Chapter 2: Computing Security and Ethics true/false




Download 65.59 Kb.
bet2/2
Sana19.03.2017
Hajmi65.59 Kb.
#375
1   2
MULTIPLE CHOICE
1. Good computer security is primarily a matter of ____.

a.

prevention

c.

repetition

b.

reaction

d.

technology

ANS: A PTS: 1 REF: 49


2. _____ is a technically proficient person who breaks into a computer system.

a.

Cracker

c.

Hacker

b.

Phreak

d.

Leech

ANS: C PTS: 1 REF: 50


3. Subverting the phone system to get free service is known as ____.

a.

cracking

c.

phoning

b.

hacking

d.

phreaking

ANS: D PTS: 1 REF: 50


4. Intentional intruders motivated primarily by the challenge of breaking into a system, called ____ hackers.

a.

directed

c.

planned

b.

undirected

d.

targeted

ANS: B PTS: 1 REF: 50


5. An amateur hacker who simply uses the hacking tools developed by others is known as a(n) ____.

a.

script kiddie

c.

elite

b.

hacker

d.

master

ANS: A PTS: 1 REF: 50-51


6. Cracking into a system as a political act is known as ____.

a.

activism

c.

hacker activism

b.

cracktivism

d.

hacktivism

ANS: D PTS: 1 REF: 51


7. A document, written anonymously, that justifies cracking into systems as an ethical exercise is known as the ____.

a.

Cracker’s Manifesto

c.

Hacker’s Manifesto

b.

Hacker’s Bible

d.

Cracker’s Bible

ANS: C PTS: 1 REF: 51


8. Shortcuts into programs created by system designers to facilitate system maintenance but used and abused by crackers are known as ____.

a.

loopholes

c.

trojans

b.

interfaces

d.

backdoors

ANS: D PTS: 1 REF: 52


9. A ____ happens when a program tries to place more information into a memory location than that location can handle.

a.

buffer overflow

c.

stack overflow

b.

heap overflow

d.

runtime error

ANS: A PTS: 1 REF: 52-53


10. Code designed to breach system security and threaten digital information is known as ____ code.

a.

devious

c.

Trojan

b.

malicious

d.

hidden

ANS: B PTS: 1 REF: 53


11. An uninvited guest program with the potential to damage files and the operating system is known as a ____.

a.

security program

c.

virus

b.

firewall

d.

feature

ANS: C PTS: 1 REF: 53


12. A ____ disguises itself as something innocent, such as a game or, the worst possible example, an antivirus program.

a.

Trojan program

c.

worm

b.

virus

d.

mass mailer

ANS: A PTS: 1 REF: 54


13. Social interaction that preys on human gullibility, sympathy, or fear to take advantage of the target is known as social ____.

a.

hacking

c.

hacktivism

b.

cracking

d.

engineering

ANS: D PTS: 1 REF: 54


14. Picking through people’s trash to find things of value is known as ____.

a.

social engineering

c.

dumpster diving

b.

access engineering

d.

refuse diving

ANS: C PTS: 1 REF: 55


15. Attacks on a system that can include snooping, eavesdropping, and interception are known as ____ attacks.

a.

interface

c.

man-in-the-middle

b.

access

d.

modification

ANS: B PTS: 1 REF: 56


16. Attacks on a system that alter information illicitly are known as ____ attacks.

a.

modification

c.

denial-of-service

b.

access

d.

man-in-the-middle

ANS: A PTS: 1 REF: 56


17. Attacks that prevent legitimate users from using the system or accessing information are known as ____ attacks.

a.

access

c.

man-in-the-middle

b.

modification

d.

denial-of-service

ANS: D PTS: 1 REF: 56


18. A(n) ____ is software or hardware that acts as a protective filter between an internal computer system and an external network, such as the Internet.

a.

intrusion detection system

c.

firewall

b.

proxy

d.

router

ANS: C PTS: 1 REF: 69


19. ____ are the moral principles a person or group holds for judging right and wrong behavior.

a.

Scruples

c.

Codes

b.

Ethics

d.

Values

ANS: B PTS: 1 REF: 78


20. E-mail that contains a phony virus warning is known as a ____.

a.

phishing scam

c.

vendor warning

b.

virus warning

d.

virus hoax

ANS: D PTS: 1 REF: 81


21. The science of the relationship between people and machines as well as designing work areas to facilitate both productivity and human ease and comfort is known as ____.

a.

economics

c.

endonomics

b.

ergonomics

d.

workplace engineering

ANS: B PTS: 1 REF: 83


22. The freedom from unwanted access to or intrusion into a person’s private life or information is known as ____.

a.

non-interference

c.

privacy

b.

solitude

d.

retreat

ANS: C PTS: 1 REF: 83


23. Unsolicited (and almost always unwanted) e-mail is known as ____.

a.

spam

c.

fraud

b.

phishing

d.

ham

ANS: A PTS: 1 REF: 84


24. Software that can track, collect, and transmit to a third party or Web site certain information about a user’s computer habits is known as ____.

a.

Trojan

c.

phishing

b.

spyware

d.

viruses

ANS: B PTS: 1 REF: 85


25. A program that can gather information about a user and store it on the user’s machine is known as a ____.

a.

byte

c.

brownie

b.

nugget

d.

cookie


ANS: D PTS: 1 REF: 85

Download 65.59 Kb.
1   2




Download 65.59 Kb.

Bosh sahifa
Aloqalar

    Bosh sahifa



Chapter 2: Computing Security and Ethics true/false

Download 65.59 Kb.