)Yes,if you have a strong sense of self and are well educated
D)No,they usually arise from a clash between competing goals,responsibilities,and loyalties
A)Yes,if you have a strong sense of self
B)Yes,if you are well educated
C)Yes,if you have a strong sense of self and are well educated
D)No,they usually arise from a clash between competing goals,responsibilities,and loyalties
D
4
What county experiences the greatest revenue losses from pirated software?
A)China
B)United Kingdom
C)Japan
D)United States
A)China
B)United Kingdom
C)Japan
D)United States
Unlock Deck
Unlock for access to all 170 flashcards in this deck.
Unlock Deck
k this deck
5
Can you make a copy of software that you buy?
A)No
B)You can make one copy
C)Yes
D)Only if the software vendor grants you the right to copy it
A)No
B)You can make one copy
C)Yes
D)Only if the software vendor grants you the right to copy it
Unlock Deck
Unlock for access to all 170 flashcards in this deck.
Unlock Deck
k this deck
6
Which of the following protects expressions of ideas,literary and dramatic works,musical and theatrical compositions,and works of art?
A)Intellectual property
B)Pirating laws
C)Fair Use Doctrine
D)Copyright
A)Intellectual property
B)Pirating laws
C)Fair Use Doctrine
D)Copyright
Unlock Deck
Unlock for access to all 170 flashcards in this deck.
Unlock Deck
k this deck
7
If you were to download a computer game from the Internet and then sell this game to your friends,what would you be doing to the person who developed the game?
A)Spamming them
B)Phishing their software
C)Pirating their software
D)Stealing their profits
A)Spamming them
B)Phishing their software
C)Pirating their software
D)Stealing their profits
Unlock Deck
Unlock for access to all 170 flashcards in this deck.
Unlock Deck
k this deck
8
There are two fundamental factors that determine your ethical reaction to dilemmas.What is one of them?
A)Your basic ethical structure
B)Your age
C)Your religious education
D)Your perceptions and intuitions
A)Your basic ethical structure
B)Your age
C)Your religious education
D)Your perceptions and intuitions
Unlock Deck
Unlock for access to all 170 flashcards in this deck.
Unlock Deck
k this deck
9
Which of the following is the unauthorized use,duplication,distribution,or sale of copyrighted software?
A)Pirated software
B)Spam
C)Phishing
D)Sneakware
A)Pirated software
B)Spam
C)Phishing
D)Sneakware
Unlock Deck
Unlock for access to all 170 flashcards in this deck.
Unlock Deck
k this deck
10
What are the principles and standards that guide our behavior toward other people?
A)Personal Morals
B)Ethics
C)Organizational culture
D)Laws
A)Personal Morals
B)Ethics
C)Organizational culture
D)Laws
Unlock Deck
Unlock for access to all 170 flashcards in this deck.
Unlock Deck
k this deck
11
What is the right to be left alone when you want to be,to have control over your own personal possessions,and not to be observed without your consent?
A)Ethics
B)Personal safety laws
C)Identity theft laws
D)Privacy
A)Ethics
B)Personal safety laws
C)Identity theft laws
D)Privacy
Unlock Deck
Unlock for access to all 170 flashcards in this deck.
Unlock Deck
k this deck
12
Your decisions regarding ethics are influenced by a number of factors.Which is not one of these factors?
A)Magnitude of the outcome
B)Your estimate of the importance of the situation
C)Your age,gender,education,and socio-economic status
D)Your perceptions of conflicting "right reactions"
A)Magnitude of the outcome
B)Your estimate of the importance of the situation
C)Your age,gender,education,and socio-economic status
D)Your perceptions of conflicting "right reactions"
Unlock Deck
Unlock for access to all 170 flashcards in this deck.
Unlock Deck
k this deck
13
There are different levels of uncertainty when faced with ethical decisions; each creates a sort of ring around the dilemma.What is true of the inside level or ring?
A)Choices or decisions regarding the ethical dilemma become harder to make; uncertainty is high
B)You are more certain of what is right or wrong; decisions become easier to make
C)Illegal and/or unethical behavior become less tolerated by society
D)Choices become harder to make and illegal and/or unethical behavior less tolerated
A)Choices or decisions regarding the ethical dilemma become harder to make; uncertainty is high
B)You are more certain of what is right or wrong; decisions become easier to make
C)Illegal and/or unethical behavior become less tolerated by society
D)Choices become harder to make and illegal and/or unethical behavior less tolerated
Unlock Deck
Unlock for access to all 170 flashcards in this deck.
Unlock Deck
k this deck
14
If you were to create a computer game for a homework assignment in programming,what type of law provides you with some protection against people selling your game without your consent?
A)Intellectual property
B)Copyright
C)Fair Use Doctrine
D)Pirating laws
A)Intellectual property
B)Copyright
C)Fair Use Doctrine
D)Pirating laws
Unlock Deck
Unlock for access to all 170 flashcards in this deck.
Unlock Deck
k this deck
15
There are two fundamental factors that determine you're your ethical reaction to dilemmas.What is the other one?
A)Laws
B)Your maturity level
C)The circumstances surrounding the dilemma
D)Your maturity level and educational background
A)Laws
B)Your maturity level
C)The circumstances surrounding the dilemma
D)Your maturity level and educational background
Unlock Deck
Unlock for access to all 170 flashcards in this deck.
Unlock Deck
k this deck
16
Which type of law allows people to use copyrighted material in teaching environments without obtaining the consent of the owner of this material?
A)Copyright
B)Patent
C)Fair Use Doctrine
D)Intellectual property
A)Copyright
B)Patent
C)Fair Use Doctrine
D)Intellectual property
Unlock Deck
Unlock for access to all 170 flashcards in this deck.
Unlock Deck
k this deck
17
Your decisions about an ethical dilemma are influenced by practical circumstances.Which of the following is not considered an influencing circumstance?
A)Consequences
B)Society's opinion
C)Likelihood of effect
D)Time from action
A)Consequences
B)Society's opinion
C)Likelihood of effect
D)Time from action
Unlock Deck
Unlock for access to all 170 flashcards in this deck.
Unlock Deck
k this deck
18
There are different levels of uncertainty when faced with ethical decisions; each creates a sort of ring around the dilemma.What is true of the outside level or ring?
A)Ethical violations are considered more serious
B)Decisions and circumstances surrounding the dilemma become confusing and uncertain
C)The laws and ramifications regarding the dilemma become clearer and more understood
D)The behavior or actions aren't considered awful and are more accepted by society
A)Ethical violations are considered more serious
B)Decisions and circumstances surrounding the dilemma become confusing and uncertain
C)The laws and ramifications regarding the dilemma become clearer and more understood
D)The behavior or actions aren't considered awful and are more accepted by society
Unlock Deck
Unlock for access to all 170 flashcards in this deck.
Unlock Deck
k this deck
19
If you were to create a self portrait and you place this portrait on your Web site,what type of law protects your work from anyone downloading and using it?
A)Copyright
B)Patent law
C)Fair Use Doctrine
D)Pirating laws
A)Copyright
B)Patent law
C)Fair Use Doctrine
D)Pirating laws
Unlock Deck
Unlock for access to all 170 flashcards in this deck.
Unlock Deck
k this deck
20
Is copyright infringement illegal?
A)Yes
B)Yes,outside of a fair use situation
C)No,not unless the material is patented
D)If the material is not patented and on the Internet it is not illegal,otherwise it is
A)Yes
B)Yes,outside of a fair use situation
C)No,not unless the material is patented
D)If the material is not patented and on the Internet it is not illegal,otherwise it is
Unlock Deck
Unlock for access to all 170 flashcards in this deck.
Unlock Deck
k this deck
21
How do business monitor email?
A)Through software that looks for specific words and phrases
B)Searching for high-activity and then reading the associated email
C)Hardware key logger
D)Software,processes,and hardware
A)Through software that looks for specific words and phrases
B)Searching for high-activity and then reading the associated email
C)Hardware key logger
D)Software,processes,and hardware
Unlock Deck
Unlock for access to all 170 flashcards in this deck.
Unlock Deck
k this deck
22
What happens to a CD when you burn images,videos,and music to it?
A)Information about the software and hardware that you used are stored on the CD
B)Personal and identifying information about you is stored on the CD
C)Cookies that are stored on your computer are also transferred to your CD
D)A distinct signature from the CD drive is left on your CD
A)Information about the software and hardware that you used are stored on the CD
B)Personal and identifying information about you is stored on the CD
C)Cookies that are stored on your computer are also transferred to your CD
D)A distinct signature from the CD drive is left on your CD
Unlock Deck
Unlock for access to all 170 flashcards in this deck.
Unlock Deck
k this deck
23
What computer feature was requested by the Secret Service of hardware manufacturers to be implemented in modern computer equipment to help the Secret Service fight crime?
A)The printing of serial numbers and date information on all printouts
B)The installation of microchips that analyzes your communications and sends anonymous warnings to the Secret Service
C)Systems software that sends ownership information and your computer's serial numbers to Secrete Service
D)Unique serial numbers for all hardware devices that can be traced back to you
A)The printing of serial numbers and date information on all printouts
B)The installation of microchips that analyzes your communications and sends anonymous warnings to the Secret Service
C)Systems software that sends ownership information and your computer's serial numbers to Secrete Service
D)Unique serial numbers for all hardware devices that can be traced back to you
Unlock Deck
Unlock for access to all 170 flashcards in this deck.
Unlock Deck
k this deck
24
Which of the following is a small file that contains information about you and your Web activities?
A)Software logger
B)Cookies
C)Web log
D)Web threads
A)Software logger
B)Cookies
C)Web log
D)Web threads
Unlock Deck
Unlock for access to all 170 flashcards in this deck.
Unlock Deck
k this deck
25
What is identity theft?
A)When a person losses that sense of self because of their heightened activities on the Web
B)When a person,or group of people,take on another person's identify and then send email and other online communications under the fraudulent name
C)When one person changes their features and dress to resemble another person
D)When a person,or group of people,forge someone's identity for the purpose of fraud
A)When a person losses that sense of self because of their heightened activities on the Web
B)When a person,or group of people,take on another person's identify and then send email and other online communications under the fraudulent name
C)When one person changes their features and dress to resemble another person
D)When a person,or group of people,forge someone's identity for the purpose of fraud
Unlock Deck
Unlock for access to all 170 flashcards in this deck.
Unlock Deck
k this deck
26
What law forbids the interception of wired and electronic communication but allows for business surveillance of employee computer activity?
A)Electronic Communications Privacy Act of 1986
B)Fair Use Doctrine
C)Public Safety and Privacy Act of 2000
D)Telecommunications Act of 1989
A)Electronic Communications Privacy Act of 1986
B)Fair Use Doctrine
C)Public Safety and Privacy Act of 2000
D)Telecommunications Act of 1989
Unlock Deck
Unlock for access to all 170 flashcards in this deck.
Unlock Deck
k this deck
27
Due to the massive amounts of information gathered about customers,what type of software is one of the fastest growing?
A)CRM
B)ARM
C)Adware,Sneakware,and Cookie management
D)Anonymous Web browsing
A)CRM
B)ARM
C)Adware,Sneakware,and Cookie management
D)Anonymous Web browsing
Unlock Deck
Unlock for access to all 170 flashcards in this deck.
Unlock Deck
k this deck
28
Can a company that you work for monitor your personal email?
A)No
B)Only if there is justifiable grounds
C)Yes,a company can monitor all your email including ones placed from home and a personal account
D)A company can monitor all incoming and outgoing mail
A)No
B)Only if there is justifiable grounds
C)Yes,a company can monitor all your email including ones placed from home and a personal account
D)A company can monitor all incoming and outgoing mail
Unlock Deck
Unlock for access to all 170 flashcards in this deck.
Unlock Deck
k this deck
29
What is phishing?
A)An investigative Web service
B)A type of Internet game that allows subscribers to find out information about you and others living in its "virtual city"
C)Information bots that surf the Web for you searching for specific information that you need
D)Email and other online techniques that attempt to gain personal information from you
A)An investigative Web service
B)A type of Internet game that allows subscribers to find out information about you and others living in its "virtual city"
C)Information bots that surf the Web for you searching for specific information that you need
D)Email and other online techniques that attempt to gain personal information from you
Unlock Deck
Unlock for access to all 170 flashcards in this deck.
Unlock Deck
k this deck
30
Which of the following is not a phising technique?
A)Installing cookies on your computer
B)Sending fraudulent emails
C)Creating fraudulent Web sites
D)Hijacking and rerouting Web traffic
A)Installing cookies on your computer
B)Sending fraudulent emails
C)Creating fraudulent Web sites
D)Hijacking and rerouting Web traffic
Unlock Deck
Unlock for access to all 170 flashcards in this deck.
Unlock Deck
k this deck
31
What is a common Web activity that is geared towards stealing your identity?
A)Phishing
B)Trojan horse
C)Denial of service attack
D)Phishing,Trojan horses,and denial of service attacks are all geared stealing your identity
A)Phishing
B)Trojan horse
C)Denial of service attack
D)Phishing,Trojan horses,and denial of service attacks are all geared stealing your identity
Unlock Deck
Unlock for access to all 170 flashcards in this deck.
Unlock Deck
k this deck
32
Why do businesses store personal information on employees?
A)Avoid lawsuits
B)Ensure appropriate conduct
C)Compliance with laws
D)To avoid lawsuits,ensure proper conduct,and comply with laws
A)Avoid lawsuits
B)Ensure appropriate conduct
C)Compliance with laws
D)To avoid lawsuits,ensure proper conduct,and comply with laws
Unlock Deck
Unlock for access to all 170 flashcards in this deck.
Unlock Deck
k this deck
33
If you received repeated bills for a credit card that you didn't own,what would you probably be a victim of?
A)Phishing
B)Wrongful actions
C)Service fraud
D)Identity theft
A)Phishing
B)Wrongful actions
C)Service fraud
D)Identity theft
Unlock Deck
Unlock for access to all 170 flashcards in this deck.
Unlock Deck
k this deck
34
What program records every keystroke and mouse click executed on a computer?
A)Keyboard recorder
B)Trojan horse
C)Virus
D)Key logger
A)Keyboard recorder
B)Trojan horse
C)Virus
D)Key logger
Unlock Deck
Unlock for access to all 170 flashcards in this deck.
Unlock Deck
k this deck
35
If an auto insurance company wanted to determine actions of the driver during an accident,what device could they examine during their investigation?
A)The car's black box
B)The odometer,speedometer,RPMs and other measuring devices
C)The car's online computer systems
D)The EDR
A)The car's black box
B)The odometer,speedometer,RPMs and other measuring devices
C)The car's online computer systems
D)The EDR
Unlock Deck
Unlock for access to all 170 flashcards in this deck.
Unlock Deck
k this deck
36
What type of device can be installed on a vehicle that collects information about a person's reckless driving?
A)Event data recorder (EDR)
B)Traffic Safety Monitor (TSM)
C)Mom's Offsite Monitor for Automobiles (MOMA)
D)Parents Against Reckless Driving (PARD)
A)Event data recorder (EDR)
B)Traffic Safety Monitor (TSM)
C)Mom's Offsite Monitor for Automobiles (MOMA)
D)Parents Against Reckless Driving (PARD)
Unlock Deck
Unlock for access to all 170 flashcards in this deck.
Unlock Deck
k this deck
37
What hardware device captures keystrokes moving from the keyboard to the motherboard?
A)Hardware key logger
B)Clickstream device
C)Keyboard monitoring systems (KMS)
D)Hardware loggers,clickstream devices,and KMSs
A)Hardware key logger
B)Clickstream device
C)Keyboard monitoring systems (KMS)
D)Hardware loggers,clickstream devices,and KMSs
Unlock Deck
Unlock for access to all 170 flashcards in this deck.
Unlock Deck
k this deck
38
What browser image informs you that you're visiting a legitimate Web site?
A)Chain link
B)Key
C)Green traffic light
D)Padlock
A)Chain link
B)Key
C)Green traffic light
D)Padlock
Unlock Deck
Unlock for access to all 170 flashcards in this deck.
Unlock Deck
k this deck
39
What privacy rights should you possess?
A)The right to be left alone
B)The right to have control over your own personal possessions
C)The right not to be observed without your consent
D)You should have all these listed rights
A)The right to be left alone
B)The right to have control over your own personal possessions
C)The right not to be observed without your consent
D)You should have all these listed rights
Unlock Deck
Unlock for access to all 170 flashcards in this deck.
Unlock Deck
k this deck
40
What techniques do "phishers" use?
A)Search online database,financial institutions,and archives from MySpace,Facebook,and other social networking websites
B)Social networking services
C)Pretend to be legitimate businesses
D)Artificial intelligence
A)Search online database,financial institutions,and archives from MySpace,Facebook,and other social networking websites
B)Social networking services
C)Pretend to be legitimate businesses
D)Artificial intelligence
Unlock Deck
Unlock for access to all 170 flashcards in this deck.
Unlock Deck
k this deck
41
What software hides itself from the operating system so that you don't know that it's running; it conceals processes,files,or system data?
A)AdAware
B)Rootkits
C)AntiVirus
D)AdAware,Rootkits,and AntiVirus
A)AdAware
B)Rootkits
C)AntiVirus
D)AdAware,Rootkits,and AntiVirus
Unlock Deck
Unlock for access to all 170 flashcards in this deck.
Unlock Deck
k this deck
42
What technology records information about you during a Web surfing session; such as the Web sites you visited,how long you spent there,and what you bought?
A)Key trapper
B)Clickstream
C)Hacking
D)Anonymizer
A)Key trapper
B)Clickstream
C)Hacking
D)Anonymizer
Unlock Deck
Unlock for access to all 170 flashcards in this deck.
Unlock Deck
k this deck
43
What is unsolicited email from businesses that advertise goods and services?
A)Computer viruses
B)Spam
C)Cookies
D)Sneakware
A)Computer viruses
B)Spam
C)Cookies
D)Sneakware
Unlock Deck
Unlock for access to all 170 flashcards in this deck.
Unlock Deck
k this deck
44
What is a person called who uses a computer to cause harm to people or destroy critical systems?
A)Cyberterrorist
B)Black-hat hacker
C)CyberCracker
D)Hacktivist
A)Cyberterrorist
B)Black-hat hacker
C)CyberCracker
D)Hacktivist
Unlock Deck
Unlock for access to all 170 flashcards in this deck.
Unlock Deck
k this deck
45
What is a computer virus?
A)Software that is written with malicious intent to cause annoyance or damage
B)Software that hides your identity from Web sites you visit
C)Utilities that hide themselves from the operating system and monitor the software you have
D)Applications that record activities and site information regarding your surfing sessions
A)Software that is written with malicious intent to cause annoyance or damage
B)Software that hides your identity from Web sites you visit
C)Utilities that hide themselves from the operating system and monitor the software you have
D)Applications that record activities and site information regarding your surfing sessions
Unlock Deck
Unlock for access to all 170 flashcards in this deck.
Unlock Deck
k this deck
46
What is the term that refers to people who break into the computer systems of others?
A)Hijacker
B)Spytech
C)Worm
D)Hacker
A)Hijacker
B)Spytech
C)Worm
D)Hacker
Unlock Deck
Unlock for access to all 170 flashcards in this deck.
Unlock Deck
k this deck
47
As an owner of a company,what would be a safe assumption on your part regarding your employees and their potential to commit crime?
A)Most would not commit a crime
B)Most will commit a crime
C)It will depend on the socio economic status of your employees
D)If "push came to shove" most employees would commit a crime
A)Most would not commit a crime
B)Most will commit a crime
C)It will depend on the socio economic status of your employees
D)If "push came to shove" most employees would commit a crime
Unlock Deck
Unlock for access to all 170 flashcards in this deck.
Unlock Deck
k this deck
48
What technology hides your identity from the Web sites you visit?
A)AntiHacking
B)Private Agent Surfing Services (PASS)
C)Stealthware
D)Anonymous Web browsing (AWB)
A)AntiHacking
B)Private Agent Surfing Services (PASS)
C)Stealthware
D)Anonymous Web browsing (AWB)
Unlock Deck
Unlock for access to all 170 flashcards in this deck.
Unlock Deck
k this deck
49
What is malicious software that secretly collects information about you and your computer and then sends it back to some someone?
A)Adware
B)Spyware
C)Trojan horse
D)Worm
A)Adware
B)Spyware
C)Trojan horse
D)Worm
Unlock Deck
Unlock for access to all 170 flashcards in this deck.
Unlock Deck
k this deck
50
We lose more money to white-collar crime than we spend on the Federal defense budget.Which of the following statistics is not true about employees and their potential to commit crime?
A)Most employees are honest and would not commit crime
B)10% of employees are complete honest
C)10% of employees will steal
D)Circumstances will dictate if most employees commit crime or not
A)Most employees are honest and would not commit crime
B)10% of employees are complete honest
C)10% of employees will steal
D)Circumstances will dictate if most employees commit crime or not
Unlock Deck
Unlock for access to all 170 flashcards in this deck.
Unlock Deck
k this deck
51
What type of software is adware?
A)Trojan horse
B)Cookie
C)Sneakware
D)Stealthware
A)Trojan horse
B)Cookie
C)Sneakware
D)Stealthware
Unlock Deck
Unlock for access to all 170 flashcards in this deck.
Unlock Deck
k this deck
52
What is the difference between spam and phishing?
A)Spam is sent via email; phishing is not
B)Phishing is about pornography; spam is not
C)Phishing attempts to get your personal information; spam does not
D)There is virtually no difference between spam and phishing
A)Spam is sent via email; phishing is not
B)Phishing is about pornography; spam is not
C)Phishing attempts to get your personal information; spam does not
D)There is virtually no difference between spam and phishing
Unlock Deck
Unlock for access to all 170 flashcards in this deck.
Unlock Deck
k this deck
53
What is Trojan horse software?
A)A software program that comes bundled with some other program; you can access it with one click
B)Copy protection technology; to use the software your must first click on a copy protection agreement
C)Downloading and installation utilities
D)Hidden software that is placed on your computer because you agreed to something buried in a disclaimer or agreement
A)A software program that comes bundled with some other program; you can access it with one click
B)Copy protection technology; to use the software your must first click on a copy protection agreement
C)Downloading and installation utilities
D)Hidden software that is placed on your computer because you agreed to something buried in a disclaimer or agreement
Unlock Deck
Unlock for access to all 170 flashcards in this deck.
Unlock Deck
k this deck
54
What is the banner ads that sit on Web pages called?
A)Adware
B)Spam
C)Phishes
D)Virus
A)Adware
B)Spam
C)Phishes
D)Virus
Unlock Deck
Unlock for access to all 170 flashcards in this deck.
Unlock Deck
k this deck
55
Who commits most of the computer crime made against companies?
A)Employees
B)Competitors
C)Terrorists
D)Hackers
A)Employees
B)Competitors
C)Terrorists
D)Hackers
Unlock Deck
Unlock for access to all 170 flashcards in this deck.
Unlock Deck
k this deck
56
What type of legislation keeps patient information confidential?
A)Fair Use Doctrine
B)Identify Teft,Medical Information,and Assumption Deterrence Act
C)Sarbanes-Oxley Act
D)Health Insurance Portability and Accountability Act
A)Fair Use Doctrine
B)Identify Teft,Medical Information,and Assumption Deterrence Act
C)Sarbanes-Oxley Act
D)Health Insurance Portability and Accountability Act
Unlock Deck
Unlock for access to all 170 flashcards in this deck.
Unlock Deck
k this deck
57
Often times,a company will hire a hacker to find vulnerabilities in systems and plug up the holes.What is this person called?
A)Black-hat hacker
B)Hactivist
C)Cracker
D)White-hat hacker
A)Black-hat hacker
B)Hactivist
C)Cracker
D)White-hat hacker
Unlock Deck
Unlock for access to all 170 flashcards in this deck.
Unlock Deck
k this deck
58
What is one of the best know spyware detection programs?
A)AdAware
B)The Anonymizer
C)Clickstream
D)The Snifter
A)AdAware
B)The Anonymizer
C)Clickstream
D)The Snifter
Unlock Deck
Unlock for access to all 170 flashcards in this deck.
Unlock Deck
k this deck
59
Which of the following is a knowledgeable computer user who breaks into your computer because of philosophical or political reasons?
A)Hacker
B)Cracker
C)Hacktivist
D)Spytech
A)Hacker
B)Cracker
C)Hacktivist
D)Spytech
Unlock Deck
Unlock for access to all 170 flashcards in this deck.
Unlock Deck
k this deck
60
How can you block a business' attempt to store information about your Web activities?
A)Avoid the Internet and purchasing products and services on it
B)Block cookies
C)Install and use SpamWare
D)Install and use SpyWare and SpamWare
A)Avoid the Internet and purchasing products and services on it
B)Block cookies
C)Install and use SpamWare
D)Install and use SpyWare and SpamWare
Unlock Deck
Unlock for access to all 170 flashcards in this deck.
Unlock Deck
k this deck
61
What type of computer virus finds your email contacts and sends itself to those accounts?
A)Worms
B)Script kiddies
C)Denial-of-service attack
D)Online blackmail
A)Worms
B)Script kiddies
C)Denial-of-service attack
D)Online blackmail
Unlock Deck
Unlock for access to all 170 flashcards in this deck.
Unlock Deck
k this deck
62
Who uses hacking code on Web sites to click-and-point their way into systems to cause damage or spread viruses?
A)White-hat hacker
B)Black-hat hacker
C)Hacktivists
D)Script kiddies
A)White-hat hacker
B)Black-hat hacker
C)Hacktivists
D)Script kiddies
Unlock Deck
Unlock for access to all 170 flashcards in this deck.
Unlock Deck
k this deck
63
If you were typing a sensitive message to your manager and you wanted to ensure that no one could read it but the person you were sending it to,what should you do to the message?
A)Run anti-virus software before sending it to ensure it has not been infected by a virus or spyware
B)Send it through a Web site that supports anonymizing
C)Use only your organization's internal systems so that it can't go through the Internet
D)Encrypt the message before sending it to the manager
A)Run anti-virus software before sending it to ensure it has not been infected by a virus or spyware
B)Send it through a Web site that supports anonymizing
C)Use only your organization's internal systems so that it can't go through the Internet
D)Encrypt the message before sending it to the manager
Unlock Deck
Unlock for access to all 170 flashcards in this deck.
Unlock Deck
k this deck
64
When you purchase copyrighted software,what actually are you paying for?
A)The cost of the CDs
B)The cost of the CDs,manuals,and the cost of the software development
C)A share of the cost of software development
D)The right to use it
A)The cost of the CDs
B)The cost of the CDs,manuals,and the cost of the software development
C)A share of the cost of software development
D)The right to use it
Unlock Deck
Unlock for access to all 170 flashcards in this deck.
Unlock Deck
k this deck
65
What is the name of the new anti-Spam bill?
A)No-Spam
B)CAN-Spam
C)Spam-Away
D)Stop Spam
A)No-Spam
B)CAN-Spam
C)Spam-Away
D)Stop Spam
Unlock Deck
Unlock for access to all 170 flashcards in this deck.
Unlock Deck
k this deck
66
What type of hardware and/or software should you install to protect your computer from intruders entering into your system from your network connection?
A)Passports
B)Anti-virus
C)Firewall
D)Network monitor
A)Passports
B)Anti-virus
C)Firewall
D)Network monitor
Unlock Deck
Unlock for access to all 170 flashcards in this deck.
Unlock Deck
k this deck
67
What is the most prevalent type of computer virus?
A)Denial-of-service attack
B)Online blackmail
C)Script kiddies
D)Worms
A)Denial-of-service attack
B)Online blackmail
C)Script kiddies
D)Worms
Unlock Deck
Unlock for access to all 170 flashcards in this deck.
Unlock Deck
k this deck
68
What is intangible creative work that is embodied in physical form?
A)Ethics
B)Intellectual property
C)Copyright
D)Fair Use Doctrine
A)Ethics
B)Intellectual property
C)Copyright
D)Fair Use Doctrine
Unlock Deck
Unlock for access to all 170 flashcards in this deck.
Unlock Deck
k this deck
69
Which of the following do viruses harm?
A)Your keyboard
B)Your monitor
C)Your processor
D)Viruses do not harm hardware
A)Your keyboard
B)Your monitor
C)Your processor
D)Viruses do not harm hardware
Unlock Deck
Unlock for access to all 170 flashcards in this deck.
Unlock Deck
k this deck
70
Which of the following records logons and deletions?
A)Key logger
B)Packet sniffer
C)Log analysis tools
D)Screen captures
A)Key logger
B)Packet sniffer
C)Log analysis tools
D)Screen captures
Unlock Deck
Unlock for access to all 170 flashcards in this deck.
Unlock Deck
k this deck
71
What software should you install to protect your computer from computer viruses?
A)Spyware
B)Adware
C)Worms
D)Anti-virus
A)Spyware
B)Adware
C)Worms
D)Anti-virus
Unlock Deck
Unlock for access to all 170 flashcards in this deck.
Unlock Deck
k this deck
72
Which of the following examines information passing through network switches,hubs,or routers?
A)Key logger
B)Packet sniffer
C)Log analysis tools
D)Screen captures
A)Key logger
B)Packet sniffer
C)Log analysis tools
D)Screen captures
Unlock Deck
Unlock for access to all 170 flashcards in this deck.
Unlock Deck
k this deck
73
Which of the following can not be used for biometrics?
A)Fingerprint
B)Retina
C)Password
D)Voice
A)Fingerprint
B)Retina
C)Password
D)Voice
Unlock Deck
Unlock for access to all 170 flashcards in this deck.
Unlock Deck
k this deck
74
What type of access authentication system uses your physical characteristics to determine if you should,or should not,have access to a computer system?
A)Behaviometrics
B)Human system recognition
C)Biometrics
D)Physiological systems
A)Behaviometrics
B)Human system recognition
C)Biometrics
D)Physiological systems
Unlock Deck
Unlock for access to all 170 flashcards in this deck.
Unlock Deck
k this deck
75
What type of software should you install to protect yourself from identify theft?
A)Anti-virus
B)Anti-phishing
C)AdAware
D)WormAware
A)Anti-virus
B)Anti-phishing
C)AdAware
D)WormAware
Unlock Deck
Unlock for access to all 170 flashcards in this deck.
Unlock Deck
k this deck
76
If you were trying to access your campus network but the system was unable to respond to you because it was overwhelmed with a flood of requests coming from some virus,what type of attack would you be experiencing?
A)Worms
B)Script kiddies
C)Denial-of-service
D)Cyber blackmail
A)Worms
B)Script kiddies
C)Denial-of-service
D)Cyber blackmail
Unlock Deck
Unlock for access to all 170 flashcards in this deck.
Unlock Deck
k this deck
77
Which of the following can a virus do?
A)Hurt your hardware
B)Hurt any files it wasn't designed to attack
C)Infect files on write-protected disks
D)Target and corrupts specific applications or files
A)Hurt your hardware
B)Hurt any files it wasn't designed to attack
C)Infect files on write-protected disks
D)Target and corrupts specific applications or files
Unlock Deck
Unlock for access to all 170 flashcards in this deck.
Unlock Deck
k this deck
78
Which of the following captures screen images?
A)Key logger
B)Packet sniffer
C)Log analysis tools
D)Screen capture software
A)Key logger
B)Packet sniffer
C)Log analysis tools
D)Screen capture software
Unlock Deck
Unlock for access to all 170 flashcards in this deck.
Unlock Deck
k this deck
79
Which of the following is a characteristic of a firewall?
A)Examines each message as it seeks entrance to the network
B)Blocks messages without the correct markings from entering the network
C)Detects computers communicating with the Internet without approval
D)Each of these items are characteristics of a firewall
A)Examines each message as it seeks entrance to the network
B)Blocks messages without the correct markings from entering the network
C)Detects computers communicating with the Internet without approval
D)Each of these items are characteristics of a firewall
Unlock Deck
Unlock for access to all 170 flashcards in this deck.
Unlock Deck
k this deck
80
What is an encryption system that uses two keys: a public key that everyone can have and a private key for only the recipient?
A)Encryption
B)Public key encryption
C)Intrusion-detection software
D)Security-auditing software
A)Encryption
B)Public key encryption
C)Intrusion-detection software
D)Security-auditing software
Unlock Deck
Unlock for access to all 170 flashcards in this deck.
Unlock Deck
k this deck