Chapter 2: Computing Security and Ethics true/false




Download 65.59 Kb.
bet1/2
Sana19.03.2017
Hajmi65.59 Kb.
#375
  1   2

Chapter 2: Computing Security and Ethics
TRUE/FALSE
1. Good computer security is as much about locking doors, storing backups, and following protocol as it is about writing smarter software to catch the bad guys.

ANS: T PTS: 1 REF: 49


2. Almost all intruders are fairly innocent computer users who stumble into a security hole and cause problems.

ANS: F PTS: 1 REF: 50


3. Altruism tends to motivate directed hackers, who are usually more proficient and do not advertise their exploits.

ANS: F PTS: 1 REF: 51


4. Malicious hackers—interested in vandalizing or terrorism—can be both directed and undirected.

ANS: T PTS: 1 REF: 51


5. A virus is a program that actively reproduces itself across a network.

ANS: F PTS: 1 REF: 53


6. Security managers divide attacks into three main categories: access, denial of service, and repudiation.

ANS: F PTS: 1 REF: 55


7. Repudiation attacks seek to create a false impression that an event didn’t occur when it actually did or did occur when it really did not.

ANS: T PTS: 1 REF: 56


8. S-HTTP and SSL both use a digital identity, which is issued by an identity authority to both the user’s browser and the vendor’s server.

ANS: F PTS: 1 REF: 66


9. The demilitarized zone (DMZ) separates services you want to offer internally from those you want to offer externally.

ANS: T PTS: 1 REF: 70


10. In the IT world, computer crime most often relates to physical theft rather than intellectual property.

ANS: F PTS: 1 REF: 72


11. Unfortunately reverse-engineering a program takes very little effort.

ANS: F PTS: 1 REF: 73


12. A patent protects inventions, the workings of a device, or a process.

ANS: T PTS: 1 REF: 73


13. Prosecuting a computer crime is a simple matter.

ANS: F PTS: 1 REF: 76


14. Using weak passwords could be considered unethical because they give online vandals access to systems.

ANS: T PTS: 1 REF: 81


15. Cracking or hacking into computers is the same as trespassing on someone’s land.

ANS: T PTS: 1 REF: 82


16. Programming is still more art than engineering.

ANS: T PTS: 1 REF: 82


17. All cultures have the same set of ethics or laws concerning privacy.

ANS: F PTS: 1 REF: 83


18. In general, starting in the late 1960s, laws related to ensuring privacy have become more protective of the privacy of U.S. residents.

ANS: T PTS: 1 REF: 84


19. Companies are required to tell their employees about the types of monitoring they use, and cannot use the information for performance review, firing, or legal action.

ANS: F PTS: 1 REF: 84


20. A number of specialized technologies are used to gather information about your Web habits and sell you products and services.

ANS: T PTS: 1 REF: 84


21. Spammers expect a high return ratio.

ANS: F PTS: 1 REF: 84


22. Spyware is often passed into your computer through a virus, worm, or Trojan program.

ANS: T PTS: 1 REF: 85


23. Spyware/adware is illegal.

ANS: F PTS: 1 REF: 85


24. Spyware is a file on your hard drive used to communicate with Web pages you visit.

ANS: F PTS: 1 REF: 85


25. Information accuracy is as much an issue as access to information.

ANS: T PTS: 1 REF: 86




Download 65.59 Kb.
  1   2




Download 65.59 Kb.

Bosh sahifa
Aloqalar

    Bosh sahifa



Chapter 2: Computing Security and Ethics true/false

Download 65.59 Kb.