Cayf12e - Testbank - 09 - Security
Cayf12e - Testbank - 09 - Security
Cayf12e - Testbank - 09 - Security
1) An individual's ability to restrict or eliminate the collection, use, and sale of confidential
personal information is known as:
A) cybertrust.
B) basic rights.
C) privacy.
D) confidentiality.
Answer: C
Diff: 2
Reference: Privacy in Cyberspace
3) The ability to convey a message without disclosing your name or identity is known as:
A) privacy.
B) confidentiality.
C) anonymity.
D) cyberblocking.
Answer: C
Diff: 1
Reference: Technology and Anonymity
1
Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall
5) Which of the following organizations have reported that many color laser printers embed
printer tracking dots on nearly every page at the urging of the U.S. government?
A) Electronic Frontier Foundation
B) National Printer Alliance
C) Patriot Organization
D) National Counterfeit Tracking Organization
Answer: A
Diff: 2
Reference: Technology and Anonymity
7) An emerging trend where individuals interact with multiple networked devices that are often
embedded in everyday objects is called:
A) internetworked computing.
B) ubiquitous computing.
C) wide area networked computing.
D) None of the above.
Answer: B
Diff: 2
Reference: Technology and Anonymity
9) ________ can be compromised when smaller computer tools are lost or stolen.
A) Data accuracy
B) Security
C) Privacy
D) Timely communication
Answer: C
Diff: 1
Reference: Technology and Anonymity
2
Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall
10) Which of the following is NOT a technique you can effectively use to reduce the amount of
unauthorized e-mail on your computer?
A) Use a "throwaway" e-mail address when visiting a chat room
B) Avoid giving your name and e-mail address on marketing questionnaires
C) Disable cookies on your Web browser
D) Reply to spam and ask to be removed from the mailing list
Answer: D
Diff: 2
Reference: Protecting Your Privacy
11) In the European Union, a basic human rights declaration grants citizens all of the following
privacy rights EXCEPT the right to:
A) request personal information be removed from a marketing database.
B) know what information is being collected and how it will be used.
C) be informed of the sale of personal information from one marketing company to another.
D) choose whether or not to divulge requested information.
Answer: C
Diff: 2
Reference: Protecting Your Privacy
12) Which of the following statements about the issue of privacy is TRUE?
A) There is no comprehensive federal law governing the overall privacy rights of U.S. citizens.
B) The privacy of individuals is protected by a patchwork of limited federal and state laws and
regulations.
C) Little exists to stop people and companies from acquiring and selling an individual's personal
information.
D) All of the above.
Answer: D
Diff: 1
Reference: Protecting Your Privacy
13) As of the week ending June 6, 2010, ________ was the top spam relaying country.
A) the United States
B) Brazil
C) England
D) India
Answer: D
Diff: 3
Reference: Protecting Your Privacy
3
Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall
14) The CAN-SPAM Act of 2003, enacted to combat spammers, is criticized for all of the
following EXCEPT:
A) it prevents states from enacting tougher laws.
B) the cost to enforce the Act is extremely high.
C) it prevents individuals from suing spammers.
D) it may be ineffective against foreign spammers.
Answer: B
Diff: 3
Reference: Protecting Your Privacy
15) Which of the following security measures on home and portable devices will deter
unauthorized access to a person's account?
A) Do not leave a secured account active on the monitor and walk away.
B) Do not leave cell phones and PDAs on tables at restaurants and college facilities.
C) Turn off services such as Bluetooth when not in use.
D) All of the above.
Answer: D
Diff: 1
Reference: Protecting Your Privacy
16) Complaints of Web crimes rose with an increase of ________ percent between 2008 and
2009.
A) 22.9
B) 19.6
C) 22.3
D) 31.4
Answer: C
Diff: 3
Reference: Protecting Your Privacy
17) The new emerging legal field that tracks and combats computer-related crimes is called:
A) Web law.
B) cyberlaw.
C) Web policing.
D) Internet crime fighting.
Answer: B
Diff: 1
Reference: Computer Crime and Cybercrime
4
Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall
18) This type of software collects your personal information, monitors your Web surfing habits,
and distributes this information to a third party.
A) Advertisement software
B) Pop-upware
C) Spyware
D) Malware
Answer: C
Diff: 1
Reference: Types of Computer Crime
20) Which of the following is NOT an extension of a Microsoft Windows executable file?
A) .bat
B) .com
C) .exe
D) .pdf
Answer: D
Diff: 2
Reference: Types of Computer Crime
5
Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall
23) In a denial of service attack, the commandeered computers form a botnet, and the individual
computers are called:
A) attackers.
B) zombies.
C) slaves.
D) worms.
Answer: B
Diff: 1
Reference: Types of Computer Crime
24) Assume you are sitting in a crowded Internet cafe and log in to your company network to
check e-mail during lunch. In this situation, you are susceptible to a technique of password
collection called:
A) shoulder surfing.
B) dumpster diving.
C) data diddling.
D) password stalking.
Answer: A
Diff: 2
Reference: Types of Computer Crime
25) ________ phishing is a type of phishing intended to target specific people and trick them into
providing personal information, which would enable identity theft.
A) Targeted
B) Selective
C) Spear
D) Aimed
Answer: C
Diff: 2
Reference: Types of Computer Crime
26) Using a technique known as ________, a message is sent to a computer system using an IP
address disguised as one from a trusted source.
A) electronic data collection
B) IP spoofing
C) hacking
D) illegal access
Answer: B
Diff: 1
Reference: Meet the Attackers
6
Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall
27) Offering goods for sale and then not delivering them is called:
A) pumping and dumping.
B) salami shaving.
C) rip and tear.
D) rob-n-run.
Answer: C
Diff: 2
Reference: Meet the Attackers
29) Which of the following populations have been found to be MOST at risk from the threat of
cyberstalking?
A) Public officials
B) Elderly people
C) People with a low level of computer literacy
D) College women
Answer: D
Diff: 2
Reference: Meet the Attackers
30) ________ is when a person drives around with a notebook computer to look for wireless
networks.
A) Network sniffing
B) Network surfing
C) Wardriving
D) Warcruising
Answer: C
Diff: 2
Reference: Security Risks
7
Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall
31) Vacation hackers, one of the newest trends in Internet fraud, involve all of the following
EXCEPT:
A) travelers being targeted by Cybercriminals.
B) in addition to the information reaching the intended destination, such as an airport or hotel,
the cybercriminal also obtains the user's data.
C) phony WiFi hot spots, called evil twins, are used to obtain data from unsuspecting
individuals.
D) users believe they are using a valid WiFi access point.
Answer: B
Diff: 2
Reference: Security Risks
32) To hinder corporate espionage, all of the following should be done EXCEPT:
A) protect against data deletion and loss by write and password protecting documents.
B) make employees aware of security policies and the consequences of violating them.
C) force password changes every 20 days if data within the organization is highly secure.
D) create regular backups.
Answer: C
Diff: 2
Reference: Security Risks
33) Of the currently employed access control methods, ________ is the most secure because it
involves identification of the user's body, such as his or her eyes or fingerprints.
A) callback
B) "know and have" authentication
C) smart card
D) biometric authentication
Answer: D
Diff: 1
Reference: Protecting Your Computer System
8
Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall
35) Which of the following is the study of converting information into encoded or scrambled
formats?
A) Cartography
B) Epistemology
C) Cryptography
D) Numerology
Answer: C
Diff: 2
Reference: The Encryption Debate
36) ________ key encryption requires that the receiver obtain the key to decrypt the message.
A) Symmetric
B) Asymmetric
C) Digital certificate
D) Digital signature
Answer: A
Diff: 2
Reference: Encryption Basics
38) A ________ is a uniform set of encryption standards that could facilitate secure Internet
transactions.
A) ciphertext
B) public key infrastructure (PKI)
C) pretty good privacy (PGP) policy
D) key escrow plan
Answer: B
Diff: 2
Reference: Public Key Encryption
39) ________ is the obligation for parties to a lawsuit to exchange documents that exist only in
electronic form.
A) E-evidence
B) E-discovery
C) E-law
D) E-exchange
Answer: B
Diff: 2
Reference: Prosecuting Violators
9
Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall
40) ________ is the field that pertains to legal evidence found in computers and digital storage
media.
A) Computer technology
B) Computer evidence
C) Computer forensics
D) Computer discovery
Answer: C
Diff: 2
Reference: Prosecuting Violators
41) Although most companies that maintain databases today claim that they sell user information
only to bona fide customers, ________ activists are concerned with what happens to the
information after it's sold.
Answer: privacy
Diff: 2
Reference: The Problem: Collection of Information Without Consent
42) ________ refers to the capability of sending a message without disclosing your identity.
Answer: Anonymity
Diff: 1
Reference: Technology and Anonymity
44) A scenario for future computing that foresees an emerging trend in which individuals no
longer interact with one computer at a time but instead with multiple devices enabling
technology to become invisible in our lives is known as ________ computing.
Answer: ubiquitous
Diff: 2
Reference: Technology and Anonymity
45) The Department of Justice and the organization known by the acronym ________ have
primary jurisdiction over spammers.
Answer: FTC
Diff: 2
Reference: Protecting Your Privacy
46) Devices such as the ________ USB flash drive include special security software to allow you
to surf the Web privately and securely, while protecting your identity and data.
Answer: IronKey
Diff: 3
Reference: Protecting Your Privacy
10
Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall
47) Crimes that use the Internet are called ________.
Answer: cybercrimes
Diff: 1
Reference: Computer Crime and Cybercrime
49) Opening a(n) ________ file attachment presents the greatest risk of virus infection.
Answer: executable
Diff: 1
Reference: Types of Computer Crime
50) A(n) ________ sector virus installs itself on the beginning tracks of a hard disk where code
is stored, which automatically executes every time the user starts the computer.
Answer: boot
Diff: 2
Reference: Types of Computer Crime
54) Memory ________ is the practice of removing some RAM chips but leaving a sufficient
amount to start the computer.
Answer: shaving
Diff: 2
Reference: Types of Computer Crime
55) A(n) ________ sniffer is a program that examines traffic on a network, searching for names,
passwords, or credit card information.
Answer: packet
Diff: 2
Reference: Types of Computer Crime
11
Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall
56) Ethical hackers are also known as ________ hats.
Answer: white
Diff: 2
Reference: Meet the Attackers
57) Like hackers, ________ are obsessed with their reputations and leave calling cards on the
systems they penetrate.
Answer: crackers
Diff: 2
Reference: Meet the Attackers
58) A computer ________ risk is an event, action, or situation that can lead to the loss or
destruction of computer systems or their data.
Answer: security
Diff: 1
Reference: Security Risks
59) US-________ is a national cyberwatch and warning center that coordinates activities with
the private sector.
Answer: CERT
Diff: 2
Reference: Security Risks
60) Wireless LANs pose challenges to security, especially ________ that are designed for open
access.
Answer: hotspots
Diff: 2
Reference: Security Risks
61) ________ key encryption, also known as asymmetric key encryption, is a security process in
which the use of two different keys safeguard data and provide confidentiality.
Answer: Public
Diff: 2
Reference: Public Key Encryption
62) A(n) ________ is a method used to bypass normal authentication to secure access to a
computer.
Answer: backdoor
Diff: 2
Reference: Encryption and Public Security Issues
63) The obligation of parties to a lawsuit to exchange documents that exist only in electronic
form, such as e-mails, voicemails, instant messages, and data on handheld devices, is called
electronic ________.
Answer: discovery
Diff: 2
Reference: Encryption and Public Security Issues
12
Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall
64) A battery-powered piece of equipment that provides backup power to a computer for a
limited time is known by the acronym ________.
Answer: UPS
Diff: 1
Reference: Protecting Your Computer System
65) When used with digital cash systems, ________ cards are devices the size of a credit card
that pose a significant threat to personal privacy.
Answer: smart
Diff: 2
Reference: Protecting Your Computer System
66) Companies such as uLocate and BrickHouse can use the GPS in your cell phone to determine
your location.
Answer: TRUE
Diff: 2
Reference: Protecting Your Privacy
67) In the cases of child identity theft, the most common perpetrator is the child's neighbors.
Answer: FALSE
Diff: 2
Reference: Types of Computer Crime
68) A study by McAfee predicted threats to social networking sites such as Facebook will
decrease.
Answer: FALSE
Diff: 1
Reference: Types of Computer Crime
69) A study by the National Cyber Security Alliance indicates that less than one in four
Americans are fully protected against malware.
Answer: TRUE
Diff: 2
Reference: Types of Computer Crime
70) The perpetrators of corporate espionage are often former employees who have been hired by
a competing firm.
Answer: TRUE
Diff: 2
Reference: Security Risks
71) A message that has been coded with an encryption key is referred to as encryptotext.
Answer: FALSE
Diff: 2
Reference: Encryption Basics
13
Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall
72) Cryptography is the study of transforming information into encoded format.
Answer: TRUE
Diff: 1
Reference: Encryption Basics
73) Stealing the key used for encryption is called key intermediation.
Answer: FALSE
Diff: 1
Reference: Encryption Basics
74) The universal key technique uses two different keys, one for encryption of a message and a
different one for decryption.
Answer: FALSE
Diff: 2
Reference: Public Key Encryption
75) A digital signature guarantees that a message has NOT been tampered with.
Answer: TRUE
Diff: 2
Reference: Public Key Encryption
77) A backdoor is a vulnerability that could enable someone to crack an encryption code.
Answer: TRUE
Diff: 2
Reference: Public Key Encryption
78) The public nature of the Internet has lessened privacy issues.
Answer: FALSE
Diff: 2
Reference: Chapter Introduction
80) Internet ad networks do NOT use cookies to track users' browsing actions.
Answer: FALSE
Diff: 2
Reference: Technology and Anonymity
14
Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall
81) A globally unique identifier (GUID) is an identification number that is generate by a
hardware component or a program.
Answer: TRUE
Diff: 1
Reference: Technology and Anonymity
82) Ubiquitous computing is defined as individuals interacting with one computer at a time.
Answer: FALSE
Diff: 2
Reference: Technology and Anonymity
83) FERPA establishes standards for the transmission of electronic health care information.
Answer: FALSE
Diff: 2
Reference: Protecting Your Privacy
84) The FTC and Department of Justice have primary jurisdiction over spammers.
Answer: TRUE
Diff: 2
Reference: Protecting Your Privacy
85) All new cell phones in the United States must have GPS awareness.
Answer: TRUE
Diff: 2
Reference: Protecting Your Privacy
86) In a DDoS attack, the commandeered computers are called zombies and the individual
computers are called botnets.
Answer: FALSE
Diff: 2
Reference: Types of Computer Crime
89) IP spoofing takes place when a hacker sends a message with an IP address disguised as an
attachment.
Answer: FALSE
Diff: 2
Reference: Meet the Attackers
15
Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall
90) Although some individuals may be discouraged from participating in e-commerce activities
because of privacy concerns and fears regarding the use of information collected by Web sites,
the Internet retail sector continues to thrive.
Answer: TRUE
Diff: 2
Reference: Protecting Your Privacy
16
Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall
Match the following terms to their meanings:
98) Worm
Diff: 2
Reference: Types of Computer Crime
17
Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall