Chapter 4 - Version1
Chapter 4 - Version1
⊚ true
⊚ false
⊚ true
⊚ false
⊚ true
⊚ false
⊚ true
⊚ false
⊚ true
⊚ false
Version 1 1
6) The Child Online Protection Act was passed to protect
minors from accessing inappropriate material on the Internet.
⊚ true
⊚ false
⊚ true
⊚ false
⊚ true
⊚ false
⊚ true
⊚ false
⊚ true
⊚ false
Version 1 2
⊚ true ⊚ false
12) Rule 41 is the part of the United States Federal Rules physical and digital
of Criminal Procedure that covers the search and seizure of evidence.
⊚ true
⊚ false
⊚ true
⊚ false
⊚ true
⊚ false
⊚ true
⊚ false
⊚ true
⊚ false
Version 1 3
17) Information secrecy is the category of computer unauthorized disclosure
security that addresses the protection of data from and confirmation of data
source authenticity.
⊚ true
⊚ false
⊚ true
⊚ false
⊚ true
⊚ false
20) An acceptable use policy (AUP) requires a user to information systems, and
agree to follow it to be provided access to corporate email, the Internet.
⊚ true
⊚ false
⊚ true
⊚ false
Version 1 4
policy outlines the corporate guidelines or principles
governing employee online communications.
⊚ true
⊚ false
⊚ true
⊚ false
⊚ true
⊚ false
⊚ true
⊚ false
⊚ true
⊚ false
⊚ true
⊚ false
Version 1 5
28) Website name stealing is the theft of a website’s name website to another website
that occurs when someone, posing as a site’s administrator, owner.
changes the ownership of the domain name assigned to the
⊚ true
⊚ false
⊚ true
⊚ false
⊚ true
⊚ false
31) Bring your own device is a policy that allows to access enterprise data
employees to use their personal mobile devices and computers and applications.
⊚ true
⊚ false
32) Fair information practices are policies that allow to access enterprise data
employees to use their personal mobile devices and computers and applications.
⊚ true
⊚ false
Version 1 6
for a set of standards governing the collection and use of
personal data and addressing issues of privacy and accuracy.
⊚ true
⊚ false
34) Bring your own devices is a general term for a set of and addressing issues of
standards governing the collection and use of personal data privacy and accuracy.
⊚ true
⊚ false
35) BYOD policies offer four basic options, including preventing local storage of
unlimited access for personal devices; access only to data on personal devices.
nonsensitive systems and data; access, but with IT control
over personal devices, apps, and stored data; and access, but
⊚ true
⊚ false
36) Different organizations and countries have their own protection of privacy and
terms for these concerns. The United Kingdom terms it "data transborder flows of
protection," and the European Union calls it "personal data personal data.
privacy"; the Organization for Economic Co-operation and
Development (OECD) has written guidelines on the
⊚ true
⊚ false
Version 1 7
⊚ true ⊚ false
⊚ true
⊚ false
⊚ true
⊚ false
⊚ true
⊚ false
⊚ true
⊚ false
⊚ true
⊚ false
Version 1 8
43) A user can opt out of receiving emails by choosing to
allow permissions to incoming emails.
⊚ true
⊚ false
⊚ true
⊚ false
⊚ true
⊚ false
⊚ true
⊚ false
⊚ true
⊚ false
Version 1 9
48) Cyberbullying is an act or object that poses a danger to assets.
Version 1 10
49) Spyware is software that, while purporting to serve the consent of the
some useful function and often fulfilling that function, also computer user.
allows Internet advertisers to display advertisements without
⊚ true
⊚ false
⊚ true
⊚ false
51) Information security is a broad term encompassing the misuse by persons inside
protection of information from accidental or intentional or outside an organization.
⊚ true
⊚ false
⊚ true
⊚ false
⊚ true
⊚ false
54) Information
Version 1 11
security is a high priority for protection of the company’s
information, and it is critical to implement an information
security procedure to combat misuse of this information.
⊚ true
⊚ false
⊚ true
⊚ false
⊚ true
⊚ false
⊚ true
⊚ false
⊚ true
⊚ false
Version 1 12
59) Black-hat hackers work at the request of the system
owners to find system vulnerabilities and plug the holes.
⊚ true
⊚ false
⊚ true
⊚ false
⊚ true
⊚ false
⊚ true
⊚ false
63) A worm spreads itself not only from file to file but
also from computer to computer.
⊚ true
⊚ false
⊚ true
⊚ false
Version 1 13
65) Cyberterrorists seek to cause harm to people or to a weapon of mass
destroy critical systems or information and use the Internet as destruction.
⊚ true
⊚ false
⊚ true
⊚ false
67) Script kiddies or script bunnies find hacking code on cause damage or spread
the Internet and click-and-point their way into systems to viruses.
⊚ true
⊚ false
68) A worm spreads itself not only from file to file but not need to attach to
also from computer to computer. The primary difference anything to spread and can
between a virus and a worm is that a virus must attach to tunnel themselves into
something, such as an executable file, to spread. Worms do computers.
⊚ true
⊚ false
⊚ true
⊚ false
Version 1 14
70) Backdoor programs open a way into the network for future attacks.
Version 1 15
71) A denial-of-service attack (DoS) floods a website with
so many requests for service that it slows down or crashes the
site.
⊚ true
⊚ false
⊚ true
⊚ false
⊚ true
⊚ false
⊚ true
⊚ false
Version 1 16
⊚ true ⊚ false
⊚ true
⊚ false
⊚ true
⊚ false
⊚ true
⊚ false
⊚ true
⊚ false
⊚ true
⊚ false
Version 1 17
81) The three primary information security areas are (1)
authentication and authorization, (2) policies and rewards, and
(3) detection and response.
⊚ true
⊚ false
⊚ true
⊚ false
⊚ true
⊚ false
⊚ true
⊚ false
⊚ true
⊚ false
Version 1 18
86) Biometrics is the identification of a user based on a
physical characteristic, such as a fingerprint, iris, face, voice,
or handwriting.
⊚ true
⊚ false
⊚ true
⊚ false
⊚ true
⊚ false
89) Identity theft is the category of computer security that and confirmation of data
addresses the protection of data from unauthorized disclosure source authenticity.
⊚ true
⊚ false
Version 1 19
⊚ true ⊚ false
⊚ true
⊚ false
92) Spear phishing is a phone scam that attempts to number to "confirm" their
defraud people by asking them to call a bogus telephone account information.
⊚ true
⊚ false
⊚ true
⊚ false
⊚ true
⊚ false
⊚ true
⊚ false
Version 1 20
uses of a zombie farm, often by an organized crime
association, to launch a massive phishing attack.
⊚ true
⊚ false
⊚ true
⊚ false
⊚ true
⊚ false
⊚ true
⊚ false
⊚ true
⊚ false
Version 1 21
⊚ true ⊚ false
⊚ true
⊚ false
⊚ true
⊚ false
⊚ true
⊚ false
105) Two-factor authentication requires the user to provide and what the user has
two means of authentication: what the user knows (password) (security token).
⊚ true
⊚ false
Version 1 22
⊚ true ⊚ false
⊚ true
⊚ false
⊚ true
⊚ false
109) Single-factor authentication requires the user to (password) and what the
provide two means of authentication: what the user knows user has (security token).
⊚ true
⊚ false
⊚ true
⊚ false
B) human
A) security and sales resources and security
Version 1 23
C) ethics and security
D) ethics and technology
D) copyright
A) privacy
B) confidentiality
C) intellectual property
D) ethical
A) intellectual software property
B) intellectual property
C) trademark property
C) esoftware
A) ebusiness D) epolicies
B) eharmony
115) In relation to privacy, which of the following is the only to those authorized to
assurance that messages and information remain available view them?
D) firewall
A) contentment security
B) ethical standard
C) confidentiality
116) Which of the following represents the principles and standards that guide our
Version 1 24
behavior toward other people?
D) security
A) ethics
B) intellectual property
C) standards of living
118) Which of the following governs the ethical and moral distribution, and
issues arising from the development and use of information processing of information?
technologies and the creation, collection, duplication,
D) information
A) ethical information ethics
B) information technology
C) information policies
C) privacy
A) safety D) confidentiality
B) ethical standard
Version 1 25
120) Determining what is ethical can sometimes be difficult
because certain actions can be justified or condemned
depending on how you view the relationship between which
of the following?
D) confidential
A) legal and confidential and open
B) legal and ethical
C) legal and technical
121) What is a technological solution that allows publishers illegal copying and
to control their digital media to discourage, limit, or prevent distribution?
D) pirated
A) digital rights management software
B) counterfeit software
C) privacy
D) information
A) information code governance
B) information technology
C) information management
123) Sophie Black works as a computer programmer for a unsure about accepting the
software company. Her boss, Mike Jones, is responsible for game because legally it
developing a new software game Nintendo After completion would be considered
of the project, Mike gives all of the team members a free copy
of the game without consent from the company. Sophie is
D) governance
A) counterfeit software. software.
B) pirated software.
C) ethical software.
Version 1 26
124) What is the method or system of government for
information management or control?
D) information
A) information management secrecy
B) information compliance
C) information governance
125) What is the category of computer security that and confirmation of data
addresses the protection of data from unauthorized disclosure source authenticity?
D) information
A) information management ethics
B) information compliance
C) information secrecy
information management
A) the act of conforming, acquiescing, or yielding or control
information C) the category of
B) a method or system of government for computer security that
Version 1 27
addresses the protection of data from unauthorized disclosure required to function and
and confirmation of data source authenticity grow effectively
D) examines the organizational resource of
information and regulates its definitions, uses, values, and
distribution, ensuring that it has the types of data/information
B) a method or
A) the act of conforming, acquiescing, or yielding system of government for
information information management
Version 1 28
or control distribution, ensuring that
C) information secrecy is the category of computer it has the types of
security that addresses the protection of data from data/information required
unauthorized disclosure and confirmation of data source to function and grow
authenticity effectively
D) examines the organizational resource of
information and regulates its definitions, uses, values, and
132) Which of the following serves as key evidence in to search and organize
many legal cases today and also provides a faster, easier way paper documents?
D) information
A) confidentiality ethics
B) digital information
C) privacy policies
C) ediscovery
A) eauthorization D) epolicies
B) emanagement
Version 1 29
134) In the information technology world, which of the
following are examples of ethical issues that a company may
have to manage?
Version 1 30
viruses to confuse IT
A) employees copying and distributing company- D) All of the
owned software answer choices are correct.
B) employees searching other employees’ private
information without their consent
C) employees intentionally creating or spreading
135) When studying the figure of the four quadrants of make decisions in which of
ethical and legal behavior, the goal is for organizations to the following quadrants?
C) quadrant I
A) quadrant IV D) quadrant III
B) quadrant II and III
D) All of the
A) legal behavior and ethical behavior answer choices are correct.
B) illegal behavior and ethical behavior
C) legal behavior and unethical behavior
C) privacy
A) ethics D) confidentiality
B) intellectual property
C) the right to be
A) the assurance that messages and data are left alone when you want
available only to those who are authorized to view them to be, to have control over
B) policies and procedures that address the ethical your own personal
use of computers and the Internet in the business environment possessions, and to not be
Version 1 31
observed without your consent behavior toward other
D) the principles and standards that guide our people
proprietary information.
A) Individuals copy, use, and distribute software. D) None of the
B) Employees search organizational databases for answer choices are correct.
sensitive corporate and personal information.
C) Individuals hack into computer systems to steal
D) pirated
A) ediscovery software
B) Child Online Protection Act
C) digital rights management
A) ediscovery
Version 1 32
D) pirated
B) Child Online Protection Act software
C) digital rights management
143) What is the part of the United States Federal Rules of physical and digital
Criminal Procedure that covers the search and seizure of evidence?
D) pirated
A) ediscovery software
B) Child Online Protection Act
C) Rule 41
144) Which rule is the part of the United States Federal seizure of physical and
Rules of Criminal Procedure that covers the search and digital evidence?
C) Rule 41
A) Rule 4 D) Rule 4.2
B) Rule 1
145) What is the measure of consumer, partner, and and secure data and the
employee confidence in an organization’s ability to protect privacy of individuals?
C) Rule 41
A) digital trust D) digital child
B) Child Online Protection Act.
146) What is a technological solution that allows publishers illegal copying and
to control their digital media to discourage, limit, or prevent distribution?
D) digital trust
A) ediscovery
B) Child Online Protection Act
C) digital rights management
Version 1 33
D) pirated
A) digital trust software
B) Child Online Protection Act
C) digital rights management
D) the measure of
A) the unauthorized use, duplication, distribution, or consumer, partner, and
sale of copyrighted software employee confidence in an
B) the ability of a company to identify, search, organization’s ability to
gather, seize, or export digital information in responding to a protect and secure data and
litigation, audit, investigation, or information inquiry the privacy of individuals
C) a law passed to protect minors from accessing
inappropriate material on the Internet
D) the measure of
A) the unauthorized use, duplication, distribution, or consumer, partner, and
sale of copyrighted software employee confidence in an
B) the ability of a company to identify, search, organization’s ability to
gather, seize, or export digital information in responding to a protect and secure data and
litigation, audit, investigation, or information inquiry the privacy of individuals
C) a law passed to protect minors from accessing
inappropriate material on the Internet
D) a
A) the measure of consumer, partner, and employee technological solution that
confidence in an organization’s ability to protect and secure allows publishers to
data and the privacy of individuals control their digital media
B) the ability of a company to identify, search, to discourage, limit, or
gather, seize, or export digital information in responding to a prevent illegal copying and
litigation, audit, investigation, or information inquiry distribution
C) a law passed to protect minors from accessing
inappropriate material on the Internet
Version 1 34
151) What is pirated software?
D) a
A) the unauthorized use, duplication, distribution, or technological solution that
sale of copyrighted software allows publishers to
B) the ability of a company to identify, search, control their digital media
gather, seize, or export digital information in responding to a to discourage, limit, or
litigation, audit, investigation, or information inquiry prevent illegal copying and
C) the measure of consumer, partner, and employee distribution
confidence in an organization’s ability to protect and secure
data and the privacy of individuals
D) data scraping
A) information systems policy
B) epolicies
C) technology applied policy
153) Which of the below is not one of the six epolicies that
a company should implement for information protection as
discussed in the text?
D) GDPR
A) information privacy policy monitoring policy
B) workplace monitoring policy
C) acceptable use policy
D) information
A) information technology code systems
B) technology policy
C) ethical computer use policy
Version 1 35
155) Which of the following clauses is typically contained
in an acceptable use policy?
D) employee use
A) nonrepudiation clause clause
B) digital trust clause
C) confidentiality clause
D) not attempting
A) not using the service as part of violating any law to break the security of any
computer network
B) not posting commercial messages to groups
where the employee has received user consent
C) not performing any nonrepudiation
D) digital trust
A) compliance
B) noncommittal
C) nonrepudiation
158) According to the ethical computer use policy, users on that basis, ________ to
should ________ the rules and, by agreeing to use the system abide by the rules.
D) consent to; be
A) be informed of; collaborate informed
B) consent to; be informed
C) be informed; consent
159) Which of the following policies states that users agree to follow it in order to be
Version 1 36
given access to corporate email, information systems, and the Internet?
D) email privacy
A) acceptable use policy policy
B) social media policy
C) information privacy policy
D) anti-hacker
A) acceptable use policy use policy
B) Internet use policy
C) ethical computer use policy
D) antispam
A) information privacy policy policy
B) acceptable use policy
C) Internet use policy
D) driver’s
A) phone number license number
B) Social Security number
C) address
D) GDPR
A) data scraping
B) data security
C) fair information practices
Version 1 37
164) What is a legal framework that sets guidelines for the individuals within the
collection and processing of personal information of European Union?
D) General Data
A) data scraping Protection Regulation
B) the right to be forgotten (GDPR)
C) fair information practices
D) General Data
A) data scraping Protection Regulation
B) the right to be forgotten
C) fair information practices
D) None of the
A) adoption and implementation of an antispam answer choices are correct.
policy
B) notice and disclosure
C) choice and quality
D) None of the
A) intellectual property answer choices are correct.
B) nonrepudiation
C) user’s expectation of privacy
A) information
Version 1 38
privacy policy D) ethical
B) acceptable use policy computer use policy
C) Internet use policy
169) Jackie is the head teller at ABC Bank, and her significant amounts of time
responsibilities include overseeing and managing the tellers, playing Internet games and
resolving customer issues, and developing and implementing posting on Facebook.
systems for an optimal and efficient team. She notices a Which policy should the
steady increase in customer complaints and tracks back to company implement to
find that the complaints started right around the time ABC help eliminate this
Bank provided Internet access to all employees. Jackie problem?
watched the tellers closely and found that they were spending
D) workplace
A) information privacy policy monitoring policy
B) email privacy policy
C) Internet use policy
good name
A) user ramifications if the policy is violated D) All of the
B) user responsibility for properly handling answer choices are correct.
offensive material
C) user responsibility for protecting the company’s
D) spam policy
A) email privacy policy
B) email confidential policy
C) right to be forgotten policy
Version 1 39
D) individual
A) individual user. user’s department.
B) company.
C) human resources department.
C) digital trust
A) mail bomb D) junk mail
B) spam
C) adware
A) spyware D) GDPR
B) spam
D) GDPR policy
A) email privacy policy
B) spam policy and procedures
C) antispam policy
Version 1 40
177) To find out your company policy regarding such to refer to the ________
websites as YouTube, Facebook, and Twitter, you would have policy.
D) employee
A) Internet use policy monitoring policy
B) social media policy
C) information use policy
D) YouTube
A) Internet workplace policy policy
B) social media policy
C) technology information policy
D) company
A) antispam system technology monitoring
B) information intelligence system
C) workplace MIS monitoring
D) All of the
A) key logger answer choices are correct.
B) hardware key logger
C) cookie
Version 1 41
181) What is an Internet monitoring technique that captures
keystrokes on their journey from the keyboard to the
motherboard?
D) hardware key
A) spyware logger
B) web log
C) adware
182) What type of Internet monitoring technique records was, what ads were
information about a customer during a web surfing session viewed, and what was
such as what websites were visited and how long the visit purchased?
C) clickstream
A) key logger D) web log
B) stealthware
D) Expressly
A) Be as specific as possible stating when and what communicate that the
will be monitored. company reserves the right
B) Do not state the consequences of violating the to monitor all employees.
policy.
C) Always enforce the policy the same for everyone.
D) a contractual
A) sending a massive amount of email to a specific stipulation to ensure that
person or system, resulting in filling up the recipient’s disk ebusiness participants deny
space their online actions
B) a contractual stipulation to ensure that ebusiness
participants do not deny their online actions
C) sending a few emails to a specific person or
system, resulting in filling up the recipient’s disk space
Version 1 42
185) Which policy details the extent to which email
messages may be read by others?
D) GDPR policy
A) acceptable use policy
B) email privacy policy
C) Internet use policy
D) All of the
A) number of keystrokes. answer choices are correct.
B) error rate.
C) number of transactions processed.
C) cookie
A) key logger software D) adware
B) spyware
C) cookie
A) key logger D) adware
B) hardware key logger
A) cyberbullying
Version 1 43
D) BYOD
B) information vandalism
C) cookie
C) cookie
A) information bullying D) BYOD
B) cybervandalism
D) competitive
A) cyberbullying click-fraud
B) cybervandalism
C) click-fraud
D) competitive
A) cyberbulling click-fraud
B) cybervandalism
C) click-fraud
D) bring your
A) cyberbullying own device
B) fair information practices
C) click-fraud
194) What is a policy that allows employees to use their personal mobile devices
Version 1 44
and computers to access enterprise data and applications?
D) bring your
A) cyberbulling own device
B) fair information practices
C) click-fraud
personal devices
A) unlimited access for personal devices D) All of the
B) access only to nonsensitive systems and data answer choices are correct.
C) access but preventing local storage of data on
D)
A) opt out nonrepudiation
B) opt in
C) BYOD
D)
A) opt out nonrepudiation
B) opt in
C) BYOD
C) social media
A) social media monitoring
B) social media manager
Version 1 45
policy
D) antispam policy
Version 1 46
199) Who is a person within the organization who is trusted
to monitor, contribute, filter, and guide the social media
presence of a company, individual, product, or brand?
D) information
A) social media monitoring privacy manager
B) social media manager
C) social media policy
D) information
A) social media monitoring privacy manager
B) social media manager
C) social media policy
201) What is the abuse of pay-per-click, pay-per-call, and a link to increase charges
pay-per-conversion revenue models by repeatedly clicking on or costs for the advertiser?
D) competitive
A) cyberbulling click-fraud
B) cybervandalism
C) click-fraud
D) competitive
A) cyberbulling click-fraud
B) cybervandalism
C) click-fraud
Version 1 47
D) competitive
A) cyberbullying click-fraud
B) threat
C) click-fraud
advertising costs by
A) the electronic defacing of an existing website repeatedly clicking on the
B) the abuse of pay-per-click, pay-per-call, and pay- advertiser’s link
per-conversion revenue models by repeatedly clicking on a D) an act or
link to increase charges or costs for the advertiser object that poses a danger
C) a computer crime where a competitor or to assets
disgruntled employee increases a company’s search
advertising costs by
A) the electronic defacing of an existing website repeatedly clicking on the
B) the abuse of pay-per-click, pay-per-call, and pay- advertiser’s link
per-conversion revenue models by repeatedly clicking on a D) an act or
link to increase charges or costs for the advertiser object that poses a danger
C) a computer crime where a competitor or to assets
disgruntled employee increases a company’s search
advertising costs by
A) the electronic defacing of an existing website repeatedly clicking on the
B) the abuse of pay-per-click, pay-per-call, and pay- advertiser’s link
per-conversion revenue models by repeatedly clicking on a D) an act or
link to increase charges or costs for the advertiser object that poses a danger
C) a computer crime where a competitor or to assets
disgruntled employee increases a company’s search
Version 1 48
advertising costs by
A) the electronic defacing of an existing website repeatedly clicking on the
B) the abuse of pay-per-click, pay-per-call, and pay- advertiser’s link
per-conversion revenue models by repeatedly clicking on a D) an act or
link to increase charges or costs for the advertiser object that poses a danger
C) a computer crime where a competitor or to assets
disgruntled employee increases a company’s search
D) teergrubing
A) typosquatting
B) website name stealing
C) Internet censorship
D) teergrubing
A) typosquatting
B) website name stealing
C) Internet censorship
D) teergrubing
A) typosquatting
B) website name stealing
C) Internet censorship
Version 1 49
launches a return attack against the spammer, sending email
messages back to the computer that originated the suspected
spam?
D) teergrubing
A) cyber duty
B) website name stealing
C) Internet censorship
D) digital trust
A) opt out
B) website name stealing
C) Internet censorship
D) an
A) a problem that occurs when someone registers antispamming approach
purposely misspelled variations of well-known domain names where the receiving
computer launches a return
B) the theft of a website’s name that occurs when attack against the
someone, posing as a site’s administrator, changes the spammer, sending email
ownership of the domain name assigned to the website to messages back to the
another website owner computer that originated
C) government attempts to control Internet traffic, the suspected spam
thus preventing some material from being viewed by a
country’s citizens
Version 1 50
when someone, posing as a site’s administrator, changes the computer launches a return
ownership of the domain name assigned to the website to attack against the
another website owner spammer, sending email
C) government attempts to control Internet traffic, messages back to the
thus preventing some material from being viewed by a computer that originated
country’s citizens the suspected spam
D) an antispamming approach where the receiving
D) an
A) a problem that occurs when someone registers antispamming approach
purposely misspelled variations of well-known domain names where the receiving
computer launches a return
B) the theft of a website’s name that occurs when attack against the
someone, posing as a site’s administrator, changes the spammer, sending email
ownership of the domain name assigned to the website to messages back to the
another website owner computer that originated
C) government attempts to control Internet traffic, the suspected spam
thus preventing some material from being viewed by a
country’s citizens
D) an
A) a problem that occurs when someone registers antispamming approach
purposely misspelled variations of well-known domain names where the receiving
computer launches a return
B) the theft of a website’s name that occurs when attack against the
someone, posing as a site’s administrator, changes the spammer, sending email
ownership of the domain name assigned to the website to messages back to the
another website owner computer that originated
C) government attempts to control Internet traffic, the suspected spam
thus preventing some material from being viewed by a
country’s citizens
Version 1 51
217) Which of the following definitions represents opt-out?
C) allowing
A) a problem that occurs when someone registers permission to incoming
purposely misspelled variations of well-known domain names emails
D) denying
B) the theft of a website’s name that occurs when permission to incoming
someone, posing as a site’s administrator, changes the emails
ownership of the domain name assigned to the website to
another website owner
C) allowing
A) a problem that occurs when someone registers permission to incoming
purposely misspelled variations of well-known domain names emails
D) denying
B) the theft of a website’s name that occurs when permission to incoming
someone, posing as a site’s administrator, changes the emails
ownership of the domain name assigned to the website to
another website owner
country’s citizens
A) a problem that occurs when someone registers D) denying
purposely misspelled variations of well-known domain names permission to incoming
emails
B) tangible protection such as alarms, guards,
fireproof doors, fences, and vaults
C) government attempts to control Internet traffic,
thus preventing some material from being viewed by a
B) MIS down
A) downtime
Version 1 52
C) direct data loss
D) downtown
Version 1 53
221) Which of the following is not an example of
unplanned downtime?
D) flood
A) power outage
B) tornado
C) system upgrade
D) All of the
A) legal expenses answer choices are correct.
B) loss in financial performance
C) damage to reputation
capital
A) per hour, per day, and per week D) None of the
B) per employee, per computer, and per company answer choices are correct.
C) per stock, per stockholder, and per investment
C) other expenses
A) fiscal responsibility D) regeneration
B) damaged reputation
225) Jensen is a senior developer for HackersRUs, a and plug the holes. What
company that helps secure management information systems. type of hacker is Jensen?
Jensen’s new task is to break into the computer system of one
of HackersRUs’s top clients to identify system vulnerabilities
Version 1 54
D) black-hat
A) cracker hacker
B) white-hat hacker
C) script bunny
D) All of the
A) a broad term encompassing the protection of answer choices are correct.
information
B) protects information from accidental misuse
C) protects information from intentional misuse
227) What are experts in technology who use their just as a challenge known
knowledge to break into computers and networks for profit or as?
C) hackers
A) elevation of privilege D) worms
B) viruses
D) cracker
A) script kiddies
B) black-hat hacker
C) white-hat hacker
C) black-hat,
A) black-hat, crackers, cyberterrorists, hacktivists,
script kiddies, and white-hat
B) black-top, cookie, script kiddies, environment,
web 3.0, and white-top
Version 1 55
script kiddies, script bats, spider crawlers, ad spiders, and
white-hat
D) None of the answer choices are correct.
Version 1 56
230) What is software written with malicious intent to
cause annoyance or damage?
C) sniffer
A) elevation of privilege D) virus
B) spoofing
D) information
A) cyberattacks ethics
B) spoofing
C) information attacks
D) information
A) cyberattacks attacks
B) cybersecurity
C) sniffer
233) What builds the national capacity to defend against assessment capabilities to
cyberattacks and works with the federal government to safeguard .gov networks?
provide cyber security tools, incident response services, and
D) information
A) cyberattacks attacks
B) data security
C) Cybersecurity and Infrastructure Security Agency
Version 1 57
C) spoofing
A) malicious code D) sniffers
B) hoaxes
235) What is the forging of the return address on an email other than the actual
so that the email message appears to come from someone sender?
C) spoofing
A) malicious code D) sniffer
B) hoax
236) What is a special class of adware that collects data user’s knowledge or
about the user and transmits it over the Internet without the permission?
C) spoofware
A) sniffer D) splog
B) spyware
C) spoofware
A) sniffer D) simplelocker
B) spyware
C) spoofware
A) sniffer D) ransomware
B) spyware
A) a form of
Version 1 58
malicious software that infects your computer and asks for D) a special class
money of adware that collects data
B) a new ransomware program that encrypts your about the user and
personal files and demands payment for the files’ decryption transmits it over the
keys Internet without the user’s
C) software that allows Internet advertisers to knowledge or permission
display advertisements without the consent of the computer
user
user
A) a form of malicious software that infects your D) a special class
computer and asks for money of adware that collects data
B) a new ransomware program that encrypts your about the user and
personal files and demands payment for the files’ decryption transmits it over the
keys Internet without the user’s
C) software that allows Internet advertisers to knowledge or permission
display advertisements without the consent of the computer
user
A) a form of malicious software that infects your D) a special class
computer and asks for money of adware that collects data
B) a new ransomware program that encrypts your about the user and
personal files and demands payment for the files’ decryption transmits it over the
keys Internet without the user’s
C) software that allows Internet advertisers to knowledge or permission
display advertisements without the consent of the computer
keys
A) a form of malicious software that infects your C) software that
computer and asks for money allows Internet advertisers
B) a new ransomware program that encrypts your to display advertisements
personal files and demands payment for the files’ decryption without the consent of the
Version 1 59
computer user knowledge or permission
D) a special class of adware that collects data about
the user and transmits it over the Internet without the user’s
C) spoofing
A) elevation of privilege D) spyware
B) packet tampering
245) DDoS stands for one of the common forms of viruses or crashes. What does
that attack multiple computers to flood a website until it slows DDoS stand for?
D) distributed
A) data distribution of systems attack denial-of-service attack
B) data denial-of-software attack
C) distributed data online systems attack
service viruses
A) packet tampering, worms, cakes, and Trojan
viruses
B) polymorphic, sniffer, splogs, and denial-of-
Version 1 60
C) backdoor program, worm, and Trojan-horse
viruses
D) All of the answer choices are correct.
Version 1 61
247) What is the software called that allows Internet
advertisers to display advertisements without the consent of
the computer user?
C) spygloss
A) sploging D) CPU buzzer
B) adware
C) hoaxes
A) crackers D) cyberterrorists
B) black-hat hackers
249) Who are those who seek to cause harm to people or to a weapon of mass
destroy critical systems or information and use the Internet as destruction?
C) cyberterrorists
A) white-hat hackers D) script bunnies
B) black-hat hackers
D) backdoor
A) polymorphic virus program
B) worm
C) Trojan-horse virus
B) white-hat
A) virus hackers
Version 1 62
C) dumpster diving
D) All of the answer choices are correct.
D) splogs
A) backdoor programs
B) strikers
C) polymorphic viruses and worms
253) Which of the following is a computer attack where an without entering the office
attacker accesses a wireless computer network, intercepts or organization that owns
data, uses network services, and/or sends attack instructions the network?
D) hacker
A) backdoor program
B) drive-by hacking
C) polymorphic virus or worm
D) adware
A) information security
B) physical security
C) drive-by hacking
C) spyware
A) information spy D) adware
B) hacker
Version 1 63
256) What is a computer attack where an attacker accesses office or organization that
a wireless computer network, intercepts data, uses network owns the network?
services, and/or sends attack instructions without entering the
D) adware
A) spyware
B) hacker
C) drive-by hacking
257) What is a special class of adware that collects data user’s knowledge or
about the user and transmits it over the Internet without the permission?
D) adware
A) spyware
B) hacker
C) drive-by hacking
258) What is software that while purporting to serve some consent of the computer
useful function and often fulfilling that function also allows user?
Internet advertisers to display advertisements without the
D) adware
A) spyware
B) hacker
C) drive-by hacking
Version 1 64
owns the network
D) software that while purporting to serve some
useful function and often fulfilling that function also allows
Internet advertisers to display advertisements without the
consent of the computer user
Version 1 65
260) What is adware?
D) software that
A) a special class of adware that collects data about while purporting to serve
the user and transmits it over the Internet without the user’s some useful function and
knowledge or permission often fulfilling that
B) experts in technology who use their knowledge to function also allows
break into computers and computer networks, either for profit Internet advertisers to
or just motivated by the challenge display advertisements
C) a computer attack where an attacker accesses a without the consent of the
wireless computer network, intercepts data, uses network computer user
services, and/or sends attack instructions without entering the
office or organization that owns the network
D) software that
A) a special class of adware that collects data about while purporting to serve
the user and transmits it over the Internet without the user’s some useful function and
knowledge or permission often fulfilling that
B) experts in technology who use their knowledge to function also allows
break into computers and computer networks, either for profit Internet advertisers to
or just motivated by the challenge display advertisements
C) a computer attack where an attacker accesses a without the consent of the
wireless computer network, intercepts data, uses network computer user
services, and/or sends attack instructions without entering the
office or organization that owns the network
wireless computer
A) a special class of adware that collects data about network, intercepts data,
the user and transmits it over the Internet without the user’s uses network services,
knowledge or permission and/or sends attack
B) experts in technology who use their knowledge to instructions without
break into computers and computer networks, either for profit entering the office or
or just motivated by the challenge organization that owns the
C) a computer attack where an attacker accesses a network
Version 1 66
D) software that while purporting to serve some consent of the computer
useful function and often fulfilling that function also allows user
Internet advertisers to display advertisements without the
D) software that
A) a broad term encompassing the protection of while purporting to serve
information from accidental or intentional misuse by persons some useful function and
inside or outside an organization often fulfilling that
B) a special class of adware that collects data about function also allows
the user and transmits it over the Internet without the user’s Internet advertisers to
knowledge or permission display advertisements
C) a computer attack where an attacker accesses a without the consent of the
wireless computer network, intercepts data, uses network computer user
services, and/or sends attack instructions without entering the
office or organization that owns the network
C) scareware
A) bug bounty program D) ransomware
B) malware
C) scareware
A) bug bounty program D) ransomware
B) malware
266) What is a type of malware designed to trick victims useless and potentially
into giving up personal information to purchase or download dangerous software?
B) malware
A) bug bounty program
Version 1 67
C) scareware
D) ransomware
Version 1 68
267) What is a form of malicious software that infects your
computer and asks for money?
C) scareware
A) bug bounty program D) ransomware
B) malware
Version 1 69
271) What is ransomware?
D) people first,
A) technology first, customers second technology second
B) technology first, people second
C) innovation first, technology second
D) company
A) people misusing organizational information departments missing sales
B) technology failures goals
C) customers misusing organizational systems
274) Angela works for an identity protection company that her customer’s names. This
maintains large amounts of sensitive customer information is a classic example of
such as usernames, passwords, personal information, and which of the following
Social Security numbers. Angela and a coworker decide to security breaches?
use the sensitive information to open credit cards in a few of
D) a dumpster
A) a social engineer diver
B) an insider
C) a spammer
Version 1 70
275) Using one’s social skills to trick people into revealing
access credentials or other valuable information is called
D) social
A) social engineering. processes.
B) social media.
C) social viruses.
D) approved
A) striker bunny consent
B) dumpster diving
C) trash retrieval
C) trash retrieval
A) dumpster texting D) pretexting
B) dumpster diving
D) malicious
A) a form of social engineering in which one agents designed by
individual lies to obtain confidential data about another spammers and other
individual Internet attackers to farm
B) when a hacker looks through your trash to find email addresses off
personal information websites or deposit
C) legitimate users who purposely or accidentally spyware on machines
misuse their access to the environment and cause some kind
of business-affecting incident
Version 1 71
279) What is dumpster diving?
D) malicious
A) a form of social engineering in which one agents designed by
individual lies to obtain confidential data about another spammers and other
individual Internet attackers to farm
B) a hacker looking through your trash to find email addresses off
personal information websites or deposit
C) legitimate users who purposely or accidentally spyware on machines
misuse their access to the environment and cause some kind
of business-affecting incident
D) malicious
A) a form of social engineering in which one agents designed by
individual lies to obtain confidential data about another spammers and other
individual Internet attackers to farm
B) a hacker looking through your trash to find email addresses off
personal information websites or deposit
C) legitimate users who purposely or accidentally spyware on machines
misuse their access to the environment and cause some kind
of business-affecting incident
D) malicious
A) a form of social engineering in which one agents designed by
individual lies to obtain confidential data about another spammers and other
individual Internet attackers to farm
B) hackers looking through your trash to find email addresses off
personal information websites or deposit
C) legitimate users who purposely or accidentally spyware on machines
misuse their access to the environment and cause some kind
of business-affecting incident
Version 1 72
its own unique security issues. Kenny is the chief information may be causing this. He
officer for Sundance Ski Resort, and he is faced with both needs to clarify and
physical and information security threats every month. Since establish what type of plan
the resort implemented a new software system, they have to help reduce further
been having larger number of threats and breaches of problems?
company information. He suspects that an internal employee
D) None of the
A) information security plan answer choices are correct.
B) ethical information policy
C) antivirus plan
283) eBay is an example of an online company that has your information will be
been faced with numerous security issues. For example, stolen. What type of
imagine you purchase a digital camera on eBay. Three months information security
later, you might receive an email asking you to log in to the breach would you consider
system to update your credit card or PayPal information. This this to be?
email is not actually from eBay, and as soon as you log in,
D) phishing
A) an insider
B) dumpster diving
C) social engineering
D) All of the
A) requiring computer users to log off before answer choices are correct.
leaving for lunch
B) never sharing user or password information with
anyone
C) changing passwords every 30 to 60 days
Version 1 73
three coworkers. Janet feels safe in her office environment creating the potential for
and frequently leaves her username and password on a sticky which type of information
note next to her computer. Without realizing it, Janet is security breach to occur?
system
A) insiders to hack into the college system D) All of the
B) dumpster diving to find usernames and passwords answer choices are correct.
C) viruses and worms to spread through the college
D) All of the
A) information ethics policy answer choices are correct.
B) information security policy
C) Information technology plan
D) authentication
A) authentication and authorization, prevention and and authorization,
resistance, prevention and response prevention and resistance,
B) authentication and authorization, prevention and detection and response
response, detection and response
C) analyzing and authenticating, prevention and
repositioning, detection and response
D) All of the
A) identity crisis answer choices are correct.
B) identity theft
C) ediscovery
Version 1 74
289) What is the use of a false identity to artificially
stimulate demand for a product, brand, or service?
D) sock puppet
A) personally identifiable information (PII) marketing
B) nonsensitive PII
C) sensitive PII
D) sock puppet
A) personally identifiable information (PII) marketing
B) nonsensitive PII
C) sensitive PII
D) sock puppet
A) personally identifiable information (PII) marketing
B) nonsensitive PII
C) sensitive PII
292) What is information transmitted with encryption and, and can potentially cause
when disclosed, results in a breach of an individual’s privacy the individual harm?
D) sock puppet
A) personally identifiable information (PII) marketing
B) nonsensitive PII
C) sensitive PII
individual
A) any data that could potentially identify a specific B) information
Version 1 75
transmitted without encryption and includes information D) the use of a
collected from public records, phone books, corporate false identity to artificially
directories, websites, etc. stimulate demand for a
C) information transmitted with encryption and, product, brand, or service
when disclosed, results in a breach of an individual’s privacy
and can potentially cause the individual harm
Version 1 76
breach of an individual’s privacy and can potentially cause
the individual harm
D) the use of a false identity to artificially stimulate
demand for a product, brand, or service
Version 1 77
297) What is the difference between phishing and
pharming?
D) insider
A) pharming hacking
B) worm holes
C) phishing
D) authentication
A) prevention and resistance and authorization
B) detection and authorizing
C) detection and response
C) authorization
A) pharming D) programming
B) authentication
Version 1 78
301) What is a method for confirming users’ identities?
C) authorization
A) phishing D) programming
B) authentication
fingerprint or voice
A) something the user knows, such as a user ID and signature
password D) All of the
B) something the user has, such as a smart card or answer choices are correct.
token
C) something that is part of the user, such as a
303) A smart card is a device the size of a credit card that small amounts of software
contains embedded technology that stores information and and can act as a(n)
D) All of the
A) identification instrument. answer choices are correct.
B) form of digital cash.
C) data storage device.
C) biometrics.
A) smart technology card. D) passwords.
B) tokens.
B) password
A) iris scan
Version 1 79
C) fingerprint
D) handwriting
Version 1 80
306) Which of the following is the main drawback of
biometrics?
D) It requires
A) It is considered illegal. constant monitoring and
B) It is viewed as an invasion of privacy. upgrading.
C) It can be costly and intrusive.
D) None of the
A) content filtering, encryption, and firewalls answer choices are correct.
B) calculating, locking, and firewalls
C) content prohibiting and cookies
C) encryption
A) antivirus software D) firewalls
B) content filtering
D) antivirus
A) encryption software
B) content filtering
C) firewalls
Version 1 81
D) All of the
A) switching the order of characters answer choices are correct.
B) replacing characters with other characters
C) inserting or removing characters
D) protective key
A) private key encryption code
B) policy key encryption
C) public key encryption
D) digital card
A) digital code
B) digital sign
C) digital certificate
313) Charles Mott works for a company called VeriSign CheckMd’s success. What
that acts a trusted third party to verify information. One of type of authentication
Charles’ largest clients is CheckMd, which holds and technique is VeriSign
authenticates customer reviews of doctors and dentists online. providing for CheckMD?
Having a third party validating the reviews is critical to
D) digital content
A) firewall certificate
B) certificate authority
C) online certificate
A) firewall
Version 1 82
B) certificate authority D) digital
C) online certificate certificate
315) Which of the following protection techniques scans known viruses, adware,
and searches hard drives to prevent, detect, and remove and spyware?
D) antivirus
A) firewall software
B) digital certificate
C) virus software
D) All of the
A) never upgrade or change vendors answer choices are correct.
B) download a portable button for it to activate
C) frequently update it to protect against viruses
317) Which of the following systems is designed with full- network traffic that
time monitoring tools that search for patterns in network attempts to access files and
traffic to identify intruders and to protect against suspicious data?
D) Internet
A) interconnected data software (IDS) detection scanner (IDS)
B) intrusion detection software (IDS)
C) security information system (SIS)
fingerprint or voice
A) something the user knows such as a user ID and signature
password D) All of the
B) something the user has such as a smart card or answer choices are correct.
token
C) something that is part of the user such as a
Version 1 83
319) What is a device that is around the same size as a
credit card and contains embedded technologies that can store
information and small amounts of software to perform some
limited processing?
C) smart card
A) token D) biometrics
B) password
D) content
A) smart card filtering
B) token
C) biometrics
D) All of the
A) voice answer choices are correct.
B) face
C) iris
D) All of the
A) voiceprint answer choices are correct.
B) face
C) iris
Version 1 84
D) the
A) the traditional security process, which requires a identification of a user
username and password based on physical
B) requires the user to provide two means of characteristic such as a
authentication: what the user knows (password) and what the fingerprint, iris, face, voice
user has (security token) or handwriting
C) requires more than two means of authentication
such as what the user knows (password), what the user has
(security token), and what the user is (biometric verification)
D) the
A) the traditional security process, which requires a identification of a user
username and password based on physical
B) requires the user to provide two means of characteristic such as a
authentication: what the user knows (password) and what the fingerprint, iris, face, voice
user has (security token) or handwriting
C) requires more than two means of authentication
such as what the user knows (password), what the user has
(security token), and what the user is (biometric verification)
D) the
A) the traditional security process, which requires a identification of a user
username and password based on physical
B) requires the user to provide two means of characteristic such as a
authentication: what the user knows (password) and what the fingerprint, iris, face, voice
user has (security token) or handwriting
C) requires more than two means of authentication
such as what the user knows (password), what the user has
(security token), and what the user is (biometric verification)
A) network
Version 1 85
behavior analysis D) cyber-
B) cyber-vigilantes espionage
C) cyberterrorism
D) cyber-
A) network behavior analysis espionage
B) cyber-vigilantes
C) cyberterrorism
D) cyber-
A) network behavior analysis espionage
B) cyber-vigilantes
C) cyberterrorism
329) What is the use of computer and networking attain political, religious,
technologies against persons or property to intimidate or or ideological goals?
coerce governments, individuals, or any segment of society to
D) cyber-
A) network behavior analysis espionage
B) cyber-vigilantes
C) cyberterrorism
D) biometrics
A) single-factor authentication
B) two-factor authentication
C) multifactor authentication
Version 1 86
331) What requires more than two means of authentication
such as what the user knows (password), what the user has
(security token), and what the user is (biometric verification)?
D) biometrics
A) single-factor authentication
B) two-factor authentication
C) multifactor authentication
D) biometrics
A) single-factor authentication
B) two-factor authentication
C) multifactor authentication
D) the
A) the traditional security process, which requires a identification of a user
username and password based on physical
B) requires the user to provide two means of characteristic such as a
authentication: what the user knows (password) and what the fingerprint, iris, face, voice
user has (security token) or handwriting
C) requires more than two means of authentication
such as what the user knows (password), what the user has
(security token), and what the user is (biometric verification)
D) None of the
A) smart card answer choices are correct.
B) fingerprint authentication
C) user ID
Version 1 87
335) Where do organizations typically place firewalls?
software
A) between a personal computer and the server D) between the
B) between a personal computer and a printer server and the Internet
C) between the server and the content filtering
336) What is the category of computer security that and confirmation of data
addresses the protection of data from unauthorized disclosure source authenticity?
D) spear phishing
A) information secrecy
B) phishing
C) phishing expedition
D) spear phishing
A) pharming
B) phishing
C) phishing expedition
D) spear phishing
A) pharming
B) phishing
C) phishing expedition
Version 1 88
D) vishing
A) pharming
B) phishing
C) phishing expedition
D) spear phishing
A) pharming
B) phishing
C) phishing expedition
spoofing
A) the category of computer security that addresses D) a phishing
the protection of data from unauthorized disclosure and expedition in which the
confirmation of data source authenticity emails are carefully
B) a technique to gain personal information for the designed to target a
purpose of identity theft, usually by means of fraudulent particular person or
emails that look as though they came from legitimate organization
businesses
C) a masquerading attack that combines spam with
spoofing
A) reroutes requests for legitimate websites to false D) a phishing
websites expedition in which the
B) a technique to gain personal information for the emails are carefully
purpose of identity theft, usually by means of fraudulent designed to target a
emails that look as though they came from legitimate particular person or
businesses organization
C) a masquerading attack that combines spam with
Version 1 89
spoofing
A) reroutes requests for legitimate websites to false D) a phishing
websites expedition in which the
B) a technique to gain personal information for the emails are carefully
purpose of identity theft, usually by means of fraudulent designed to target a
emails that look as though they came from legitimate particular person or
businesses organization
C) a masquerading attack that combines spam with
spoofing
A) reroutes requests for legitimate websites to false D) a phishing
websites expedition in which the
B) a technique to gain personal information for the emails are carefully
purpose of identity theft, usually by means of fraudulent designed to target a
emails that look as though they came from legitimate particular person or
businesses organization
C) a masquerading attack that combines spam with
spoofing
A) reroutes requests for legitimate websites to false D) a phone scam
websites that attempts to defraud
B) a technique to gain personal information for the people by asking them to
purpose of identity theft, usually by means of fraudulent call a bogus telephone
emails that look as though they came from legitimate number to "confirm" their
businesses account information
C) a masquerading attack that combines spam with
Version 1 90
combines spam with spoofing their account information
D) a phone scam that attempts to defraud people by
asking them to call a bogus telephone number to "confirm"
D) pharming
A) zombie
B) zombie farm
C) pharming attack
D) time bomb
A) zombie
B) zombie farm
C) pharming attack
D) time bomb
A) zombie
B) zombie farm
C) pharming attack
D) time bomb
A) zombie
B) zombie farm
C) pharming attack
Version 1 91
351) What are computer viruses that wait for a specific date
before executing their instructions?
D) time bombs
A) zombies
B) zombie farms
C) pharming attacks
C) decryption
A) digital certificate D) cryptography
B) encryption
C) decryption
A) digital certificate D) cryptography
B) encryption
C) decryption
A) digital certificate D) cryptography
B) encryption
C) decryption
A) digital certificate D) cryptography
B) encryption
Version 1 92
ESSAY. Write your answer in the space provided or on a 356) Explain the ethical
separate sheet of paper. issues in the use of
information technology.
Version 1 93
360) Provide an example of each of the three primary
information security areas: (1) authentication and
authorization, (2) prevention and resistance, and (3) detection
and response.
Version 1 94
Answer Key
Version 1 95
20) TRUE
21) FALSE
22) TRUE
23) TRUE
24) TRUE
25) TRUE
26) TRUE
27) FALSE
28) TRUE
29) FALSE
30) FALSE
31) TRUE
32) FALSE
33) TRUE
34) FALSE
35) TRUE
36) TRUE
37) TRUE
38) TRUE
39) TRUE
40) TRUE
Version 1 96
41) TRUE
42) FALSE
43) FALSE
44) TRUE
45) TRUE
46) FALSE
47) FALSE
48) FALSE
49) FALSE
50) TRUE
51) TRUE
52) FALSE
53) TRUE
54) TRUE
55) TRUE
56) TRUE
57) TRUE
58) FALSE
59) FALSE
60) TRUE
61) TRUE
Version 1 97
62) FALSE
63) TRUE
64) FALSE
65) TRUE
66) FALSE
67) TRUE
68) TRUE
69) FALSE
70) TRUE
71) TRUE
72) TRUE
73) FALSE
74) FALSE
75) FALSE
76) TRUE
77) TRUE
78) FALSE
79) TRUE
80) FALSE
81) FALSE
82) TRUE
Version 1 98
83) TRUE
84) FALSE
85) TRUE
86) TRUE
87) FALSE
88) TRUE
89) FALSE
90) TRUE
91) TRUE
92) FALSE
93) FALSE
94) TRUE
95) TRUE
96) TRUE
97) FALSE
98) TRUE
99) TRUE
100) TRUE
101) FALSE
102) FALSE
103) TRUE
Version 1 99
104) TRUE
105) TRUE
106) TRUE
107) FALSE
108) FALSE
109) FALSE
110) TRUE
111) C
112) D
113) B
114) A
115) C
116) A
117) B
118) D
119) C
120) B
121) A
122) C
123) B
124) C
Version 1 100
125) C
126) A
127) B
128) C
129) D
130) A
131) A
132) B
133) C
134) D
135) C
136) D
137) B
138) C
139) D
140) A
141) A
142) B
143) C
144) C
145) A
Version 1 101
146) C
147) D
148) B
149) C
150) D
151) A
152) B
153) D
154) C
155) A
156) B
157) C
158) C
159) A
160) D
161) A
162) B
163) A
164) D
165) B
166) B
Version 1 102
167) C
168) D
169) C
170) D
171) A
172) B
173) D
174) A
175) B
176) C
177) B
178) B
179) C
180) D
181) D
182) C
183) B
184) A
185) B
186) D
187) A
Version 1 103
188) C
189) A
190) B
191) A
192) B
193) B
194) D
195) D
196) A
197) B
198) A
199) B
200) C
201) C
202) D
203) B
204) A
205) B
206) C
207) D
208) A
Version 1 104
209) B
210) C
211) D
212) A
213) A
214) B
215) C
216) D
217) D
218) C
219) B
220) A
221) C
222) D
223) A
224) C
225) B
226) D
227) C
228) B
229) A
Version 1 105
230) D
231) A
232) B
233) C
234) A
235) C
236) B
237) D
238) D
239) A
240) B
241) C
242) D
243) C
244) A
245) D
246) C
247) B
248) A
249) C
250) B
Version 1 106
251) A
252) C
253) B
254) A
255) B
256) C
257) A
258) D
259) A
260) D
261) C
262) B
263) A
264) A
265) B
266) C
267) D
268) A
269) B
270) C
271) D
Version 1 107
272) D
273) A
274) B
275) A
276) B
277) D
278) A
279) B
280) C
281) D
282) A
283) D
284) D
285) A
286) B
287) D
288) B
289) D
290) A
291) B
292) C
Version 1 108
293) C
294) B
295) A
296) D
297) C
298) A
299) D
300) C
301) B
302) D
303) D
304) C
305) B
306) C
307) A
308) B
309) A
310) D
311) C
312) C
313) B
Version 1 109
314) A
315) D
316) C
317) B
318) D
319) C
320) C
321) D
322) A
323) A
324) C
325) B
326) A
327) B
328) D
329) C
330) A
331) C
332) B
333) D
334) D
Version 1 110
335) D
336) A
337) B
338) C
339) D
340) A
341) A
342) B
343) C
344) D
345) D
346) A
347) D
348) A
349) B
350) C
351) D
352) A
353) B
354) C
355) D
Version 1 111
356) Information ethics govern the ethical and loyalties. Inevitably,
moral issues arising from the development and there will be more
use of information technologies, as well as the than one socially
creation, collection, duplication, distribution, acceptable or
and processing of information itself (with or "correct" decision.
without the aid of computer technologies). For this reason,
Ethical dilemmas in this area usually arise not acting ethically and
as simple, clear-cut situations but as clashes legally are not
between competing goals, responsibilities, and always the same.
357) An ethical computer use policy contains or principles
general principles to guide computer user governing employee
behavior. For example, it might explicitly online
state that users should refrain from playing communications.
computer games during working hours. An An employee
information privacy policy contains general monitoring policy
principles regarding information privacy. An states explicitly
acceptable use policy is a policy that a user how, when, and
must agree to follow in order to be provided where the company
access to corporate email, information monitors its
systems, and the Internet. An email privacy employees.
policy details the extent to which email
messages may be read by others. A social
media policy outlines the corporate guidelines
358) Hackers are experts in technology who and leave viruses,
use their knowledge to break into computers causing massive
and computer networks, either for profit or computer damage.
just for the challenge. A virus is software
written with malicious intent to cause
annoyance or damage. Some hackers create
Version 1 112
359) Information security policies identify the The best way a
rules required to maintain information company can
security, such as requiring users to log off safeguard itself is
before leaving for lunch or meetings, never by implementing
sharing passwords with anyone, and changing and communicating
passwords every 30 days. An information its information
security plan details how an organization will security plan.
implement the information security policies.
360) Authentication and authorization: and/or software that
Authentication is a method of confirming guards a private
users’ identities. Once a system determines the network by
authentication of a user, it can then determine analyzing incoming
the access privileges (or authorization) for that and outgoing
user. Authorization is the process of providing information for the
a user with permission, including access levels correct markings.
and abilities such as file access, hours of Detection and
access, and amount of allocated storage space. intrusion detection
Prevention and resistance: Content filtering software features
occurs when organizations use software that full-time monitoring
filters content, such as emails, to prevent the tools that search for
accidental or malicious transmission of patterns in network
unauthorized information. Encryption traffic to identify
scrambles information into an alternative form intruders.
that requires a key or password to decrypt. In
a security breach, a thief is unable to read
encrypted information. A firewall is hardware
Version 1 113