Chapter 2: Computing Security and Ethics TRUE/FALSE 1. Good computer security is as much about locking doors, storing backups, and following protocol as it is about writing smarter software to catch the bad guys.
ANS: T PTS: 1 REF: 49
2. Almost all intruders are fairly innocent computer users who stumble into a security hole and cause problems.
ANS: F PTS: 1 REF: 50
3. Altruism tends to motivate directed hackers, who are usually more proficient and do not advertise their exploits.
ANS: F PTS: 1 REF: 51
4. Malicious hackers—interested in vandalizing or terrorism—can be both directed and undirected.
ANS: T PTS: 1 REF: 51
5. A virus is a program that actively reproduces itself across a network.
ANS: F PTS: 1 REF: 53
6. Security managers divide attacks into three main categories: access, denial of service, and repudiation.
ANS: F PTS: 1 REF: 55
7. Repudiation attacks seek to create a false impression that an event didn’t occur when it actually did or did occur when it really did not.
ANS: T PTS: 1 REF: 56
8. S-HTTP and SSL both use a digital identity, which is issued by an identity authority to both the user’s browser and the vendor’s server.
ANS: F PTS: 1 REF: 66
9. The demilitarized zone (DMZ) separates services you want to offer internally from those you want to offer externally.
ANS: T PTS: 1 REF: 70
10. In the IT world, computer crime most often relates to physical theft rather than intellectual property.
ANS: F PTS: 1 REF: 72
11. Unfortunately reverse-engineering a program takes very little effort.
13. Prosecuting a computer crime is a simple matter.
ANS: F PTS: 1 REF: 76
14. Using weak passwords could be considered unethical because they give online vandals access to systems.
ANS: T PTS: 1 REF: 81
15. Cracking or hacking into computers is the same as trespassing on someone’s land.
ANS: T PTS: 1 REF: 82
16. Programming is still more art than engineering.
ANS: T PTS: 1 REF: 82
17. All cultures have the same set of ethics or laws concerning privacy.
ANS: F PTS: 1 REF: 83
18. In general, starting in the late 1960s, laws related to ensuring privacy have become more protective of the privacy of U.S.
General (lot. generalis - umumiy, bosh) - qurolli kuchlardagi harbiy unvon (daraja). Dastlab, 16-a.da Fransiyada joriy qilingan. Rossiyada 17-a.ning 2-yarmidan maʼlum. Oʻzbekiston qurolli kuchlarida G.
ANS: T PTS: 1 REF: 84
19. Companies are required to tell their employees about the types of monitoring they use, and cannot use the information for performance review, firing, or legal action.
ANS: F PTS: 1 REF: 84
20. A number of specialized technologies are used to gather information about your Web habits and sell you products and services.