Deck 14: The Personal and Social Impact of Computers

ملء الشاشة (f)
exit full mode
سؤال
The Homeland Security Department's Information Analysis and Infrastructure Protection Directorate serves as a focal point for threat assessment of, warning of, investigation of, and response to threats or attacks against the country's critical infrastructure.
استخدم زر المسافة أو
up arrow
down arrow
لقلب البطاقة.
سؤال
The combining of duties is a key concept of good internal controls.
سؤال
Smartphones-especially ones running the popular Android operating system-can run applications that are impervious to malware.
سؤال
Tracking software sends messages via a wireless network to the specified e-mail address, pinpointing its location and including a picture of the thief (for those computers with an integrated Web cam).
سؤال
A virus can send copies of itself via a network.
سؤال
A script bunny is a young, female computer hacker.
سؤال
To obtain a patent or to determine if a patent exists in an area a company seeks to exploit requires a search by the U.S. Patent Office; these can last longer than 25 months.
سؤال
The Mask is a collection of malware that infects computers running the Windows, OS X, and Linux operating systems.
سؤال
Catching and convicting criminal hackers remains an easy task, and the method behind these crimes is often easy to determine.
سؤال
Role-based system access means that only people who fill a particular role can access a specific system.
سؤال
Penalties for software piracy are lenient and liberal.
سؤال
Phishing has become such a serious problem that several companies have formed the Domain-based Message Authentication, Reporting, and Conformance (DMARC) group to provide improved e-mail security and protection from phishing.
سؤال
Many computer crimes go unreported because companies do not want bad publicity or don't think that law enforcement can help.
سؤال
Patent laws protect processes, machines, and compositions of matter.
سؤال
Organizations continue to operate their businesses using integrated information systems that leads to missed opportunities, increased costs, and lost sales.
سؤال
Incidents of identity theft are reported to the Federal Trade Commission (FTC).
سؤال
Only few small and mid-sized organizations are willing to outsource their network security operations.
سؤال
Some web sites offer digital tools-often without charge-that let people snoop, crash computers, hijack control of a machine, or retrieve a copy of every keystroke.
سؤال
A computer can be both the tool used to commit a crime and the object of that crime.
سؤال
Computer-related mistakes include organizations operating unintegrated information systems and acquiring redundant systems.
سؤال
If an activity is defined as legal then it is ethical.
سؤال
A(n) _____ is a computer savvy person who attempts to gain unauthorized or illegal access to computer systems to steal passwords, corrupt files or programs, or even transfer money.

A) criminal hacker
B) insider
C) whistleblower
D) script bunny
سؤال
The use of e-mail among public officials might violate "open meeting" laws.
سؤال
The LeadsOnline Web-based service system is one of several information systems used by law enforcement to _____.

A) monitor sex offenders
B) assess crime risk for a given area
C) recover stolen property
D) help victims restore their credit
سؤال
Which of the following is a useful policy to minimize waste and mistakes?

A) Changes to HTML and URLs should be documented and authorized by end users.
B) System report titles should be as brief as possible and should simply indicate the report number.
C) Users should implement proper procedures to ensure correct input data.
D) Tight control should be avoided over critical tables.
سؤال
A job that requires sitting at a desk and using a computer for many hours a day qualifies as a sedentary job.
سؤال
_____ is a legislation that requires businesses to prove that they are securing their data.

A) Internet Tax Freedom Act
B) Sarbanes-Oxley Act
C) Glass-Steagall Act
D) ​Judiciary Act
سؤال
Multinational companies face an extremely difficult challenge in implementing data collection and dissemination processes and policies because of the multitude of differing country and regional statutes.
سؤال
To protect a person's PC and prevent it from spreading malware to his or her coworkers, some antivirus software scans and cleans both incoming and outgoing e-mail messages.
سؤال
A _____ is a small program hidden in a network or computer system that records identification numbers.

A) logic bomb
B) password sniffer
C) variant
D) rootkit
سؤال
_____ is a set of programs that enables its user to gain administrator level access to a computer or network.

A) Virus
B) Trojan horse
C) Rootkit
D) Worm
سؤال
In order to protect the privacy of employees, email messages that have been erased from hard disks cannot be retrieved.
سؤال
Posting information to the Internet using anonymous email accounts or screen names makes it impossible to identify a libeler.
سؤال
_____ refers to the use of any of several technologies to enforce policies for controlling access to digital media, such as movies, music, and software.

A) Copyright protection
B) Software protection dongle
C) Software piracy
D) Digital rights management
سؤال
Two primary causes of computer-related health problems are a poorly designed work environment and failure to take regular breaks to stretch the muscles and rest the eyes.
سؤال
A job that requires sitting at a desk for many hours a day can significantly reduce the risk of type 2 diabetes.
سؤال
The Internet Crime Computer Center (IC3) is an alliance between ______.

A) the Department of Homeland Security (DHS) and the White Collar Crime Center (NW3C)
B) the Department of Homeland Security (DHS) and the Department of Justice (DOJ)
C) the White Collar Crime Center (NW3C) and the Federal Bureau of Investigation (FBI)
D) the Federal Bureau of Investigation (FBI) and the Central Intelligence Agency (CIA)
سؤال
IS professionals believe that their field offers few opportunities for unethical behavior.
سؤال
_____ have extra knowledge that make them especially dangerous-they know logon IDs, passwords, and company procedures that help them evade detection.

A) Crackers
B) Hackers
C) Insiders
D) Script bunnies
سؤال
_____ is a type of malware that executes when specific conditions occur.

A) Virus
B) Worm
C) Logic bomb
D) Trojan horse
سؤال
A job that requires sitting at a desk and using a computer for many hours a day can lead to:

A) undesirable weight loss.
B) formation of blood clots.
C) inflammation of the gum tissue.
D) sleep disorders.
سؤال
A _____ is a malicious program that spreads from computer to computer without any human action.

A) variant
B) worm
C) virus
D) rootkit
سؤال
The _____ requires telephone companies to turn over customer information, including numbers called, without a court order if the Federal Bureau of Investigation (FBI) claims that the records are relevant to a terrorism investigation.

A) Cable Act of 1992
B) Electronic Communications Privacy Act of 1986
C) Gramm-Leach-Bliley Act of 1999
D) USA Patriot Act of 2001
سؤال
_____ involves publishing an intentionally false written statement that is damaging to a person's or an organization's reputation.

A) Vishing
B) Slander
C) Libel
D) Phishing
سؤال
Heavy computer users who experience red, dry, itchy eyes should _____.

A) consider the use of artificial tears
B) consider the use of older, but more human friendly CRT monitors
C) keep their focus on their screens for long hours
D) avoid blinking often
سؤال
The _____ requires all financial institutions to protect and secure customers' nonpublic data from unauthorized access or use.

A) Gramm-Leach-Bliley Act of 1999
B) E-Government Act of 2002
C) USA Patriot Act of 2001
D) Sarbanes-Oxley Act of 2002
سؤال
Which of the following statements is true of the E-Government Act of 2002?

A) It renews the U.S. government's authority to monitor electronic communications of foreigners abroad and authorizes foreign surveillance programs by the National Security Agency (NSA).
B) It requires federal agencies to post machine-readable privacy policies on their Web sites and to perform privacy impact assessments on all new collections of data of ten or more people.
C) It restricts government access to certain records held by financial institutions.
D) It defines procedures to request judicial authorization for electronic surveillance of persons engaged in espionage against the United States on behalf of a foreign power.
سؤال
_____ is the intimidation of government or civilian population by using information technology to disable critical national infrastructures (e.g., energy, transportation, financial, law enforcement, emergency response) to achieve political, religious, or ideological goals.
سؤال
_____ is the practice of using social skills to get computer users to provide information that allows a hacker to access an information system or its data.
سؤال
_____ is is an inflammation of the nerve that connects the forearm to the palm of the wrist.

A) Carpal tunnel syndrome (CTS)
B) Seated immobility thromboembolism (SIT)
C) Chronic idiopathic mylofibrosis
D) Behcet's syndrome
سؤال
Which of the following statements is true of federal laws?

A) They permit employers to monitor instant messages sent and received by employees.
B) They authorize public officials to meet in private about matters that affect the state or local area.
C) They completely protect individual privacy.
D) They forbid customers and employees from accessing data about themselves.
سؤال
_____ is a crime in which an imposter obtains key pieces of personal identification information to impersonate someone else.
سؤال
_____ states the principles and core values that are essential to a set of people and that, therefore, govern these people's behavior.

A) Code of ethics
B) Code of conduct
C) Code of civil procedure
D) Code of criminal procedure
سؤال
The practice of disguising illegally gained funds so that they seem legal is called _____.

A) identity theft
B) vishing
C) spoofing
D) money laundering
سؤال
_____ is a method by which a criminal illegally gains access to another's line of credit with stolen credit card numbers.
سؤال
Under the Identity Theft and Assumption Deterrence Act of 1998, the _____ is assigned responsibility to help victims restore their credit and erase the impact of the imposter.

A) Federal Bureau of Investigation (FBI)
B) Federal Trade Commission (FTC)
C) Securities and Exchange Commission (SEC)
D) Department of Justice (DOJ)
سؤال
Proper use of antivirus software requires:

A) scanning all removable media before copying programs from them.
B) running the software only if a virus has been detected.
C) refraining from updating the software often.
D) installing software from unsealed packages.
سؤال
A useful guideline to protect corporate computers from criminal hackers is to _____.

A) install antivirus software on all computers
B) enable physical access to servers
C) provide overfriendly sign-in procedures for remote users
D) enable several guest accounts
سؤال
The act of going through the trash of an organization to find secret or confidential information, including information needed to access an information system or its data is known as _____.
سؤال
Which of the following is a computer-related mistake?

A) Operating unintegrated information systems
B) Mishandling computer outputs
C) Acquiring redundant systems
D) Exhausting information system resources
سؤال
_____ issues deal with what is generally considered right or wrong.
سؤال
_____ is a scam that attempts to steal an individual's private information by having them respond to a text message.
سؤال
A party offended by a libel can file what is known as a(n) _____ lawsuit and use the subpoena power it grants to force the Internet service provider (ISP) to provide whatever information it has about the anonymous poster, including Internet Protocol (IP) address, name, and street address.
سؤال
Inexperienced hackers can download programs called _____ that automate the job of breaking into computers.
سؤال
The hazardous activities associated with unfavorable working conditions are collectively referred to as _____.
سؤال
A(n) _____ is a malicious program that disguises itself as a useful application or game and purposefully does something a user does not expect.
سؤال
_____ is software installed on a personal computer to intercept or take partial control over a user's interaction with a computer without the knowledge or permission of the user.
سؤال
Organizations that monitor, manage, and maintain network security for both hardware and software for other organizations are known as _____.
سؤال
_____ is a form of computer scam that attempts to get users to gain access to a customer's private information through a fake Web site.
سؤال
_____ are employees, disgruntled or otherwise, working solo or in concert with outsiders to compromise corporate systems.
سؤال
_____ is a scam that attempts to steal an individual's private information by having them call a phone number and enter personal data.
سؤال
A(n) _____ is a person paid by a company to lie about how much he or she has earned and how easy the plan was to operate.
سؤال
Software programs that when loaded into a computer system will destroy, interrupt, or cause errors in processing are known as _____.
سؤال
The science of designing machines, products, and systems to maximize the safety, comfort, and efficiency of the people who use them is called _____.
سؤال
_____ is the careful division of the tasks and responsibilities associated with a key process so that they must be performed by more than one person.
سؤال
A(n) _____ monitors system and network resources and traffic and notifies network security personnel when it senses a possible intrusion.
سؤال
The _____ is directed at Web sites catering to children and requires Web site owners to obtain parental consent before they collect any personal information from children under 13 years old.
سؤال
A(n) _____ is software that runs in the background to protect a user's computer from dangers lurking on the Internet and other possible sources of infected files.
سؤال
_____ is the science of designing machines, products, and systems to maximize the safety, comfort, and efficiency of the people who use them.
سؤال
_____ is the act of unauthorized copying, downloading, sharing, selling, or installing of software.
فتح الحزمة
قم بالتسجيل لفتح البطاقات في هذه المجموعة!
Unlock Deck
Unlock Deck
1/85
auto play flashcards
العب
simple tutorial
ملء الشاشة (f)
exit full mode
Deck 14: The Personal and Social Impact of Computers
1
The Homeland Security Department's Information Analysis and Infrastructure Protection Directorate serves as a focal point for threat assessment of, warning of, investigation of, and response to threats or attacks against the country's critical infrastructure.
True
2
The combining of duties is a key concept of good internal controls.
False
3
Smartphones-especially ones running the popular Android operating system-can run applications that are impervious to malware.
False
4
Tracking software sends messages via a wireless network to the specified e-mail address, pinpointing its location and including a picture of the thief (for those computers with an integrated Web cam).
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 85 في هذه المجموعة.
فتح الحزمة
k this deck
5
A virus can send copies of itself via a network.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 85 في هذه المجموعة.
فتح الحزمة
k this deck
6
A script bunny is a young, female computer hacker.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 85 في هذه المجموعة.
فتح الحزمة
k this deck
7
To obtain a patent or to determine if a patent exists in an area a company seeks to exploit requires a search by the U.S. Patent Office; these can last longer than 25 months.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 85 في هذه المجموعة.
فتح الحزمة
k this deck
8
The Mask is a collection of malware that infects computers running the Windows, OS X, and Linux operating systems.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 85 في هذه المجموعة.
فتح الحزمة
k this deck
9
Catching and convicting criminal hackers remains an easy task, and the method behind these crimes is often easy to determine.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 85 في هذه المجموعة.
فتح الحزمة
k this deck
10
Role-based system access means that only people who fill a particular role can access a specific system.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 85 في هذه المجموعة.
فتح الحزمة
k this deck
11
Penalties for software piracy are lenient and liberal.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 85 في هذه المجموعة.
فتح الحزمة
k this deck
12
Phishing has become such a serious problem that several companies have formed the Domain-based Message Authentication, Reporting, and Conformance (DMARC) group to provide improved e-mail security and protection from phishing.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 85 في هذه المجموعة.
فتح الحزمة
k this deck
13
Many computer crimes go unreported because companies do not want bad publicity or don't think that law enforcement can help.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 85 في هذه المجموعة.
فتح الحزمة
k this deck
14
Patent laws protect processes, machines, and compositions of matter.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 85 في هذه المجموعة.
فتح الحزمة
k this deck
15
Organizations continue to operate their businesses using integrated information systems that leads to missed opportunities, increased costs, and lost sales.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 85 في هذه المجموعة.
فتح الحزمة
k this deck
16
Incidents of identity theft are reported to the Federal Trade Commission (FTC).
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 85 في هذه المجموعة.
فتح الحزمة
k this deck
17
Only few small and mid-sized organizations are willing to outsource their network security operations.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 85 في هذه المجموعة.
فتح الحزمة
k this deck
18
Some web sites offer digital tools-often without charge-that let people snoop, crash computers, hijack control of a machine, or retrieve a copy of every keystroke.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 85 في هذه المجموعة.
فتح الحزمة
k this deck
19
A computer can be both the tool used to commit a crime and the object of that crime.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 85 في هذه المجموعة.
فتح الحزمة
k this deck
20
Computer-related mistakes include organizations operating unintegrated information systems and acquiring redundant systems.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 85 في هذه المجموعة.
فتح الحزمة
k this deck
21
If an activity is defined as legal then it is ethical.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 85 في هذه المجموعة.
فتح الحزمة
k this deck
22
A(n) _____ is a computer savvy person who attempts to gain unauthorized or illegal access to computer systems to steal passwords, corrupt files or programs, or even transfer money.

A) criminal hacker
B) insider
C) whistleblower
D) script bunny
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 85 في هذه المجموعة.
فتح الحزمة
k this deck
23
The use of e-mail among public officials might violate "open meeting" laws.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 85 في هذه المجموعة.
فتح الحزمة
k this deck
24
The LeadsOnline Web-based service system is one of several information systems used by law enforcement to _____.

A) monitor sex offenders
B) assess crime risk for a given area
C) recover stolen property
D) help victims restore their credit
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 85 في هذه المجموعة.
فتح الحزمة
k this deck
25
Which of the following is a useful policy to minimize waste and mistakes?

A) Changes to HTML and URLs should be documented and authorized by end users.
B) System report titles should be as brief as possible and should simply indicate the report number.
C) Users should implement proper procedures to ensure correct input data.
D) Tight control should be avoided over critical tables.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 85 في هذه المجموعة.
فتح الحزمة
k this deck
26
A job that requires sitting at a desk and using a computer for many hours a day qualifies as a sedentary job.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 85 في هذه المجموعة.
فتح الحزمة
k this deck
27
_____ is a legislation that requires businesses to prove that they are securing their data.

A) Internet Tax Freedom Act
B) Sarbanes-Oxley Act
C) Glass-Steagall Act
D) ​Judiciary Act
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 85 في هذه المجموعة.
فتح الحزمة
k this deck
28
Multinational companies face an extremely difficult challenge in implementing data collection and dissemination processes and policies because of the multitude of differing country and regional statutes.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 85 في هذه المجموعة.
فتح الحزمة
k this deck
29
To protect a person's PC and prevent it from spreading malware to his or her coworkers, some antivirus software scans and cleans both incoming and outgoing e-mail messages.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 85 في هذه المجموعة.
فتح الحزمة
k this deck
30
A _____ is a small program hidden in a network or computer system that records identification numbers.

A) logic bomb
B) password sniffer
C) variant
D) rootkit
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 85 في هذه المجموعة.
فتح الحزمة
k this deck
31
_____ is a set of programs that enables its user to gain administrator level access to a computer or network.

A) Virus
B) Trojan horse
C) Rootkit
D) Worm
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 85 في هذه المجموعة.
فتح الحزمة
k this deck
32
In order to protect the privacy of employees, email messages that have been erased from hard disks cannot be retrieved.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 85 في هذه المجموعة.
فتح الحزمة
k this deck
33
Posting information to the Internet using anonymous email accounts or screen names makes it impossible to identify a libeler.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 85 في هذه المجموعة.
فتح الحزمة
k this deck
34
_____ refers to the use of any of several technologies to enforce policies for controlling access to digital media, such as movies, music, and software.

A) Copyright protection
B) Software protection dongle
C) Software piracy
D) Digital rights management
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 85 في هذه المجموعة.
فتح الحزمة
k this deck
35
Two primary causes of computer-related health problems are a poorly designed work environment and failure to take regular breaks to stretch the muscles and rest the eyes.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 85 في هذه المجموعة.
فتح الحزمة
k this deck
36
A job that requires sitting at a desk for many hours a day can significantly reduce the risk of type 2 diabetes.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 85 في هذه المجموعة.
فتح الحزمة
k this deck
37
The Internet Crime Computer Center (IC3) is an alliance between ______.

A) the Department of Homeland Security (DHS) and the White Collar Crime Center (NW3C)
B) the Department of Homeland Security (DHS) and the Department of Justice (DOJ)
C) the White Collar Crime Center (NW3C) and the Federal Bureau of Investigation (FBI)
D) the Federal Bureau of Investigation (FBI) and the Central Intelligence Agency (CIA)
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 85 في هذه المجموعة.
فتح الحزمة
k this deck
38
IS professionals believe that their field offers few opportunities for unethical behavior.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 85 في هذه المجموعة.
فتح الحزمة
k this deck
39
_____ have extra knowledge that make them especially dangerous-they know logon IDs, passwords, and company procedures that help them evade detection.

A) Crackers
B) Hackers
C) Insiders
D) Script bunnies
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 85 في هذه المجموعة.
فتح الحزمة
k this deck
40
_____ is a type of malware that executes when specific conditions occur.

A) Virus
B) Worm
C) Logic bomb
D) Trojan horse
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 85 في هذه المجموعة.
فتح الحزمة
k this deck
41
A job that requires sitting at a desk and using a computer for many hours a day can lead to:

A) undesirable weight loss.
B) formation of blood clots.
C) inflammation of the gum tissue.
D) sleep disorders.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 85 في هذه المجموعة.
فتح الحزمة
k this deck
42
A _____ is a malicious program that spreads from computer to computer without any human action.

A) variant
B) worm
C) virus
D) rootkit
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 85 في هذه المجموعة.
فتح الحزمة
k this deck
43
The _____ requires telephone companies to turn over customer information, including numbers called, without a court order if the Federal Bureau of Investigation (FBI) claims that the records are relevant to a terrorism investigation.

A) Cable Act of 1992
B) Electronic Communications Privacy Act of 1986
C) Gramm-Leach-Bliley Act of 1999
D) USA Patriot Act of 2001
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 85 في هذه المجموعة.
فتح الحزمة
k this deck
44
_____ involves publishing an intentionally false written statement that is damaging to a person's or an organization's reputation.

A) Vishing
B) Slander
C) Libel
D) Phishing
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 85 في هذه المجموعة.
فتح الحزمة
k this deck
45
Heavy computer users who experience red, dry, itchy eyes should _____.

A) consider the use of artificial tears
B) consider the use of older, but more human friendly CRT monitors
C) keep their focus on their screens for long hours
D) avoid blinking often
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 85 في هذه المجموعة.
فتح الحزمة
k this deck
46
The _____ requires all financial institutions to protect and secure customers' nonpublic data from unauthorized access or use.

A) Gramm-Leach-Bliley Act of 1999
B) E-Government Act of 2002
C) USA Patriot Act of 2001
D) Sarbanes-Oxley Act of 2002
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 85 في هذه المجموعة.
فتح الحزمة
k this deck
47
Which of the following statements is true of the E-Government Act of 2002?

A) It renews the U.S. government's authority to monitor electronic communications of foreigners abroad and authorizes foreign surveillance programs by the National Security Agency (NSA).
B) It requires federal agencies to post machine-readable privacy policies on their Web sites and to perform privacy impact assessments on all new collections of data of ten or more people.
C) It restricts government access to certain records held by financial institutions.
D) It defines procedures to request judicial authorization for electronic surveillance of persons engaged in espionage against the United States on behalf of a foreign power.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 85 في هذه المجموعة.
فتح الحزمة
k this deck
48
_____ is the intimidation of government or civilian population by using information technology to disable critical national infrastructures (e.g., energy, transportation, financial, law enforcement, emergency response) to achieve political, religious, or ideological goals.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 85 في هذه المجموعة.
فتح الحزمة
k this deck
49
_____ is the practice of using social skills to get computer users to provide information that allows a hacker to access an information system or its data.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 85 في هذه المجموعة.
فتح الحزمة
k this deck
50
_____ is is an inflammation of the nerve that connects the forearm to the palm of the wrist.

A) Carpal tunnel syndrome (CTS)
B) Seated immobility thromboembolism (SIT)
C) Chronic idiopathic mylofibrosis
D) Behcet's syndrome
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 85 في هذه المجموعة.
فتح الحزمة
k this deck
51
Which of the following statements is true of federal laws?

A) They permit employers to monitor instant messages sent and received by employees.
B) They authorize public officials to meet in private about matters that affect the state or local area.
C) They completely protect individual privacy.
D) They forbid customers and employees from accessing data about themselves.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 85 في هذه المجموعة.
فتح الحزمة
k this deck
52
_____ is a crime in which an imposter obtains key pieces of personal identification information to impersonate someone else.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 85 في هذه المجموعة.
فتح الحزمة
k this deck
53
_____ states the principles and core values that are essential to a set of people and that, therefore, govern these people's behavior.

A) Code of ethics
B) Code of conduct
C) Code of civil procedure
D) Code of criminal procedure
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 85 في هذه المجموعة.
فتح الحزمة
k this deck
54
The practice of disguising illegally gained funds so that they seem legal is called _____.

A) identity theft
B) vishing
C) spoofing
D) money laundering
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 85 في هذه المجموعة.
فتح الحزمة
k this deck
55
_____ is a method by which a criminal illegally gains access to another's line of credit with stolen credit card numbers.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 85 في هذه المجموعة.
فتح الحزمة
k this deck
56
Under the Identity Theft and Assumption Deterrence Act of 1998, the _____ is assigned responsibility to help victims restore their credit and erase the impact of the imposter.

A) Federal Bureau of Investigation (FBI)
B) Federal Trade Commission (FTC)
C) Securities and Exchange Commission (SEC)
D) Department of Justice (DOJ)
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 85 في هذه المجموعة.
فتح الحزمة
k this deck
57
Proper use of antivirus software requires:

A) scanning all removable media before copying programs from them.
B) running the software only if a virus has been detected.
C) refraining from updating the software often.
D) installing software from unsealed packages.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 85 في هذه المجموعة.
فتح الحزمة
k this deck
58
A useful guideline to protect corporate computers from criminal hackers is to _____.

A) install antivirus software on all computers
B) enable physical access to servers
C) provide overfriendly sign-in procedures for remote users
D) enable several guest accounts
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 85 في هذه المجموعة.
فتح الحزمة
k this deck
59
The act of going through the trash of an organization to find secret or confidential information, including information needed to access an information system or its data is known as _____.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 85 في هذه المجموعة.
فتح الحزمة
k this deck
60
Which of the following is a computer-related mistake?

A) Operating unintegrated information systems
B) Mishandling computer outputs
C) Acquiring redundant systems
D) Exhausting information system resources
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 85 في هذه المجموعة.
فتح الحزمة
k this deck
61
_____ issues deal with what is generally considered right or wrong.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 85 في هذه المجموعة.
فتح الحزمة
k this deck
62
_____ is a scam that attempts to steal an individual's private information by having them respond to a text message.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 85 في هذه المجموعة.
فتح الحزمة
k this deck
63
A party offended by a libel can file what is known as a(n) _____ lawsuit and use the subpoena power it grants to force the Internet service provider (ISP) to provide whatever information it has about the anonymous poster, including Internet Protocol (IP) address, name, and street address.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 85 في هذه المجموعة.
فتح الحزمة
k this deck
64
Inexperienced hackers can download programs called _____ that automate the job of breaking into computers.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 85 في هذه المجموعة.
فتح الحزمة
k this deck
65
The hazardous activities associated with unfavorable working conditions are collectively referred to as _____.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 85 في هذه المجموعة.
فتح الحزمة
k this deck
66
A(n) _____ is a malicious program that disguises itself as a useful application or game and purposefully does something a user does not expect.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 85 في هذه المجموعة.
فتح الحزمة
k this deck
67
_____ is software installed on a personal computer to intercept or take partial control over a user's interaction with a computer without the knowledge or permission of the user.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 85 في هذه المجموعة.
فتح الحزمة
k this deck
68
Organizations that monitor, manage, and maintain network security for both hardware and software for other organizations are known as _____.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 85 في هذه المجموعة.
فتح الحزمة
k this deck
69
_____ is a form of computer scam that attempts to get users to gain access to a customer's private information through a fake Web site.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 85 في هذه المجموعة.
فتح الحزمة
k this deck
70
_____ are employees, disgruntled or otherwise, working solo or in concert with outsiders to compromise corporate systems.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 85 في هذه المجموعة.
فتح الحزمة
k this deck
71
_____ is a scam that attempts to steal an individual's private information by having them call a phone number and enter personal data.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 85 في هذه المجموعة.
فتح الحزمة
k this deck
72
A(n) _____ is a person paid by a company to lie about how much he or she has earned and how easy the plan was to operate.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 85 في هذه المجموعة.
فتح الحزمة
k this deck
73
Software programs that when loaded into a computer system will destroy, interrupt, or cause errors in processing are known as _____.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 85 في هذه المجموعة.
فتح الحزمة
k this deck
74
The science of designing machines, products, and systems to maximize the safety, comfort, and efficiency of the people who use them is called _____.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 85 في هذه المجموعة.
فتح الحزمة
k this deck
75
_____ is the careful division of the tasks and responsibilities associated with a key process so that they must be performed by more than one person.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 85 في هذه المجموعة.
فتح الحزمة
k this deck
76
A(n) _____ monitors system and network resources and traffic and notifies network security personnel when it senses a possible intrusion.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 85 في هذه المجموعة.
فتح الحزمة
k this deck
77
The _____ is directed at Web sites catering to children and requires Web site owners to obtain parental consent before they collect any personal information from children under 13 years old.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 85 في هذه المجموعة.
فتح الحزمة
k this deck
78
A(n) _____ is software that runs in the background to protect a user's computer from dangers lurking on the Internet and other possible sources of infected files.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 85 في هذه المجموعة.
فتح الحزمة
k this deck
79
_____ is the science of designing machines, products, and systems to maximize the safety, comfort, and efficiency of the people who use them.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 85 في هذه المجموعة.
فتح الحزمة
k this deck
80
_____ is the act of unauthorized copying, downloading, sharing, selling, or installing of software.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 85 في هذه المجموعة.
فتح الحزمة
k this deck
locked card icon
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 85 في هذه المجموعة.