• Question 1

0.5 out of 0.5 points

When company employees fail to realize the importance of the information written down and toss the paperwork in the garbage without shredding, it sets the company up to possibly intrusion due to:
Selected Answer:  

Dumpster diving

Answers: Hacking
Sniffer intrusions
 

Dumpster diving

Back door intrusions
  • Question 2

0.5 out of 0.5 points

The practice of sending extremely critical, derogatory e-mail messages or newsgroup postings to other users on the Internet is called _______________.

 

Selected Answer:  

flaming

Answers:  

flaming

 spamming
spoofing
 spying
  • Question 3

0.5 out of 0.5 points

A _______________ is software that can guess passwords.
Selected Answer:  

password cracker

Answers: logic bomb
 

password cracker

back door
sniffer
  • Question 4

0.5 out of 0.5 points

_______________ is/are the most commonly used security technology at large companies.
Selected Answer:  

Antivirus software

Answers: Intrusion-detection systems
Smart cards
Biometrics
 

Antivirus software

  • Question 5

0.5 out of 0.5 points

One way hackers gain access to an individual’s information is by faking an e-mail address or Web page to trick users into passing along critical information like credit card numbers. This is known as ________________.
Selected Answer:  

spoofing

Answers: sniffing
hacking
 phishing
 

spoofing

  • Question 6

0.5 out of 0.5 points

Which one of the following would NOT be considered as a way that a computer virus can enter a computer system?
Selected Answer:  

Running antivirus programs

Answers: E-mail and file attachments
 

Running antivirus programs

Downloaded copies of shareware
Borrowed copies of software
  • Question 7

0.5 out of 0.5 points

Denial of service attacks are:
Selected Answer:  

A tactic where someone attempts to overload a company’s website to slow performance or even shut down a website

Answers:  

A tactic where someone attempts to overload a company’s website to slow performance or even shut down a website

Is an attack where hackers change critical passwords to deny access to legitimate users
Attempts to shut down servers by interruption of power supplies
All answers are correct
  • Question 8

0.5 out of 0.5 points

Programs that automatically dial thousands of telephone numbers in search of a way in through a modem connection is a description of which of the following hacking tactics used to assault companies through the Internet and other networks?
Selected Answer:  

War Dialing

Answers: Scans
Back Doors
 

War Dialing

Sniffers
  • Question 9

0.5 out of 0.5 points

Your text describes firewalls as:
Selected Answer: A “gatekeeper” system that protects a company’s intranets and other computer networks from intrusion by providing a filter and safe transfer point for access to and from the Internet and other networks
Answers: The transmission of data through telecommunications lines in “scrambled” form
The act of ensuring the accuracy, integrity and safety of all E-business processes and resources
A “gatekeeper” system that protects a company’s intranets and other computer networks from intrusion by providing a filter and safe transfer point for access to and from the Internet and other networks
None of the choices are correct
  • Question 10

0.5 out of 0.5 points

Software that employs users’ Internet connections in the background without their knowledge or explicit permission to collect specific information about you, ranging from general demographics such as name, address, credit card numbers, passwords and other personal information is:
Selected Answer:  

Spyware

Answers: Adware
Shareware
 

Spyware

Freeware
  • Question 11

0.5 out of 0.5 points

Your text describes encryption as:
Selected Answer:  

The transmission of data through telecommunications lines in “scrambled” form

Answers:  

The transmission of data through telecommunications lines in “scrambled” form

The act of ensuring the accuracy, integrity and safety of all E-business processes and resources
A “gatekeeper” system that protects a company’s intranets and other computer networks from intrusion by providing a filter and safe transfer point for access to and from the Internet and other networks
None of the choices are correct
  • Question 12

0.5 out of 0.5 points

The goal of security management is:
Selected Answer:  

To ensure the accuracy, integrity and safety of all information system processes and resources

Answers: To design healthy work environments that are safe, comfortable and pleasant for people to work in
 

To ensure the accuracy, integrity and safety of all information system processes and resources

To ensure the access and effective use of all information system processes and resources
To design policies to ensure the privacy of personal information
  • Question 13

0.5 out of 0.5 points

Individuals have been mistakenly arrested and jailed and people have been denied credit because of their physical profiles. These are often results of:
Selected Answer:  

Computer profiling and computer matching

Answers:  

Computer profiling and computer matching

Computer libel
Censorship
Privacy
  • Question 14

0.5 out of 0.5 points

The development of __________________ has lead to the violation of intellectual property rights held by musicians due to illegal coping of music.
Selected Answer:  

Peer-to-peer networks

Answers:  

Peer-to-peer networks

The Internet
Software piracy
Compact disks
  • Question 15

0.5 out of 0.5 points

Concerning the issue of opt-in or opt-out:
Selected Answer: The US has leaned toward the more business friendly opt-out model while European countries have leaned toward the more consumer protective opt-in model
Answers: The US has leaned toward the more business friendly opt-out model while European countries have leaned toward the more consumer protective opt-in model
The principles are similar, but use different virus protection standards to ensure consumer protection
Is an issue most companies in the world decide for themselves which they want to use
None of the choices are correct
  • Question 16

0.5 out of 0.5 points

Your text defines flaming as the:
Selected Answer:  

Sending of extremely critical, derogatory and vulgar E-mail messages

Answers: Indiscriminate sending of unsolicited E-mail messages to many Internet users
 

Sending of extremely critical, derogatory and vulgar E-mail messages

Use of cookie files to collect unauthorized data on individuals
None of the above applies to the concept of flaming
  • Question 17

0.5 out of 0.5 points

_______________ refers to sifting through a company’s garbage to find information to help break into their computers.
Selected Answer:  

Dumpster Diving

Answers:  

Dumpster Diving

Password cracker
 Back door
Sniffe
  • Question 18

0.5 out of 0.5 points

Using fake email or websites to gather personal information is called:
Selected Answer:  

Phishing

Answers:  

Phishing

Dumpster diving
Scamming
Cracking
  • Question 19

0.5 out of 0.5 points

Why is computer monitoring being criticized as an invasion of the privacy of employment?
Selected Answer:  

In many cases, the employees do not know that they are being monitored or don’t know how the information is being used

Answers:  

In many cases, the employees do not know that they are being monitored or don’t know how the information is being used

People have a right to express their opinions and the right to publish those opinions on the Internet
Information technology has created repetitive jobs that cause serious health problems
There have been incidents of racist or defamatory messages on the Web
  • Question 20

0.5 out of 0.5 points

Hacking, in computerese is the obsessive use of computers or the unauthorized access and use of networked computer systems. Which of the following is NOT considered a hacker?
Selected Answer:  

Outsiders who use the Internet to view a company’s website

Answers: Outsiders who use the Internet to damage data
Company employees who use the Internet to steal data and programs
Company employees who use the Internet to damage data
 

Outsiders who use the Internet to view a company’s website