|
Chapter 2: Computing Security and Ethics true/false
|
bet | 2/2 | Sana | 19.03.2017 | Hajmi | 65,59 Kb. | | #375 |
MULTIPLE CHOICE
1. Good computer security is primarily a matter of ____.
a.
|
prevention
|
c.
|
repetition
|
b.
|
reaction
|
d.
|
technology
|
ANS: A PTS: 1 REF: 49
2. _____ is a technically proficient person who breaks into a computer system.
a.
|
Cracker
|
c.
|
Hacker
|
b.
|
Phreak
|
d.
|
Leech
|
ANS: C PTS: 1 REF: 50
3. Subverting the phone system to get free service is known as ____.
a.
|
cracking
|
c.
|
phoning
|
b.
|
hacking
|
d.
|
phreaking
|
ANS: D PTS: 1 REF: 50
4. Intentional intruders motivated primarily by the challenge of breaking into a system, called ____ hackers.
a.
|
directed
|
c.
|
planned
|
b.
|
undirected
|
d.
|
targeted
|
ANS: B PTS: 1 REF: 50
5. An amateur hacker who simply uses the hacking tools developed by others is known as a(n) ____.
a.
|
script kiddie
|
c.
|
elite
|
b.
|
hacker
|
d.
|
master
|
ANS: A PTS: 1 REF: 50-51
6. Cracking into a system as a political act is known as ____.
a.
|
activism
|
c.
|
hacker activism
|
b.
|
cracktivism
|
d.
|
hacktivism
|
ANS: D PTS: 1 REF: 51
7. A document, written anonymously, that justifies cracking into systems as an ethical exercise is known as the ____.
a.
|
Cracker’s Manifesto
|
c.
|
Hacker’s Manifesto
|
b.
|
Hacker’s Bible
|
d.
|
Cracker’s Bible
|
ANS: C PTS: 1 REF: 51
8. Shortcuts into programs created by system designers to facilitate system maintenance but used and abused by crackers are known as ____.
a.
|
loopholes
|
c.
|
trojans
|
b.
|
interfaces
|
d.
|
backdoors
|
ANS: D PTS: 1 REF: 52
9. A ____ happens when a program tries to place more information into a memory location than that location can handle.
a.
|
buffer overflow
|
c.
|
stack overflow
|
b.
|
heap overflow
|
d.
|
runtime error
|
ANS: A PTS: 1 REF: 52-53
10. Code designed to breach system security and threaten digital information is known as ____ code.
a.
|
devious
|
c.
|
Trojan
|
b.
|
malicious
|
d.
|
hidden
|
ANS: B PTS: 1 REF: 53
11. An uninvited guest program with the potential to damage files and the operating system is known as a ____.
a.
|
security program
|
c.
|
virus
|
b.
|
firewall
|
d.
|
feature
|
ANS: C PTS: 1 REF: 53
12. A ____ disguises itself as something innocent, such as a game or, the worst possible example, an antivirus program.
a.
|
Trojan program
|
c.
|
worm
|
b.
|
virus
|
d.
|
mass mailer
|
ANS: A PTS: 1 REF: 54
13. Social interaction that preys on human gullibility, sympathy, or fear to take advantage of the target is known as social ____.
a.
|
hacking
|
c.
|
hacktivism
|
b.
|
cracking
|
d.
|
engineering
|
ANS: D PTS: 1 REF: 54
14. Picking through people’s trash to find things of value is known as ____.
a.
|
social engineering
|
c.
|
dumpster diving
|
b.
|
access engineering
|
d.
|
refuse diving
|
ANS: C PTS: 1 REF: 55
15. Attacks on a system that can include snooping, eavesdropping, and interception are known as ____ attacks.
a.
|
interface
|
c.
|
man-in-the-middle
|
b.
|
access
|
d.
|
modification
|
ANS: B PTS: 1 REF: 56
16. Attacks on a system that alter information illicitly are known as ____ attacks.
a.
|
modification
|
c.
|
denial-of-service
|
b.
|
access
|
d.
|
man-in-the-middle
|
ANS: A PTS: 1 REF: 56
17. Attacks that prevent legitimate users from using the system or accessing information are known as ____ attacks.
a.
|
access
|
c.
|
man-in-the-middle
|
b.
|
modification
|
d.
|
denial-of-service
|
ANS: D PTS: 1 REF: 56
18. A(n) ____ is software or hardware that acts as a protective filter between an internal computer system and an external network, such as the Internet.
a.
|
intrusion detection system
|
c.
|
firewall
|
b.
|
proxy
|
d.
|
router
|
ANS: C PTS: 1 REF: 69
19. ____ are the moral principles a person or group holds for judging right and wrong behavior.
a.
|
Scruples
|
c.
|
Codes
|
b.
|
Ethics
|
d.
|
Values
|
ANS: B PTS: 1 REF: 78
20. E-mail that contains a phony virus warning is known as a ____.
a.
|
phishing scam
|
c.
|
vendor warning
|
b.
|
virus warning
|
d.
|
virus hoax
|
ANS: D PTS: 1 REF: 81
21. The science of the relationship between people and machines as well as designing work areas to facilitate both productivity and human ease and comfort is known as ____.
a.
|
economics
|
c.
|
endonomics
|
b.
|
ergonomics
|
d.
|
workplace engineering
|
ANS: B PTS: 1 REF: 83
22. The freedom from unwanted access to or intrusion into a person’s private life or information is known as ____.
a.
|
non-interference
|
c.
|
privacy
|
b.
|
solitude
|
d.
|
retreat
|
ANS: C PTS: 1 REF: 83
23. Unsolicited (and almost always unwanted) e-mail is known as ____.
a.
|
spam
|
c.
|
fraud
|
b.
|
phishing
|
d.
|
ham
|
ANS: A PTS: 1 REF: 84
24. Software that can track, collect, and transmit to a third party or Web site certain information about a user’s computer habits is known as ____.
a.
|
Trojan
|
c.
|
phishing
|
b.
|
spyware
|
d.
|
viruses
|
ANS: B PTS: 1 REF: 85
25. A program that can gather information about a user and store it on the user’s machine is known as a ____.
a.
|
byte
|
c.
|
brownie
|
b.
|
nugget
|
d.
|
cookie
|
ANS: D PTS: 1 REF: 85
|
| |