Deck 14: The Personal and Social Impact of Computers

Full screen (f)
exit full mode
Question
The Homeland Security Department's Information Analysis and Infrastructure Protection Directorate serves as a focal point for threat assessment of, warning of, investigation of, and response to threats or attacks against the country's critical infrastructure.
Use Space or
up arrow
down arrow
to flip the card.
Question
The combining of duties is a key concept of good internal controls.
Question
Smartphones-especially ones running the popular Android operating system-can run applications that are impervious to malware.
Question
Tracking software sends messages via a wireless network to the specified e-mail address, pinpointing its location and including a picture of the thief (for those computers with an integrated Web cam).
Question
A virus can send copies of itself via a network.
Question
A script bunny is a young, female computer hacker.
Question
To obtain a patent or to determine if a patent exists in an area a company seeks to exploit requires a search by the U.S. Patent Office; these can last longer than 25 months.
Question
The Mask is a collection of malware that infects computers running the Windows, OS X, and Linux operating systems.
Question
Catching and convicting criminal hackers remains an easy task, and the method behind these crimes is often easy to determine.
Question
Role-based system access means that only people who fill a particular role can access a specific system.
Question
Penalties for software piracy are lenient and liberal.
Question
Phishing has become such a serious problem that several companies have formed the Domain-based Message Authentication, Reporting, and Conformance (DMARC) group to provide improved e-mail security and protection from phishing.
Question
Many computer crimes go unreported because companies do not want bad publicity or don't think that law enforcement can help.
Question
Patent laws protect processes, machines, and compositions of matter.
Question
Organizations continue to operate their businesses using integrated information systems that leads to missed opportunities, increased costs, and lost sales.
Question
Incidents of identity theft are reported to the Federal Trade Commission (FTC).
Question
Only few small and mid-sized organizations are willing to outsource their network security operations.
Question
Some web sites offer digital tools-often without charge-that let people snoop, crash computers, hijack control of a machine, or retrieve a copy of every keystroke.
Question
A computer can be both the tool used to commit a crime and the object of that crime.
Question
Computer-related mistakes include organizations operating unintegrated information systems and acquiring redundant systems.
Question
If an activity is defined as legal then it is ethical.
Question
A(n) _____ is a computer savvy person who attempts to gain unauthorized or illegal access to computer systems to steal passwords, corrupt files or programs, or even transfer money.

A) criminal hacker
B) insider
C) whistleblower
D) script bunny
Question
The use of e-mail among public officials might violate "open meeting" laws.
Question
The LeadsOnline Web-based service system is one of several information systems used by law enforcement to _____.

A) monitor sex offenders
B) assess crime risk for a given area
C) recover stolen property
D) help victims restore their credit
Question
Which of the following is a useful policy to minimize waste and mistakes?

A) Changes to HTML and URLs should be documented and authorized by end users.
B) System report titles should be as brief as possible and should simply indicate the report number.
C) Users should implement proper procedures to ensure correct input data.
D) Tight control should be avoided over critical tables.
Question
A job that requires sitting at a desk and using a computer for many hours a day qualifies as a sedentary job.
Question
_____ is a legislation that requires businesses to prove that they are securing their data.

A) Internet Tax Freedom Act
B) Sarbanes-Oxley Act
C) Glass-Steagall Act
D) ​Judiciary Act
Question
Multinational companies face an extremely difficult challenge in implementing data collection and dissemination processes and policies because of the multitude of differing country and regional statutes.
Question
To protect a person's PC and prevent it from spreading malware to his or her coworkers, some antivirus software scans and cleans both incoming and outgoing e-mail messages.
Question
A _____ is a small program hidden in a network or computer system that records identification numbers.

A) logic bomb
B) password sniffer
C) variant
D) rootkit
Question
_____ is a set of programs that enables its user to gain administrator level access to a computer or network.

A) Virus
B) Trojan horse
C) Rootkit
D) Worm
Question
In order to protect the privacy of employees, email messages that have been erased from hard disks cannot be retrieved.
Question
Posting information to the Internet using anonymous email accounts or screen names makes it impossible to identify a libeler.
Question
_____ refers to the use of any of several technologies to enforce policies for controlling access to digital media, such as movies, music, and software.

A) Copyright protection
B) Software protection dongle
C) Software piracy
D) Digital rights management
Question
Two primary causes of computer-related health problems are a poorly designed work environment and failure to take regular breaks to stretch the muscles and rest the eyes.
Question
A job that requires sitting at a desk for many hours a day can significantly reduce the risk of type 2 diabetes.
Question
The Internet Crime Computer Center (IC3) is an alliance between ______.

A) the Department of Homeland Security (DHS) and the White Collar Crime Center (NW3C)
B) the Department of Homeland Security (DHS) and the Department of Justice (DOJ)
C) the White Collar Crime Center (NW3C) and the Federal Bureau of Investigation (FBI)
D) the Federal Bureau of Investigation (FBI) and the Central Intelligence Agency (CIA)
Question
IS professionals believe that their field offers few opportunities for unethical behavior.
Question
_____ have extra knowledge that make them especially dangerous-they know logon IDs, passwords, and company procedures that help them evade detection.

A) Crackers
B) Hackers
C) Insiders
D) Script bunnies
Question
_____ is a type of malware that executes when specific conditions occur.

A) Virus
B) Worm
C) Logic bomb
D) Trojan horse
Question
A job that requires sitting at a desk and using a computer for many hours a day can lead to:

A) undesirable weight loss.
B) formation of blood clots.
C) inflammation of the gum tissue.
D) sleep disorders.
Question
A _____ is a malicious program that spreads from computer to computer without any human action.

A) variant
B) worm
C) virus
D) rootkit
Question
The _____ requires telephone companies to turn over customer information, including numbers called, without a court order if the Federal Bureau of Investigation (FBI) claims that the records are relevant to a terrorism investigation.

A) Cable Act of 1992
B) Electronic Communications Privacy Act of 1986
C) Gramm-Leach-Bliley Act of 1999
D) USA Patriot Act of 2001
Question
_____ involves publishing an intentionally false written statement that is damaging to a person's or an organization's reputation.

A) Vishing
B) Slander
C) Libel
D) Phishing
Question
Heavy computer users who experience red, dry, itchy eyes should _____.

A) consider the use of artificial tears
B) consider the use of older, but more human friendly CRT monitors
C) keep their focus on their screens for long hours
D) avoid blinking often
Question
The _____ requires all financial institutions to protect and secure customers' nonpublic data from unauthorized access or use.

A) Gramm-Leach-Bliley Act of 1999
B) E-Government Act of 2002
C) USA Patriot Act of 2001
D) Sarbanes-Oxley Act of 2002
Question
Which of the following statements is true of the E-Government Act of 2002?

A) It renews the U.S. government's authority to monitor electronic communications of foreigners abroad and authorizes foreign surveillance programs by the National Security Agency (NSA).
B) It requires federal agencies to post machine-readable privacy policies on their Web sites and to perform privacy impact assessments on all new collections of data of ten or more people.
C) It restricts government access to certain records held by financial institutions.
D) It defines procedures to request judicial authorization for electronic surveillance of persons engaged in espionage against the United States on behalf of a foreign power.
Question
_____ is the intimidation of government or civilian population by using information technology to disable critical national infrastructures (e.g., energy, transportation, financial, law enforcement, emergency response) to achieve political, religious, or ideological goals.
Question
_____ is the practice of using social skills to get computer users to provide information that allows a hacker to access an information system or its data.
Question
_____ is is an inflammation of the nerve that connects the forearm to the palm of the wrist.

A) Carpal tunnel syndrome (CTS)
B) Seated immobility thromboembolism (SIT)
C) Chronic idiopathic mylofibrosis
D) Behcet's syndrome
Question
Which of the following statements is true of federal laws?

A) They permit employers to monitor instant messages sent and received by employees.
B) They authorize public officials to meet in private about matters that affect the state or local area.
C) They completely protect individual privacy.
D) They forbid customers and employees from accessing data about themselves.
Question
_____ is a crime in which an imposter obtains key pieces of personal identification information to impersonate someone else.
Question
_____ states the principles and core values that are essential to a set of people and that, therefore, govern these people's behavior.

A) Code of ethics
B) Code of conduct
C) Code of civil procedure
D) Code of criminal procedure
Question
The practice of disguising illegally gained funds so that they seem legal is called _____.

A) identity theft
B) vishing
C) spoofing
D) money laundering
Question
_____ is a method by which a criminal illegally gains access to another's line of credit with stolen credit card numbers.
Question
Under the Identity Theft and Assumption Deterrence Act of 1998, the _____ is assigned responsibility to help victims restore their credit and erase the impact of the imposter.

A) Federal Bureau of Investigation (FBI)
B) Federal Trade Commission (FTC)
C) Securities and Exchange Commission (SEC)
D) Department of Justice (DOJ)
Question
Proper use of antivirus software requires:

A) scanning all removable media before copying programs from them.
B) running the software only if a virus has been detected.
C) refraining from updating the software often.
D) installing software from unsealed packages.
Question
A useful guideline to protect corporate computers from criminal hackers is to _____.

A) install antivirus software on all computers
B) enable physical access to servers
C) provide overfriendly sign-in procedures for remote users
D) enable several guest accounts
Question
The act of going through the trash of an organization to find secret or confidential information, including information needed to access an information system or its data is known as _____.
Question
Which of the following is a computer-related mistake?

A) Operating unintegrated information systems
B) Mishandling computer outputs
C) Acquiring redundant systems
D) Exhausting information system resources
Question
_____ issues deal with what is generally considered right or wrong.
Question
_____ is a scam that attempts to steal an individual's private information by having them respond to a text message.
Question
A party offended by a libel can file what is known as a(n) _____ lawsuit and use the subpoena power it grants to force the Internet service provider (ISP) to provide whatever information it has about the anonymous poster, including Internet Protocol (IP) address, name, and street address.
Question
Inexperienced hackers can download programs called _____ that automate the job of breaking into computers.
Question
The hazardous activities associated with unfavorable working conditions are collectively referred to as _____.
Question
A(n) _____ is a malicious program that disguises itself as a useful application or game and purposefully does something a user does not expect.
Question
_____ is software installed on a personal computer to intercept or take partial control over a user's interaction with a computer without the knowledge or permission of the user.
Question
Organizations that monitor, manage, and maintain network security for both hardware and software for other organizations are known as _____.
Question
_____ is a form of computer scam that attempts to get users to gain access to a customer's private information through a fake Web site.
Question
_____ are employees, disgruntled or otherwise, working solo or in concert with outsiders to compromise corporate systems.
Question
_____ is a scam that attempts to steal an individual's private information by having them call a phone number and enter personal data.
Question
A(n) _____ is a person paid by a company to lie about how much he or she has earned and how easy the plan was to operate.
Question
Software programs that when loaded into a computer system will destroy, interrupt, or cause errors in processing are known as _____.
Question
The science of designing machines, products, and systems to maximize the safety, comfort, and efficiency of the people who use them is called _____.
Question
_____ is the careful division of the tasks and responsibilities associated with a key process so that they must be performed by more than one person.
Question
A(n) _____ monitors system and network resources and traffic and notifies network security personnel when it senses a possible intrusion.
Question
The _____ is directed at Web sites catering to children and requires Web site owners to obtain parental consent before they collect any personal information from children under 13 years old.
Question
A(n) _____ is software that runs in the background to protect a user's computer from dangers lurking on the Internet and other possible sources of infected files.
Question
_____ is the science of designing machines, products, and systems to maximize the safety, comfort, and efficiency of the people who use them.
Question
_____ is the act of unauthorized copying, downloading, sharing, selling, or installing of software.
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/85
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 14: The Personal and Social Impact of Computers
1
The Homeland Security Department's Information Analysis and Infrastructure Protection Directorate serves as a focal point for threat assessment of, warning of, investigation of, and response to threats or attacks against the country's critical infrastructure.
True
2
The combining of duties is a key concept of good internal controls.
False
3
Smartphones-especially ones running the popular Android operating system-can run applications that are impervious to malware.
False
4
Tracking software sends messages via a wireless network to the specified e-mail address, pinpointing its location and including a picture of the thief (for those computers with an integrated Web cam).
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
5
A virus can send copies of itself via a network.
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
6
A script bunny is a young, female computer hacker.
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
7
To obtain a patent or to determine if a patent exists in an area a company seeks to exploit requires a search by the U.S. Patent Office; these can last longer than 25 months.
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
8
The Mask is a collection of malware that infects computers running the Windows, OS X, and Linux operating systems.
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
9
Catching and convicting criminal hackers remains an easy task, and the method behind these crimes is often easy to determine.
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
10
Role-based system access means that only people who fill a particular role can access a specific system.
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
11
Penalties for software piracy are lenient and liberal.
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
12
Phishing has become such a serious problem that several companies have formed the Domain-based Message Authentication, Reporting, and Conformance (DMARC) group to provide improved e-mail security and protection from phishing.
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
13
Many computer crimes go unreported because companies do not want bad publicity or don't think that law enforcement can help.
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
14
Patent laws protect processes, machines, and compositions of matter.
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
15
Organizations continue to operate their businesses using integrated information systems that leads to missed opportunities, increased costs, and lost sales.
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
16
Incidents of identity theft are reported to the Federal Trade Commission (FTC).
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
17
Only few small and mid-sized organizations are willing to outsource their network security operations.
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
18
Some web sites offer digital tools-often without charge-that let people snoop, crash computers, hijack control of a machine, or retrieve a copy of every keystroke.
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
19
A computer can be both the tool used to commit a crime and the object of that crime.
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
20
Computer-related mistakes include organizations operating unintegrated information systems and acquiring redundant systems.
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
21
If an activity is defined as legal then it is ethical.
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
22
A(n) _____ is a computer savvy person who attempts to gain unauthorized or illegal access to computer systems to steal passwords, corrupt files or programs, or even transfer money.

A) criminal hacker
B) insider
C) whistleblower
D) script bunny
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
23
The use of e-mail among public officials might violate "open meeting" laws.
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
24
The LeadsOnline Web-based service system is one of several information systems used by law enforcement to _____.

A) monitor sex offenders
B) assess crime risk for a given area
C) recover stolen property
D) help victims restore their credit
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
25
Which of the following is a useful policy to minimize waste and mistakes?

A) Changes to HTML and URLs should be documented and authorized by end users.
B) System report titles should be as brief as possible and should simply indicate the report number.
C) Users should implement proper procedures to ensure correct input data.
D) Tight control should be avoided over critical tables.
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
26
A job that requires sitting at a desk and using a computer for many hours a day qualifies as a sedentary job.
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
27
_____ is a legislation that requires businesses to prove that they are securing their data.

A) Internet Tax Freedom Act
B) Sarbanes-Oxley Act
C) Glass-Steagall Act
D) ​Judiciary Act
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
28
Multinational companies face an extremely difficult challenge in implementing data collection and dissemination processes and policies because of the multitude of differing country and regional statutes.
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
29
To protect a person's PC and prevent it from spreading malware to his or her coworkers, some antivirus software scans and cleans both incoming and outgoing e-mail messages.
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
30
A _____ is a small program hidden in a network or computer system that records identification numbers.

A) logic bomb
B) password sniffer
C) variant
D) rootkit
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
31
_____ is a set of programs that enables its user to gain administrator level access to a computer or network.

A) Virus
B) Trojan horse
C) Rootkit
D) Worm
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
32
In order to protect the privacy of employees, email messages that have been erased from hard disks cannot be retrieved.
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
33
Posting information to the Internet using anonymous email accounts or screen names makes it impossible to identify a libeler.
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
34
_____ refers to the use of any of several technologies to enforce policies for controlling access to digital media, such as movies, music, and software.

A) Copyright protection
B) Software protection dongle
C) Software piracy
D) Digital rights management
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
35
Two primary causes of computer-related health problems are a poorly designed work environment and failure to take regular breaks to stretch the muscles and rest the eyes.
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
36
A job that requires sitting at a desk for many hours a day can significantly reduce the risk of type 2 diabetes.
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
37
The Internet Crime Computer Center (IC3) is an alliance between ______.

A) the Department of Homeland Security (DHS) and the White Collar Crime Center (NW3C)
B) the Department of Homeland Security (DHS) and the Department of Justice (DOJ)
C) the White Collar Crime Center (NW3C) and the Federal Bureau of Investigation (FBI)
D) the Federal Bureau of Investigation (FBI) and the Central Intelligence Agency (CIA)
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
38
IS professionals believe that their field offers few opportunities for unethical behavior.
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
39
_____ have extra knowledge that make them especially dangerous-they know logon IDs, passwords, and company procedures that help them evade detection.

A) Crackers
B) Hackers
C) Insiders
D) Script bunnies
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
40
_____ is a type of malware that executes when specific conditions occur.

A) Virus
B) Worm
C) Logic bomb
D) Trojan horse
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
41
A job that requires sitting at a desk and using a computer for many hours a day can lead to:

A) undesirable weight loss.
B) formation of blood clots.
C) inflammation of the gum tissue.
D) sleep disorders.
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
42
A _____ is a malicious program that spreads from computer to computer without any human action.

A) variant
B) worm
C) virus
D) rootkit
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
43
The _____ requires telephone companies to turn over customer information, including numbers called, without a court order if the Federal Bureau of Investigation (FBI) claims that the records are relevant to a terrorism investigation.

A) Cable Act of 1992
B) Electronic Communications Privacy Act of 1986
C) Gramm-Leach-Bliley Act of 1999
D) USA Patriot Act of 2001
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
44
_____ involves publishing an intentionally false written statement that is damaging to a person's or an organization's reputation.

A) Vishing
B) Slander
C) Libel
D) Phishing
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
45
Heavy computer users who experience red, dry, itchy eyes should _____.

A) consider the use of artificial tears
B) consider the use of older, but more human friendly CRT monitors
C) keep their focus on their screens for long hours
D) avoid blinking often
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
46
The _____ requires all financial institutions to protect and secure customers' nonpublic data from unauthorized access or use.

A) Gramm-Leach-Bliley Act of 1999
B) E-Government Act of 2002
C) USA Patriot Act of 2001
D) Sarbanes-Oxley Act of 2002
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
47
Which of the following statements is true of the E-Government Act of 2002?

A) It renews the U.S. government's authority to monitor electronic communications of foreigners abroad and authorizes foreign surveillance programs by the National Security Agency (NSA).
B) It requires federal agencies to post machine-readable privacy policies on their Web sites and to perform privacy impact assessments on all new collections of data of ten or more people.
C) It restricts government access to certain records held by financial institutions.
D) It defines procedures to request judicial authorization for electronic surveillance of persons engaged in espionage against the United States on behalf of a foreign power.
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
48
_____ is the intimidation of government or civilian population by using information technology to disable critical national infrastructures (e.g., energy, transportation, financial, law enforcement, emergency response) to achieve political, religious, or ideological goals.
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
49
_____ is the practice of using social skills to get computer users to provide information that allows a hacker to access an information system or its data.
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
50
_____ is is an inflammation of the nerve that connects the forearm to the palm of the wrist.

A) Carpal tunnel syndrome (CTS)
B) Seated immobility thromboembolism (SIT)
C) Chronic idiopathic mylofibrosis
D) Behcet's syndrome
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
51
Which of the following statements is true of federal laws?

A) They permit employers to monitor instant messages sent and received by employees.
B) They authorize public officials to meet in private about matters that affect the state or local area.
C) They completely protect individual privacy.
D) They forbid customers and employees from accessing data about themselves.
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
52
_____ is a crime in which an imposter obtains key pieces of personal identification information to impersonate someone else.
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
53
_____ states the principles and core values that are essential to a set of people and that, therefore, govern these people's behavior.

A) Code of ethics
B) Code of conduct
C) Code of civil procedure
D) Code of criminal procedure
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
54
The practice of disguising illegally gained funds so that they seem legal is called _____.

A) identity theft
B) vishing
C) spoofing
D) money laundering
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
55
_____ is a method by which a criminal illegally gains access to another's line of credit with stolen credit card numbers.
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
56
Under the Identity Theft and Assumption Deterrence Act of 1998, the _____ is assigned responsibility to help victims restore their credit and erase the impact of the imposter.

A) Federal Bureau of Investigation (FBI)
B) Federal Trade Commission (FTC)
C) Securities and Exchange Commission (SEC)
D) Department of Justice (DOJ)
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
57
Proper use of antivirus software requires:

A) scanning all removable media before copying programs from them.
B) running the software only if a virus has been detected.
C) refraining from updating the software often.
D) installing software from unsealed packages.
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
58
A useful guideline to protect corporate computers from criminal hackers is to _____.

A) install antivirus software on all computers
B) enable physical access to servers
C) provide overfriendly sign-in procedures for remote users
D) enable several guest accounts
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
59
The act of going through the trash of an organization to find secret or confidential information, including information needed to access an information system or its data is known as _____.
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
60
Which of the following is a computer-related mistake?

A) Operating unintegrated information systems
B) Mishandling computer outputs
C) Acquiring redundant systems
D) Exhausting information system resources
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
61
_____ issues deal with what is generally considered right or wrong.
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
62
_____ is a scam that attempts to steal an individual's private information by having them respond to a text message.
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
63
A party offended by a libel can file what is known as a(n) _____ lawsuit and use the subpoena power it grants to force the Internet service provider (ISP) to provide whatever information it has about the anonymous poster, including Internet Protocol (IP) address, name, and street address.
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
64
Inexperienced hackers can download programs called _____ that automate the job of breaking into computers.
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
65
The hazardous activities associated with unfavorable working conditions are collectively referred to as _____.
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
66
A(n) _____ is a malicious program that disguises itself as a useful application or game and purposefully does something a user does not expect.
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
67
_____ is software installed on a personal computer to intercept or take partial control over a user's interaction with a computer without the knowledge or permission of the user.
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
68
Organizations that monitor, manage, and maintain network security for both hardware and software for other organizations are known as _____.
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
69
_____ is a form of computer scam that attempts to get users to gain access to a customer's private information through a fake Web site.
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
70
_____ are employees, disgruntled or otherwise, working solo or in concert with outsiders to compromise corporate systems.
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
71
_____ is a scam that attempts to steal an individual's private information by having them call a phone number and enter personal data.
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
72
A(n) _____ is a person paid by a company to lie about how much he or she has earned and how easy the plan was to operate.
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
73
Software programs that when loaded into a computer system will destroy, interrupt, or cause errors in processing are known as _____.
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
74
The science of designing machines, products, and systems to maximize the safety, comfort, and efficiency of the people who use them is called _____.
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
75
_____ is the careful division of the tasks and responsibilities associated with a key process so that they must be performed by more than one person.
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
76
A(n) _____ monitors system and network resources and traffic and notifies network security personnel when it senses a possible intrusion.
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
77
The _____ is directed at Web sites catering to children and requires Web site owners to obtain parental consent before they collect any personal information from children under 13 years old.
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
78
A(n) _____ is software that runs in the background to protect a user's computer from dangers lurking on the Internet and other possible sources of infected files.
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
79
_____ is the science of designing machines, products, and systems to maximize the safety, comfort, and efficiency of the people who use them.
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
80
_____ is the act of unauthorized copying, downloading, sharing, selling, or installing of software.
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 85 flashcards in this deck.