Chapter 11 True/False Darken the letter on a Scantron that indicates whether the sentence or statement is true or false. 1. Like a virus or worm, a Trojan horse replicates itself to other computers. 2. Most systems require that users select their own passwords. 3. Examples of possessed objects are badges, cards, smart cards, and keys. 4. Possessed objects often are used in combination with personal identification numbers. 5. The best preventive measures against hardware theft and vandalism are common sense and a constant awareness of the risk. 6. Software piracy is by far the least common form of software theft. 7. Most organizations use available software packages for encryption. 8. All surge protectors are 100 percent effective. 9. The higher a surge protector’s Joule rating, the poorer the protection. 10. A growing trend is to use an Internet hard drive as an offsite location for backup copies. 11. Some users implement a three-generation backup policy to preserve three copies of important files. 12. S-HTTP is easier to use than SSL, but it is less secure. 13. A copyright protects any tangible form of expression. 14. Tendonitis is inflammation of the nerve that connects the forearm to the palm of the wrist. 15. Computer addiction is an untreatable illness. Multiple Choice Darken the letter on a Scantron of the choice that best completes the statement or answers the question. 16. A ____ is a malicious-logic program that hides within or looks like a legitimate program and usually is triggered by a certain condition or action. a. computer virus c. Trojan horse b. worm d. all of the above 17. Some viruses are hidden in ____, which are instructions saved in an application such as a word processing or spreadsheet program. a. macros c. cookies b. logs d. spikes 18. Each character added to a password significantly ____ it might take for someone or for a hacker’s computer to guess the password. a. reduces the number of combinations and the length of time b. reduces the number of combinations but increases the length of time c. increases the number of combinations but reduces the length of time d. increases the number of combinations and the length of time 19. Some notebook computers use ____ as methods of security. a. passwords c. biometrics 20. 21. 22. 23. 24. 25. b. possessed objects d. all of the above When a mobile user connects to a main office using a standard Internet connection, a ____ provides the mobile user with a secure connection to the company network server. a. value added network (VAN) c. virtual private network (VPN) b. local area network (LAN) d. wide area network (WAN) ____, which allows users to choose an encryption scheme that passes between a client and a server, requires that both the client and server have digital certificates. a. Secure Sockets Layer (SSL) b. Secure HTTP (S-HTTP) c. Secure Electronics Transactions (SET™) Specifications d. Pretty Good Privacy (PGP) The ____ uses encryption to secure financial transactions on the Internet. a. Secure Sockets Layer (SSL) b. Secure HTTP (S-HTTP) c. Secure Electronics Transactions (SET™) Specifications d. Pretty Good Privacy (PGP) A ____ is a mathematical formula that generates a code from the contents of an e-mail message. a. spike c. password b. macro d. hash The 1970 ____ limits the rights of those viewing a credit report to only those with a legitimate business need, but does not define a legitimate business need. a. Electronic Communications Privacy Act (ECPA) b. Fair Credit Reporting Act c. Computer Fraud and Abuse Act d. Computer Matching and Privacy Protection Act ____ is an applied science devoted to incorporating comfort, efficiency, and safety into the design of items in the workplace. a. Ergonomics c. Epidemics b. Eurhythmics d. Econometrics Chapter 11 Answer Section TRUE/FALSE 1. 2. 3. 4. 5. 6. 7. 8. 9. 10. 11. 12. 13. 14. 15. ANS: ANS: ANS: ANS: ANS: ANS: ANS: ANS: ANS: ANS: ANS: ANS: ANS: ANS: ANS: F T T T T F T F F T T F T F F DIF: DIF: DIF: DIF: DIF: DIF: DIF: DIF: DIF: DIF: DIF: DIF: DIF: DIF: DIF: Primary Primary Secondary Secondary Primary Primary Secondary Primary Secondary Secondary Secondary Secondary Primary Secondary Primary REF: REF: REF: REF: REF: REF: REF: REF: REF: REF: REF: REF: REF: REF: REF: 11.03 11.11 11.12 11.12 11.14 11.14 11.17 11.19 11.19 11.20 11.20 11.22 11.24 11.32 11.35 OBJ: OBJ: OBJ: OBJ: OBJ: OBJ: OBJ: OBJ: OBJ: OBJ: OBJ: OBJ: OBJ: OBJ: OBJ: 2 3 3 3 4 5 6 7 7 8 8 9 10 12 12 DIF: DIF: DIF: DIF: DIF: DIF: DIF: DIF: DIF: DIF: Primary Secondary Primary Secondary Secondary Secondary Secondary Secondary Primary Secondary REF: REF: REF: REF: REF: REF: REF: REF: REF: REF: 11.03 11.05 11.11 11.14 11.17 11.22 11.22 11.23 11.31 11.34 OBJ: OBJ: OBJ: OBJ: OBJ: OBJ: OBJ: OBJ: OBJ: OBJ: 2 2 3 4 6 9 9 9 11 12 MULTIPLE CHOICE 16. 17. 18. 19. 20. 21. 22. 23. 24. 25. ANS: ANS: ANS: ANS: ANS: ANS: ANS: ANS: ANS: ANS: C A D D C B C D B A