|
Chapter 2: Computing Security and Ethics true/false
|
Sana | 19.03.2017 | Hajmi | 94.63 Kb. |
Chapter 2: Computing Security and Ethics
TRUE/FALSE
1. Good computer security is as much about locking doors, storing backups, and following protocol as it is about writing smarter software to catch the bad guys.
ANS: T PTS: 1 REF: 49
2. Almost all intruders are fairly innocent computer users who stumble into a security hole and cause problems.
ANS: F PTS: 1 REF: 50
3. Altruism tends to motivate directed hackers, who are usually more proficient and do not advertise their exploits.
ANS: F PTS: 1 REF: 51
4. Malicious hackers—interested in vandalizing or terrorism—can be both directed and undirected.
ANS: T PTS: 1 REF: 51
5. A virus is a program that actively reproduces itself across a network.
ANS: F PTS: 1 REF: 53
6. Security managers divide attacks into three main categories: access, denial of service, and repudiation.
ANS: F PTS: 1 REF: 55
7. Repudiation attacks seek to create a false impression that an event didn’t occur when it actually did or did occur when it really did not.
ANS: T PTS: 1 REF: 56
8. S-HTTP and SSL both use a digital identity, which is issued by an identity authority to both the user’s browser and the vendor’s server.
ANS: F PTS: 1 REF: 66
9. The demilitarized zone (DMZ) separates services you want to offer internally from those you want to offer externally.
ANS: T PTS: 1 REF: 70
10. In the IT world, computer crime most often relates to physical theft rather than intellectual property.
ANS: F PTS: 1 REF: 72
11. Unfortunately reverse-engineering a program takes very little effort.
ANS: F PTS: 1 REF: 73
12. A patent protects inventions, the workings of a device, or a process.
ANS: T PTS: 1 REF: 73
13. Prosecuting a computer crime is a simple matter.
ANS: F PTS: 1 REF: 76
14. Using weak passwords could be considered unethical because they give online vandals access to systems.
ANS: T PTS: 1 REF: 81
15. Cracking or hacking into computers is the same as trespassing on someone’s land.
ANS: T PTS: 1 REF: 82
16. Programming is still more art than engineering.
ANS: T PTS: 1 REF: 82
17. All cultures have the same set of ethics or laws concerning privacy.
ANS: F PTS: 1 REF: 83
18. In general, starting in the late 1960s, laws related to ensuring privacy have become more protective of the privacy of U.S.General (lot. generalis - umumiy, bosh) - qurolli kuchlardagi harbiy unvon (daraja). Dastlab, 16-a.da Fransiyada joriy qilingan. Rossiyada 17-a.ning 2-yarmidan maʼlum. Oʻzbekiston qurolli kuchlarida G. residents.
ANS: T PTS: 1 REF: 84
19. Companies are required to tell their employees about the types of monitoring they use, and cannot use the information for performance review, firing, or legal action.
ANS: F PTS: 1 REF: 84
20. A number of specialized technologies are used to gather information about your Web habits and sell you products and services.
ANS: T PTS: 1 REF: 84
21. Spammers expect a high return ratio.
ANS: F PTS: 1 REF: 84
22. Spyware is often passed into your computer through a virus, worm, or Trojan program.
ANS: T PTS: 1 REF: 85
23. Spyware/adware is illegal.
ANS: F PTS: 1 REF: 85
24. Spyware is a file on your hard drive used to communicate with Web pages you visit.
ANS: F PTS: 1 REF: 85
25. Information accuracy is as much an issue as access to information.
ANS: T PTS: 1 REF: 86
MULTIPLE CHOICE
1. Good computer security is primarily a matter of ____.
a.
|
prevention
|
c.
|
repetition
|
b.
|
reaction
|
d.
|
technology
|
ANS: A PTS: 1 REF: 49
2. _____ is a technically proficient person who breaks into a computer system.
a.
|
Cracker
|
c.
|
Hacker
|
b.
|
Phreak
|
d.
|
Leech
|
ANS: C PTS: 1 REF: 50
3. Subverting the phone system to get free service is known as ____.
a.
|
cracking
|
c.
|
phoning
|
b.
|
hacking
|
d.
|
phreaking
|
ANS: D PTS: 1 REF: 50
4. Intentional intruders motivated primarily by the challenge of breaking into a system, called ____ hackers.
a.
|
directed
|
c.
|
planned
|
b.
|
undirected
|
d.
|
targeted
|
ANS: B PTS: 1 REF: 50
5. An amateur hacker who simply uses the hacking tools developed by others is known as a(n) ____.
a.
|
script kiddie
|
c.
|
elite
|
b.
|
hacker
|
d.
|
master
|
ANS: A PTS: 1 REF: 50-51
6. Cracking into a system as a political act is known as ____.
a.
|
activism
|
c.
|
hacker activism
|
b.
|
cracktivism
|
d.
|
hacktivism
|
ANS: D PTS: 1 REF: 51
7. A document, written anonymously, that justifies cracking into systems as an ethical exercise is known as the ____.
a.
|
Cracker’s Manifesto
|
c.
|
Hacker’s Manifesto
|
b.
|
Hacker’s Bible
|
d.
|
Cracker’s Bible
|
ANS: C PTS: 1 REF: 51
8. Shortcuts into programs created by system designers to facilitate system maintenance but used and abused by crackers are known as ____.
a.
|
loopholes
|
c.
|
trojans
|
b.
|
interfaces
|
d.
|
backdoors
|
ANS: D PTS: 1 REF: 52
9. A ____ happens when a program tries to place more information into a memory location than that location can handle.
a.
|
buffer overflow
|
c.
|
stack overflow
|
b.
|
heap overflow
|
d.
|
runtime error
|
ANS: A PTS: 1 REF: 52-53
10. Code designed to breach system security and threaten digital information is known as ____ code.
a.
|
devious
|
c.
|
Trojan
|
b.
|
malicious
|
d.
|
hidden
|
ANS: B PTS: 1 REF: 53
11. An uninvited guest program with the potential to damage files and the operating system is known as a ____.
a.
|
security program
|
c.
|
virus
|
b.
|
firewall
|
d.
|
feature
|
ANS: C PTS: 1 REF: 53
12. A ____ disguises itself as something innocent, such as a game or, the worst possible example, an antivirus program.
a.
|
Trojan program
|
c.
|
worm
|
b.
|
virus
|
d.
|
mass mailer
|
ANS: A PTS: 1 REF: 54
13. Social interaction that preys on human gullibility, sympathy, or fear to take advantage of the target is known as social ____.
a.
|
hacking
|
c.
|
hacktivism
|
b.
|
cracking
|
d.
|
engineering
|
ANS: D PTS: 1 REF: 54
14. Picking through people’s trash to find things of value is known as ____.
a.
|
social engineering
|
c.
|
dumpster diving
|
b.
|
access engineering
|
d.
|
refuse diving
|
ANS: C PTS: 1 REF: 55
15. Attacks on a system that can include snooping, eavesdropping, and interception are known as ____ attacks.
a.
|
interface
|
c.
|
man-in-the-middle
|
b.
|
access
|
d.
|
modification
|
ANS: B PTS: 1 REF: 56
16. Attacks on a system that alter information illicitly are known as ____ attacks.
a.
|
modification
|
c.
|
denial-of-service
|
b.
|
access
|
d.
|
man-in-the-middle
|
ANS: A PTS: 1 REF: 56
17. Attacks that prevent legitimate users from using the system or accessing information are known as ____ attacks.
a.
|
access
|
c.
|
man-in-the-middle
|
b.
|
modification
|
d.
|
denial-of-service
|
ANS: D PTS: 1 REF: 56
18. A(n) ____ is software or hardware that acts as a protective filter between an internal computer system and an external network, such as the Internet.
a.
|
intrusion detection system
|
c.
|
firewall
|
b.
|
proxy
|
d.
|
router
|
ANS: C PTS: 1 REF: 69
19. ____ are the moral principles a person or group holds for judging right and wrong behavior.
a.
|
Scruples
|
c.
|
Codes
|
b.
|
Ethics
|
d.
|
Values
|
ANS: B PTS: 1 REF: 78
20. E-mail that contains a phony virus warning is known as a ____.
a.
|
phishing scam
|
c.
|
vendor warning
|
b.
|
virus warning
|
d.
|
virus hoax
|
ANS: D PTS: 1 REF: 81
21. The science of the relationship between people and machines as well as designing work areas to facilitate both productivity and human ease and comfort is known as ____.
a.
|
economics
|
c.
|
endonomics
|
b.
|
ergonomics
|
d.
|
workplace engineering
|
ANS: B PTS: 1 REF: 83
22. The freedom from unwanted access to or intrusion into a person’s private life or information is known as ____.
a.
|
non-interference
|
c.
|
privacy
|
b.
|
solitude
|
d.
|
retreat
|
ANS: C PTS: 1 REF: 83
23. Unsolicited (and almost always unwanted) e-mail is known as ____.
a.
|
spam
|
c.
|
fraud
|
b.
|
phishing
|
d.
|
ham
|
ANS: A PTS: 1 REF: 84
24. Software that can track, collect, and transmit to a third party or Web site certain information about a user’s computer habits is known as ____.
a.
|
Trojan
|
c.
|
phishing
|
b.
|
spyware
|
d.
|
viruses
|
ANS: B PTS: 1 REF: 85
25. A program that can gather information about a user and store it on the user’s machine is known as a ____.
a.
|
byte
|
c.
|
brownie
|
b.
|
nugget
|
d.
|
cookie
|
ANS: D PTS: 1 REF: 85
|
| |