|
Chapter 2: Computing Security and Ethics true/false
|
bet | 1/2 | Sana | 19.03.2017 | Hajmi | 65,59 Kb. | | #375 |
Chapter 2: Computing Security and Ethics
TRUE/FALSE
1. Good computer security is as much about locking doors, storing backups, and following protocol as it is about writing smarter software to catch the bad guys.
ANS: T PTS: 1 REF: 49
2. Almost all intruders are fairly innocent computer users who stumble into a security hole and cause problems.
ANS: F PTS: 1 REF: 50
3. Altruism tends to motivate directed hackers, who are usually more proficient and do not advertise their exploits.
ANS: F PTS: 1 REF: 51
4. Malicious hackers—interested in vandalizing or terrorism—can be both directed and undirected.
ANS: T PTS: 1 REF: 51
5. A virus is a program that actively reproduces itself across a network.
ANS: F PTS: 1 REF: 53
6. Security managers divide attacks into three main categories: access, denial of service, and repudiation.
ANS: F PTS: 1 REF: 55
7. Repudiation attacks seek to create a false impression that an event didn’t occur when it actually did or did occur when it really did not.
ANS: T PTS: 1 REF: 56
8. S-HTTP and SSL both use a digital identity, which is issued by an identity authority to both the user’s browser and the vendor’s server.
ANS: F PTS: 1 REF: 66
9. The demilitarized zone (DMZ) separates services you want to offer internally from those you want to offer externally.
ANS: T PTS: 1 REF: 70
10. In the IT world, computer crime most often relates to physical theft rather than intellectual property.
ANS: F PTS: 1 REF: 72
11. Unfortunately reverse-engineering a program takes very little effort.
ANS: F PTS: 1 REF: 73
12. A patent protects inventions, the workings of a device, or a process.
ANS: T PTS: 1 REF: 73
13. Prosecuting a computer crime is a simple matter.
ANS: F PTS: 1 REF: 76
14. Using weak passwords could be considered unethical because they give online vandals access to systems.
ANS: T PTS: 1 REF: 81
15. Cracking or hacking into computers is the same as trespassing on someone’s land.
ANS: T PTS: 1 REF: 82
16. Programming is still more art than engineering.
ANS: T PTS: 1 REF: 82
17. All cultures have the same set of ethics or laws concerning privacy.
ANS: F PTS: 1 REF: 83
18. In general, starting in the late 1960s, laws related to ensuring privacy have become more protective of the privacy of U.S. residents.
ANS: T PTS: 1 REF: 84
19. Companies are required to tell their employees about the types of monitoring they use, and cannot use the information for performance review, firing, or legal action.
ANS: F PTS: 1 REF: 84
20. A number of specialized technologies are used to gather information about your Web habits and sell you products and services.
ANS: T PTS: 1 REF: 84
21. Spammers expect a high return ratio.
ANS: F PTS: 1 REF: 84
22. Spyware is often passed into your computer through a virus, worm, or Trojan program.
ANS: T PTS: 1 REF: 85
23. Spyware/adware is illegal.
ANS: F PTS: 1 REF: 85
24. Spyware is a file on your hard drive used to communicate with Web pages you visit.
ANS: F PTS: 1 REF: 85
25. Information accuracy is as much an issue as access to information.
ANS: T PTS: 1 REF: 86
|
| |