Deck 9: The Personal and Social Impact of Computers

ملء الشاشة (f)
exit full mode
سؤال
The combination of duties is a key concept of good internal controls.
استخدم زر المسافة أو
up arrow
down arrow
لقلب البطاقة.
سؤال
Phishing has become such a serious problem that several companies have formed the Domain-based Message Authentication,Reporting,and Conformance (DMARC)group to provide improved e-mail security and protection from phishing.
سؤال
The first step to prevent computer-related waste is to review existing policies and procedures and determine whether they are adequate.
سؤال
A rootkit is a type of Trojan horse that executes when specific conditions occur.
سؤال
The ready availability of personal computers,coupled with the development of mapping and analysis software,has led law enforcement agencies to use crime-related data,powerful analysis techniques,and geographic information systems (GIS)to better understand and even diminish crime risks.
سؤال
Most computer-related mistakes are caused by machine error.
سؤال
Role-based system access means that only people who fill a certain role can access a specific system.
سؤال
Incidents of identity theft are reported to the Department of Justice.
سؤال
A script bunny is a young,female computer hacker.
سؤال
The Department of Homeland Security Department's Information Analysis and Infrastructure Protection Directorate serves as a focal point for threat assessment,warning,investigation,and response to cyberterrorism threats or attacks against the country's critical infrastructure.
سؤال
Many computer crimes go unreported because companies do not want bad publicity or don't think that law enforcement can help.
سؤال
Smartphones-especially ones running the popular Android operating system-can run applications that are impervious to malware.
سؤال
The public cannot gain online access to information about registered sex offenders online because of various privacy laws.
سؤال
For those computers with an integrated Web cam,tracking software sends messages via a wireless network to the specified email address,pinpointing its location and including a picture of the thief.
سؤال
As information technology becomes faster,more complex,and more powerful,the risk of computer-related mistakes decreases tremendously.
سؤال
To obtain a patent or to determine if a patent exists in an area a company seeks to exploit,a search by the U.S.Patent Office is required;these can last longer than 25 months.
سؤال
A computer hacker is someone who intimidates or coerces a government or organization to advance his or her political or social objectives by launching computer-based attacks against computers,networks,and the information stored on them.
سؤال
Patent laws protect processes,machines,and compositions of matter.
سؤال
Relaxing controls for changes to critical tables,HTML,and URLs is a useful policy to minimize computer-related waste and mistakes.
سؤال
Not many small and medium sized organizations are willing to outsource their network security operations.
سؤال
Carpal tunnel syndrome (CTS)is the formation of blood clots in the legs or lungs.
سؤال
Federal law prohibits employers from monitoring email sent or received by their employees.
سؤال
_____ is often conducted by phone with a hacker imitating someone in a position of authority and attempting to gradually draw information out of a user.

A) Dumpster diving
B) Cyberterrorism
C) Social engineering attack
D) Organizational identity theft
سؤال
The final step to prevent computer-related waste is to:

A) ensure that users throughout an organization are following established procedures.
B) establish policies and procedures regarding efficient acquisition,use,and disposal of systems and devices.
C) review existing policies and procedures and determine whether they are adequate.
D) check whether current policies cover existing practices adequately.
سؤال
_____ have extra knowledge that make them especially dangerous-they know logon IDs,passwords,and company procedures that help them evade detection.

A) Crackers
B) Hackers
C) Insiders
D) Script bunnies
سؤال
The use of email among public officials might violate "open meeting" laws.
سؤال
A _____ is a set of programs that enables its user to gain administrator level access to a computer or network.

A) virus
B) Trojan horse
C) rootkit
D) worm
سؤال
If an activity is defined as legal then it is ethical.
سؤال
A _____ is a type of Trojan horse that executes when specific conditions occur.

A) virus
B) worm
C) logic bomb
D) rootkit
سؤال
The ______ Web-based service system is one of several information systems used by law enforcement to recover stolen property.

A) LeadsOnline
B) JusticeXchange
C) Watch Systems
D) CRIMECAST
سؤال
A job that requires sitting at a desk and using a computer for many hours a day doubles the risk of seated immobility thromboembolism (SIT).
سؤال
Multinational companies face an extremely difficult challenge in implementing data collection and dissemination processes and policies because of the multitude of differing country and regional statutes.
سؤال
_____ refer to errors,failures,and other computer problems that make computer output incorrect or not useful.

A) Computer-related wastes
B) Human errors
C) Computer-related mistakes
D) Coding errors
سؤال
A _____ is a modified version of a virus that is produced by the virus's author or another person by amending the original virus code.

A) rootkit
B) variant
C) Trojan horse
D) worm
سؤال
A(n)_____ is a computer savvy person who attempts to gain unauthorized or illegal access to computer systems to steal passwords,corrupt files or programs,or even transfer money.

A) hacker
B) insider
C) cracker
D) script bunny
سؤال
The monitor should be about one arm's length away from a user.
سؤال
IS professionals believe that their field offers few opportunities for unethical behavior.
سؤال
The Internet Crime Computer Center (IC3)is an alliance between ______.

A) the Department of Homeland Security and the White Collar Crime Center
B) the Department of Homeland Security and the Department of Justice
C) the White Collar Crime Center and the Federal Bureau of Investigation
D) the Federal Bureau of Investigation and the Central Intelligence Agency
سؤال
To safeguard a user's PC and prevent it from spreading malware to the user's friends and coworkers,some antivirus software scans and cleans both incoming and outgoing email messages.
سؤال
Posting information to the Internet using anonymous e-mail accounts or screen names makes it impossible to identify the libeler.
سؤال
_____ is a crime in which an imposter obtains key pieces of personal identification information to impersonate someone else.
سؤال
_____ refers to the use of any of several technologies to enforce policies for controlling access to digital media,such as movies,music,and software.

A) Copyright protection
B) Software protection dongle
C) Software piracy
D) Digital rights management
سؤال
The _____ requires telephone companies to turn over customer information,including numbers called,without a court order,if the Federal Bureau of Investigation (FBI)claims that the records are relevant to a terrorism investigation.

A) Cable Act of 1992
B) Electronic Communications Privacy Act of 1986
C) Gramm-Leach-Bliley Act of 1999
D) USA Patriot Act of 2001
سؤال
A useful guideline to protect corporate computers from criminal hackers is to:

A) install antivirus software on all computers.
B) enable physical access to servers.
C) provide overfriendly sign-in procedures for remote users.
D) enable several guest accounts.
سؤال
_____ is an inflammation of the nerve that connects the forearm to the palm of the wrist.

A) Carpal tunnel syndrome (CTS)
B) Seated immobility thromboembolism (SIT)
C) Chronic idiopathic mylofibrosis
D) Behcet's syndrome
سؤال
_____ is the intimidation of government or civilian population by using information technology to disable critical national infrastructures (e.g. ,energy,transportation,financial,law enforcement,emergency response)to achieve political,religious,or ideological goals.
سؤال
The _____ requires all financial institutions to protect and secure customers' nonpublic data from unauthorized access or use.

A) Gramm-Leach-Bliley Act
B) Fair Credit Reporting Act
C) USA Patriot Act
D) Fair and Accurate Credit Transactions Act
سؤال
If convicted for copyright infringement,software pirates could be sentenced to jail for up to _____ years.

A) two
B) ten
C) five
D) three
سؤال
The practice of disguising illegally gained funds so that they seem legal is called _____.

A) identity theft
B) vishing
C) spoofing
D) money laundering
سؤال
Which of the following statements is true of federal laws?

A) They permit employers to monitor instant messages sent and received by employees.
B) They authorize public officials to meet in private about matters that affect the state or local area.
C) They completely protect individual privacy.
D) They forbid customers and employees from accessing data about themselves.
سؤال
_____ is a scam that attempts to steal an individual's private information by having them respond to a text message.

A) Phishing
B) Smishing
C) Vishing
D) Sniffing
سؤال
Proper use of antivirus software requires:

A) scanning all removable media before copying programs from them.
B) running the software only if a virus has been detected.
C) refraining from updating the software often.
D) installing software from unsealed packages.​
سؤال
_____ is an activity in which a criminal illegally gains access to another's line of credit with stolen credit card numbers.
سؤال
Founded in 1947,the _____ is the oldest computing society and boasts more than 100,000 members in more than 100 countries.

A) United States Computer Emergency Readiness Team (US-CERT)
B) Computer Sciences Corporation (CSC)
C) Domain-based Message Authentication,Reporting,and Conformance group (DMARC)
D) Association for Computing Machinery (ACM)
سؤال
Which of the following statements is true of the E-Government Act of 2002?

A) It renews the U.S.government's authority to monitor electronic communications of foreigners abroad and authorizes foreign surveillance programs by the National Security Agency (NSA).
B) It requires federal agencies to post machine-readable privacy policies on their Web sites and to perform privacy impact assessments on all new collections of data of ten or more people.
C) It restricts government access to certain records held by financial institutions.
D) It defines procedures to request judicial authorization for electronic surveillance of persons engaged in espionage against the United States on behalf of a foreign power.
سؤال
Heavy computer users who experience red,dry,itchy eyes should _____.

A) consider the use of artificial tears
B) consider the use of older,but more human friendly CRT monitors
C) keep their focus on their screens for long hours
D) avoid blinking often
سؤال
Organizations operating unintegrated information systems,acquiring redundant systems,and wasting information system are examples of _____.
سؤال
Under the Identity Theft and Assumption Deterrence Act of 1998,the _____ is assigned responsibility to help victims restore their credit and erase the impact of the imposter.

A) Federal Bureau of Investigation (FBI)
B) Federal Trade Commission (FTC)
C) Securities and Exchange Commission (SEC)
D) Department of Justice (DOJ)
سؤال
A _____ is a small program hidden in a network or computer system that records identification numbers.

A) logic bomb
B) password sniffer
C) Trojan horse
D) rootkit
سؤال
_____ is the practice of using social skills to get computer users to provide information that allows a hacker to access an information system or its data.
سؤال
The hazardous activities associated with unfavorable working conditions are collectively referred to as _____.
سؤال
A party offended by a libel can file what is known as a(n)_____ lawsuit and use the subpoena power it grants to force the Internet service provider (ISP)to provide whatever information it has about the anonymous poster,including Internet Protocol (IP)address,name,and street address.
سؤال
The _____,passed by Congress in October 1998,was directed at Web sites catering to children,requiring site owners to post comprehensive privacy policies and to obtain parental consent before they collect any personal information from children under 13 years of age.
سؤال
The science of designing machines,products,and systems to maximize the safety,comfort,and efficiency of the people who use them is called _____.
سؤال
Many organizations use _____ software to provide a comprehensive display on a single computer screen of all the vital data related to an organization's security defenses,including threats,exposures,policy compliance,and incident alerts.
سؤال
A(n)_____ monitors system and network resources and traffic and notifies network security personnel when it senses a possible intrusion.
سؤال
_____ is software installed on a personal computer to intercept or take partial control over the user's interaction with the computer without knowledge or permission of the user.
سؤال
_____ is software that runs in the background to protect a user's computer from dangers lurking on the Internet and other possible sources of infected files.
سؤال
A(n)_____ is a person paid by a company to lie about how much he or she has earned and how easy the plan was to operate.
سؤال
Software programs that when loaded into a computer system will destroy,interrupt,or cause errors in processing are known as _____.
سؤال
Inexperienced hackers can download programs called _____ that automate the job of breaking into computers.
سؤال
_____ is a scam that attempts to steal an individual's private information by having them call a phone number and enter personal data.
سؤال
Practitioners in many professions subscribe to a(n)_____ that states the principles and core values that are essential to their work,and,therefore,govern their behavior.
سؤال
_____ is a Web-based data sharing system that places millions of nationwide booking records at the fingertips of law enforcement officials.
سؤال
_____ are employees,disgruntled or otherwise,working solo or in concert with outsiders to compromise corporate systems.
سؤال
_____ is a form of computer scam that attempts to get users to gain access to a customer's private information through a fake Web site.
سؤال
_____ is the process of converting an original electronic message into a form that can be understood only by the intended recipients.
سؤال
The act of going through the trash of an organization to find secret or confidential information,including information needed to access an information system or its data is known as _____.
سؤال
To help parents control what their children see on the Internet,some companies provide _____ to help screen Internet content.
سؤال
_____ is the careful division of the tasks and responsibilities associated with a key process so that they must be performed by more than one person to prevent collusion.
فتح الحزمة
قم بالتسجيل لفتح البطاقات في هذه المجموعة!
Unlock Deck
Unlock Deck
1/80
auto play flashcards
العب
simple tutorial
ملء الشاشة (f)
exit full mode
Deck 9: The Personal and Social Impact of Computers
1
The combination of duties is a key concept of good internal controls.
False
2
Phishing has become such a serious problem that several companies have formed the Domain-based Message Authentication,Reporting,and Conformance (DMARC)group to provide improved e-mail security and protection from phishing.
True
3
The first step to prevent computer-related waste is to review existing policies and procedures and determine whether they are adequate.
False
4
A rootkit is a type of Trojan horse that executes when specific conditions occur.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
5
The ready availability of personal computers,coupled with the development of mapping and analysis software,has led law enforcement agencies to use crime-related data,powerful analysis techniques,and geographic information systems (GIS)to better understand and even diminish crime risks.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
6
Most computer-related mistakes are caused by machine error.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
7
Role-based system access means that only people who fill a certain role can access a specific system.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
8
Incidents of identity theft are reported to the Department of Justice.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
9
A script bunny is a young,female computer hacker.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
10
The Department of Homeland Security Department's Information Analysis and Infrastructure Protection Directorate serves as a focal point for threat assessment,warning,investigation,and response to cyberterrorism threats or attacks against the country's critical infrastructure.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
11
Many computer crimes go unreported because companies do not want bad publicity or don't think that law enforcement can help.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
12
Smartphones-especially ones running the popular Android operating system-can run applications that are impervious to malware.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
13
The public cannot gain online access to information about registered sex offenders online because of various privacy laws.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
14
For those computers with an integrated Web cam,tracking software sends messages via a wireless network to the specified email address,pinpointing its location and including a picture of the thief.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
15
As information technology becomes faster,more complex,and more powerful,the risk of computer-related mistakes decreases tremendously.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
16
To obtain a patent or to determine if a patent exists in an area a company seeks to exploit,a search by the U.S.Patent Office is required;these can last longer than 25 months.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
17
A computer hacker is someone who intimidates or coerces a government or organization to advance his or her political or social objectives by launching computer-based attacks against computers,networks,and the information stored on them.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
18
Patent laws protect processes,machines,and compositions of matter.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
19
Relaxing controls for changes to critical tables,HTML,and URLs is a useful policy to minimize computer-related waste and mistakes.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
20
Not many small and medium sized organizations are willing to outsource their network security operations.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
21
Carpal tunnel syndrome (CTS)is the formation of blood clots in the legs or lungs.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
22
Federal law prohibits employers from monitoring email sent or received by their employees.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
23
_____ is often conducted by phone with a hacker imitating someone in a position of authority and attempting to gradually draw information out of a user.

A) Dumpster diving
B) Cyberterrorism
C) Social engineering attack
D) Organizational identity theft
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
24
The final step to prevent computer-related waste is to:

A) ensure that users throughout an organization are following established procedures.
B) establish policies and procedures regarding efficient acquisition,use,and disposal of systems and devices.
C) review existing policies and procedures and determine whether they are adequate.
D) check whether current policies cover existing practices adequately.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
25
_____ have extra knowledge that make them especially dangerous-they know logon IDs,passwords,and company procedures that help them evade detection.

A) Crackers
B) Hackers
C) Insiders
D) Script bunnies
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
26
The use of email among public officials might violate "open meeting" laws.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
27
A _____ is a set of programs that enables its user to gain administrator level access to a computer or network.

A) virus
B) Trojan horse
C) rootkit
D) worm
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
28
If an activity is defined as legal then it is ethical.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
29
A _____ is a type of Trojan horse that executes when specific conditions occur.

A) virus
B) worm
C) logic bomb
D) rootkit
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
30
The ______ Web-based service system is one of several information systems used by law enforcement to recover stolen property.

A) LeadsOnline
B) JusticeXchange
C) Watch Systems
D) CRIMECAST
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
31
A job that requires sitting at a desk and using a computer for many hours a day doubles the risk of seated immobility thromboembolism (SIT).
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
32
Multinational companies face an extremely difficult challenge in implementing data collection and dissemination processes and policies because of the multitude of differing country and regional statutes.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
33
_____ refer to errors,failures,and other computer problems that make computer output incorrect or not useful.

A) Computer-related wastes
B) Human errors
C) Computer-related mistakes
D) Coding errors
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
34
A _____ is a modified version of a virus that is produced by the virus's author or another person by amending the original virus code.

A) rootkit
B) variant
C) Trojan horse
D) worm
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
35
A(n)_____ is a computer savvy person who attempts to gain unauthorized or illegal access to computer systems to steal passwords,corrupt files or programs,or even transfer money.

A) hacker
B) insider
C) cracker
D) script bunny
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
36
The monitor should be about one arm's length away from a user.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
37
IS professionals believe that their field offers few opportunities for unethical behavior.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
38
The Internet Crime Computer Center (IC3)is an alliance between ______.

A) the Department of Homeland Security and the White Collar Crime Center
B) the Department of Homeland Security and the Department of Justice
C) the White Collar Crime Center and the Federal Bureau of Investigation
D) the Federal Bureau of Investigation and the Central Intelligence Agency
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
39
To safeguard a user's PC and prevent it from spreading malware to the user's friends and coworkers,some antivirus software scans and cleans both incoming and outgoing email messages.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
40
Posting information to the Internet using anonymous e-mail accounts or screen names makes it impossible to identify the libeler.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
41
_____ is a crime in which an imposter obtains key pieces of personal identification information to impersonate someone else.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
42
_____ refers to the use of any of several technologies to enforce policies for controlling access to digital media,such as movies,music,and software.

A) Copyright protection
B) Software protection dongle
C) Software piracy
D) Digital rights management
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
43
The _____ requires telephone companies to turn over customer information,including numbers called,without a court order,if the Federal Bureau of Investigation (FBI)claims that the records are relevant to a terrorism investigation.

A) Cable Act of 1992
B) Electronic Communications Privacy Act of 1986
C) Gramm-Leach-Bliley Act of 1999
D) USA Patriot Act of 2001
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
44
A useful guideline to protect corporate computers from criminal hackers is to:

A) install antivirus software on all computers.
B) enable physical access to servers.
C) provide overfriendly sign-in procedures for remote users.
D) enable several guest accounts.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
45
_____ is an inflammation of the nerve that connects the forearm to the palm of the wrist.

A) Carpal tunnel syndrome (CTS)
B) Seated immobility thromboembolism (SIT)
C) Chronic idiopathic mylofibrosis
D) Behcet's syndrome
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
46
_____ is the intimidation of government or civilian population by using information technology to disable critical national infrastructures (e.g. ,energy,transportation,financial,law enforcement,emergency response)to achieve political,religious,or ideological goals.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
47
The _____ requires all financial institutions to protect and secure customers' nonpublic data from unauthorized access or use.

A) Gramm-Leach-Bliley Act
B) Fair Credit Reporting Act
C) USA Patriot Act
D) Fair and Accurate Credit Transactions Act
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
48
If convicted for copyright infringement,software pirates could be sentenced to jail for up to _____ years.

A) two
B) ten
C) five
D) three
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
49
The practice of disguising illegally gained funds so that they seem legal is called _____.

A) identity theft
B) vishing
C) spoofing
D) money laundering
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
50
Which of the following statements is true of federal laws?

A) They permit employers to monitor instant messages sent and received by employees.
B) They authorize public officials to meet in private about matters that affect the state or local area.
C) They completely protect individual privacy.
D) They forbid customers and employees from accessing data about themselves.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
51
_____ is a scam that attempts to steal an individual's private information by having them respond to a text message.

A) Phishing
B) Smishing
C) Vishing
D) Sniffing
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
52
Proper use of antivirus software requires:

A) scanning all removable media before copying programs from them.
B) running the software only if a virus has been detected.
C) refraining from updating the software often.
D) installing software from unsealed packages.​
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
53
_____ is an activity in which a criminal illegally gains access to another's line of credit with stolen credit card numbers.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
54
Founded in 1947,the _____ is the oldest computing society and boasts more than 100,000 members in more than 100 countries.

A) United States Computer Emergency Readiness Team (US-CERT)
B) Computer Sciences Corporation (CSC)
C) Domain-based Message Authentication,Reporting,and Conformance group (DMARC)
D) Association for Computing Machinery (ACM)
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
55
Which of the following statements is true of the E-Government Act of 2002?

A) It renews the U.S.government's authority to monitor electronic communications of foreigners abroad and authorizes foreign surveillance programs by the National Security Agency (NSA).
B) It requires federal agencies to post machine-readable privacy policies on their Web sites and to perform privacy impact assessments on all new collections of data of ten or more people.
C) It restricts government access to certain records held by financial institutions.
D) It defines procedures to request judicial authorization for electronic surveillance of persons engaged in espionage against the United States on behalf of a foreign power.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
56
Heavy computer users who experience red,dry,itchy eyes should _____.

A) consider the use of artificial tears
B) consider the use of older,but more human friendly CRT monitors
C) keep their focus on their screens for long hours
D) avoid blinking often
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
57
Organizations operating unintegrated information systems,acquiring redundant systems,and wasting information system are examples of _____.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
58
Under the Identity Theft and Assumption Deterrence Act of 1998,the _____ is assigned responsibility to help victims restore their credit and erase the impact of the imposter.

A) Federal Bureau of Investigation (FBI)
B) Federal Trade Commission (FTC)
C) Securities and Exchange Commission (SEC)
D) Department of Justice (DOJ)
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
59
A _____ is a small program hidden in a network or computer system that records identification numbers.

A) logic bomb
B) password sniffer
C) Trojan horse
D) rootkit
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
60
_____ is the practice of using social skills to get computer users to provide information that allows a hacker to access an information system or its data.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
61
The hazardous activities associated with unfavorable working conditions are collectively referred to as _____.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
62
A party offended by a libel can file what is known as a(n)_____ lawsuit and use the subpoena power it grants to force the Internet service provider (ISP)to provide whatever information it has about the anonymous poster,including Internet Protocol (IP)address,name,and street address.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
63
The _____,passed by Congress in October 1998,was directed at Web sites catering to children,requiring site owners to post comprehensive privacy policies and to obtain parental consent before they collect any personal information from children under 13 years of age.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
64
The science of designing machines,products,and systems to maximize the safety,comfort,and efficiency of the people who use them is called _____.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
65
Many organizations use _____ software to provide a comprehensive display on a single computer screen of all the vital data related to an organization's security defenses,including threats,exposures,policy compliance,and incident alerts.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
66
A(n)_____ monitors system and network resources and traffic and notifies network security personnel when it senses a possible intrusion.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
67
_____ is software installed on a personal computer to intercept or take partial control over the user's interaction with the computer without knowledge or permission of the user.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
68
_____ is software that runs in the background to protect a user's computer from dangers lurking on the Internet and other possible sources of infected files.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
69
A(n)_____ is a person paid by a company to lie about how much he or she has earned and how easy the plan was to operate.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
70
Software programs that when loaded into a computer system will destroy,interrupt,or cause errors in processing are known as _____.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
71
Inexperienced hackers can download programs called _____ that automate the job of breaking into computers.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
72
_____ is a scam that attempts to steal an individual's private information by having them call a phone number and enter personal data.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
73
Practitioners in many professions subscribe to a(n)_____ that states the principles and core values that are essential to their work,and,therefore,govern their behavior.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
74
_____ is a Web-based data sharing system that places millions of nationwide booking records at the fingertips of law enforcement officials.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
75
_____ are employees,disgruntled or otherwise,working solo or in concert with outsiders to compromise corporate systems.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
76
_____ is a form of computer scam that attempts to get users to gain access to a customer's private information through a fake Web site.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
77
_____ is the process of converting an original electronic message into a form that can be understood only by the intended recipients.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
78
The act of going through the trash of an organization to find secret or confidential information,including information needed to access an information system or its data is known as _____.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
79
To help parents control what their children see on the Internet,some companies provide _____ to help screen Internet content.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
80
_____ is the careful division of the tasks and responsibilities associated with a key process so that they must be performed by more than one person to prevent collusion.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
locked card icon
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.