• MULTIPLE CHOICE
  • Chapter 2: Computing Security and Ethics true/false




    Download 94.63 Kb.
    Sana19.03.2017
    Hajmi94.63 Kb.

    Chapter 2: Computing Security and Ethics
    TRUE/FALSE
    1. Good computer security is as much about locking doors, storing backups, and following protocol as it is about writing smarter software to catch the bad guys.

    ANS: T PTS: 1 REF: 49


    2. Almost all intruders are fairly innocent computer users who stumble into a security hole and cause problems.

    ANS: F PTS: 1 REF: 50


    3. Altruism tends to motivate directed hackers, who are usually more proficient and do not advertise their exploits.

    ANS: F PTS: 1 REF: 51


    4. Malicious hackers—interested in vandalizing or terrorism—can be both directed and undirected.

    ANS: T PTS: 1 REF: 51


    5. A virus is a program that actively reproduces itself across a network.

    ANS: F PTS: 1 REF: 53


    6. Security managers divide attacks into three main categories: access, denial of service, and repudiation.

    ANS: F PTS: 1 REF: 55


    7. Repudiation attacks seek to create a false impression that an event didn’t occur when it actually did or did occur when it really did not.

    ANS: T PTS: 1 REF: 56


    8. S-HTTP and SSL both use a digital identity, which is issued by an identity authority to both the user’s browser and the vendor’s server.

    ANS: F PTS: 1 REF: 66


    9. The demilitarized zone (DMZ) separates services you want to offer internally from those you want to offer externally.

    ANS: T PTS: 1 REF: 70


    10. In the IT world, computer crime most often relates to physical theft rather than intellectual property.

    ANS: F PTS: 1 REF: 72


    11. Unfortunately reverse-engineering a program takes very little effort.

    ANS: F PTS: 1 REF: 73


    12. A patent protects inventions, the workings of a device, or a process.

    ANS: T PTS: 1 REF: 73


    13. Prosecuting a computer crime is a simple matter.

    ANS: F PTS: 1 REF: 76


    14. Using weak passwords could be considered unethical because they give online vandals access to systems.

    ANS: T PTS: 1 REF: 81


    15. Cracking or hacking into computers is the same as trespassing on someone’s land.

    ANS: T PTS: 1 REF: 82


    16. Programming is still more art than engineering.

    ANS: T PTS: 1 REF: 82


    17. All cultures have the same set of ethics or laws concerning privacy.

    ANS: F PTS: 1 REF: 83


    18. In general, starting in the late 1960s, laws related to ensuring privacy have become more protective of the privacy of U.S.
    General (lot. generalis - umumiy, bosh) - qurolli kuchlardagi harbiy unvon (daraja). Dastlab, 16-a.da Fransiyada joriy qilingan. Rossiyada 17-a.ning 2-yarmidan maʼlum. Oʻzbekiston qurolli kuchlarida G.
    residents.

    ANS: T PTS: 1 REF: 84


    19. Companies are required to tell their employees about the types of monitoring they use, and cannot use the information for performance review, firing, or legal action.

    ANS: F PTS: 1 REF: 84


    20. A number of specialized technologies are used to gather information about your Web habits and sell you products and services.

    ANS: T PTS: 1 REF: 84


    21. Spammers expect a high return ratio.

    ANS: F PTS: 1 REF: 84


    22. Spyware is often passed into your computer through a virus, worm, or Trojan program.

    ANS: T PTS: 1 REF: 85


    23. Spyware/adware is illegal.

    ANS: F PTS: 1 REF: 85


    24. Spyware is a file on your hard drive used to communicate with Web pages you visit.

    ANS: F PTS: 1 REF: 85


    25. Information accuracy is as much an issue as access to information.

    ANS: T PTS: 1 REF: 86


    MULTIPLE CHOICE
    1. Good computer security is primarily a matter of ____.

    a.

    prevention

    c.

    repetition

    b.

    reaction

    d.

    technology

    ANS: A PTS: 1 REF: 49


    2. _____ is a technically proficient person who breaks into a computer system.

    a.

    Cracker

    c.

    Hacker

    b.

    Phreak

    d.

    Leech

    ANS: C PTS: 1 REF: 50


    3. Subverting the phone system to get free service is known as ____.

    a.

    cracking

    c.

    phoning

    b.

    hacking

    d.

    phreaking

    ANS: D PTS: 1 REF: 50


    4. Intentional intruders motivated primarily by the challenge of breaking into a system, called ____ hackers.

    a.

    directed

    c.

    planned

    b.

    undirected

    d.

    targeted

    ANS: B PTS: 1 REF: 50


    5. An amateur hacker who simply uses the hacking tools developed by others is known as a(n) ____.

    a.

    script kiddie

    c.

    elite

    b.

    hacker

    d.

    master

    ANS: A PTS: 1 REF: 50-51


    6. Cracking into a system as a political act is known as ____.

    a.

    activism

    c.

    hacker activism

    b.

    cracktivism

    d.

    hacktivism

    ANS: D PTS: 1 REF: 51


    7. A document, written anonymously, that justifies cracking into systems as an ethical exercise is known as the ____.

    a.

    Cracker’s Manifesto

    c.

    Hacker’s Manifesto

    b.

    Hacker’s Bible

    d.

    Cracker’s Bible

    ANS: C PTS: 1 REF: 51


    8. Shortcuts into programs created by system designers to facilitate system maintenance but used and abused by crackers are known as ____.

    a.

    loopholes

    c.

    trojans

    b.

    interfaces

    d.

    backdoors

    ANS: D PTS: 1 REF: 52


    9. A ____ happens when a program tries to place more information into a memory location than that location can handle.

    a.

    buffer overflow

    c.

    stack overflow

    b.

    heap overflow

    d.

    runtime error

    ANS: A PTS: 1 REF: 52-53


    10. Code designed to breach system security and threaten digital information is known as ____ code.

    a.

    devious

    c.

    Trojan

    b.

    malicious

    d.

    hidden

    ANS: B PTS: 1 REF: 53


    11. An uninvited guest program with the potential to damage files and the operating system is known as a ____.

    a.

    security program

    c.

    virus

    b.

    firewall

    d.

    feature

    ANS: C PTS: 1 REF: 53


    12. A ____ disguises itself as something innocent, such as a game or, the worst possible example, an antivirus program.

    a.

    Trojan program

    c.

    worm

    b.

    virus

    d.

    mass mailer

    ANS: A PTS: 1 REF: 54


    13. Social interaction that preys on human gullibility, sympathy, or fear to take advantage of the target is known as social ____.

    a.

    hacking

    c.

    hacktivism

    b.

    cracking

    d.

    engineering

    ANS: D PTS: 1 REF: 54


    14. Picking through people’s trash to find things of value is known as ____.

    a.

    social engineering

    c.

    dumpster diving

    b.

    access engineering

    d.

    refuse diving

    ANS: C PTS: 1 REF: 55


    15. Attacks on a system that can include snooping, eavesdropping, and interception are known as ____ attacks.

    a.

    interface

    c.

    man-in-the-middle

    b.

    access

    d.

    modification

    ANS: B PTS: 1 REF: 56


    16. Attacks on a system that alter information illicitly are known as ____ attacks.

    a.

    modification

    c.

    denial-of-service

    b.

    access

    d.

    man-in-the-middle

    ANS: A PTS: 1 REF: 56


    17. Attacks that prevent legitimate users from using the system or accessing information are known as ____ attacks.

    a.

    access

    c.

    man-in-the-middle

    b.

    modification

    d.

    denial-of-service

    ANS: D PTS: 1 REF: 56


    18. A(n) ____ is software or hardware that acts as a protective filter between an internal computer system and an external network, such as the Internet.

    a.

    intrusion detection system

    c.

    firewall

    b.

    proxy

    d.

    router

    ANS: C PTS: 1 REF: 69


    19. ____ are the moral principles a person or group holds for judging right and wrong behavior.

    a.

    Scruples

    c.

    Codes

    b.

    Ethics

    d.

    Values

    ANS: B PTS: 1 REF: 78


    20. E-mail that contains a phony virus warning is known as a ____.

    a.

    phishing scam

    c.

    vendor warning

    b.

    virus warning

    d.

    virus hoax

    ANS: D PTS: 1 REF: 81


    21. The science of the relationship between people and machines as well as designing work areas to facilitate both productivity and human ease and comfort is known as ____.

    a.

    economics

    c.

    endonomics

    b.

    ergonomics

    d.

    workplace engineering

    ANS: B PTS: 1 REF: 83


    22. The freedom from unwanted access to or intrusion into a person’s private life or information is known as ____.

    a.

    non-interference

    c.

    privacy

    b.

    solitude

    d.

    retreat

    ANS: C PTS: 1 REF: 83


    23. Unsolicited (and almost always unwanted) e-mail is known as ____.

    a.

    spam

    c.

    fraud

    b.

    phishing

    d.

    ham

    ANS: A PTS: 1 REF: 84


    24. Software that can track, collect, and transmit to a third party or Web site certain information about a user’s computer habits is known as ____.

    a.

    Trojan

    c.

    phishing

    b.

    spyware

    d.

    viruses

    ANS: B PTS: 1 REF: 85


    25. A program that can gather information about a user and store it on the user’s machine is known as a ____.

    a.

    byte

    c.

    brownie

    b.

    nugget

    d.

    cookie


    ANS: D PTS: 1 REF: 85


    Download 94.63 Kb.

    Bosh sahifa
    Aloqalar

        Bosh sahifa


    Chapter 2: Computing Security and Ethics true/false

    Download 94.63 Kb.