Deck 9: The Personal and Social Impact of Computers

Full screen (f)
exit full mode
Question
The combination of duties is a key concept of good internal controls.
Use Space or
up arrow
down arrow
to flip the card.
Question
Phishing has become such a serious problem that several companies have formed the Domain-based Message Authentication,Reporting,and Conformance (DMARC)group to provide improved e-mail security and protection from phishing.
Question
The first step to prevent computer-related waste is to review existing policies and procedures and determine whether they are adequate.
Question
A rootkit is a type of Trojan horse that executes when specific conditions occur.
Question
The ready availability of personal computers,coupled with the development of mapping and analysis software,has led law enforcement agencies to use crime-related data,powerful analysis techniques,and geographic information systems (GIS)to better understand and even diminish crime risks.
Question
Most computer-related mistakes are caused by machine error.
Question
Role-based system access means that only people who fill a certain role can access a specific system.
Question
Incidents of identity theft are reported to the Department of Justice.
Question
A script bunny is a young,female computer hacker.
Question
The Department of Homeland Security Department's Information Analysis and Infrastructure Protection Directorate serves as a focal point for threat assessment,warning,investigation,and response to cyberterrorism threats or attacks against the country's critical infrastructure.
Question
Many computer crimes go unreported because companies do not want bad publicity or don't think that law enforcement can help.
Question
Smartphones-especially ones running the popular Android operating system-can run applications that are impervious to malware.
Question
The public cannot gain online access to information about registered sex offenders online because of various privacy laws.
Question
For those computers with an integrated Web cam,tracking software sends messages via a wireless network to the specified email address,pinpointing its location and including a picture of the thief.
Question
As information technology becomes faster,more complex,and more powerful,the risk of computer-related mistakes decreases tremendously.
Question
To obtain a patent or to determine if a patent exists in an area a company seeks to exploit,a search by the U.S.Patent Office is required;these can last longer than 25 months.
Question
A computer hacker is someone who intimidates or coerces a government or organization to advance his or her political or social objectives by launching computer-based attacks against computers,networks,and the information stored on them.
Question
Patent laws protect processes,machines,and compositions of matter.
Question
Relaxing controls for changes to critical tables,HTML,and URLs is a useful policy to minimize computer-related waste and mistakes.
Question
Not many small and medium sized organizations are willing to outsource their network security operations.
Question
Carpal tunnel syndrome (CTS)is the formation of blood clots in the legs or lungs.
Question
Federal law prohibits employers from monitoring email sent or received by their employees.
Question
_____ is often conducted by phone with a hacker imitating someone in a position of authority and attempting to gradually draw information out of a user.

A) Dumpster diving
B) Cyberterrorism
C) Social engineering attack
D) Organizational identity theft
Question
The final step to prevent computer-related waste is to:

A) ensure that users throughout an organization are following established procedures.
B) establish policies and procedures regarding efficient acquisition,use,and disposal of systems and devices.
C) review existing policies and procedures and determine whether they are adequate.
D) check whether current policies cover existing practices adequately.
Question
_____ have extra knowledge that make them especially dangerous-they know logon IDs,passwords,and company procedures that help them evade detection.

A) Crackers
B) Hackers
C) Insiders
D) Script bunnies
Question
The use of email among public officials might violate "open meeting" laws.
Question
A _____ is a set of programs that enables its user to gain administrator level access to a computer or network.

A) virus
B) Trojan horse
C) rootkit
D) worm
Question
If an activity is defined as legal then it is ethical.
Question
A _____ is a type of Trojan horse that executes when specific conditions occur.

A) virus
B) worm
C) logic bomb
D) rootkit
Question
The ______ Web-based service system is one of several information systems used by law enforcement to recover stolen property.

A) LeadsOnline
B) JusticeXchange
C) Watch Systems
D) CRIMECAST
Question
A job that requires sitting at a desk and using a computer for many hours a day doubles the risk of seated immobility thromboembolism (SIT).
Question
Multinational companies face an extremely difficult challenge in implementing data collection and dissemination processes and policies because of the multitude of differing country and regional statutes.
Question
_____ refer to errors,failures,and other computer problems that make computer output incorrect or not useful.

A) Computer-related wastes
B) Human errors
C) Computer-related mistakes
D) Coding errors
Question
A _____ is a modified version of a virus that is produced by the virus's author or another person by amending the original virus code.

A) rootkit
B) variant
C) Trojan horse
D) worm
Question
A(n)_____ is a computer savvy person who attempts to gain unauthorized or illegal access to computer systems to steal passwords,corrupt files or programs,or even transfer money.

A) hacker
B) insider
C) cracker
D) script bunny
Question
The monitor should be about one arm's length away from a user.
Question
IS professionals believe that their field offers few opportunities for unethical behavior.
Question
The Internet Crime Computer Center (IC3)is an alliance between ______.

A) the Department of Homeland Security and the White Collar Crime Center
B) the Department of Homeland Security and the Department of Justice
C) the White Collar Crime Center and the Federal Bureau of Investigation
D) the Federal Bureau of Investigation and the Central Intelligence Agency
Question
To safeguard a user's PC and prevent it from spreading malware to the user's friends and coworkers,some antivirus software scans and cleans both incoming and outgoing email messages.
Question
Posting information to the Internet using anonymous e-mail accounts or screen names makes it impossible to identify the libeler.
Question
_____ is a crime in which an imposter obtains key pieces of personal identification information to impersonate someone else.
Question
_____ refers to the use of any of several technologies to enforce policies for controlling access to digital media,such as movies,music,and software.

A) Copyright protection
B) Software protection dongle
C) Software piracy
D) Digital rights management
Question
The _____ requires telephone companies to turn over customer information,including numbers called,without a court order,if the Federal Bureau of Investigation (FBI)claims that the records are relevant to a terrorism investigation.

A) Cable Act of 1992
B) Electronic Communications Privacy Act of 1986
C) Gramm-Leach-Bliley Act of 1999
D) USA Patriot Act of 2001
Question
A useful guideline to protect corporate computers from criminal hackers is to:

A) install antivirus software on all computers.
B) enable physical access to servers.
C) provide overfriendly sign-in procedures for remote users.
D) enable several guest accounts.
Question
_____ is an inflammation of the nerve that connects the forearm to the palm of the wrist.

A) Carpal tunnel syndrome (CTS)
B) Seated immobility thromboembolism (SIT)
C) Chronic idiopathic mylofibrosis
D) Behcet's syndrome
Question
_____ is the intimidation of government or civilian population by using information technology to disable critical national infrastructures (e.g. ,energy,transportation,financial,law enforcement,emergency response)to achieve political,religious,or ideological goals.
Question
The _____ requires all financial institutions to protect and secure customers' nonpublic data from unauthorized access or use.

A) Gramm-Leach-Bliley Act
B) Fair Credit Reporting Act
C) USA Patriot Act
D) Fair and Accurate Credit Transactions Act
Question
If convicted for copyright infringement,software pirates could be sentenced to jail for up to _____ years.

A) two
B) ten
C) five
D) three
Question
The practice of disguising illegally gained funds so that they seem legal is called _____.

A) identity theft
B) vishing
C) spoofing
D) money laundering
Question
Which of the following statements is true of federal laws?

A) They permit employers to monitor instant messages sent and received by employees.
B) They authorize public officials to meet in private about matters that affect the state or local area.
C) They completely protect individual privacy.
D) They forbid customers and employees from accessing data about themselves.
Question
_____ is a scam that attempts to steal an individual's private information by having them respond to a text message.

A) Phishing
B) Smishing
C) Vishing
D) Sniffing
Question
Proper use of antivirus software requires:

A) scanning all removable media before copying programs from them.
B) running the software only if a virus has been detected.
C) refraining from updating the software often.
D) installing software from unsealed packages.​
Question
_____ is an activity in which a criminal illegally gains access to another's line of credit with stolen credit card numbers.
Question
Founded in 1947,the _____ is the oldest computing society and boasts more than 100,000 members in more than 100 countries.

A) United States Computer Emergency Readiness Team (US-CERT)
B) Computer Sciences Corporation (CSC)
C) Domain-based Message Authentication,Reporting,and Conformance group (DMARC)
D) Association for Computing Machinery (ACM)
Question
Which of the following statements is true of the E-Government Act of 2002?

A) It renews the U.S.government's authority to monitor electronic communications of foreigners abroad and authorizes foreign surveillance programs by the National Security Agency (NSA).
B) It requires federal agencies to post machine-readable privacy policies on their Web sites and to perform privacy impact assessments on all new collections of data of ten or more people.
C) It restricts government access to certain records held by financial institutions.
D) It defines procedures to request judicial authorization for electronic surveillance of persons engaged in espionage against the United States on behalf of a foreign power.
Question
Heavy computer users who experience red,dry,itchy eyes should _____.

A) consider the use of artificial tears
B) consider the use of older,but more human friendly CRT monitors
C) keep their focus on their screens for long hours
D) avoid blinking often
Question
Organizations operating unintegrated information systems,acquiring redundant systems,and wasting information system are examples of _____.
Question
Under the Identity Theft and Assumption Deterrence Act of 1998,the _____ is assigned responsibility to help victims restore their credit and erase the impact of the imposter.

A) Federal Bureau of Investigation (FBI)
B) Federal Trade Commission (FTC)
C) Securities and Exchange Commission (SEC)
D) Department of Justice (DOJ)
Question
A _____ is a small program hidden in a network or computer system that records identification numbers.

A) logic bomb
B) password sniffer
C) Trojan horse
D) rootkit
Question
_____ is the practice of using social skills to get computer users to provide information that allows a hacker to access an information system or its data.
Question
The hazardous activities associated with unfavorable working conditions are collectively referred to as _____.
Question
A party offended by a libel can file what is known as a(n)_____ lawsuit and use the subpoena power it grants to force the Internet service provider (ISP)to provide whatever information it has about the anonymous poster,including Internet Protocol (IP)address,name,and street address.
Question
The _____,passed by Congress in October 1998,was directed at Web sites catering to children,requiring site owners to post comprehensive privacy policies and to obtain parental consent before they collect any personal information from children under 13 years of age.
Question
The science of designing machines,products,and systems to maximize the safety,comfort,and efficiency of the people who use them is called _____.
Question
Many organizations use _____ software to provide a comprehensive display on a single computer screen of all the vital data related to an organization's security defenses,including threats,exposures,policy compliance,and incident alerts.
Question
A(n)_____ monitors system and network resources and traffic and notifies network security personnel when it senses a possible intrusion.
Question
_____ is software installed on a personal computer to intercept or take partial control over the user's interaction with the computer without knowledge or permission of the user.
Question
_____ is software that runs in the background to protect a user's computer from dangers lurking on the Internet and other possible sources of infected files.
Question
A(n)_____ is a person paid by a company to lie about how much he or she has earned and how easy the plan was to operate.
Question
Software programs that when loaded into a computer system will destroy,interrupt,or cause errors in processing are known as _____.
Question
Inexperienced hackers can download programs called _____ that automate the job of breaking into computers.
Question
_____ is a scam that attempts to steal an individual's private information by having them call a phone number and enter personal data.
Question
Practitioners in many professions subscribe to a(n)_____ that states the principles and core values that are essential to their work,and,therefore,govern their behavior.
Question
_____ is a Web-based data sharing system that places millions of nationwide booking records at the fingertips of law enforcement officials.
Question
_____ are employees,disgruntled or otherwise,working solo or in concert with outsiders to compromise corporate systems.
Question
_____ is a form of computer scam that attempts to get users to gain access to a customer's private information through a fake Web site.
Question
_____ is the process of converting an original electronic message into a form that can be understood only by the intended recipients.
Question
The act of going through the trash of an organization to find secret or confidential information,including information needed to access an information system or its data is known as _____.
Question
To help parents control what their children see on the Internet,some companies provide _____ to help screen Internet content.
Question
_____ is the careful division of the tasks and responsibilities associated with a key process so that they must be performed by more than one person to prevent collusion.
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/80
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 9: The Personal and Social Impact of Computers
1
The combination of duties is a key concept of good internal controls.
False
2
Phishing has become such a serious problem that several companies have formed the Domain-based Message Authentication,Reporting,and Conformance (DMARC)group to provide improved e-mail security and protection from phishing.
True
3
The first step to prevent computer-related waste is to review existing policies and procedures and determine whether they are adequate.
False
4
A rootkit is a type of Trojan horse that executes when specific conditions occur.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
5
The ready availability of personal computers,coupled with the development of mapping and analysis software,has led law enforcement agencies to use crime-related data,powerful analysis techniques,and geographic information systems (GIS)to better understand and even diminish crime risks.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
6
Most computer-related mistakes are caused by machine error.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
7
Role-based system access means that only people who fill a certain role can access a specific system.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
8
Incidents of identity theft are reported to the Department of Justice.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
9
A script bunny is a young,female computer hacker.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
10
The Department of Homeland Security Department's Information Analysis and Infrastructure Protection Directorate serves as a focal point for threat assessment,warning,investigation,and response to cyberterrorism threats or attacks against the country's critical infrastructure.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
11
Many computer crimes go unreported because companies do not want bad publicity or don't think that law enforcement can help.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
12
Smartphones-especially ones running the popular Android operating system-can run applications that are impervious to malware.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
13
The public cannot gain online access to information about registered sex offenders online because of various privacy laws.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
14
For those computers with an integrated Web cam,tracking software sends messages via a wireless network to the specified email address,pinpointing its location and including a picture of the thief.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
15
As information technology becomes faster,more complex,and more powerful,the risk of computer-related mistakes decreases tremendously.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
16
To obtain a patent or to determine if a patent exists in an area a company seeks to exploit,a search by the U.S.Patent Office is required;these can last longer than 25 months.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
17
A computer hacker is someone who intimidates or coerces a government or organization to advance his or her political or social objectives by launching computer-based attacks against computers,networks,and the information stored on them.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
18
Patent laws protect processes,machines,and compositions of matter.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
19
Relaxing controls for changes to critical tables,HTML,and URLs is a useful policy to minimize computer-related waste and mistakes.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
20
Not many small and medium sized organizations are willing to outsource their network security operations.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
21
Carpal tunnel syndrome (CTS)is the formation of blood clots in the legs or lungs.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
22
Federal law prohibits employers from monitoring email sent or received by their employees.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
23
_____ is often conducted by phone with a hacker imitating someone in a position of authority and attempting to gradually draw information out of a user.

A) Dumpster diving
B) Cyberterrorism
C) Social engineering attack
D) Organizational identity theft
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
24
The final step to prevent computer-related waste is to:

A) ensure that users throughout an organization are following established procedures.
B) establish policies and procedures regarding efficient acquisition,use,and disposal of systems and devices.
C) review existing policies and procedures and determine whether they are adequate.
D) check whether current policies cover existing practices adequately.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
25
_____ have extra knowledge that make them especially dangerous-they know logon IDs,passwords,and company procedures that help them evade detection.

A) Crackers
B) Hackers
C) Insiders
D) Script bunnies
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
26
The use of email among public officials might violate "open meeting" laws.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
27
A _____ is a set of programs that enables its user to gain administrator level access to a computer or network.

A) virus
B) Trojan horse
C) rootkit
D) worm
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
28
If an activity is defined as legal then it is ethical.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
29
A _____ is a type of Trojan horse that executes when specific conditions occur.

A) virus
B) worm
C) logic bomb
D) rootkit
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
30
The ______ Web-based service system is one of several information systems used by law enforcement to recover stolen property.

A) LeadsOnline
B) JusticeXchange
C) Watch Systems
D) CRIMECAST
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
31
A job that requires sitting at a desk and using a computer for many hours a day doubles the risk of seated immobility thromboembolism (SIT).
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
32
Multinational companies face an extremely difficult challenge in implementing data collection and dissemination processes and policies because of the multitude of differing country and regional statutes.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
33
_____ refer to errors,failures,and other computer problems that make computer output incorrect or not useful.

A) Computer-related wastes
B) Human errors
C) Computer-related mistakes
D) Coding errors
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
34
A _____ is a modified version of a virus that is produced by the virus's author or another person by amending the original virus code.

A) rootkit
B) variant
C) Trojan horse
D) worm
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
35
A(n)_____ is a computer savvy person who attempts to gain unauthorized or illegal access to computer systems to steal passwords,corrupt files or programs,or even transfer money.

A) hacker
B) insider
C) cracker
D) script bunny
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
36
The monitor should be about one arm's length away from a user.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
37
IS professionals believe that their field offers few opportunities for unethical behavior.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
38
The Internet Crime Computer Center (IC3)is an alliance between ______.

A) the Department of Homeland Security and the White Collar Crime Center
B) the Department of Homeland Security and the Department of Justice
C) the White Collar Crime Center and the Federal Bureau of Investigation
D) the Federal Bureau of Investigation and the Central Intelligence Agency
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
39
To safeguard a user's PC and prevent it from spreading malware to the user's friends and coworkers,some antivirus software scans and cleans both incoming and outgoing email messages.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
40
Posting information to the Internet using anonymous e-mail accounts or screen names makes it impossible to identify the libeler.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
41
_____ is a crime in which an imposter obtains key pieces of personal identification information to impersonate someone else.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
42
_____ refers to the use of any of several technologies to enforce policies for controlling access to digital media,such as movies,music,and software.

A) Copyright protection
B) Software protection dongle
C) Software piracy
D) Digital rights management
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
43
The _____ requires telephone companies to turn over customer information,including numbers called,without a court order,if the Federal Bureau of Investigation (FBI)claims that the records are relevant to a terrorism investigation.

A) Cable Act of 1992
B) Electronic Communications Privacy Act of 1986
C) Gramm-Leach-Bliley Act of 1999
D) USA Patriot Act of 2001
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
44
A useful guideline to protect corporate computers from criminal hackers is to:

A) install antivirus software on all computers.
B) enable physical access to servers.
C) provide overfriendly sign-in procedures for remote users.
D) enable several guest accounts.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
45
_____ is an inflammation of the nerve that connects the forearm to the palm of the wrist.

A) Carpal tunnel syndrome (CTS)
B) Seated immobility thromboembolism (SIT)
C) Chronic idiopathic mylofibrosis
D) Behcet's syndrome
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
46
_____ is the intimidation of government or civilian population by using information technology to disable critical national infrastructures (e.g. ,energy,transportation,financial,law enforcement,emergency response)to achieve political,religious,or ideological goals.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
47
The _____ requires all financial institutions to protect and secure customers' nonpublic data from unauthorized access or use.

A) Gramm-Leach-Bliley Act
B) Fair Credit Reporting Act
C) USA Patriot Act
D) Fair and Accurate Credit Transactions Act
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
48
If convicted for copyright infringement,software pirates could be sentenced to jail for up to _____ years.

A) two
B) ten
C) five
D) three
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
49
The practice of disguising illegally gained funds so that they seem legal is called _____.

A) identity theft
B) vishing
C) spoofing
D) money laundering
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
50
Which of the following statements is true of federal laws?

A) They permit employers to monitor instant messages sent and received by employees.
B) They authorize public officials to meet in private about matters that affect the state or local area.
C) They completely protect individual privacy.
D) They forbid customers and employees from accessing data about themselves.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
51
_____ is a scam that attempts to steal an individual's private information by having them respond to a text message.

A) Phishing
B) Smishing
C) Vishing
D) Sniffing
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
52
Proper use of antivirus software requires:

A) scanning all removable media before copying programs from them.
B) running the software only if a virus has been detected.
C) refraining from updating the software often.
D) installing software from unsealed packages.​
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
53
_____ is an activity in which a criminal illegally gains access to another's line of credit with stolen credit card numbers.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
54
Founded in 1947,the _____ is the oldest computing society and boasts more than 100,000 members in more than 100 countries.

A) United States Computer Emergency Readiness Team (US-CERT)
B) Computer Sciences Corporation (CSC)
C) Domain-based Message Authentication,Reporting,and Conformance group (DMARC)
D) Association for Computing Machinery (ACM)
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
55
Which of the following statements is true of the E-Government Act of 2002?

A) It renews the U.S.government's authority to monitor electronic communications of foreigners abroad and authorizes foreign surveillance programs by the National Security Agency (NSA).
B) It requires federal agencies to post machine-readable privacy policies on their Web sites and to perform privacy impact assessments on all new collections of data of ten or more people.
C) It restricts government access to certain records held by financial institutions.
D) It defines procedures to request judicial authorization for electronic surveillance of persons engaged in espionage against the United States on behalf of a foreign power.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
56
Heavy computer users who experience red,dry,itchy eyes should _____.

A) consider the use of artificial tears
B) consider the use of older,but more human friendly CRT monitors
C) keep their focus on their screens for long hours
D) avoid blinking often
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
57
Organizations operating unintegrated information systems,acquiring redundant systems,and wasting information system are examples of _____.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
58
Under the Identity Theft and Assumption Deterrence Act of 1998,the _____ is assigned responsibility to help victims restore their credit and erase the impact of the imposter.

A) Federal Bureau of Investigation (FBI)
B) Federal Trade Commission (FTC)
C) Securities and Exchange Commission (SEC)
D) Department of Justice (DOJ)
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
59
A _____ is a small program hidden in a network or computer system that records identification numbers.

A) logic bomb
B) password sniffer
C) Trojan horse
D) rootkit
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
60
_____ is the practice of using social skills to get computer users to provide information that allows a hacker to access an information system or its data.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
61
The hazardous activities associated with unfavorable working conditions are collectively referred to as _____.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
62
A party offended by a libel can file what is known as a(n)_____ lawsuit and use the subpoena power it grants to force the Internet service provider (ISP)to provide whatever information it has about the anonymous poster,including Internet Protocol (IP)address,name,and street address.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
63
The _____,passed by Congress in October 1998,was directed at Web sites catering to children,requiring site owners to post comprehensive privacy policies and to obtain parental consent before they collect any personal information from children under 13 years of age.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
64
The science of designing machines,products,and systems to maximize the safety,comfort,and efficiency of the people who use them is called _____.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
65
Many organizations use _____ software to provide a comprehensive display on a single computer screen of all the vital data related to an organization's security defenses,including threats,exposures,policy compliance,and incident alerts.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
66
A(n)_____ monitors system and network resources and traffic and notifies network security personnel when it senses a possible intrusion.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
67
_____ is software installed on a personal computer to intercept or take partial control over the user's interaction with the computer without knowledge or permission of the user.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
68
_____ is software that runs in the background to protect a user's computer from dangers lurking on the Internet and other possible sources of infected files.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
69
A(n)_____ is a person paid by a company to lie about how much he or she has earned and how easy the plan was to operate.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
70
Software programs that when loaded into a computer system will destroy,interrupt,or cause errors in processing are known as _____.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
71
Inexperienced hackers can download programs called _____ that automate the job of breaking into computers.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
72
_____ is a scam that attempts to steal an individual's private information by having them call a phone number and enter personal data.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
73
Practitioners in many professions subscribe to a(n)_____ that states the principles and core values that are essential to their work,and,therefore,govern their behavior.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
74
_____ is a Web-based data sharing system that places millions of nationwide booking records at the fingertips of law enforcement officials.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
75
_____ are employees,disgruntled or otherwise,working solo or in concert with outsiders to compromise corporate systems.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
76
_____ is a form of computer scam that attempts to get users to gain access to a customer's private information through a fake Web site.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
77
_____ is the process of converting an original electronic message into a form that can be understood only by the intended recipients.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
78
The act of going through the trash of an organization to find secret or confidential information,including information needed to access an information system or its data is known as _____.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
79
To help parents control what their children see on the Internet,some companies provide _____ to help screen Internet content.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
80
_____ is the careful division of the tasks and responsibilities associated with a key process so that they must be performed by more than one person to prevent collusion.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 80 flashcards in this deck.