Page 1

Full file at http://testbank360.eu/test-bank-connecting-with-computer-science-2nd-edition-anderson

Chapter 2: Computing Security and Ethics TRUE/FALSE 1. Good computer security is as much about locking doors, storing backups, and following protocol as it is about writing smarter software to catch the bad guys. ANS: T

PTS: 1

REF: 49

2. Almost all intruders are fairly innocent computer users who stumble into a security hole and cause problems. ANS: F

PTS: 1

REF: 50

3. Altruism tends to motivate directed hackers, who are usually more proficient and do not advertise their exploits. ANS: F

PTS: 1

REF: 51

4. Malicious hackers—interested in vandalizing or terrorism—can be both directed and undirected. ANS: T

PTS: 1

REF: 51

5. A virus is a program that actively reproduces itself across a network. ANS: F

PTS: 1

REF: 53

6. Security managers divide attacks into three main categories: access, denial of service, and repudiation. ANS: F

PTS: 1

REF: 55

7. Repudiation attacks seek to create a false impression that an event didn’t occur when it actually did or did occur when it really did not. ANS: T

PTS: 1

REF: 56

8. S-HTTP and SSL both use a digital identity, which is issued by an identity authority to both the user’s browser and the vendor’s server. ANS: F

PTS: 1

REF: 66

9. The demilitarized zone (DMZ) separates services you want to offer internally from those you want to offer externally. ANS: T

PTS: 1

REF: 70

10. In the IT world, computer crime most often relates to physical theft rather than intellectual property. ANS: F

PTS: 1

REF: 72

11. Unfortunately reverse-engineering a program takes very little effort.


Full file at http://testbank360.eu/test-bank-connecting-with-computer-science-2nd-edition-anderson

ANS: F

PTS: 1

REF: 73

12. A patent protects inventions, the workings of a device, or a process. ANS: T

PTS: 1

REF: 73

13. Prosecuting a computer crime is a simple matter. ANS: F

PTS: 1

REF: 76

14. Using weak passwords could be considered unethical because they give online vandals access to systems. ANS: T

PTS: 1

REF: 81

15. Cracking or hacking into computers is the same as trespassing on someone’s land. ANS: T

PTS: 1

REF: 82

16. Programming is still more art than engineering. ANS: T

PTS: 1

REF: 82

17. All cultures have the same set of ethics or laws concerning privacy. ANS: F

PTS: 1

REF: 83

18. In general, starting in the late 1960s, laws related to ensuring privacy have become more protective of the privacy of U.S. residents. ANS: T

PTS: 1

REF: 84

19. Companies are required to tell their employees about the types of monitoring they use, and cannot use the information for performance review, firing, or legal action. ANS: F

PTS: 1

REF: 84

20. A number of specialized technologies are used to gather information about your Web habits and sell you products and services. ANS: T

PTS: 1

REF: 84

21. Spammers expect a high return ratio. ANS: F

PTS: 1

REF: 84

22. Spyware is often passed into your computer through a virus, worm, or Trojan program. ANS: T

PTS: 1

23. Spyware/adware is illegal.

REF: 85


Full file at http://testbank360.eu/test-bank-connecting-with-computer-science-2nd-edition-anderson

ANS: F

PTS: 1

REF: 85

24. Spyware is a file on your hard drive used to communicate with Web pages you visit. ANS: F

PTS: 1

REF: 85

25. Information accuracy is as much an issue as access to information. ANS: T

PTS: 1

REF: 86

MULTIPLE CHOICE 1. Good computer security is primarily a matter of ____. a. prevention c. repetition b. reaction d. technology ANS: A

PTS: 1

REF: 49

2. _____ is a technically proficient person who breaks into a computer system. a. Cracker c. Hacker b. Phreak d. Leech ANS: C

PTS: 1

REF: 50

3. Subverting the phone system to get free service is known as ____. a. cracking c. phoning b. hacking d. phreaking ANS: D

PTS: 1

REF: 50

4. Intentional intruders motivated primarily by the challenge of breaking into a system, called ____ hackers. a. directed c. planned b. undirected d. targeted ANS: B

PTS: 1

REF: 50

5. An amateur hacker who simply uses the hacking tools developed by others is known as a(n) ____. a. script kiddie c. elite b. hacker d. master ANS: A

PTS: 1

REF: 50-51

6. Cracking into a system as a political act is known as ____. a. activism c. hacker activism b. cracktivism d. hacktivism ANS: D

PTS: 1

REF: 51

7. A document, written anonymously, that justifies cracking into systems as an ethical exercise is known as the ____. a. Cracker’s Manifesto c. Hacker’s Manifesto b. Hacker’s Bible d. Cracker’s Bible


Full file at http://testbank360.eu/test-bank-connecting-with-computer-science-2nd-edition-anderson

ANS: C

PTS: 1

REF: 51

8. Shortcuts into programs created by system designers to facilitate system maintenance but used and abused by crackers are known as ____. a. loopholes c. trojans b. interfaces d. backdoors ANS: D

PTS: 1

REF: 52

9. A ____ happens when a program tries to place more information into a memory location than that location can handle. a. buffer overflow c. stack overflow b. heap overflow d. runtime error ANS: A

PTS: 1

REF: 52-53

10. Code designed to breach system security and threaten digital information is known as ____ code. a. devious c. Trojan b. malicious d. hidden ANS: B

PTS: 1

REF: 53

11. An uninvited guest program with the potential to damage files and the operating system is known as a ____. a. security program c. virus b. firewall d. feature ANS: C

PTS: 1

REF: 53

12. A ____ disguises itself as something innocent, such as a game or, the worst possible example, an antivirus program. a. Trojan program c. worm b. virus d. mass mailer ANS: A

PTS: 1

REF: 54

13. Social interaction that preys on human gullibility, sympathy, or fear to take advantage of the target is known as social ____. a. hacking c. hacktivism b. cracking d. engineering ANS: D

PTS: 1

REF: 54

14. Picking through people’s trash to find things of value is known as ____. a. social engineering c. dumpster diving b. access engineering d. refuse diving ANS: C

PTS: 1

REF: 55

15. Attacks on a system that can include snooping, eavesdropping, and interception are known as ____ attacks. a. interface c. man-in-the-middle b. access d. modification ANS: B

PTS: 1

REF: 56


Full file at http://testbank360.eu/test-bank-connecting-with-computer-science-2nd-edition-anderson

16. Attacks on a system that alter information illicitly are known as ____ attacks. a. modification c. denial-of-service b. access d. man-in-the-middle ANS: A

PTS: 1

REF: 56

17. Attacks that prevent legitimate users from using the system or accessing information are known as ____ attacks. a. access c. man-in-the-middle b. modification d. denial-of-service ANS: D

PTS: 1

REF: 56

18. A(n) ____ is software or hardware that acts as a protective filter between an internal computer system and an external network, such as the Internet. a. intrusion detection system c. firewall b. proxy d. router ANS: C

PTS: 1

REF: 69

19. ____ are the moral principles a person or group holds for judging right and wrong behavior. a. Scruples c. Codes b. Ethics d. Values ANS: B

PTS: 1

REF: 78

20. E-mail that contains a phony virus warning is known as a ____. a. phishing scam c. vendor warning b. virus warning d. virus hoax ANS: D

PTS: 1

REF: 81

21. The science of the relationship between people and machines as well as designing work areas to facilitate both productivity and human ease and comfort is known as ____. a. economics c. endonomics b. ergonomics d. workplace engineering ANS: B

PTS: 1

REF: 83

22. The freedom from unwanted access to or intrusion into a person’s private life or information is known as ____. a. non-interference c. privacy b. solitude d. retreat ANS: C

PTS: 1

REF: 83

23. Unsolicited (and almost always unwanted) e-mail is known as ____. a. spam c. fraud b. phishing d. ham ANS: A

PTS: 1

REF: 84

24. Software that can track, collect, and transmit to a third party or Web site certain information about a user’s computer habits is known as ____.


Full file at http://testbank360.eu/test-bank-connecting-with-computer-science-2nd-edition-anderson

a. Trojan b. spyware ANS: B

c. phishing d. viruses PTS: 1

REF: 85

25. A program that can gather information about a user and store it on the user’s machine is known as a ____. a. byte c. brownie b. nugget d. cookie ANS: D

PTS: 1

REF: 85

Test bank connecting with computer science 2nd edition anderson  

test bank connecting with computer science 2nd edition anderson. Full file at http://testbank360.eu/test-bank-connecting-with-computer-...

Read more
Read more
Similar to
Popular now
Just for you