2010-9 - MavDISK

2010-9 - MavDISK 2010-9 - MavDISK

mavdisk.mnsu.edu
from mavdisk.mnsu.edu More from this publisher
21.07.2013 Views

2010-9 True/False Indicate whether the statement is true or false. ____ 1. “Shoulder surfing”occurs when an identity thief simply stands next to someone at a public office, such as the Bureau of Motor Vehicles, and watches as the person fills out personal information on a form. ____ 2. Originally, a cracker was a person who enjoys computer technology and spends time learning and using computer systems. ____ 3. Worms can create copies on the same computer or can send the copies to other computers via a network. ____ 4. Some antivirus software is capable of repairing common virus infections automatically, without interrupting your work. ____ 5. Using a password sniffer, a criminal hacker can gain access to computers and networks to steal data and information, invade privacy, plant viruses, and disrupt computer operations. ____ 6. Internet-based software piracy occurs whenever software is downloaded from the Internet. ____ 7. A key is a variable value that is applied using an algorithm to a string or block of unencrypted text to produce encrypted text or to decrypt encrypted text. ____ 8. The length of the key used to encode and decode messages determines the strength of the encryption algorithm. ____ 9. Biometrics is the most common method on the Internet for authenticating a message sender or encrypting a message. ____ 10. PKI uses four keys to encode and decode messages. ____ 11. PKI techniques compare a person’s unique characteristics against a stored set to detect differences between them. ____ 12. Intrusion detection systems send an alarm, often by e-mail or pager, to network security personnel when they detect an apparent attack. ____ 13. The Sarbanes-Oxley Act is a federal law passed in December 2000 that required federally funded libraries to use some form of prevention measure (such as Internet filters) to block access to obscene material and other material considered harmful to minors. ____ 14. A firewall can include both hardware and software that act as a barrier between an organization’s information system and the outside world. ____ 15. Federal law prohibits employers from monitoring e-mail sent and received by employees. ____ 16. E-mail messages that have been erased from hard disks can be retrieved and used in lawsuits because the laws of discovery demand that companies produce all relevant business documents. ____ 17. Instead of forcing users to find and read through the privacy policy for each site they visit, P3P software in a computer’s browser will download the privacy policy from each site, scan it, and notify the user if the policy does not match his or her preferences. ____ 18. The Children’s Online Privacy Protection Act (COPPA) was passed by Congress in October 2002. ____ 19. There is currently no federal law that bans unsolicited fax advertisements.

<strong>2010</strong>-9<br />

True/False<br />

Indicate whether the statement is true or false.<br />

____ 1. “Shoulder surfing”occurs when an identity thief simply stands next to someone at a public office, such as the<br />

Bureau of Motor Vehicles, and watches as the person fills out personal information on a form.<br />

____ 2. Originally, a cracker was a person who enjoys computer technology and spends time learning and using<br />

computer systems.<br />

____ 3. Worms can create copies on the same computer or can send the copies to other computers via a network.<br />

____ 4. Some antivirus software is capable of repairing common virus infections automatically, without interrupting<br />

your work.<br />

____ 5. Using a password sniffer, a criminal hacker can gain access to computers and networks to steal data and<br />

information, invade privacy, plant viruses, and disrupt computer operations.<br />

____ 6. Internet-based software piracy occurs whenever software is downloaded from the Internet.<br />

____ 7. A key is a variable value that is applied using an algorithm to a string or block of unencrypted text to produce<br />

encrypted text or to decrypt encrypted text.<br />

____ 8. The length of the key used to encode and decode messages determines the strength of the encryption<br />

algorithm.<br />

____ 9. Biometrics is the most common method on the Internet for authenticating a message sender or encrypting a<br />

message.<br />

____ 10. PKI uses four keys to encode and decode messages.<br />

____ 11. PKI techniques compare a person’s unique characteristics against a stored set to detect differences between<br />

them.<br />

____ 12. Intrusion detection systems send an alarm, often by e-mail or pager, to network security personnel when they<br />

detect an apparent attack.<br />

____ 13. The Sarbanes-Oxley Act is a federal law passed in December 2000 that required federally funded libraries to<br />

use some form of prevention measure (such as Internet filters) to block access to obscene material and other<br />

material considered harmful to minors.<br />

____ 14. A firewall can include both hardware and software that act as a barrier between an organization’s information<br />

system and the outside world.<br />

____ 15. Federal law prohibits employers from monitoring e-mail sent and received by employees.<br />

____ 16. E-mail messages that have been erased from hard disks can be retrieved and used in lawsuits because the laws<br />

of discovery demand that companies produce all relevant business documents.<br />

____ 17. Instead of forcing users to find and read through the privacy policy for each site they visit, P3P software in a<br />

computer’s browser will download the privacy policy from each site, scan it, and notify the user if the policy<br />

does not match his or her preferences.<br />

____ 18. The Children’s Online Privacy Protection Act (COPPA) was passed by Congress in October 2002.<br />

____ 19. There is currently no federal law that bans unsolicited fax advertisements.


____ 20. CTS involves wrist pain, a feeling of tingling and numbness, and difficulty grasping and holding objects.<br />

Multiple Choice<br />

Identify the choice that best completes the statement or answers the question.<br />

____ 21. The goal of the ____ act is to require healthcare organizations to implement cost-effective procedures for<br />

exchanging medical data.<br />

a. PA74<br />

b. Gramm-Leach-Bliley Financial Services Modernization<br />

c. Sarbanes-Oxley<br />

d. HIPAA<br />

____ 22. ____ involves the use of one’s social skills to get computer users to provide you with information to access an<br />

information system and/or its data.<br />

a. Dumpster diving c. Software piracy<br />

b. Social engineering d. Password sniffing<br />

____ 23. Going through the trash cans of an organization to find secret or confidential information, including<br />

information needed to access an information system and/or its data, is known as ____.<br />

a. dumpster diving c. software piracy<br />

b. social engineering d. phishing<br />

____ 24. ____ are employees, disgruntled or otherwise, working solo or in concert with outsiders to compromise<br />

corporate systems.<br />

a. Script bunnies c. Insiders<br />

b. Criminal hackers d. Social engineers<br />

____ 25. A ____ is a computer program file capable of attaching to disks or other files and replicating itself repeatedly,<br />

typically without the user’s knowledge or permission.<br />

a. virus c. PKI<br />

b. worm d. biometric<br />

____ 26. ____ are parasitic computer programs that replicate but do not infect other computer program files.<br />

a. Viruses c. Trojans<br />

b. Worms d. Biometrics<br />

____ 27. A ____ is a nonreplicating malicious program that disguises itself as a useful application and purposefully<br />

does something the user does not expect.<br />

a. virus c. Trojan horse<br />

b. worm d. biometric<br />

____ 28. ____ is the process of converting an original electronic message into a form that can be understood only by<br />

the intended recipients.<br />

a. Decryption c. Intrusion detection<br />

b. Software piracy d. Encryption<br />

____ 29. ____ enables users of an unsecured public network such as the Internet to securely and privately exchange<br />

data through the use of a public and a private cryptographic key pair that is obtained and shared through a<br />

trusted authority.<br />

a. Public key infrastructure c. Social engineering<br />

b. Ergonomics d. Biometrics<br />

____ 30. ____ involves the measurement of one of a person’s traits, whether physical or behavioral.<br />

a. Public key infrastructure c. Social engineering<br />

b. Ergonomics d. Biometrics<br />

____ 31. A(n) ____ monitors system and network resources and notifies network security personnel when it senses a<br />

possible intrusion.


a. password sniffer c. Trojan horse<br />

b. intrusion detection system d. antivirus software<br />

____ 32. The ____ act established a Privacy Study Commission to study existing databases and to recommend rules<br />

and legislation for consideration by Congress.<br />

a. Sarbanes-Oxley c. Gramm-Leach-Bliley<br />

b. PA74 d. USA Patriot<br />

____ 33. The ____ Act was passed in 1999 and required all financial institutions to protect and secure customers’<br />

nonpublic data from unauthorized access or use.<br />

a. USA Patriot c. Gramm-Leach-Bliley<br />

b. PA74 d. Sarbanes-Oxley<br />

____ 34. The terms of the ____ Act assume that all customers approve of the financial institutions’ collecting and<br />

storing their personal information.<br />

a. USA Patriot c. Gramm-Leach-Bliley<br />

b. PA74 d. Sarbanes-Oxley<br />

____ 35. Under the ____ Act, Internet service providers and telephone companies must turn over customer<br />

information, including numbers called, without a court order if the FBI claims that the records are relevant to<br />

a terrorism investigation.<br />

a. USA Patriot c. Gramm-Leach-Bliley<br />

b. PA74 d. Sarbanes-Oxley<br />

____ 36. ____ is the science of designing machines, products, and systems to maximize the safety, comfort, and<br />

efficiency of the people who use them.<br />

a. Biometrics c. Ergonomics<br />

b. PKI d. Encryption<br />

____ 37. ____ is a major component of ergonomics and an important feature of computer devices.<br />

a. Encryption c. Biometrics<br />

b. PKI d. Flexibility<br />

____ 38. Many organizations implement ____ to measure actual results against established goals, such as percentage of<br />

end-user reports produced on time, percentage of data input errors detected, number of input transactions<br />

entered per eight-hour shift, and so on.<br />

a. ergonomics c. biometrics<br />

b. internal audits d. external audits<br />

____ 39. The ____ Act requires public companies to implement procedures to ensure that their audit committees can<br />

document underlying financial data to validate earnings reports.<br />

a. Sarbanes-Oxley c. Gramm-Leach-Bliley<br />

b. PA74 d. HIPPA<br />

____ 40. ____ is charged with coordinating communication among experts during computer security emergencies and<br />

helping to prevent future incidents.<br />

a. DARPA<br />

b. The World Wide Consortium<br />

c. CERT<br />

d. The Software and Information Industry Alliance<br />

____ 41. ____ employees study Internet security vulnerabilities, handle computer security incidents, publish security<br />

alerts, research long-term changes in networked systems, develop information and training to help<br />

organizations improve security at their sites, and conduct an ongoing public awareness campaign.<br />

a. DARPA c. CERT<br />

b. Hewlett Packard d. Google<br />

____ 42. The term ____ is used to describe software programs that, when loaded into a computer system, will destroy,<br />

interrupt, or cause errors in processing.<br />

a. ergonomics c. biometrics


. malware d. PKI<br />

____ 43. The ____ virus gang conspired to infect computers with a virus which would turn each infected machine into<br />

a zombie machine under their control.<br />

a. m75 c. w00g<br />

b. m23 d. m00p<br />

____ 44. The ____ is a security service designed to locate and eliminate critical security vulnerabilities for<br />

organizations that subscribe to this service.<br />

a. Hewlett Packard Active Countermeasures<br />

b. Microsoft Active Countermeasures<br />

c. IBM Active Countermeasures<br />

d. CERT Active Countermeasures<br />

____ 45. ____ was the original antipiracy organization, formed and financed by many of the large software publishers.<br />

a. CERT<br />

b. DARPA<br />

c. The World Wide Consortium<br />

d. The Software and Information Industry Alliance<br />

____ 46. ____, an international industry group whose members include Apple, Commerce One, Ericsson, and<br />

Microsoft, is supporting the development of P3P.<br />

a. CERT<br />

b. DARPA<br />

c. The World Wide Consortium<br />

d. The Software and Information Industry Alliance<br />

____ 47. The specific goals of ____ are to protect children from potentially harmful material, while also safeguarding<br />

free speech on the Internet.<br />

a. CERT<br />

b. DARPA<br />

c. the Internet Content Rating Association<br />

d. the Software and Information Industry Alliance<br />

____ 48. The purpose of the ____ act is to provide certain safeguards for people against an invasion of personal privacy<br />

by requiring federal agencies to permit people to determine what records pertaining to them are collected,<br />

maintained, used, or disseminated by such agencies.<br />

a. PA74<br />

b. HIPPA<br />

c. Gramm-Leach-Bliley Financial Services Modernization<br />

d. Sarbanes-Oxley<br />

____ 49. The 1999 ____ Act requires all financial service institutions to communicate their data privacy rules and<br />

honor customer preferences.<br />

a. PA74<br />

b. Gramm-Leach-Bliley Financial Services Modernization<br />

c. HIPPA<br />

d. Sarbanes-Oxley<br />

____ 50. The hazardous activities associated with poorly designed work environments are collectively referred to as<br />

____.<br />

a. malware c. carpal tunnel syndrome<br />

b. biometrics d. work stressors<br />

Completion<br />

Complete each statement.


Essay<br />

51. A(n) ____________________ is someone who intimidates or coerces a government or organization to<br />

advance his or her political or social objectives by launching computer-based attacks against computers,<br />

networks, and the information stored on them.<br />

52. ____________________ is a crime in which an imposter obtains key pieces of personal identification<br />

information, such as Social Security or driver’s license numbers, in order to impersonate someone else.<br />

53. A(n) ____________________ is a computer-savvy person who attempts to gain unauthorized or illegal access<br />

to computer systems to steal passwords, corrupt files and programs, or even transfer money.<br />

54. ____________________ are wannabe crackers with little technical savvy - crackers who download programs<br />

called scripts - that automate the job of breaking into computers.<br />

55. A(n) ____________________ is a type of Trojan horse that executes when specific conditions occur.<br />

56. A(n) ____________________ is a modified version of a virus that is produced by the virus’s author or<br />

another person who amends the original virus code.<br />

57. ____________________ run in the background to protect your computer from dangers lurking on the Internet<br />

and other possible sources of infected files.<br />

58. A(n) ____________________ is a small program hidden in a network or a computer system that records<br />

identification numbers and passwords.<br />

59. ____________________ is the act of illegally duplicating software.<br />

60. The ________________________________________ is a screening technology that shields users from Web<br />

sites that don’t provide the level of privacy protection they desire.<br />

61. ______________________________ can include tendonitis, tennis elbow, the inability to hold objects, and<br />

sharp pain in the fingers.<br />

62. ______________________________ is the aggravation of the pathway for nerves that travel through the<br />

wrist.<br />

63. The ______________________________ bill requires companies with 15 or more employees who spend at<br />

least four hours a day working with computer screens to give 15-minute breaks every two hours.<br />

64. ____________________ screens provide a much better viewing experience for your eyes by virtually<br />

eliminating flicker and while still being bright without harsh incandescence.<br />

65. Practitioners in many professions subscribe to a(n) ____________________ that states the principles and core<br />

values that are essential to their work and thus governs their behavior.<br />

66. Computer ____________________ involves the inappropriate use of computer technology and resources.<br />

67. Computer-related ____________________ refer to errors, failures, and other computer problems that make<br />

computer output incorrect or not useful, caused mostly by human error.<br />

68. The U.S. Congress passed the ________________________________________ Act of 1998 to fight identity<br />

theft.<br />

69. Under the ________________________________________ Act, the Federal Trade Commission (FTC) is<br />

assigned responsibility to help victims restore their credit and erase the impact of the imposter.<br />

70. The ________________________________________ Act makes identity theft a federal felony punishable by<br />

a prison term ranging from 3 to 25 years.


71. List seven types of computer-related mistakes.<br />

72. Briefly discuss four useful policies that would allow you to minimize computer waste and mistakes.<br />

73. What are some of the questions that you should ask during the systems review process?<br />

74. Briefly discuss three tips that would help to prevent your computer from becoming infected by viruses and<br />

worms.<br />

75. What steps should be taken to aid the prevention of crime on the Internet?

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!