Peter Francis Hughes © Legal Studies 2012 Unit 3 CHAPTER THREE PART E The Constitution.
Chapter 3 Hughes
-
Upload
leonard-planck-iii -
Category
Documents
-
view
10 -
download
4
description
Transcript of Chapter 3 Hughes
Chapter 3 Hughes
Question 1
0 out of 1 points
Improvements in information technologies are leading to a decreasing number of ethical problems.Answer Selected Answer: TrueCorrect Answer: FalseResponse Feedback:
Question 2
1 out of 1 points
The computing skills necessary to be a hacker are increasing.Answer Selected Answer: FalseCorrect Answer: FalseResponse Feedback:
Question 3
1 out of 1 points
When you interview for a job at a company, it is likely that the company will Google you and search social networking sites for information on you.Answer Selected Answer: TrueCorrect Answer: TrueResponse Feedback:
Question 4
1 out of 1 points
The higher the level of an employee in organization, the lower the threat that he or she poses to the organization.Answer Selected Answer: FalseCorrect Answer: FalseResponse Feedback:
Question 5
1 out of 1 points
A password refers to “something the user is.”Answer Selected Answer: FalseCorrect Answer: FalseResponse Feedback:
Question 6
1 out of 1 points
To defend itself against downstream liability, a company must prove that it practices due diligence in information security.Answer Selected Answer: TrueCorrect Answer: TrueResponse Feedback:
Question 7
0 out of 1 points
Dumpster diving is:Answer
Selected Answer: D. always illegal because it is considered trespassing.
Correct Answer: C. typically committed for the purpose of identity theft.
Response Feedback: Threats to Information Security
Question 8
0 out of 1 points
Which of the following factors are not increasing the threats to information security?Answer
Selected Answer: E. due diligence
Correct Answer: A. limited storage capacity on portable devices
Response Feedback: Threats to Information Security
Question 9
1 out of 1 points
Passwords and passphrases are examples of:Answer
Selected Answer: A. something the user knows.
Correct Answer: A. something the user knows.
Response Feedback: Protecting Information Resources
Question 10
1 out of 1 points
An organization's e-mail policy has the least impact on which of the following software attacks?Answer
Selected Answer: C. zero-day
Correct Answer: C. zero-day
Response Feedback: Threats to Information Security
Question 11
1 out of 1 points
What is _____ is not necessarily _____.Answer
Selected Answer: A. Unethical, illegal
Correct Answer: A. Unethical, illegal
Response Feedback: Ethical Issues
Question 12
0 out of 1 points
Which of the following statements is correct?Answer
Selected Answer:
A. Consistent international privacy and security laws help companies with their regulatory requirements from country to country.
Correct Answer:
D. International privacy and security laws have led to a complex global legal framework.
Response Feedback: Ethical Issues
Question 1
0 out of 1 points
_____ is clandestine software that is installed on your PC through duplicitous channels, but is not very malicious.Answer
Selected Answer: A. Worm
Correct Answer: E. Alien software
Response Feedback: Threats to Information Security
Question 2
1 out of 1 points
_____ uses deception to fraudulently acquire sensitive personal information by masquerading as an official e-mail.Answer
Selected Answer: D. Phishing
Correct Answer: D. Phishing
Response Feedback: Threats to Information Security
Question 3
1 out of 1 points
Biometrics are an example of:Answer
Selected Answer: E. something the user is.
Correct Answer: E.
something the user is.
Response Feedback: Protecting Information Resources
Question 4
1 out of 1 points
Which of the following factors are not increasing the threats to information security?Answer
Selected Answer: C. limited storage capacity on portable devices
Correct Answer: C. limited storage capacity on portable devices
Response Feedback: Threats to Information Security
Question 5
1 out of 1 points
Dumpster diving is:Answer
Selected Answer: A. typically committed for the purpose of identity theft.
Correct Answer: A. typically committed for the purpose of identity theft.
Response Feedback: Threats to Information Security
Question 6
1 out of 1 points
An organization's e-mail policy has the least impact on which of the following software attacks?Answer
Selected Answer: C. zero-day
Correct Answer: C. zero-day
Response Feedback: Threats to Information Security
Question 7
1 out of 1 points
Trojan horses are software programs that hide in other computer programs and reveal their designed behavior only when they are activated.Answer Selected Answer: TrueCorrect Answer: TrueResponse Feedback:
Question 8
1 out of 1 points
Public-key encryption uses two different keys, one public and one private.Answer Selected Answer: TrueCorrect Answer: TrueResponse Feedback:
Question 9
0 out of 1 points
An individual or organization faced with an ethical decision is basically considering whether to break the law.Answer Selected Answer: True
Correct Answer: FalseResponse Feedback:
Question 10
1 out of 1 points
The higher the level of an employee in organization, the lower the threat that he or she poses to the organization.Answer Selected Answer: FalseCorrect Answer: FalseResponse Feedback:
Question 11
1 out of 1 points
Purchasing insurance is a type of risk acceptance.Answer Selected Answer: FalseCorrect Answer: FalseResponse Feedback:
Question 12
1 out of 1 points
A password refers to “something the user is.”Answer Selected Answer: FalseCorrect Answer: False
Question 1
0 out of 1 points
Which of the following is the most important issue raised by the numerous security breaches at NASA?Answer
Selected Answer:
E. Should NASA be required to detail its problems with cyberespionage to the taxpayers?
Correct Answer:
C. Is it possible to secure the Internet?
Response Feedback: Chapter Opening Case
Question 2
1 out of 1 points
_____ is the process in which an organization assesses the value of each asset being protected, estimates the probability that each asset might be compromised, and compares the probable costs of each being compromised with the costs of protecting it.Answer
Selected Answer: D. Risk analysis
Correct Answer: D. Risk analysis
Response Feedback: Protecting Information Resources
Question 3
1 out of 1 points
_____ is designed to use your computer as a launch pad for sending unsolicited e-mail to other computers.Answer
Selected Answer: D. Spamware
Correct Answer: D. Spamware
Response Feedback: Threats to Information Security
Question 4
1 out of 1 points
A(n) _____ is any danger to which an information resource may be exposed.Answer
Selected Answer: B. threat
Correct Answer: B. threat
Response Feedback: Threats to Information Security
Question 5
1 out of 1 points
An organization's e-mail policy has the least impact on which of the following software attacks?Answer
Selected Answer: B. zero-day
Correct Answer: B. zero-day
Response Feedback: Threats to Information Security
Question 6
0 out of 1 points
Which of the following is not a characteristic of strong passwords?Answer
Selected Answer:
C. should be difficult to guess
Correct Answer: A. should be shorter rather than longer so the password can be remembered
Response Feedback: Protecting Information Resources
Question 7
1 out of 1 points
When you interview for a job at a company, it is likely that the company will Google you and search social networking sites for information on you.Answer Selected Answer: TrueCorrect Answer: TrueResponse Feedback:
Question 8
0 out of 1 points
Dumpster diving is always illegal because it involves trespassing on private property.Answer Selected Answer: TrueCorrect Answer: FalseResponse Feedback:
Question 9
1 out of 1 points
When companies require users to accurately select characters in turn from a series of boxes, attackers use screen scrapers to capture this information.Answer
Selected Answer: TrueCorrect Answer: TrueResponse Feedback:
Question 10
1 out of 1 points
To defend itself against downstream liability, a company must prove that it practices due diligence in information security.Answer Selected Answer: TrueCorrect Answer: TrueResponse Feedback:
Question 11
1 out of 1 points
Improvements in information technologies are leading to a decreasing number of ethical problems.Answer Selected Answer: FalseCorrect Answer: FalseResponse Feedback:
Question 12
1 out of 1 points
The higher the level of an employee in organization, the lower the threat that he or she poses to the organization.Answer Selected Answer: FalseCorrect Answer: Fals
Question 1
0 out of 1 points
_____ involves building an inappropriate trust relationship with employees for the purpose of gaining sensitive information or unauthorized access privileges.Answer
Selected Answer: A. Hacking
Correct Answer: E. Social engineering
Response Feedback: Threats to Information Security
Question 2
1 out of 1 points
A(n) _____ is intellectual work that is known only to a company and is not based on public information.Answer
Selected Answer: D. trade secret
Correct Answer: D. trade secret
Response Feedback: Threats to Information Security
Question 3
1 out of 1 points
Bob is using public key encryption to send a message to Ted. Bob encrypts the message with Ted's _____ key and Ted decrypts the message using his _____ key.Answer
Selected Answer: B. public, private
Correct Answer: B. public, private
Response Feedback: See Protecting Information Resources
Question 4
1 out of 1 points
_____ is the process in which an organization assesses the value of each asset being protected, estimates the probability that each asset might be compromised, and compares the probable costs of each being compromised with the costs of protecting it.Answer
Selected Answer: C. Risk analysis
Correct Answer: C. Risk analysis
Response Feedback: Protecting Information Resources
Question 5
1 out of 1 points
In _____, the organization takes concrete actions against risks.Answer
Selected Answer: B. risk mitigation
Correct Answer: B. risk mitigation
Response Feedback: Protecting Information Resources
Question 6
0 out of 1 points
The process of profiling:Answer
Selected Answer: A. is legal, but unethical.
Correct Answer: C. decreases individual privacy.
Response Feedback: Ethical Issues
Question 7
0 out of 1 points
An individual or organization faced with an ethical decision is basically considering whether to break the law.Answer Selected Answer: TrueCorrect Answer: FalseResponse Feedback:
Question 8
1 out of 1 points
A code of ethics is a collection of principles that are intended to guide decision making by members of the organization.Answer Selected Answer: TrueCorrect Answer: TrueResponse Feedback:
Question 9
0 out of 1 points
In most cases, cookies track your path through Web sites and are therefore invasions of your privacy.Answer Selected Answer: TrueCorrect Answer: FalseResponse Feedback:
Question 10
1 out of 1 points
Cyberterrorism and cyberwarfare can attack supervisory control and data acquisition systems to cause widespread physical damage.Answer Selected Answer: TrueCorrect Answer: TrueResponse Feedback:
Question 11
1 out of 1 points
A password refers to “something the user is.”Answer Selected Answer: FalseCorrect Answer: FalseResponse Feedback:
Question 12
1 out of 1 points
In a distributed denial-of-service attack, a coordinated stream of requests is launched against a target from many compromised computers at the same time.Answer
Selected Answer: TrueCorrect Answer: True
Question 1
1 out of 1 points
Cyberterrorism and cyberwarfare can attack supervisory control and data acquisition systems to cause widespread physical damage.Answer Selected Answer: TrueCorrect Answer: TrueResponse Feedback:
Question 2
1 out of 1 points
The computing skills necessary to be a hacker are increasing.Answer Selected Answer: FalseCorrect Answer: FalseResponse Feedback:
Question 3
1 out of 1 points
An individual or organization faced with an ethical decision is basically considering whether to break the law.Answer Selected Answer: FalseCorrect Answer: FalseResponse Feedback:
Question 4
1 out of 1 points
A password refers to “something the user is.”Answer Selected Answer: FalseCorrect Answer: FalseResponse Feedback:
Question 5
0 out of 1 points
The security of each computer on the Internet is independent of the security of all other computers on the Internet.Answer Selected Answer: TrueCorrect Answer: FalseResponse Feedback:
Question 6
0 out of 1 points
Dumpster diving is always illegal because it involves trespassing on private property.Answer Selected Answer: TrueCorrect Answer: FalseResponse Feedback:
Question 7
1 out of 1 points
Biometrics are an example of:Answer
Selected Answer: A. something the user is.
Correct Answer: A. something the user is.
Response Feedback: Protecting Information Resources
Question 8
1 out of 1 points
In _____, the organization takes concrete actions against risks.Answer
Selected Answer: A. risk mitigation
Correct Answer: A. risk mitigation
Response Feedback: Protecting Information Resources
Question 9
0 out of 1 points
Employees in which functional areas of the organization pose particularly grave threats to information security?Answer
Selected Answer: B. finance, management information systems
Correct Answer: D. human resources, management information systems
Response Feedback: Threats to Information Security
Question 10
0 out of 1 points
A(n) _____ is any danger to which an information resource may be exposed.Answer
Selected Answer: A. risk
Correct Answer: D. threat
Response Feedback: Threats to Information Security
Question 11
0 out of 1 points
Voice and signature recognition are examples of:Answer
Selected Answer: E. something the user knows.
Correct Answer: B. something the user does.
Response Feedback: Protecting Information Resources
Question 12
0 out of 1 points
_____ are segments of computer code embedded within an organization's existing computer programs that activate and perform a destructive action at a certain time or date.Answer
Selected Answer: D. Viruses
Correct Answer: A. Logic bomb
Response Feedback: Threats to Information Security
Question 1
0 out of 1 points
Unintentional threats to information systems include all of the following except:Answer
Selected Answer: A. tornados
Correct Answer: B. malicious software
Response Feedback: Threats to Information Security
Question 2
0 out of 1 points
Rank the following in terms of dollar value of the crime, from highest to lowest.Answer
Selected Answer: D. cybercrime – robbery – white collar crime
Correct Answer: E. cybercrime – white collar crime – robbery
Response Feedback: Threats to Information Security
Question 3
0 out of 1 points
The most overlooked people in information security are:Answer
Selected Answer: C. executives and executive secretaries.
Correct Answer: D. janitors and guards.
Response Feedback: Threats to Information Security
Question 4
0 out of 1 points
In a(n) _____ attack, a coordinated stream of requests is launched against a target system from many compromised computers at the same time.Answer
Selected Answer: B. denial-of-service
Correct Answer: C. distributed denial-of-service
Response Feedback: Threats to Information Security
Question 5
0 out of 1 points
Which of the following statements is not correct concerning the difficulties in protecting information resources?Answer
Selected Answer:
C. Computer crimes often remain undetected for a long period of time.
Correct Answer: A. Rapid technological changes ensure that controls are effective for years.
Response Feedback: Protecting Information Resources
Question 6
0 out of 1 points
When companies attempt to counter _____ by requiring users to accurately select characters in turn from a series of boxes, attackers use _____.Answer
Selected Answer: B. spam, keyloggers
Correct Answer: A. keyloggers, screen scrapers
Response Feedback: Threats to Information Security
Question 7
1 out of 1 points
The computing skills necessary to be a hacker are increasing.Answer Selected Answer: FalseCorrect Answer: FalseResponse Feedback:
Question 8
0 out of 1 points
Zero-day attacks use descriptive e-mails to acquire sensitive personal information.Answer Selected Answer: TrueCorrect Answer: FalseResponse Feedback:
Question 9
1 out of 1 points
Improvements in information technologies are leading to a decreasing number of ethical problems.
Answer Selected Answer: FalseCorrect Answer: FalseResponse Feedback:
Question 10
1 out of 1 points
Public-key encryption uses two different keys, one public and one private.Answer Selected Answer: TrueCorrect Answer: TrueResponse Feedback:
Question 11
1 out of 1 points
In a distributed denial-of-service attack, a coordinated stream of requests is launched against a target from many compromised computers at the same time.Answer Selected Answer: TrueCorrect Answer: TrueResponse Feedback:
Question 12
1 out of 1 points
A password refers to “something the user is.”Answer Selected Answer: FalseCorrect Answer: False
Question 1
1 out of 1 points
To defend itself against downstream liability, a company must prove that it practices due diligence in information security.Answer Selected Answer: TrueCorrect Answer: TrueResponse Feedback:
Question 2
1 out of 1 points
In reverse social engineering, the employees approach the attacker.Answer Selected Answer: TrueCorrect Answer: TrueResponse Feedback:
Question 3
1 out of 1 points
The computing skills necessary to be a hacker are increasing.Answer Selected Answer: FalseCorrect Answer: FalseResponse Feedback:
Question 4
1 out of 1 points
In most cases, cookies track your path through Web sites and are therefore invasions of your privacy.Answer Selected Answer: FalseCorrect Answer: FalseResponse Feedback:
Question 5
1 out of 1 points
Improvements in information technologies are leading to a decreasing number of ethical problems.Answer Selected Answer: FalseCorrect Answer: FalseResponse Feedback:
Question 6
1 out of 1 points
Trojan horses are software programs that hide in other computer programs and reveal their designed behavior only when they are activated.Answer Selected Answer: TrueCorrect Answer: TrueResponse Feedback:
Question 7
1 out of 1 points
Your company's computers have been taken over by an attacker and used to attack another organization's information systems. Your problem is which of the following?Answer
Selected Answer: D. downstream liability
Correct Answer: D. downstream liability
Response Feedback: Threats to Information Security
Question 8
1 out of 1 points
Which of the following statements is not correct?Answer
Selected Answer:
E. As with normal first-class mail, employers cannot read employee e-mail.
Correct Answer: E. As with normal first-class mail, employers cannot read employee e-mail.
Response Feedback: Ethical Issues
Question 9
1 out of 1 points
The most overlooked people in information security are:Answer
Selected Answer: D. janitors and guards.
Correct Answer: D. janitors and guards.
Response Feedback: Threats to Information Security
Question 10
0 out of 1 points
Which attack method would most typically be used in cyberwarfare?Answer
Selected Answer: C. distributed denial-of-service
Correct Answer: E. supervisory control and data acquisition
Response Feedback: Threats to Information Security
Question 11
1 out of 1 points
_____ are segments of computer code embedded within an organization's existing computer programs that activate and perform a destructive action at a certain time or date.Answer
Selected Answer: E. Logic bomb
Correct Answer: E. Logic bomb
Response Feedback: Threats to Information Security
Question 12
1 out of 1 points
The process of profiling:Answer
Selected Answer: B. decreases individual privacy.
Correct Answer: B. decreases individual privacy.
Question 1
1 out of 1 points
A(n) _____ is a document that grants the holder exclusive rights on an invention for 20 years.Answer
Selected Answer: B. patent
Correct Answer: B. patent
Response Feedback: Threats to Information Security
Question 2
1 out of 1 points
_____ issues involve who may obtain information and how much they should pay for this information.Answer
Selected Answer: E. Accessibility
Correct Answer: E. Accessibility
Response Feedback: Ethical Issues
Question 3
1 out of 1 points
Which of the following statements is correct?Answer
Selected Answer:
B. International privacy and security laws have led to a complex global legal framework.
Correct Answer:
B. International privacy and security laws have led to a complex global legal framework.
Response Feedback: Ethical Issues
Question 4
0 out of 1 points
The computing skills necessary to be a hacker are decreasing for which of the following reasons?Answer
Selected Answer:
A. International organized crime is training hackers.
Correct Answer:
B. Computer attack programs, called scripts, are available for download from the Internet.
Response Feedback: Threats to Information Security
Question 5
0 out of 1 points
Your company's computers have been taken over by an attacker and used to attack another organization's information systems. Your problem is which of the following?Answer
Selected Answer: E. poor security policies and procedures
Correct Answer: C. downstream liability
Response Feedback: Threats to Information Security
Question 6
1 out of 1 points
_____ involves building an inappropriate trust relationship with employees for the purpose of gaining sensitive information or unauthorized access privileges.Answer
Selected Answer: A. Social engineering
Correct Answer: A. Social engineering
Response Feedback: Threats to Information Security
Question 7
0 out of 1 points
A password refers to “something the user is.”Answer Selected Answer: TrueCorrect Answer: FalseResponse Feedback:
Question 8
1 out of 1 points
In a distributed denial-of-service attack, a coordinated stream of requests is launched against a target from many compromised computers at the same time.Answer Selected Answer: TrueCorrect Answer: TrueResponse Feedback:
Question 9
1 out of 1 points
Dumpster diving is always illegal because it involves trespassing on private property.Answer Selected Answer: FalseCorrect Answer: FalseResponse Feedback:
Question 10
1 out of 1 points
When you interview for a job at a company, it is likely that the company will Google you and search social networking sites for information on you.Answer Selected Answer: TrueCorrect Answer: TrueResponse Feedback:
Question 11
1 out of 1 points
A code of ethics is a collection of principles that are intended to guide decision making by members of the organization.Answer Selected Answer: TrueCorrect Answer: TrueResponse Feedback:
Question 12
1 out of 1 points
When companies require users to accurately select characters in turn from a series of boxes, attackers use screen scrapers to capture this information.
Answer Selected Answer: TrueCorrect Answer: True
Question 1
0 out of 1 points
Biometrics are an example of:Answer
Selected Answer: A. something the user does.
Correct Answer: C. something the user is.
Response Feedback: Protecting Information Resources
Question 2
1 out of 1 points
_____ are software programs that hide in other computer programs and reveal their designed behavior only when they are activated.Answer
Selected Answer: D. Trojan horses
Correct Answer: D. Trojan horses
Response Feedback: Threats to Information Security
Question 3
1 out of 1 points
A(n) information system's _____ is the possibility that the system will suffer harm by a threat.
Answer
Selected Answer: A. vulnerability
Correct Answer: A. vulnerability
Response Feedback: Threats to Information Security
Question 4
1 out of 1 points
Which of the following statements is not correct concerning the difficulties in protecting information resources?Answer
Selected Answer:
A. Rapid technological changes ensure that controls are effective for years.
Correct Answer: A. Rapid technological changes ensure that controls are effective for years.
Response Feedback: Protecting Information Resources
Question 5
0 out of 1 points
_____ issues involve collecting, storing and disseminating information about individuals.Answer
Selected Answer: B. Accessibility
Correct Answer: A. Privacy
Response Feedback: Ethical Issues
Question 6
0 out of 1 points
Various organizations that promote fair and responsible use of information systems often develop _____:Answer
Selected Answer: A. a strategic plan
Correct Answer: E. a code of ethics
Response Feedback: Ethical Issues
Question 7
1 out of 1 points
Trojan horses are software programs that hide in other computer programs and reveal their designed behavior only when they are activated.Answer Selected Answer: TrueCorrect Answer: TrueResponse Feedback:
Question 8
0 out of 1 points
A code of ethics is a collection of principles that are intended to guide decision making by members of the organization.Answer Selected Answer: FalseCorrect Answer: TrueResponse Feedback:
Question 9
0 out of 1 points
The security of each computer on the Internet is independent of the security of all other computers on the Internet.Answer Selected Answer: TrueCorrect Answer: FalseResponse Feedback:
Question 10
0 out of 1 points
The computing skills necessary to be a hacker are increasing.Answer Selected Answer: TrueCorrect Answer: FalseResponse Feedback:
Question 11
1 out of 1 points
To defend itself against downstream liability, a company must prove that it practices due diligence in information security.Answer Selected Answer: TrueCorrect Answer: TrueResponse Feedback:
Question 12
1 out of 1 points
When companies require users to accurately select characters in turn from a series of boxes, attackers use screen scrapers to capture this information.Answer Selected Answer: TrueCorrect Answer: True
Question 1
1 out of 1 points
In a distributed denial-of-service attack, a coordinated stream of requests is launched against a target from many compromised computers at the same time.Answer Selected Answer: TrueCorrect Answer: TrueResponse Feedback:
Question 2
1 out of 1 points
Human errors cause more than half of the security-related problems in many organizations.Answer Selected Answer: TrueCorrect Answer: TrueResponse Feedback:
Question 3
1 out of 1 points
The higher the level of an employee in organization, the lower the threat that he or she poses to the organization.Answer Selected Answer: False
Correct Answer: FalseResponse Feedback:
Question 4
1 out of 1 points
To defend itself against downstream liability, a company must prove that it practices due diligence in information security.Answer Selected Answer: TrueCorrect Answer: TrueResponse Feedback:
Question 5
1 out of 1 points
Cyberterrorism and cyberwarfare can attack supervisory control and data acquisition systems to cause widespread physical damage.Answer Selected Answer: TrueCorrect Answer: TrueResponse Feedback:
Question 6
1 out of 1 points
Trojan horses are software programs that hide in other computer programs and reveal their designed behavior only when they are activated.Answer Selected Answer: TrueCorrect Answer: TrueResponse Feedback:
Question 7
1 out of 1 points
_____ issues involve collecting, storing and disseminating information about individuals.Answer
Selected Answer: C. Privacy
Correct Answer: C. Privacy
Response Feedback: Ethical Issues
Question 8
1 out of 1 points
A(n) _____ is any danger to which an information resource may be exposed.Answer
Selected Answer: A. threat
Correct Answer: A. threat
Response Feedback: Threats to Information Security
Question 9
1 out of 1 points
Biometrics are an example of:Answer
Selected Answer: E. something the user is.
Correct Answer: E. something the user is.
Response Feedback: Protecting Information Resources
Question 10
1 out of 1 points
_____ are segments of computer code embedded within an organization's existing computer programs that activate and perform a destructive action at a certain time or date.Answer
Selected Answer: C. Logic bomb
Correct Answer: C. Logic bomb
Response Feedback: Threats to Information Security
Question 11
0 out of 1 points
In _____, the attacker approaches employees, where in _____ the employees approach the attacker.Answer
Selected Answer: C. phishing, social engineering
Correct Answer: A. social engineering, reverse social engineering
Response Feedback: Threats to Information Security
Question 12
0 out of 1 points
Which of the following statements is correct?Answer
Selected Answer: A. An individual's right to privacy supersedes the needs of society.
Correct Answer: B. It is difficult to determine and enforce privacy regulations.
Question 1
1 out of 1 points
Trojan horses are software programs that hide in other computer programs and reveal their designed behavior only when they are activated.Answer Selected Answer: TrueCorrect Answer: TrueResponse Feedback:
Question 2
1 out of 1 points
In most cases, cookies track your path through Web sites and are therefore invasions of your privacy.Answer Selected Answer: FalseCorrect Answer: FalseResponse Feedback:
Question 3
1 out of 1 points
In reverse social engineering, the employees approach the attacker.Answer Selected Answer: TrueCorrect Answer: True
Response Feedback:
Question 4
1 out of 1 points
The higher the level of an employee in organization, the lower the threat that he or she poses to the organization.Answer Selected Answer: FalseCorrect Answer: FalseResponse Feedback:
Question 5
1 out of 1 points
When you interview for a job at a company, it is likely that the company will Google you and search social networking sites for information on you.Answer Selected Answer: TrueCorrect Answer: TrueResponse Feedback:
Question 6
1 out of 1 points
Human errors cause more than half of the security-related problems in many organizations.Answer Selected Answer: TrueCorrect Answer: TrueResponse Feedback:
Question 7
1 out of 1 points
Which of the following statements is correct?Answer
Selected Answer: B. It is difficult to determine and enforce privacy regulations.
Correct Answer: B. It is difficult to determine and enforce privacy regulations.
Response Feedback: Ethical Issues
Question 8
1 out of 1 points
_____ is designed to use your computer as a launch pad for sending unsolicited e-mail to other computers.Answer
Selected Answer: C. Spamware
Correct Answer: C. Spamware
Response Feedback: Threats to Information Security
Question 9
1 out of 1 points
Employees in which functional areas of the organization pose particularly grave threats to information security?Answer
Selected Answer: B. human resources, management information systems
Correct Answer: B.
human resources, management information systems
Response Feedback: Threats to Information Security
Question 10
0 out of 1 points
_____ issues involve the authenticity and fidelity of information that is collected and processed.Answer
Selected Answer: B. Privacy
Correct Answer: A. Accuracy
Response Feedback: Ethical Issues
Question 11
1 out of 1 points
Various organizations that promote fair and responsible use of information systems often develop _____:Answer
Selected Answer: B. a code of ethics
Correct Answer: B. a code of ethics
Response Feedback: Ethical Issues
Question 12
0 out of 1 points
In its study of various organizations, the Ponemon Institute found that the most common cause of data breaches was which of the following?
Answer
Selected Answer: E. weak passwords
Correct Answer: A. employee negligence
Question 1
1 out of 1 points
Cyberterrorism and cyberwarfare can attack supervisory control and data acquisition systems to cause widespread physical damage.Answer Selected Answer: TrueCorrect Answer: TrueResponse Feedback:
Question 2
1 out of 1 points
Dumpster diving is always illegal because it involves trespassing on private property.Answer Selected Answer: FalseCorrect Answer: FalseResponse Feedback:
Question 3
1 out of 1 points
In reverse social engineering, the employees approach the attacker.Answer Selected Answer: TrueCorrect Answer: True
Response Feedback:
Question 4
1 out of 1 points
An individual or organization faced with an ethical decision is basically considering whether to break the law.Answer Selected Answer: FalseCorrect Answer: FalseResponse Feedback:
Question 5
1 out of 1 points
The security of each computer on the Internet is independent of the security of all other computers on the Internet.Answer Selected Answer: FalseCorrect Answer: FalseResponse Feedback:
Question 6
1 out of 1 points
Human errors cause more than half of the security-related problems in many organizations.Answer Selected Answer: TrueCorrect Answer: TrueResponse Feedback:
Question 7
1 out of 1 points
_____ uses deception to fraudulently acquire sensitive personal information by masquerading as an official e-mail.Answer
Selected Answer: B. Phishing
Correct Answer: B. Phishing
Response Feedback: Threats to Information Security
Question 8
1 out of 1 points
_____ issues involve the authenticity and fidelity of information that is collected and processed.Answer
Selected Answer: D. Accuracy
Correct Answer: D. Accuracy
Response Feedback: Ethical Issues
Question 9
1 out of 1 points
A(n) information system's _____ is the possibility that the system will suffer harm by a threat.Answer
Selected Answer: A. vulnerability
Correct Answer: A. vulnerability
Response Feedback: Threats to Information Security
Question 10
1 out of 1 points
Various organizations that promote fair and responsible use of information systems often develop _____:Answer
Selected Answer: D. a code of ethics
Correct Answer: D. a code of ethics
Response Feedback: Ethical Issues
Question 11
0 out of 1 points
Access controls involve _____ before _____.Answer
Selected Answer: B. authorization, authentication
Correct Answer: D. authentication, authorization
Response Feedback: Protecting Information Resources
Question 12
1 out of 1 points
Your company's computers have been taken over by an attacker and used to attack another organization's information systems. Your problem is which of the following?
Answer
Selected Answer: B. downstream liability
Correct Answer: B. downstream liability
Question 1
1 out of 1 points
Which of the following is not a characteristic of strong passwords?Answer
Selected Answer:
E. should be shorter rather than longer so the password can be remembered
Correct Answer: E. should be shorter rather than longer so the password can be remembered
Response Feedback: Protecting Information Resources
Question 2
1 out of 1 points
Which of the following statements is not correct?Answer
Selected Answer:
C. As with normal first-class mail, employers cannot read employee e-mail.
Correct Answer: C. As with normal first-class mail, employers cannot read employee e-mail.
Response Feedback: Ethical Issues
Question 3
1 out of 1 points
_____ is clandestine software that is installed on your PC through duplicitous channels, but is not very malicious.Answer
Selected Answer: C. Alien software
Correct Answer: C. Alien software
Response Feedback: Threats to Information Security
Question 4
0 out of 1 points
_____ means verifying processing by checking for known outputs using specific inputs.Answer
Selected Answer: D. Auditing through the computer
Correct Answer: E. Auditing around the computer
Response Feedback: Protecting Information Resources
Question 5
1 out of 1 points
Passwords and passphrases are examples of:Answer
Selected Answer: D. something the user knows.
Correct Answer: D. something the user knows.
Response Feedback: Protecting Information Resources
Question 6
1 out of 1 points
_____ uses deception to fraudulently acquire sensitive personal information by masquerading as an official e-mail.Answer
Selected Answer: A. Phishing
Correct Answer: A. Phishing
Response Feedback: Threats to Information Security
Question 7
1 out of 1 points
A password refers to “something the user is.”Answer Selected Answer: FalseCorrect Answer: FalseResponse Feedback:
Question 8
1 out of 1 points
A code of ethics is a collection of principles that are intended to guide decision making by members of the organization.Answer Selected Answer: TrueCorrect Answer: TrueResponse Feedback:
Question 9
1 out of 1 points
Cyberterrorism and cyberwarfare can attack supervisory control and data acquisition systems to cause widespread physical damage.Answer Selected Answer: TrueCorrect Answer: TrueResponse Feedback:
Question 10
1 out of 1 points
Dumpster diving is always illegal because it involves trespassing on private property.Answer Selected Answer: FalseCorrect Answer: FalseResponse Feedback:
Question 11
1 out of 1 points
In most cases, cookies track your path through Web sites and are therefore invasions of your privacy.Answer Selected Answer: FalseCorrect Answer: FalseResponse Feedback:
Question 12
1 out of 1 points
Public-key encryption uses two different keys, one public and one private.Answer Selected Answer: TrueCorrect Answer: True
Question 1
1 out of 1 points
The process of profiling:Answer
Selected Answer: B. decreases individual privacy.
Correct Answer: B. decreases individual privacy.
Response Feedback: Ethical Issues
Question 2
1 out of 1 points
_____ is designed to use your computer as a launch pad for sending unsolicited e-mail to other computers.Answer
Selected Answer: E. Spamware
Correct Answer: E. Spamware
Response Feedback: Threats to Information Security
Question 3
1 out of 1 points
A(n) _____ is a document that grants the holder exclusive rights on an invention for 20 years.Answer
Selected Answer: C. patent
Correct Answer: C. patent
Response Feedback: Threats to Information Security
Question 4
1 out of 1 points
Passwords and passphrases are examples of:Answer
Selected Answer: B. something the user knows.
Correct Answer: B. something the user knows.
Response Feedback: Protecting Information Resources
Question 5
1 out of 1 points
A(n) _____ is any danger to which an information resource may be exposed.Answer
Selected Answer: E. threat
Correct Answer: E. threat
Response Feedback: Threats to Information Security
Question 6
1 out of 1 points
Which of the following statements is correct?Answer
Selected Answer: D. It is difficult to determine and enforce privacy regulations.
Correct Answer: D. It is difficult to determine and enforce privacy regulations.
Response Feedback: Ethical Issues
Question 7
1 out of 1 points
In most cases, cookies track your path through Web sites and are therefore invasions of your privacy.Answer Selected Answer: FalseCorrect Answer: FalseResponse Feedback:
Question 8
1 out of 1 points
A code of ethics is a collection of principles that are intended to guide decision making by members of the organization.Answer Selected Answer: TrueCorrect Answer: TrueResponse Feedback:
Question 9
1 out of 1 points
The security of each computer on the Internet is independent of the security of all other computers on the Internet.Answer Selected Answer: FalseCorrect Answer: FalseResponse Feedback:
Question 10
1 out of 1 points
In a distributed denial-of-service attack, a coordinated stream of requests is launched against a target from many compromised computers at the same time.Answer Selected Answer: TrueCorrect Answer: TrueResponse Feedback:
Question 11
1 out of 1 points
A password refers to “something the user is.”Answer Selected Answer: FalseCorrect Answer: FalseResponse Feedback:
Question 12
1 out of 1 points
Public-key encryption uses two different keys, one public and one private.Answer
Selected Answer: TrueCorrect Answer: True