Quiz 3 Q1. Which of the following replicates and spreads itself? a. Encryption b. Worm c. VoIP d. Spyware Answer B Q2. What type of network security applications watches the current network traffic, matching it against lists with characteristics of known attacks? a. Firewall b Intrusion detection system c. Denial-of-service d. Authenticity Answer A Q3. Which of the following is not a type of malware? a Encryption b. Worm c. Virus d. Spyware Answer a Q4. What is the difference between pirated and counterfeit software? A. Counterfeit is fake technology products; pirated is invisible technological cameras placed online. B. Pirated is the unauthorized use, duplication, distribution, or sale of copyrighted software; counterfeit is software that is manufactured to look like the real thing and sold as such. C. Counterfeit is the unauthorized use, duplication, distribution, or sale of copyrighted software; pirated is software that is manufactured to look like the real thing and sold as such. D. Pirated is stolen software used to hack into a company's classified material; counterfeit is a fake version of firewall software. Answer B Q5. Who are computer security professionals who are hired by a company to break into its computer system? a. Hacker b. Thrill-seeker hacker c White-hat hacker d. Black-hat hacker Answer C Q6. Jackie is the head teller at ABC Bank, and her responsibilities include overseeing and managing the tellers, resolving customer issues, and developing and implementing systems for an optimal and efficient team. She notices a steady increase in customer complaints and tracks back to find that the complaints started right around the time ABC Bank provided Internet access to all employees. Jackie watched the tellers closely and found that they were spending significant amounts of time playing Internet games and posting on Facebook. Which policy should the company implement to help eliminate this problem? A. An information privacy policy B. An email privacy policy C. An Internet use policy D. A workplace monitoring policy Answer C Q7.What is intangible creative work that is embodied in physical form? A) Ethics B) Intellectual property C) Copyright D) Fair Use Doctrine Answer: B Q8.Which of the following describes confidentiality? A) The assurance that messages and information are available only to those who are authorized to view them B) Policies and procedures that address the ethical use of computers and Internet usage in the business environment C) The right to be left alone when you want to be, to have control over your own personal possessions, and not to be observed without your consent D) The principles and standards that guide our behavior toward other people Answer: A Q9. How can you block a business' attempt to store information about your Web activities? a. Avoid the Internet and purchasing products and services on it b. Block cookies c. Install and use SpamWare d. Install and use SpyWare and SpamWare Answer b Q10. Your decisions regarding ethics are influenced by a number of factors. Which is not one of these factors? a. Magnitude of the outcome b. Your estimate of the importance of the situation c. Your age, gender, education, and socio-economic status d. Your perceptions of conflicting "right reactions" Answer C Q11. If you were to create a computer game for a homework assignment in programming, what type of law provides you with some protection against people selling your game without your consent? a Intellectual property b. Copyright c. Fair Use Doctrine d. Pirating laws Answer b Q 12. Berry was looking through your trash for personal information. This is called A. Striker bunny B. Dumpster diving C. Trash retrieval D. Approved consent Answer B Q13. What is the difference between a computer virus and a worm? a. A worm is a type of virus that replicates and spreads itself throughout computer systems b. The goal of a virus is to replicate; a worm weaves in and out of systems like a snake c. Viruses target systems and application software; worms target computer files d. The terms virus and worms can be used interchangeably; there is no difference Answer a Q14. If you were to download a computer game from the Internet and then sell this game to your friends, what would you be doing to the person who developed the game? a. Spamming them b. Phishing their software c. Pirating their software d. Stealing their profits Answer c Q15. Johnny used his social skills in tricking Mark into revealing access code. This would be called ______________. A. Social engineering B. Social media C. Social viruses D. Social processes Answer A Q 16. This computer is UB’s property and any misuse will result in revocation of your computer account is an example of: A. Information technology code B. Techie policy C. Ethical computer use policy D. Information systems Answer C Q 17. What is unsolicited email that plagues employees at all levels and clogs email systems? A. Spyware B. Spam C. Adware D. None of these Answer B Q 18. What is an Internet monitoring technique that captures keystrokes on their journey from the keyboard to the motherboard? A. Spyware B. Web log C. Adware D. Key logger Answer D Q 19. What is a small file deposited on a hard drive by a website that contains information about customers and their web activities? A. Key logger B. Hardware key logger C. Cookie D. Adware Answer C Q 20. What type of encryption technology uses multiple keys, one for public and one for private? A. Private key encryption B. Policy key encryption C. Public key encryption D. Protective key code Answer C Q 21 Mar Howe destroyed critical systems at eBay by using the Internet as a weapon of mass destruction? He will be called a A. White-hat hacker B. Black-hat hacker C. Cyberterrorists D. Script bunnies Answer C Q 22. Who are cyber vandals? a. Crackers b. Thrill-seeker hackers c. White-hat hackers d. Black-hat hackers Answer d Q 23. Sophie Black works as a computer programmer for a software company. Her boss, Mike Jones, is responsible for developing a new software game for the Wii. After completion of the project Mike gives all of the team members a free copy of the game without consent from the company. Sophie is a little hesitant and unsure about accepting the game because legally it would be considered _________. A. Counterfeit software B. Pirated software C. Ethical software D. Governance software Answer B Q 24 eBay is an example of an online company that has been faced with numerous security issues. For example, imagine you purchase a digital camera on eBay. Three months later, you might receive an email asking you to log in to the system to update your credit card or PayPal information. Of course, this email is not actually from eBay, and as soon as you log in, your information will be stolen. What type of information security breach would you consider this to be? A. An insider B. Dumpster diving C. Social engineering D. Phishing Answer D Q 25 What prevention technique scrambles information into an alternative form that requires a key or password to decrypt? A. Encryption B. Content filtering C. Firewalls D. Antivirus software Answer A Q 26. What is hardware or software that guards a private network by analyzing incoming and outgoing information for the correct markings? A. Firewall B. Certificate authority C. Online certificate D. Digital certificate Answer A Q 27. What is the process that provides a user with permission including access levels and abilities such as file access, hours of access, and amount of allocated storage space? A. Pharming B. Authentication C. Authorization D. Programming Answer C