Accounting
Anthropology
Archaeology
Art History
Banking
Biology & Life Science
Business
Business Communication
Business Development
Business Ethics
Business Law
Chemistry
Communication
Computer Science
Counseling
Criminal Law
Curriculum & Instruction
Design
Earth Science
Economic
Education
Engineering
Finance
History & Theory
Humanities
Human Resource
International Business
Investments & Securities
Journalism
Law
Management
Marketing
Medicine
Medicine & Health Science
Nursing
Philosophy
Physic
Psychology
Real Estate
Science
Social Science
Sociology
Special Education
Speech
Visual Arts
Mathematic
Q:
Downloading a song or album from the Internet is usually not a violation of intellectual property laws.
Q:
A cookie a small file created by a Web page and stored on your computer.
Q:
Copyright applies to the implementation of an idea.
Q:
Spam is unsolicited e-mail that advertises goods and services.
Q:
In the United States, a person cannot legally make even one backup copy of software.
Q:
Spam can be perfectly blocked by using filters.
Q:
Copyright statements vary in their details. For example, some allow installation on multiple machines and some don't.
Q:
Spyware, sneakware, and stealthware are all different versions of cookies.
Q:
Electronic privacy cannot be invaded.
Q:
Biometrics identifies individuals based on physiological characteristics.
Q:
Snoopware can be used to monitor what your computer is being used for.
Q:
E-mail is completely secure.
Q:
The Electronic Communications Privacy Act of 1986 completely forbids the interception of wired and wireless communications completely.
Q:
Identity theft occurs when someone forges your identity for fraudulent purposes.
Q:
A worm attaches itself to a Word file.
Q:
A computer virus may spread across many hundreds of computers before it is detected.
Q:
Encryption scrambles the contents of a file so you can't read it without having the right decryption key.
Q:
Privacy is the right to be left alone when you want to be, to have control over your own personal possessions, and not to be observed without your consent.
Q:
People rarely do anything unethical involving computers.
Q:
Key logger, or key trapper software, is software that records sounds.
Q:
The only factor involved in ethical decisions is the person's basic ethical structure developed since childhood.
Q:
A hardware key logger is a hardware device that captures keystrokes on their journey from the keyboard to the motherboard.
Q:
Ethical decisions are always easy and straightforward.
Q:
A cookie is a small file deposited on your hard disk by a Web site containing information about you and your Web activities.
Q:
The possible consequences rarely influence an ethical decision.
Q:
Adware is software to generate ads that installs itself on your computer when you download some other (usually free) program from the Web.
Q:
A worm hides your identity from the Web sites you visit.
Q:
Spyware is software that comes hidden in free downloadable software and collects information about you and your computer and reports it to someone without your permission.
Q:
A Web log consists of one line of information for every visitor to a Web site and is usually stored on a Web server.
Q:
A clickstream will record information about you during a Web surfing session such as what Web sites you visited, how long you were there, what ads you looked at, and what you bought.
Q:
Anonymous Web browsing (AWB) service gives your identity to the Web sites you visit.
Q:
Spyware is one example of Trojan horse software.
Q:
A Web log is a file stored on your computer showing a history of sites you have visited.
Q:
Hackers are generally very knowledgeable computer users who use their knowledge to invade other people's computers.
Q:
The Fair Use Doctrine says that you may not use copyrighted material in certain situations for example, in the creation of new work or, within certain limits, for teaching purposes.
Q:
Pirated software is the unauthorized use, duplication, distribution or sale of copyrighted software.
Q:
Software piracy rarely happens so companies should not spend a lot trying to curb it.
Q:
What says that you may use copyrighted material in certain situations for example, in the creation of new work or, within certain limits, for teaching purposes?A.EthicsB.Intellectual propertyC.CopyrightD.Fair Use Doctrine
Q:
Ethics are the principles and standards that guide our behavior toward other people.
Q:
Intellectual property is tangible creative work that is embodied in physical form.
Q:
Copyright is the legal protection afforded an expression of an idea, such as a song, video game, and some types of proprietary documents.
Q:
When you purchase copyrighted software, what actually are you paying for?
A.The cost of the CDs
B.The cost of the CDs, manuals, and the cost of the software development
C.A share of the cost of software development
D.The right to use it
Q:
What is the legal protection afforded an expression of an idea, such as a song, video game, and some types of proprietary documents?
A.Ethics
B.Intellectual property
C.Copyright
D.Fair Use Doctrine
Q:
Which of the following captures screen images?
A.Key logger
B.Packet sniffer
C.Log analysis tools
D.Screen capture software
Q:
Which of the following examines information passing through network switches, hubs, or routers?
A.Key logger
B.Packet sniffer
C.Log analysis tools
D.Screen captures
Q:
Which of the following records logons and deletions?
A.Key logger
B.Packet sniffer
C.Log analysis tools
D.Screen captures
Q:
What is the name of the new anti-Spam bill?
A.No-Spam
B.CAN-Spam
C.Spam-Away
D.Stop Spam
Q:
What is intangible creative work that is embodied in physical form?
A.Ethics
B.Intellectual property
C.Copyright
D.Fair Use Doctrine
Q:
Which of the following can not be used for biometrics?
A.Fingerprint
B.Retina
C.Password
D.Voice
Q:
We lose more money to white-collar crime than we spend on the Federal defense budget. Which of the following statistics is not true about employees and their potential to commit crime?
A.Most employees are honest and would not commit crime
B.10% of employees are complete honest
C.10% of employees will steal
D.Circumstances will dictate if most employees commit crime or not
Q:
Who uses hacking code on Web sites to click-and-point their way into systems to cause damage or spread viruses?
A.White-hat hacker
B.Black-hat hacker
C.Hacktivists
D.Script kiddies
Q:
As an owner of a company, what would be a safe assumption on your part regarding your employees and their potential to commit crime?
A.Most would not commit a crime
B.Most will commit a crime
C.It will depend on the socio economic status of your employees
D.If "push came to shove" most employees would commit a crime
Q:
What is an encryption system that uses two keys: a public key that everyone can have and a private key for only the recipient?
A.Encryption
B.Public key encryption
C.Intrusion-detection software
D.Security-auditing software
Q:
What is the term that refers to people who break into the computer systems of others?
A.Hijacker
B.Spytech
C.Worm
D.Hacker
Q:
Which of the following do viruses harm?
A.Your keyboard
B.Your monitor
C.Your processor
D.Viruses do not harm hardware
Q:
Which of the following is a knowledgeable computer user who breaks into your computer because of philosophical or political reasons?
A.Hacker
B.Cracker
C.Hacktivist
D.Spytech
Q:
Which of the following can a virus do?
A.Hurt your hardware
B.Hurt any files it wasn't designed to attack
C.Infect files on write-protected disks
D.Target and corrupts specific applications or files
Q:
Often times, a company will hire a hacker to find vulnerabilities in systems and plug up the holes. What is this person called?
A.Black-hat hacker
B.Hactivist
C.Cracker
D.White-hat hacker
Q:
Which of the following is a characteristic of a firewall?
A.Examines each message as it seeks entrance to the network
B.Blocks messages without the correct markings from entering the network
C.Detects computers communicating with the Internet without approval
D.Each of these items are characteristics of a firewall
Q:
What is a person called who uses a computer to cause harm to people or destroy critical systems?
A.Cyberterrorist
B.Black-hat hacker
C.CyberCracker
D.Hacktivist
Q:
What is a computer virus?
A.Software that is written with malicious intent to cause annoyance or damage
B.Software that hides your identity from Web sites you visit
C.Utilities that hide themselves from the operating system and monitor the software you have
D.Applications that record activities and site information regarding your surfing sessions
Q:
What is the most prevalent type of computer virus?
A.Denial-of-service attack
B.Online blackmail
C.Script kiddies
D.Worms
Q:
What type of computer virus finds your email contacts and sends itself to those accounts?
A.Worms
B.Script kiddies
C.Denial-of-service attack
D.Online blackmail
Q:
If you were trying to access your campus network but the system was unable to respond to you because it was overwhelmed with a flood of requests coming from some virus, what type of attack would you be experiencing?
A.Worms
B.Script kiddies
C.Denial-of-service
D.Cyber blackmail
Q:
What software should you install to protect your computer from computer viruses?
A.Spyware
B.Adware
C.Worms
D.Anti-virus
Q:
What type of software should you install to protect yourself from identify theft?
A.Anti-virus
B.Anti-phishing
C.AdAware
D.WormAware
Q:
What type of hardware and/or software should you install to protect your computer from intruders entering into your system from your network connection?
A.Passports
B.Anti-virus
C.Firewall
D.Network monitor
Q:
What type of access authentication system uses your physical characteristics to determine if you should, or should not, have access to a computer system?
A.Behaviometrics
B.Human system recognition
C.Biometrics
D.Physiological systems
Q:
If you were typing a sensitive message to your manager and you wanted to ensure that no one could read it but the person you were sending it to, what should you do to the message?
A.Run anti-virus software before sending it to ensure it has not been infected by a virus or spyware
B.Send it through a Web site that supports anonymizing
C.Use only your organization's internal systems so that it can't go through the Internet
D.Encrypt the message before sending it to the manager
Q:
What hardware device captures keystrokes moving from the keyboard to the motherboard?
A.Hardware key logger
B.Clickstream device
C.Keyboard monitoring systems (KMS)
D.Hardware loggers, clickstream devices, and KMSs
Q:
Who commits most of the computer crime made against companies?
A.Employees
B.Competitors
C.Terrorists
D.Hackers
Q:
What law forbids the interception of wired and electronic communication but allows for business surveillance of employee computer activity?
A.Electronic Communications Privacy Act of 1986
B.Fair Use Doctrine
C.Public Safety and Privacy Act of 2000
D.Telecommunications Act of 1989
Q:
Due to the massive amounts of information gathered about customers, what type of software is one of the fastest growing?
A.CRM
B.ARM
C.Adware, Sneakware, and Cookie management
D.Anonymous Web browsing
Q:
Which of the following is a small file that contains information about you and your Web activities?
A.Software logger
B.Cookies
C.Web log
D.Web threads
Q:
How can you block a business' attempt to store information about your Web activities?
A.Avoid the Internet and purchasing products and services on it
B.Block cookies
C.Install and use SpamWare
D.Install and use SpyWare and SpamWare
Q:
What is unsolicited email from businesses that advertise goods and services?
A.Computer viruses
B.Spam
C.Cookies
D.Sneakware
Q:
What is the difference between spam and phishing?
A.Spam is sent via email; phishing is not
B.Phishing is about pornography; spam is not
C.Phishing attempts to get your personal information; spam does not
D.There is virtually no difference between spam and phishing
Q:
What is the banner ads that sit on Web pages called?
A.Adware
B.Spam
C.Phishes
D.Virus
Q:
What type of software is adware?
A.Trojan horse
B.Cookie
C.Sneakware
D.Stealthware
Q:
What is Trojan horse software?
A.A software program that comes bundled with some other program; you can access it with one click
B.Copy protection technology; to use the software your must first click on a copy protection agreement
C.Downloading and installation utilities
D.Hidden software that is placed on your computer because you agreed to something buried in a disclaimer or agreement