Deck 14: The Personal and Social Impact of Computers

Full screen (f)
exit full mode
Question
To obtain a patent or to determine if a patent exists in an area a company seeks to exploit requires a search by the U.S. Patent Office; these can last longer than 25 months.
Use Space or
up arrow
down arrow
to flip the card.
Question
Just over 300,000 crimes were reported to the Internet Crime Computer Center in 2010 and this represents the majority of computer-related crimes.
Question
The public is not able to gain online access to information about registered sex offenders online because of various privacy laws.
Question
The Department of Homeland Security Department's Information Analysis and Infrastructure Protection Directorate serves as a focal point for threat assessment, warning, investigation, and response to cyberterrorism attacks against the country's critical infrastructure.
Question
Patent laws protect processes, machines, and compositions of matter.
Question
Personal computers, mapping and analysis software, crime-related data, powerful analysis techniques, and geographic information systems have helped law enforcement to better understand and even diminish crime.
Question
The combining of duties is a key concept of good internal controls.
Question
Few small and medium sized organizations are willing to outsource their network security operations.
Question
It is estimated that the global software piracy rate was about 42% and amounted to about $95 billion in lost sales.
Question
Incidents of child identity theft are reported to the Federal Trade Commission.
Question
Tracking software sends messages via a wireless network to the specified e-mail address, pinpointing its location and including a picture of the thief (for those computers with an integrated Web cam).
Question
A virus can send copies of itself via a network.
Question
Smartphones such as the iPhone and Google's Android phone that can run applications are impervious to malware.
Question
The FBI's Domestic Investigations and Operations Guide encourages agents to consider dumpster diving as a technique to gain information.
Question
A number of federal laws prohibit individuals from engaging in online gambling.
Question
Many computer crimes go unreported because companies do not want bad publicity or don't think that law enforcement can help.
Question
A computer hacker is someone who intimidates or coerces a government or organization to advance his or her political or social objectives by launching computer-based attacks against, computers, networks, and the information stored on them.
Question
Role-based system access means that only people who fill or used to fill a certain role can access a specific system.
Question
A script bunny is a young, female computer hacker.
Question
Phishing has become such a serious problem that several companies have formed the Domain-based Message Authentication, Reporting, and Conformance group to provide improved e-mail security and protection from phishing.
Question
A job that requires sitting at a desk and using a computer for many hours a day triple the risk of seated immobility thromboembolism (SIT), the formation of blood clots in the legs or lungs.
Question
The Hippocratic Oath is an example of a code of ethics.
Question
Multinational companies face an extremely difficult challenge in implementing data collection and dissemination processes and policies because of the multitude of differing country and regional statutes.
Question
The federal agency to which identity theft complaints are made is the ______.

A) Federal Bureau of Investigation
B) Federal Trade Commission
C) Securities and Exchange Commission
D) Department of Justice
Question
According to the Internet Crime Computer Center, the two most common online crimes reported included _____.

A) phishing to steal individuals' banking logon's and passwords and planting keystroke capturing software on individuals' computers
B) nondelivery of merchandise or payments and scams involving people posing as FBI agents
C) hacking into individuals' email accounts and the planting of password sniffers in corporate networks
D) planting of viruses in corporate networks and the defacing of corporate and government Websites
Question
If an activity is defined as legal then it is ethical.
Question
The use of e-mail among public officials might violate "open meeting" laws.
Question
______ is a small program hidden in a network or computer system that records identification numbers and passwords.

A) Logic bomb
B) Password sniffer
C) Trojan horse
D) Rootkit
Question
The ______ Web-based service system is one of several information systems used by law enforcement to recover stolen property.

A) LeadsOnline
B) JusticeXchange
C) Watch Systems
D) Crimecast
Question
The Internet Crime Computer Center is an alliance between the White Collar Crime Center and the ______.

A) Department of Homeland Security
B) Department of Justice
C) Federal Bureau of Investigation
D) none of the above
Question
Prolonged computer use under poor working conditions can lead to carpal tunnel syndrome, bursitis, headaches, and permanent eye damage.
Question
Posting information to the Internet using anonymous e-mail accounts or screen names makes it impossible to identify the poster.
Question
A(n) ____ is a computer savvy person who attempts to gain unauthorized or illegal access to computer systems to steal passwords, corrupt files or programs, or even transfer money.

A) hacker
B) insider
C) cracker
D) script bunny
Question
Federal law prohibits private employers from monitoring e-mail sent or received by their employees.
Question
Two primary causes of computer-related health problems are a poorly designed work environment and failure to take regular breaks to stretch the muscles and rest the eyes.
Question
____________________ have extra knowledge that make them especially dangerous - they know logon ids, passwords, and company procedures that help them evade detection.

A) crackers
B) hackers
C) insiders
D) script bunnies
Question
The Leads Online Web-based service system is used by law enforcement to ____.

A) monitor sex offenders
B) provide a quick overview of crime risk at a given address
C) recover stolen property
D) none of the above
Question
To protect your PC and prevent it from spreading malware to your co-workers, some antivirus software scans and cleans both incoming and outgoing e-mail messages.
Question
A good example of a useful policy to minimize waste and mistake is ____.

A) avoid tight control over critical tables
B) system report titles should be as brief as possible and simply indicate the report number
C) users should implement proper procedures to ensure correct input data
D) all of the above
Question
____________________ is a type of malware that executes when specific conditions occur.

A) Virus
B) Worm
C) Logic bomb
D) Trojan horse
Question
____ is an aggravation of the pathway for the nerves that travel through the wrist.

A) Carpal tunnel syndrome
B) Seated immobility thromboembolism
C) Chronic idiopathic mylofibrosis
D) none of the above
Question
If a court determines that a patent infringement is intentional, it can award up to _____ to the patent holder.

A) $10 million
B) $250,000 per infringement
C) three times the amount of damages claimed by the patent holder
D) $100,000 per infringement
Question
A useful guideline to protect corporate computers from criminal hackers is to ____.

A) Install antivirus software on all computers
B) Avoid creating frequent backups of critical data
C) Remove any firewall that may have been installed between your corporate network and the Internet
D) Enable several guest accounts
Question
The penalty for software piracy can be severe, as much as ______ for each program copied.

A) $50,000
B) $100,000
C) $150,000
D) $200,000
Question
____________________ is a set of programs that enables its user to gain administrator level access to a computer or network.

A) Virus
B) Trojan horse
C) Rootkit
D) Worm
Question
Proper use of antivirus software requires that it is ____.

A) used to scan all removable storage media before copying or running programs from them
B) updated each month
C) run at least once per week
D) all of the above
Question
Computer users who work at their machines for several hours a day, should ____.

A) consider the use of artificial tears
B) consider the use of older, but more human friendly CRT monitors
C) take a break by playing solitaire every couple hours
D) avoid blinking
Question
The ____ requires telephone companies to turn over customer information, including numbers called, without a court order if the FBI claims that the records are relevant to a terrorism investigation.

A) Privacy Act of 1974
B) Electronic Communications Privacy Act
C) Gramm-Leach-Bliley Act
D) USA Patriot Act
Question
A type of malware that executes when specific conditions occur.

A) rootkit
B) logic bomb
C) Trojan horse
D) password sniffer
Question
____ of U.S. employers monitor their employees Web surfing activities.

A) Less that 20%
B) About 25%
C) Over 50%
D) Almost 75%
Question
A job that requires sitting at a desk and using a computer all day can lead to ____.

A) the formation of blood clots in the legs or lungs
B) an undesirable weight gain
C) greater risk of type 2 diabetes
D) all of the above
Question
The ____ prohibits the government from intercepting electronic messages unless it obtains a court order based on probable cause.

A) Gramm-Leach-Bliley Act
B) Electronic Communications Privacy Act
C) Freedom of Information Act
D) none of the above
Question
Both SOPA and PIPA are two bills proposed by congress that aim to __________________.

A) clamp down on money laundering
B) stop online piracy and protect copyright holders
C) provide effective rules to prevent and punish patent infringement
D) make it a federal offense to plant a virus on government computers
Question
Legislation that requires businesses to prove that they are securing their data ____.

A) HIPPA
B) Sarbanes-Oxley
C) USA Patriot Act
D) all of the above
Question
The Privacy Act of 1974 ____.

A) deals with the protection of communications while in transit from sender to receiver
B) applies only to certain federal agencies
C) requires all financial institutions to protect and secure customers' nonpublic data from unauthorized use or access
D) all of the above
Question
____ involves publishing an intentionally false written statement that is damaging to a person's or an organization's reputation.

A) Blogging
B) Slander
C) Libel
D) Unfriending
Question
______ refers to the use of any of several technologies to enforce policies for controlling access to digital media.

A) Copyright protection
B) Encryption
C) Software piracy
D) Digital rights management
Question
The practice of disguising illegally gained funds so that they seem legal is called ____.

A) identity theft
B) vishing
C) spoofing
D) money laundering
Question
The ____ required all financial service institutions to communicate their data privacy rules and honor customer preferences on sharing of data.

A) Gramm-Leach-Bliley Act
B) Freedom of Information Act
C) USA Patriot Act
D) none of the above
Question
Federal law ______.

A) permits employers to monitor instant messages sent and received by employees.
B) prohibits the implantation of RFID chips
C) encourages the use of e-mail among public officials by excluding such messages from the "open meeting" laws
D) prohibit the selling of customer data gathered on the Internet to other organizations
Question
The hazardous activities associated with unfavorable working conditions are collectively referred to as ____________________.
Question
A libeled party can file what is known as a ____________________ lawsuit to force the ISP to provide whatever information they have about an anonymous poster.
Question
In a ______ attack, the victim is sent a message to call to verify account information.
Question
CAP Index Inc.'s CRIMECAST Reports provide a quick and thorough overview of the ______ at any given location in the U.S., Canada, and the U.K.
Question
______ is the careful division of the tasks and responsibilities associated with a key process so that they must be performed by more than one person to prevent collusion.
Question
Many organizations use ____________________ software to provide a comprehensive display on a single computer screen of all the vital data related to an organizations' security defenses.
Question
_________________ is any premediated, politically motivated attack against information , computer systems, computer programs, and data which results in violence against non-combatant targets by sub-national groups or clandestine agents.
Question
____________________ is software installed on a personal computer to intercept or take partial control over the user's interaction with the computer without knowledge or permission of the user.
Question
____________________ is the operation of a fake Web site by someone trying to gain access to customer's private information.
Question
The science of designing machines, products, and systems to maximize the safety, comfort, and efficiency of the people who use them is called ____________________.
Question
Another word for computer viruses and worms is ____________________.
Question
It is ______ for banks and other financial institutions to facilitate the transfer of funds to online casinos.
Question
Inexperienced hackers can download programs called ______ that automate the job of breaking into computers.
Question
____________________ is a crime in which an imposter obtains key pieces of personal identification information to impersonate someone else.
Question
The ____________________ card causes phones to display a caller ID number specified by the caller rather than the actual number of the caller.
Question
Specialized hardware and software, such as ____________________ devices, can be used to encode data and information to help prevent unauthorized use.
Question
A(n) ____________________ system monitors system and network resources and notifies network security personnel when it senses a possible intrusion.
Question
A(n) ____________________ is a person paid by a company about how much they've earned and how easy the get-rich-quick plan was to operate.
Question
The ______ is directed at Web sites catering to children and requires Web site owners to obtain parental consent before they collect any personal information from children under 13 years old.
Question
Software is considered intellectual property and may be protected by copyright or ____________________ law.
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/89
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 14: The Personal and Social Impact of Computers
1
To obtain a patent or to determine if a patent exists in an area a company seeks to exploit requires a search by the U.S. Patent Office; these can last longer than 25 months.
True
2
Just over 300,000 crimes were reported to the Internet Crime Computer Center in 2010 and this represents the majority of computer-related crimes.
False
3
The public is not able to gain online access to information about registered sex offenders online because of various privacy laws.
False
4
The Department of Homeland Security Department's Information Analysis and Infrastructure Protection Directorate serves as a focal point for threat assessment, warning, investigation, and response to cyberterrorism attacks against the country's critical infrastructure.
Unlock Deck
Unlock for access to all 89 flashcards in this deck.
Unlock Deck
k this deck
5
Patent laws protect processes, machines, and compositions of matter.
Unlock Deck
Unlock for access to all 89 flashcards in this deck.
Unlock Deck
k this deck
6
Personal computers, mapping and analysis software, crime-related data, powerful analysis techniques, and geographic information systems have helped law enforcement to better understand and even diminish crime.
Unlock Deck
Unlock for access to all 89 flashcards in this deck.
Unlock Deck
k this deck
7
The combining of duties is a key concept of good internal controls.
Unlock Deck
Unlock for access to all 89 flashcards in this deck.
Unlock Deck
k this deck
8
Few small and medium sized organizations are willing to outsource their network security operations.
Unlock Deck
Unlock for access to all 89 flashcards in this deck.
Unlock Deck
k this deck
9
It is estimated that the global software piracy rate was about 42% and amounted to about $95 billion in lost sales.
Unlock Deck
Unlock for access to all 89 flashcards in this deck.
Unlock Deck
k this deck
10
Incidents of child identity theft are reported to the Federal Trade Commission.
Unlock Deck
Unlock for access to all 89 flashcards in this deck.
Unlock Deck
k this deck
11
Tracking software sends messages via a wireless network to the specified e-mail address, pinpointing its location and including a picture of the thief (for those computers with an integrated Web cam).
Unlock Deck
Unlock for access to all 89 flashcards in this deck.
Unlock Deck
k this deck
12
A virus can send copies of itself via a network.
Unlock Deck
Unlock for access to all 89 flashcards in this deck.
Unlock Deck
k this deck
13
Smartphones such as the iPhone and Google's Android phone that can run applications are impervious to malware.
Unlock Deck
Unlock for access to all 89 flashcards in this deck.
Unlock Deck
k this deck
14
The FBI's Domestic Investigations and Operations Guide encourages agents to consider dumpster diving as a technique to gain information.
Unlock Deck
Unlock for access to all 89 flashcards in this deck.
Unlock Deck
k this deck
15
A number of federal laws prohibit individuals from engaging in online gambling.
Unlock Deck
Unlock for access to all 89 flashcards in this deck.
Unlock Deck
k this deck
16
Many computer crimes go unreported because companies do not want bad publicity or don't think that law enforcement can help.
Unlock Deck
Unlock for access to all 89 flashcards in this deck.
Unlock Deck
k this deck
17
A computer hacker is someone who intimidates or coerces a government or organization to advance his or her political or social objectives by launching computer-based attacks against, computers, networks, and the information stored on them.
Unlock Deck
Unlock for access to all 89 flashcards in this deck.
Unlock Deck
k this deck
18
Role-based system access means that only people who fill or used to fill a certain role can access a specific system.
Unlock Deck
Unlock for access to all 89 flashcards in this deck.
Unlock Deck
k this deck
19
A script bunny is a young, female computer hacker.
Unlock Deck
Unlock for access to all 89 flashcards in this deck.
Unlock Deck
k this deck
20
Phishing has become such a serious problem that several companies have formed the Domain-based Message Authentication, Reporting, and Conformance group to provide improved e-mail security and protection from phishing.
Unlock Deck
Unlock for access to all 89 flashcards in this deck.
Unlock Deck
k this deck
21
A job that requires sitting at a desk and using a computer for many hours a day triple the risk of seated immobility thromboembolism (SIT), the formation of blood clots in the legs or lungs.
Unlock Deck
Unlock for access to all 89 flashcards in this deck.
Unlock Deck
k this deck
22
The Hippocratic Oath is an example of a code of ethics.
Unlock Deck
Unlock for access to all 89 flashcards in this deck.
Unlock Deck
k this deck
23
Multinational companies face an extremely difficult challenge in implementing data collection and dissemination processes and policies because of the multitude of differing country and regional statutes.
Unlock Deck
Unlock for access to all 89 flashcards in this deck.
Unlock Deck
k this deck
24
The federal agency to which identity theft complaints are made is the ______.

A) Federal Bureau of Investigation
B) Federal Trade Commission
C) Securities and Exchange Commission
D) Department of Justice
Unlock Deck
Unlock for access to all 89 flashcards in this deck.
Unlock Deck
k this deck
25
According to the Internet Crime Computer Center, the two most common online crimes reported included _____.

A) phishing to steal individuals' banking logon's and passwords and planting keystroke capturing software on individuals' computers
B) nondelivery of merchandise or payments and scams involving people posing as FBI agents
C) hacking into individuals' email accounts and the planting of password sniffers in corporate networks
D) planting of viruses in corporate networks and the defacing of corporate and government Websites
Unlock Deck
Unlock for access to all 89 flashcards in this deck.
Unlock Deck
k this deck
26
If an activity is defined as legal then it is ethical.
Unlock Deck
Unlock for access to all 89 flashcards in this deck.
Unlock Deck
k this deck
27
The use of e-mail among public officials might violate "open meeting" laws.
Unlock Deck
Unlock for access to all 89 flashcards in this deck.
Unlock Deck
k this deck
28
______ is a small program hidden in a network or computer system that records identification numbers and passwords.

A) Logic bomb
B) Password sniffer
C) Trojan horse
D) Rootkit
Unlock Deck
Unlock for access to all 89 flashcards in this deck.
Unlock Deck
k this deck
29
The ______ Web-based service system is one of several information systems used by law enforcement to recover stolen property.

A) LeadsOnline
B) JusticeXchange
C) Watch Systems
D) Crimecast
Unlock Deck
Unlock for access to all 89 flashcards in this deck.
Unlock Deck
k this deck
30
The Internet Crime Computer Center is an alliance between the White Collar Crime Center and the ______.

A) Department of Homeland Security
B) Department of Justice
C) Federal Bureau of Investigation
D) none of the above
Unlock Deck
Unlock for access to all 89 flashcards in this deck.
Unlock Deck
k this deck
31
Prolonged computer use under poor working conditions can lead to carpal tunnel syndrome, bursitis, headaches, and permanent eye damage.
Unlock Deck
Unlock for access to all 89 flashcards in this deck.
Unlock Deck
k this deck
32
Posting information to the Internet using anonymous e-mail accounts or screen names makes it impossible to identify the poster.
Unlock Deck
Unlock for access to all 89 flashcards in this deck.
Unlock Deck
k this deck
33
A(n) ____ is a computer savvy person who attempts to gain unauthorized or illegal access to computer systems to steal passwords, corrupt files or programs, or even transfer money.

A) hacker
B) insider
C) cracker
D) script bunny
Unlock Deck
Unlock for access to all 89 flashcards in this deck.
Unlock Deck
k this deck
34
Federal law prohibits private employers from monitoring e-mail sent or received by their employees.
Unlock Deck
Unlock for access to all 89 flashcards in this deck.
Unlock Deck
k this deck
35
Two primary causes of computer-related health problems are a poorly designed work environment and failure to take regular breaks to stretch the muscles and rest the eyes.
Unlock Deck
Unlock for access to all 89 flashcards in this deck.
Unlock Deck
k this deck
36
____________________ have extra knowledge that make them especially dangerous - they know logon ids, passwords, and company procedures that help them evade detection.

A) crackers
B) hackers
C) insiders
D) script bunnies
Unlock Deck
Unlock for access to all 89 flashcards in this deck.
Unlock Deck
k this deck
37
The Leads Online Web-based service system is used by law enforcement to ____.

A) monitor sex offenders
B) provide a quick overview of crime risk at a given address
C) recover stolen property
D) none of the above
Unlock Deck
Unlock for access to all 89 flashcards in this deck.
Unlock Deck
k this deck
38
To protect your PC and prevent it from spreading malware to your co-workers, some antivirus software scans and cleans both incoming and outgoing e-mail messages.
Unlock Deck
Unlock for access to all 89 flashcards in this deck.
Unlock Deck
k this deck
39
A good example of a useful policy to minimize waste and mistake is ____.

A) avoid tight control over critical tables
B) system report titles should be as brief as possible and simply indicate the report number
C) users should implement proper procedures to ensure correct input data
D) all of the above
Unlock Deck
Unlock for access to all 89 flashcards in this deck.
Unlock Deck
k this deck
40
____________________ is a type of malware that executes when specific conditions occur.

A) Virus
B) Worm
C) Logic bomb
D) Trojan horse
Unlock Deck
Unlock for access to all 89 flashcards in this deck.
Unlock Deck
k this deck
41
____ is an aggravation of the pathway for the nerves that travel through the wrist.

A) Carpal tunnel syndrome
B) Seated immobility thromboembolism
C) Chronic idiopathic mylofibrosis
D) none of the above
Unlock Deck
Unlock for access to all 89 flashcards in this deck.
Unlock Deck
k this deck
42
If a court determines that a patent infringement is intentional, it can award up to _____ to the patent holder.

A) $10 million
B) $250,000 per infringement
C) three times the amount of damages claimed by the patent holder
D) $100,000 per infringement
Unlock Deck
Unlock for access to all 89 flashcards in this deck.
Unlock Deck
k this deck
43
A useful guideline to protect corporate computers from criminal hackers is to ____.

A) Install antivirus software on all computers
B) Avoid creating frequent backups of critical data
C) Remove any firewall that may have been installed between your corporate network and the Internet
D) Enable several guest accounts
Unlock Deck
Unlock for access to all 89 flashcards in this deck.
Unlock Deck
k this deck
44
The penalty for software piracy can be severe, as much as ______ for each program copied.

A) $50,000
B) $100,000
C) $150,000
D) $200,000
Unlock Deck
Unlock for access to all 89 flashcards in this deck.
Unlock Deck
k this deck
45
____________________ is a set of programs that enables its user to gain administrator level access to a computer or network.

A) Virus
B) Trojan horse
C) Rootkit
D) Worm
Unlock Deck
Unlock for access to all 89 flashcards in this deck.
Unlock Deck
k this deck
46
Proper use of antivirus software requires that it is ____.

A) used to scan all removable storage media before copying or running programs from them
B) updated each month
C) run at least once per week
D) all of the above
Unlock Deck
Unlock for access to all 89 flashcards in this deck.
Unlock Deck
k this deck
47
Computer users who work at their machines for several hours a day, should ____.

A) consider the use of artificial tears
B) consider the use of older, but more human friendly CRT monitors
C) take a break by playing solitaire every couple hours
D) avoid blinking
Unlock Deck
Unlock for access to all 89 flashcards in this deck.
Unlock Deck
k this deck
48
The ____ requires telephone companies to turn over customer information, including numbers called, without a court order if the FBI claims that the records are relevant to a terrorism investigation.

A) Privacy Act of 1974
B) Electronic Communications Privacy Act
C) Gramm-Leach-Bliley Act
D) USA Patriot Act
Unlock Deck
Unlock for access to all 89 flashcards in this deck.
Unlock Deck
k this deck
49
A type of malware that executes when specific conditions occur.

A) rootkit
B) logic bomb
C) Trojan horse
D) password sniffer
Unlock Deck
Unlock for access to all 89 flashcards in this deck.
Unlock Deck
k this deck
50
____ of U.S. employers monitor their employees Web surfing activities.

A) Less that 20%
B) About 25%
C) Over 50%
D) Almost 75%
Unlock Deck
Unlock for access to all 89 flashcards in this deck.
Unlock Deck
k this deck
51
A job that requires sitting at a desk and using a computer all day can lead to ____.

A) the formation of blood clots in the legs or lungs
B) an undesirable weight gain
C) greater risk of type 2 diabetes
D) all of the above
Unlock Deck
Unlock for access to all 89 flashcards in this deck.
Unlock Deck
k this deck
52
The ____ prohibits the government from intercepting electronic messages unless it obtains a court order based on probable cause.

A) Gramm-Leach-Bliley Act
B) Electronic Communications Privacy Act
C) Freedom of Information Act
D) none of the above
Unlock Deck
Unlock for access to all 89 flashcards in this deck.
Unlock Deck
k this deck
53
Both SOPA and PIPA are two bills proposed by congress that aim to __________________.

A) clamp down on money laundering
B) stop online piracy and protect copyright holders
C) provide effective rules to prevent and punish patent infringement
D) make it a federal offense to plant a virus on government computers
Unlock Deck
Unlock for access to all 89 flashcards in this deck.
Unlock Deck
k this deck
54
Legislation that requires businesses to prove that they are securing their data ____.

A) HIPPA
B) Sarbanes-Oxley
C) USA Patriot Act
D) all of the above
Unlock Deck
Unlock for access to all 89 flashcards in this deck.
Unlock Deck
k this deck
55
The Privacy Act of 1974 ____.

A) deals with the protection of communications while in transit from sender to receiver
B) applies only to certain federal agencies
C) requires all financial institutions to protect and secure customers' nonpublic data from unauthorized use or access
D) all of the above
Unlock Deck
Unlock for access to all 89 flashcards in this deck.
Unlock Deck
k this deck
56
____ involves publishing an intentionally false written statement that is damaging to a person's or an organization's reputation.

A) Blogging
B) Slander
C) Libel
D) Unfriending
Unlock Deck
Unlock for access to all 89 flashcards in this deck.
Unlock Deck
k this deck
57
______ refers to the use of any of several technologies to enforce policies for controlling access to digital media.

A) Copyright protection
B) Encryption
C) Software piracy
D) Digital rights management
Unlock Deck
Unlock for access to all 89 flashcards in this deck.
Unlock Deck
k this deck
58
The practice of disguising illegally gained funds so that they seem legal is called ____.

A) identity theft
B) vishing
C) spoofing
D) money laundering
Unlock Deck
Unlock for access to all 89 flashcards in this deck.
Unlock Deck
k this deck
59
The ____ required all financial service institutions to communicate their data privacy rules and honor customer preferences on sharing of data.

A) Gramm-Leach-Bliley Act
B) Freedom of Information Act
C) USA Patriot Act
D) none of the above
Unlock Deck
Unlock for access to all 89 flashcards in this deck.
Unlock Deck
k this deck
60
Federal law ______.

A) permits employers to monitor instant messages sent and received by employees.
B) prohibits the implantation of RFID chips
C) encourages the use of e-mail among public officials by excluding such messages from the "open meeting" laws
D) prohibit the selling of customer data gathered on the Internet to other organizations
Unlock Deck
Unlock for access to all 89 flashcards in this deck.
Unlock Deck
k this deck
61
The hazardous activities associated with unfavorable working conditions are collectively referred to as ____________________.
Unlock Deck
Unlock for access to all 89 flashcards in this deck.
Unlock Deck
k this deck
62
A libeled party can file what is known as a ____________________ lawsuit to force the ISP to provide whatever information they have about an anonymous poster.
Unlock Deck
Unlock for access to all 89 flashcards in this deck.
Unlock Deck
k this deck
63
In a ______ attack, the victim is sent a message to call to verify account information.
Unlock Deck
Unlock for access to all 89 flashcards in this deck.
Unlock Deck
k this deck
64
CAP Index Inc.'s CRIMECAST Reports provide a quick and thorough overview of the ______ at any given location in the U.S., Canada, and the U.K.
Unlock Deck
Unlock for access to all 89 flashcards in this deck.
Unlock Deck
k this deck
65
______ is the careful division of the tasks and responsibilities associated with a key process so that they must be performed by more than one person to prevent collusion.
Unlock Deck
Unlock for access to all 89 flashcards in this deck.
Unlock Deck
k this deck
66
Many organizations use ____________________ software to provide a comprehensive display on a single computer screen of all the vital data related to an organizations' security defenses.
Unlock Deck
Unlock for access to all 89 flashcards in this deck.
Unlock Deck
k this deck
67
_________________ is any premediated, politically motivated attack against information , computer systems, computer programs, and data which results in violence against non-combatant targets by sub-national groups or clandestine agents.
Unlock Deck
Unlock for access to all 89 flashcards in this deck.
Unlock Deck
k this deck
68
____________________ is software installed on a personal computer to intercept or take partial control over the user's interaction with the computer without knowledge or permission of the user.
Unlock Deck
Unlock for access to all 89 flashcards in this deck.
Unlock Deck
k this deck
69
____________________ is the operation of a fake Web site by someone trying to gain access to customer's private information.
Unlock Deck
Unlock for access to all 89 flashcards in this deck.
Unlock Deck
k this deck
70
The science of designing machines, products, and systems to maximize the safety, comfort, and efficiency of the people who use them is called ____________________.
Unlock Deck
Unlock for access to all 89 flashcards in this deck.
Unlock Deck
k this deck
71
Another word for computer viruses and worms is ____________________.
Unlock Deck
Unlock for access to all 89 flashcards in this deck.
Unlock Deck
k this deck
72
It is ______ for banks and other financial institutions to facilitate the transfer of funds to online casinos.
Unlock Deck
Unlock for access to all 89 flashcards in this deck.
Unlock Deck
k this deck
73
Inexperienced hackers can download programs called ______ that automate the job of breaking into computers.
Unlock Deck
Unlock for access to all 89 flashcards in this deck.
Unlock Deck
k this deck
74
____________________ is a crime in which an imposter obtains key pieces of personal identification information to impersonate someone else.
Unlock Deck
Unlock for access to all 89 flashcards in this deck.
Unlock Deck
k this deck
75
The ____________________ card causes phones to display a caller ID number specified by the caller rather than the actual number of the caller.
Unlock Deck
Unlock for access to all 89 flashcards in this deck.
Unlock Deck
k this deck
76
Specialized hardware and software, such as ____________________ devices, can be used to encode data and information to help prevent unauthorized use.
Unlock Deck
Unlock for access to all 89 flashcards in this deck.
Unlock Deck
k this deck
77
A(n) ____________________ system monitors system and network resources and notifies network security personnel when it senses a possible intrusion.
Unlock Deck
Unlock for access to all 89 flashcards in this deck.
Unlock Deck
k this deck
78
A(n) ____________________ is a person paid by a company about how much they've earned and how easy the get-rich-quick plan was to operate.
Unlock Deck
Unlock for access to all 89 flashcards in this deck.
Unlock Deck
k this deck
79
The ______ is directed at Web sites catering to children and requires Web site owners to obtain parental consent before they collect any personal information from children under 13 years old.
Unlock Deck
Unlock for access to all 89 flashcards in this deck.
Unlock Deck
k this deck
80
Software is considered intellectual property and may be protected by copyright or ____________________ law.
Unlock Deck
Unlock for access to all 89 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 89 flashcards in this deck.