True/False Questions

advertisement
Quiz 3
Q1.
Which of the following replicates and spreads itself?
a. Encryption
b. Worm
c. VoIP
d. Spyware
Answer B
Q2. What type of network security applications watches the current network traffic, matching
it against lists with characteristics of known attacks?
a. Firewall
b Intrusion detection system
c. Denial-of-service
d. Authenticity
Answer A
Q3. Which of the following is not a type of malware?
a Encryption
b. Worm
c. Virus
d. Spyware
Answer a
Q4.
What is the difference between pirated and counterfeit software?
A. Counterfeit is fake technology products; pirated is invisible technological cameras placed
online.
B. Pirated is the unauthorized use, duplication, distribution, or sale of copyrighted software;
counterfeit is software that is manufactured to look like the real thing and sold as such.
C. Counterfeit is the unauthorized use, duplication, distribution, or sale of copyrighted
software; pirated is software that is manufactured to look like the real thing and sold as such.
D. Pirated is stolen software used to hack into a company's classified material; counterfeit is a
fake version of firewall software.
Answer B
Q5. Who are computer security professionals who are hired by a company to break into its
computer system?
a. Hacker
b. Thrill-seeker hacker
c White-hat hacker
d. Black-hat hacker
Answer C
Q6. Jackie is the head teller at ABC Bank, and her responsibilities include overseeing and
managing the tellers, resolving customer issues, and developing and implementing systems
for an optimal and efficient team. She notices a steady increase in customer complaints and
tracks back to find that the complaints started right around the time ABC Bank provided
Internet access to all employees. Jackie watched the tellers closely and found that they were
spending significant amounts of time playing Internet games and posting on Facebook. Which
policy should the company implement to help eliminate this problem?
A. An information privacy policy
B. An email privacy policy
C. An Internet use policy
D. A workplace monitoring policy
Answer C
Q7.What is intangible creative work that is embodied in physical form?
A) Ethics
B) Intellectual property
C) Copyright
D) Fair Use Doctrine
Answer: B
Q8.Which of the following describes confidentiality?
A) The assurance that messages and information are available only to those who are
authorized to view them
B) Policies and procedures that address the ethical use of computers and Internet
usage in the business environment
C) The right to be left alone when you want to be, to have control over your own
personal possessions, and not to be observed without your consent
D) The principles and standards that guide our behavior toward other people
Answer: A
Q9. How can you block a business' attempt to store information about your Web activities?
a. Avoid the Internet and purchasing products and services on it
b. Block cookies
c. Install and use SpamWare
d. Install and use SpyWare and SpamWare
Answer b
Q10. Your decisions regarding ethics are influenced by a number of factors. Which is not one
of these factors?
a. Magnitude of the outcome
b. Your estimate of the importance of the situation
c. Your age, gender, education, and socio-economic status
d. Your perceptions of conflicting "right reactions"
Answer C
Q11. If you were to create a computer game for a homework assignment in programming,
what type of law provides you with some protection against people selling your game without
your consent?
a Intellectual property
b. Copyright
c. Fair Use Doctrine
d. Pirating laws
Answer b
Q 12. Berry was looking through your trash for personal information. This is called
A. Striker bunny
B. Dumpster diving
C. Trash retrieval
D. Approved consent
Answer B
Q13. What is the difference between a computer virus and a worm?
a. A worm is a type of virus that replicates and spreads itself throughout computer systems
b. The goal of a virus is to replicate; a worm weaves in and out of systems like a snake
c. Viruses target systems and application software; worms target computer files
d. The terms virus and worms can be used interchangeably; there is no difference
Answer a
Q14. If you were to download a computer game from the Internet and then sell this game to
your friends, what would you be doing to the person who developed the game?
a. Spamming them
b. Phishing their software
c. Pirating their software
d. Stealing their profits
Answer c
Q15. Johnny used his social skills in tricking Mark into revealing access code. This would be
called ______________.
A. Social engineering
B. Social media
C. Social viruses
D. Social processes
Answer A
Q 16. This computer is UB’s property and any misuse will result in revocation of your
computer account is an example of:
A. Information technology code
B. Techie policy
C. Ethical computer use policy
D. Information systems
Answer C
Q 17. What is unsolicited email that plagues employees at all levels and clogs email systems?
A. Spyware
B. Spam
C. Adware
D. None of these
Answer B
Q 18. What is an Internet monitoring technique that captures keystrokes on their journey from
the keyboard to the motherboard?
A. Spyware
B. Web log
C. Adware
D. Key logger
Answer D
Q 19. What is a small file deposited on a hard drive by a website that contains information
about customers and their web activities?
A. Key logger
B. Hardware key logger
C. Cookie
D. Adware
Answer C
Q 20. What type of encryption technology uses multiple keys, one for public and one for
private?
A. Private key encryption
B. Policy key encryption
C. Public key encryption
D. Protective key code
Answer C
Q 21 Mar Howe destroyed critical systems at eBay by using the Internet as a weapon of mass
destruction? He will be called a
A. White-hat hacker
B. Black-hat hacker
C. Cyberterrorists
D. Script bunnies
Answer C
Q 22. Who are cyber vandals?
a. Crackers
b. Thrill-seeker hackers
c. White-hat hackers
d. Black-hat hackers
Answer d
Q 23. Sophie Black works as a computer programmer for a software company. Her boss,
Mike Jones, is responsible for developing a new software game for the Wii. After completion
of the project Mike gives all of the team members a free copy of the game without consent
from the company. Sophie is a little hesitant and unsure about accepting the game because
legally it would be considered _________.
A. Counterfeit software
B. Pirated software
C. Ethical software
D. Governance software
Answer B
Q 24 eBay is an example of an online company that has been faced with numerous security
issues. For example, imagine you purchase a digital camera on eBay. Three
months later, you might receive an email asking you to log in to the system to
update your credit card or PayPal information. Of course, this email is not actually
from eBay, and as soon as you log in, your information will be stolen. What type
of information security breach would you consider this to be?
A. An insider
B. Dumpster diving
C. Social engineering
D. Phishing
Answer D
Q 25 What prevention technique scrambles information into an alternative form that requires
a key or password to decrypt?
A. Encryption
B. Content filtering
C. Firewalls
D. Antivirus software
Answer A
Q 26. What is hardware or software that guards a private network by analyzing incoming and
outgoing information for the correct markings?
A. Firewall
B. Certificate authority
C. Online certificate
D. Digital certificate
Answer A
Q 27. What is the process that provides a user with permission including access levels and
abilities such as file access, hours of access, and amount of allocated storage space?
A. Pharming
B. Authentication
C. Authorization
D. Programming
Answer C
Download