Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 17

Computers Are Your Future, 12e (LaBerta)

Chapter 9 Privacy, Crime, and Security

1) An individual's ability to restrict or eliminate the collection, use, and sale of confidential
personal information is known as:
A) cybertrust.
B) basic rights.
C) privacy.
D) confidentiality.
Answer: C
Diff: 2
Reference: Privacy in Cyberspace

2) Which of the following is NOT an example of a credit reporting agency?


A) TransUnion
B) InfoUSA
C) Equifax
D) Experian
Answer: B
Diff: 1
Reference: The Problem: Collection of Information Without Consent

3) The ability to convey a message without disclosing your name or identity is known as:
A) privacy.
B) confidentiality.
C) anonymity.
D) cyberblocking.
Answer: C
Diff: 1
Reference: Technology and Anonymity

4) Which of the following is NOT a technology that threatens online anonymity?


A) Cookies
B) Ubiquitous computing
C) Phreaking
D) Radio frequency identification
Answer: C
Diff: 2
Reference: Technology and Anonymity

1
Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall
5) Which of the following organizations have reported that many color laser printers embed
printer tracking dots on nearly every page at the urging of the U.S. government?
A) Electronic Frontier Foundation
B) National Printer Alliance
C) Patriot Organization
D) National Counterfeit Tracking Organization
Answer: A
Diff: 2
Reference: Technology and Anonymity

6) Which of the following is the best definition of a cookie?


A) It is a virus appended to an online shopping transaction.
B) It is a plain-text file written to your hard disk by a Web site you visit.
C) It is a file containing consumer information sold by an online store to a marketing company.
D) It is an unsolicited advertisement that pops up on your computer.
Answer: B
Diff: 2
Reference: Technology and Anonymity

7) An emerging trend where individuals interact with multiple networked devices that are often
embedded in everyday objects is called:
A) internetworked computing.
B) ubiquitous computing.
C) wide area networked computing.
D) None of the above.
Answer: B
Diff: 2
Reference: Technology and Anonymity

8) An example of ubiquitous computing is a(n) ________, a small device worn by an individual


that transmits a unique infrared signal, which tracks an individual's movements.
A) computerized badge
B) digital name tag
C) active badge
D) encrypted identifier
Answer: C
Diff: 2
Reference: Technology and Anonymity

9) ________ can be compromised when smaller computer tools are lost or stolen.
A) Data accuracy
B) Security
C) Privacy
D) Timely communication
Answer: C
Diff: 1
Reference: Technology and Anonymity
2
Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall
10) Which of the following is NOT a technique you can effectively use to reduce the amount of
unauthorized e-mail on your computer?
A) Use a "throwaway" e-mail address when visiting a chat room
B) Avoid giving your name and e-mail address on marketing questionnaires
C) Disable cookies on your Web browser
D) Reply to spam and ask to be removed from the mailing list
Answer: D
Diff: 2
Reference: Protecting Your Privacy

11) In the European Union, a basic human rights declaration grants citizens all of the following
privacy rights EXCEPT the right to:
A) request personal information be removed from a marketing database.
B) know what information is being collected and how it will be used.
C) be informed of the sale of personal information from one marketing company to another.
D) choose whether or not to divulge requested information.
Answer: C
Diff: 2
Reference: Protecting Your Privacy

12) Which of the following statements about the issue of privacy is TRUE?
A) There is no comprehensive federal law governing the overall privacy rights of U.S. citizens.
B) The privacy of individuals is protected by a patchwork of limited federal and state laws and
regulations.
C) Little exists to stop people and companies from acquiring and selling an individual's personal
information.
D) All of the above.
Answer: D
Diff: 1
Reference: Protecting Your Privacy

13) As of the week ending June 6, 2010, ________ was the top spam relaying country.
A) the United States
B) Brazil
C) England
D) India
Answer: D
Diff: 3
Reference: Protecting Your Privacy

3
Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall
14) The CAN-SPAM Act of 2003, enacted to combat spammers, is criticized for all of the
following EXCEPT:
A) it prevents states from enacting tougher laws.
B) the cost to enforce the Act is extremely high.
C) it prevents individuals from suing spammers.
D) it may be ineffective against foreign spammers.
Answer: B
Diff: 3
Reference: Protecting Your Privacy

15) Which of the following security measures on home and portable devices will deter
unauthorized access to a person's account?
A) Do not leave a secured account active on the monitor and walk away.
B) Do not leave cell phones and PDAs on tables at restaurants and college facilities.
C) Turn off services such as Bluetooth when not in use.
D) All of the above.
Answer: D
Diff: 1
Reference: Protecting Your Privacy

16) Complaints of Web crimes rose with an increase of ________ percent between 2008 and
2009.
A) 22.9
B) 19.6
C) 22.3
D) 31.4
Answer: C
Diff: 3
Reference: Protecting Your Privacy

17) The new emerging legal field that tracks and combats computer-related crimes is called:
A) Web law.
B) cyberlaw.
C) Web policing.
D) Internet crime fighting.
Answer: B
Diff: 1
Reference: Computer Crime and Cybercrime

4
Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall
18) This type of software collects your personal information, monitors your Web surfing habits,
and distributes this information to a third party.
A) Advertisement software
B) Pop-upware
C) Spyware
D) Malware
Answer: C
Diff: 1
Reference: Types of Computer Crime

19) Most viruses act as file infectors by attaching themselves to a:


A) hard drive sector.
B) directory.
C) data file.
D) program file.
Answer: D
Diff: 1
Reference: Types of Computer Crime

20) Which of the following is NOT an extension of a Microsoft Windows executable file?
A) .bat
B) .com
C) .exe
D) .pdf
Answer: D
Diff: 2
Reference: Types of Computer Crime

21) A spam text message is known as:


A) macro.
B) spam-text.
C) spim.
D) spem.
Answer: C
Diff: 2
Reference: Types of Computer Crime

22) When a virus self-modifies itself, the new copy is known as a:


A) beta.
B) macro virus.
C) variant.
D) m-virus.
Answer: C
Diff: 2
Reference: Types of Computer Crime

5
Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall
23) In a denial of service attack, the commandeered computers form a botnet, and the individual
computers are called:
A) attackers.
B) zombies.
C) slaves.
D) worms.
Answer: B
Diff: 1
Reference: Types of Computer Crime

24) Assume you are sitting in a crowded Internet cafe and log in to your company network to
check e-mail during lunch. In this situation, you are susceptible to a technique of password
collection called:
A) shoulder surfing.
B) dumpster diving.
C) data diddling.
D) password stalking.
Answer: A
Diff: 2
Reference: Types of Computer Crime

25) ________ phishing is a type of phishing intended to target specific people and trick them into
providing personal information, which would enable identity theft.
A) Targeted
B) Selective
C) Spear
D) Aimed
Answer: C
Diff: 2
Reference: Types of Computer Crime

26) Using a technique known as ________, a message is sent to a computer system using an IP
address disguised as one from a trusted source.
A) electronic data collection
B) IP spoofing
C) hacking
D) illegal access
Answer: B
Diff: 1
Reference: Meet the Attackers

6
Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall
27) Offering goods for sale and then not delivering them is called:
A) pumping and dumping.
B) salami shaving.
C) rip and tear.
D) rob-n-run.
Answer: C
Diff: 2
Reference: Meet the Attackers

28) Which of the following is the best definition of a computer hacker?


A) A hacker is creates bogus work-at-home opportunities, chain letters, get-rich-quick scams via
email, chat rooms, and websites.
B) A hacker is a slang term for a professional programmer.
C) A hacker is a criminal who tries to discover computer capabilities not mentioned in software
manuals, as well as modify them to obtain maximum performance.
D) A hacker is a person who is highly skilled in computer programming but has had no formal
education.
Answer: C
Diff: 2
Reference: Meet the Attackers

29) Which of the following populations have been found to be MOST at risk from the threat of
cyberstalking?
A) Public officials
B) Elderly people
C) People with a low level of computer literacy
D) College women
Answer: D
Diff: 2
Reference: Meet the Attackers

30) ________ is when a person drives around with a notebook computer to look for wireless
networks.
A) Network sniffing
B) Network surfing
C) Wardriving
D) Warcruising
Answer: C
Diff: 2
Reference: Security Risks

7
Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall
31) Vacation hackers, one of the newest trends in Internet fraud, involve all of the following
EXCEPT:
A) travelers being targeted by Cybercriminals.
B) in addition to the information reaching the intended destination, such as an airport or hotel,
the cybercriminal also obtains the user's data.
C) phony WiFi hot spots, called evil twins, are used to obtain data from unsuspecting
individuals.
D) users believe they are using a valid WiFi access point.
Answer: B
Diff: 2
Reference: Security Risks

32) To hinder corporate espionage, all of the following should be done EXCEPT:
A) protect against data deletion and loss by write and password protecting documents.
B) make employees aware of security policies and the consequences of violating them.
C) force password changes every 20 days if data within the organization is highly secure.
D) create regular backups.
Answer: C
Diff: 2
Reference: Security Risks

33) Of the currently employed access control methods, ________ is the most secure because it
involves identification of the user's body, such as his or her eyes or fingerprints.
A) callback
B) "know and have" authentication
C) smart card
D) biometric authentication
Answer: D
Diff: 1
Reference: Protecting Your Computer System

34) Firewalls are used to:


A) eavesdrop on employee e-mail.
B) check for viruses on a company's network.
C) restrict outsiders from accessing internal data.
D) prevent employees from sending e-mail beyond the confines of the network.
Answer: C
Diff: 2
Reference: Protecting Your Computer System

8
Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall
35) Which of the following is the study of converting information into encoded or scrambled
formats?
A) Cartography
B) Epistemology
C) Cryptography
D) Numerology
Answer: C
Diff: 2
Reference: The Encryption Debate

36) ________ key encryption requires that the receiver obtain the key to decrypt the message.
A) Symmetric
B) Asymmetric
C) Digital certificate
D) Digital signature
Answer: A
Diff: 2
Reference: Encryption Basics

37) The goal of Secure Electronic Transmissions (SET) is to:


A) alert the network administrator to packet sniffing activities.
B) create safe online transactions using digital certificates.
C) provide firewall standards for all network servers.
D) add public key encryption techniques to all Internet traffic.
Answer: B
Diff: 2
Reference: Public Key Encryption

38) A ________ is a uniform set of encryption standards that could facilitate secure Internet
transactions.
A) ciphertext
B) public key infrastructure (PKI)
C) pretty good privacy (PGP) policy
D) key escrow plan
Answer: B
Diff: 2
Reference: Public Key Encryption

39) ________ is the obligation for parties to a lawsuit to exchange documents that exist only in
electronic form.
A) E-evidence
B) E-discovery
C) E-law
D) E-exchange
Answer: B
Diff: 2
Reference: Prosecuting Violators
9
Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall
40) ________ is the field that pertains to legal evidence found in computers and digital storage
media.
A) Computer technology
B) Computer evidence
C) Computer forensics
D) Computer discovery
Answer: C
Diff: 2
Reference: Prosecuting Violators

41) Although most companies that maintain databases today claim that they sell user information
only to bona fide customers, ________ activists are concerned with what happens to the
information after it's sold.
Answer: privacy
Diff: 2
Reference: The Problem: Collection of Information Without Consent

42) ________ refers to the capability of sending a message without disclosing your identity.
Answer: Anonymity
Diff: 1
Reference: Technology and Anonymity

43) A(n) ________ unique identifier is an identification number generated by a hardware


component or a program.
Answer: global
Diff: 2
Reference: Technology and Anonymity

44) A scenario for future computing that foresees an emerging trend in which individuals no
longer interact with one computer at a time but instead with multiple devices enabling
technology to become invisible in our lives is known as ________ computing.
Answer: ubiquitous
Diff: 2
Reference: Technology and Anonymity

45) The Department of Justice and the organization known by the acronym ________ have
primary jurisdiction over spammers.
Answer: FTC
Diff: 2
Reference: Protecting Your Privacy

46) Devices such as the ________ USB flash drive include special security software to allow you
to surf the Web privately and securely, while protecting your identity and data.
Answer: IronKey
Diff: 3
Reference: Protecting Your Privacy

10
Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall
47) Crimes that use the Internet are called ________.
Answer: cybercrimes
Diff: 1
Reference: Computer Crime and Cybercrime

48) The term malware is short for ________ software.


Answer: malicious
Diff: 1
Reference: Types of Computer Crime

49) Opening a(n) ________ file attachment presents the greatest risk of virus infection.
Answer: executable
Diff: 1
Reference: Types of Computer Crime

50) A(n) ________ sector virus installs itself on the beginning tracks of a hard disk where code
is stored, which automatically executes every time the user starts the computer.
Answer: boot
Diff: 2
Reference: Types of Computer Crime

51) Sasser and Slammer are examples of ________.


Answer: worms
Diff: 3
Reference: Types of Computer Crime

52) A DoS attack is a denial of ________ attack.


Answer: service
Diff: 2
Reference: Types of Computer Crime

53) DDoS is a ________ denial of service.


Answer: distributed
Diff: 2
Reference: Types of Computer Crime

54) Memory ________ is the practice of removing some RAM chips but leaving a sufficient
amount to start the computer.
Answer: shaving
Diff: 2
Reference: Types of Computer Crime

55) A(n) ________ sniffer is a program that examines traffic on a network, searching for names,
passwords, or credit card information.
Answer: packet
Diff: 2
Reference: Types of Computer Crime
11
Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall
56) Ethical hackers are also known as ________ hats.
Answer: white
Diff: 2
Reference: Meet the Attackers

57) Like hackers, ________ are obsessed with their reputations and leave calling cards on the
systems they penetrate.
Answer: crackers
Diff: 2
Reference: Meet the Attackers

58) A computer ________ risk is an event, action, or situation that can lead to the loss or
destruction of computer systems or their data.
Answer: security
Diff: 1
Reference: Security Risks

59) US-________ is a national cyberwatch and warning center that coordinates activities with
the private sector.
Answer: CERT
Diff: 2
Reference: Security Risks

60) Wireless LANs pose challenges to security, especially ________ that are designed for open
access.
Answer: hotspots
Diff: 2
Reference: Security Risks

61) ________ key encryption, also known as asymmetric key encryption, is a security process in
which the use of two different keys safeguard data and provide confidentiality.
Answer: Public
Diff: 2
Reference: Public Key Encryption

62) A(n) ________ is a method used to bypass normal authentication to secure access to a
computer.
Answer: backdoor
Diff: 2
Reference: Encryption and Public Security Issues

63) The obligation of parties to a lawsuit to exchange documents that exist only in electronic
form, such as e-mails, voicemails, instant messages, and data on handheld devices, is called
electronic ________.
Answer: discovery
Diff: 2
Reference: Encryption and Public Security Issues
12
Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall
64) A battery-powered piece of equipment that provides backup power to a computer for a
limited time is known by the acronym ________.
Answer: UPS
Diff: 1
Reference: Protecting Your Computer System

65) When used with digital cash systems, ________ cards are devices the size of a credit card
that pose a significant threat to personal privacy.
Answer: smart
Diff: 2
Reference: Protecting Your Computer System

66) Companies such as uLocate and BrickHouse can use the GPS in your cell phone to determine
your location.
Answer: TRUE
Diff: 2
Reference: Protecting Your Privacy

67) In the cases of child identity theft, the most common perpetrator is the child's neighbors.
Answer: FALSE
Diff: 2
Reference: Types of Computer Crime

68) A study by McAfee predicted threats to social networking sites such as Facebook will
decrease.
Answer: FALSE
Diff: 1
Reference: Types of Computer Crime

69) A study by the National Cyber Security Alliance indicates that less than one in four
Americans are fully protected against malware.
Answer: TRUE
Diff: 2
Reference: Types of Computer Crime

70) The perpetrators of corporate espionage are often former employees who have been hired by
a competing firm.
Answer: TRUE
Diff: 2
Reference: Security Risks

71) A message that has been coded with an encryption key is referred to as encryptotext.
Answer: FALSE
Diff: 2
Reference: Encryption Basics

13
Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall
72) Cryptography is the study of transforming information into encoded format.
Answer: TRUE
Diff: 1
Reference: Encryption Basics

73) Stealing the key used for encryption is called key intermediation.
Answer: FALSE
Diff: 1
Reference: Encryption Basics

74) The universal key technique uses two different keys, one for encryption of a message and a
different one for decryption.
Answer: FALSE
Diff: 2
Reference: Public Key Encryption

75) A digital signature guarantees that a message has NOT been tampered with.
Answer: TRUE
Diff: 2
Reference: Public Key Encryption

76) Before it is encrypted, a readable message is known as ciphertext.


Answer: FALSE
Diff: 1
Reference: Encryption Basics

77) A backdoor is a vulnerability that could enable someone to crack an encryption code.
Answer: TRUE
Diff: 2
Reference: Public Key Encryption

78) The public nature of the Internet has lessened privacy issues.
Answer: FALSE
Diff: 2
Reference: Chapter Introduction

79) Online retailers use cookies to implement "shopping carts."


Answer: TRUE
Diff: 2
Reference: Technology and Anonymity

80) Internet ad networks do NOT use cookies to track users' browsing actions.
Answer: FALSE
Diff: 2
Reference: Technology and Anonymity

14
Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall
81) A globally unique identifier (GUID) is an identification number that is generate by a
hardware component or a program.
Answer: TRUE
Diff: 1
Reference: Technology and Anonymity

82) Ubiquitous computing is defined as individuals interacting with one computer at a time.
Answer: FALSE
Diff: 2
Reference: Technology and Anonymity

83) FERPA establishes standards for the transmission of electronic health care information.
Answer: FALSE
Diff: 2
Reference: Protecting Your Privacy

84) The FTC and Department of Justice have primary jurisdiction over spammers.
Answer: TRUE
Diff: 2
Reference: Protecting Your Privacy

85) All new cell phones in the United States must have GPS awareness.
Answer: TRUE
Diff: 2
Reference: Protecting Your Privacy

86) In a DDoS attack, the commandeered computers are called zombies and the individual
computers are called botnets.
Answer: FALSE
Diff: 2
Reference: Types of Computer Crime

87) Spear phishing targets specific people.


Answer: TRUE
Diff: 2
Reference: Types of Computer Crime

88) A lot of software piracy takes place on file-sharing sites.


Answer: TRUE
Diff: 2
Reference: Types of Computer Crime

89) IP spoofing takes place when a hacker sends a message with an IP address disguised as an
attachment.
Answer: FALSE
Diff: 2
Reference: Meet the Attackers
15
Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall
90) Although some individuals may be discouraged from participating in e-commerce activities
because of privacy concerns and fears regarding the use of information collected by Web sites,
the Internet retail sector continues to thrive.
Answer: TRUE
Diff: 2
Reference: Protecting Your Privacy

Match the following terms to their meanings:

A) Theft of a user ID or password by watching someone enter keyboard data


B) Theft of computer user information by using system administrator access
C) Examination of a company's trash for user IDs or passwords
D) Program that monitors network traffic for passwords and other valuable information
E) Theft of a poorly chosen password

91) Dumpster diving


Diff: 2
Reference: Types of Computer Crime

92) Superuser status


Diff: 2
Reference: Shoulder surfing

93) Types of Computer Crime


Diff: 2
Reference: Types of Computer Crime

94) Packet sniffer


Diff: 2
Reference: Types of Computer Crime

95) Password guessing


Diff: 2
Reference: Types of Computer Crime

Answers: 91) C 92) B 93) A 94) D 95) E

16
Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall
Match the following terms to their meanings:

A) Propagates through networks


B) Installed on the hard drive and infects your computer when you start it
C) Triggered on a certain date or event
D) Disguised as a game or a utility program
E) Takes advantage of automatic command execution capabilities

96) Boot sector virus


Diff: 2
Reference: Types of Computer Crime

97) Time bomb


Diff: 2
Reference: Types of Computer Crime

98) Worm
Diff: 2
Reference: Types of Computer Crime

99) Macro virus


Diff: 2
Reference: Types of Computer Crime

100) Trojan horse


Diff: 2
Reference: Types of Computer Crime

Answers: 96) B 97) C 98) A 99) E 100) D

17
Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall

You might also like