Vous êtes sur la page 1sur 101

Chapter 08 Protecting People and Information: Threats and Safeguards

Answer Key

Multiple Choice Questions

1. Which of the following is an example of the unethical use of computers?

A. Employees failing to answer a large number of e-mail messages due to


network problems.

B. Employees searching organizational databases for information on celebrities


and friends.

C. Employees sending messages without spell checking and proofreading them.

D. Employees updating their passwords at the end of every month.

Examples of the unethical use of computers include employees searching


organizational databases for information on celebrities and friends, and
organizations collecting, buying, and using information without checking the
validity or accuracy of that information.

AACSB: Ethics
AACSB: Technology
Blooms: Understand
Learning Objective: 08-01 Define ethics and describe the two factors that affect how you make a decision concerning an ethical
issue.
Level of Difficulty: 2 Medium
Topic: Introduction

2. Which of the following is true of an ethical dilemma?

A. It is faced exclusively by unethical, immoral people.

B. It occurs when one's responsibilities seem to lead in opposite directions.

C. It is the choice of whether or not to act ethically.

D. It involves choosing between compatible good outcomes.

Even the most ethical people must face the nearly inevitable dilemmas involving
choices between incompatible good outcomes and conflicting loyalties. An
ethical dilemma is not the choice of whether or not to be ethical; rather, an
ethical dilemma is when one's responsibilities seem to lead in opposite
directions.

AACSB: Ethics
Blooms: Remember
Learning Objective: 08-01 Define ethics and describe the two factors that affect how you make a decision concerning an ethical
issue.
Level of Difficulty: 1 Easy
Topic: Ethics
3. _____ can be defined as the principles and standards that guide our behavior
toward other people.

A. Ethics

B. Models

C. Eugenics

D. Aesthetics

Ethics can be defined as the principles and standards that guide our behavior
toward other people. Ethics is also about the reasons we give for thinking we
ought to live one way rather than another, make one decision rather than
another, or opt for one policy over another.

AACSB: Ethics
Blooms: Remember
Learning Objective: 08-01 Define ethics and describe the two factors that affect how you make a decision concerning an ethical
issue.
Level of Difficulty: 1 Easy
Topic: Ethics
4. Which of the following is true of ethics and ethical people?

A. Ethical people do not face ethical dilemmas since they know the difference
between right and wrong.

B. Ethical people's values are free from the influence of their history, culture,
and religion.

C. Ethical norms change radically because of society's dynamic nature.

D. Acting ethically means behaving in a principled fashion and treating others


with dignity.

Acting ethically means behaving in a principled fashion and treating other


people with dignity and respect. This is simple to say but not always so simple to
do since some situations are complex or ambiguous.

AACSB: Ethics
Blooms: Understand
Learning Objective: 08-01 Define ethics and describe the two factors that affect how you make a decision concerning an ethical
issue.
Level of Difficulty: 2 Medium
Topic: Ethics
5. David works as process supervisor at an industrial plant. In his company, he is
known by all his colleagues and superiors as an honest worker whose decisions
are always guided by ethical values. Recently, David came to know that due to
the irresponsible disposal of company waste, the local groundwater has been
contaminated. Because of this, a large number of people living in close
proximity to the plant have been suffering from severe ailments. However, in
spite of knowing this, David does not take any action. Which of the following, if
true, most likely explains David's decision not to act?

A. David's decision was guided by morality and ethical values.

B. David considered the impact of toxins on the environment while making the
decision.

C. David's decision was influenced by the dilemma of losing his job at the plant.

D. David made the decision by considering the well-being of the people living in
close proximity to the plant.

Two factors affect how one makes a decision when faced with an ethical
dilemma. The first is one's basic ethical structure, which one developed while
growing up. The second is the set of practical circumstances inevitably involved
in the decision that one is trying to make, that is, all the shades of gray in what
are rarely black or white decisions.

AACSB: Reflective Thinking


Blooms: Apply
Learning Objective: 08-01 Define ethics and describe the two factors that affect how you make a decision concerning an ethical
issue.
Level of Difficulty: 3 Hard
Topic: Ethics
6. Which of the following is part of the outermost level of an individual's ethical
structure?

A. Actions that are considered serious ethical violations by both society and
oneself.

B. Behavior that causes extreme ethical discomfort to the person.

C. Behavior that calls for stringent measures against the person.

D. Actions that most people would not consider unacceptable or unethical.

A person's ethical structure and the ethical challenges one will face exist at
several levels. At the outside level are things that most people would not
consider bad, such as taking a couple of paper clips or sending an occasional
personal e-mail on company time.

AACSB: Ethics
Blooms: Understand
Learning Objective: 08-01 Define ethics and describe the two factors that affect how you make a decision concerning an ethical
issue.
Level of Difficulty: 2 Medium
Topic: Ethics
7. Among the three levels of an individual's ethical structure, the _____ level
involves things that most people would not consider bad, such as taking a
couple of paper clips or sending an occasional personal e-mail on company
time.

A. innermost

B. outermost

C. second

D. middle

A person's ethical structure and the ethical challenges one will face exist at
several levels. At the outside level are things that most people would not
consider bad, such as taking a couple of paper clips or sending an occasional
personal e-mail on company time.

AACSB: Ethics
Blooms: Remember
Learning Objective: 08-01 Define ethics and describe the two factors that affect how you make a decision concerning an ethical
issue.
Level of Difficulty: 1 Easy
Topic: Ethics
8. Which of the following is part of the innermost level of an individual's ethical
structure?

A. Ethical violations that one would consider extremely serious.

B. Ethical behavior that a society considers acceptable.

C. Behavior that does not call for action against the person.

D. Actions that seem acceptable to one's values and morals.

A person's ethical structure and the ethical challenges one will face exist at
several levels. At the innermost ethical level are ethical violations that one would
consider very serious, such as embezzling funds or selling company records to a
competitor.

AACSB: Ethics
Blooms: Remember
Learning Objective: 08-01 Define ethics and describe the two factors that affect how you make a decision concerning an ethical
issue.
Level of Difficulty: 2 Medium
Topic: Ethics
9. Among the three levels of an individual's ethical structure, the _____ level
involves ethical violations that one would consider very serious, such as
embezzling funds or selling company records to a competitor.

A. innermost

B. outermost

C. external

D. middle

A person's ethical structure and the ethical challenges one will face exist at
several levels. At the innermost ethical level are ethical violations that one would
consider very serious, such as embezzling funds or selling company records to a
competitor.

AACSB: Ethics
Blooms: Remember
Learning Objective: 08-01 Define ethics and describe the two factors that affect how you make a decision concerning an ethical
issue.
Level of Difficulty: 1 Easy
Topic: Ethics
10. Michelle works as an engineer at a software firm and often checks her personal
e-mail while at work. Due to the long hours she puts in at the office, she does
not have any time to check her e-mail at home and hence, feels that her actions
are acceptable. Michelle's behavior relates to which of the following levels of her
ethical structure?

A. Innermost

B. Outermost

C. Inside

D. Middle

A person's ethical structure and the ethical challenges one will face exist at
several levels. At the outside level are things that most people would not
consider bad, such as taking a couple of paper clips or sending an occasional
personal e-mail on company time.

AACSB: Reflective Thinking


Blooms: Apply
Learning Objective: 08-01 Define ethics and describe the two factors that affect how you make a decision concerning an ethical
issue.
Level of Difficulty: 3 Hard
Topic: Ethics
11. Palmer Inc. recently found out that a senior researcher at the company, Jessica
Hughes, has been selling the firm's trade secrets to a leading competitor.
Though Jessica knew that her actions would result in serious consequences, she
went ahead and shared the confidential information with the rival firm. Jessica's
behavior relates to which of the following levels of her ethical structure?

A. Innermost

B. External

C. Outermost

D. Middle

A person's ethical structure and the ethical challenges one will face exist at
several levels. At the innermost ethical level are ethical violations that one would
surely consider very serious, such as embezzling funds or selling company
records to a competitor.

AACSB: Reflective Thinking


Blooms: Apply
Learning Objective: 08-01 Define ethics and describe the two factors that affect how you make a decision concerning an ethical
issue.
Level of Difficulty: 3 Hard
Topic: Ethics
12. An assessment of what is right or wrong can be determined by considering ____,
which can be understood as the benefit or harm that will come from a particular
decision.

A. the consequences

B. society's opinion

C. the time till the consequences take effect

D. the reach of the result

An assessment of what is right or wrong can rarely be divorced from a variety of


considerations. One of the considerations is the consequences—the benefit or
harm that will come from a particular decision.

AACSB: Ethics
Blooms: Remember
Learning Objective: 08-01 Define ethics and describe the two factors that affect how you make a decision concerning an ethical
issue.
Level of Difficulty: 1 Easy
Topic: Ethics
13. Peter works as a quality inspection officer at a coffee factory. Due to personal
obligations, he needs to leave work early one day, because of which certain
consignments will be shipped without any quality checks. Peter is now thinking
about the actions that the company will take against him if they find out about
it. Which of the following is Peter considering before making his decision?

A. Reach of result

B. Relatedness

C. Time to consequences

D. Consequences

An assessment of what is right or wrong can rarely be divorced from a variety of


considerations. One of the considerations is the consequences—the benefit or
harm that will come from a particular decision.

AACSB: Reflective Thinking


Blooms: Apply
Learning Objective: 08-01 Define ethics and describe the two factors that affect how you make a decision concerning an ethical
issue.
Level of Difficulty: 2 Medium
Topic: Ethics
14. The management at Belle Cosmetics, a company headquartered in Jakarta, is
contemplating whether or not to use palm oil extracts for their hair products.
Though the extracts are proven to nourish hair, using palm oil for commercial
products is a major cause of deforestation in Indonesia. They feel that using
palm oil extracts will make their customers shift their loyalties to other brands.
Which of the following considerations is the company taking into account while
making their decision?

A. Likelihood of effect

B. Relatedness

C. Society's opinion

D. Time to consequences

An assessment of what is right or wrong can rarely be divorced from a variety of


considerations. One of these considerations is society's opinion, that is, your
perception of what society really thinks of your intended action.

AACSB: Reflective Thinking


Blooms: Apply
Learning Objective: 08-01 Define ethics and describe the two factors that affect how you make a decision concerning an ethical
issue.
Level of Difficulty: 3 Hard
Topic: Ethics
15. Kelly, who works at an advertising firm, regularly receives calls from friends and
family during office hours. Though she knows that it is not right on her part to
spend a lot of time answering personal calls, she feels that the management will
not take any strict action against her because she always meets project
deadlines and provides quality work. Which of the following is Kelly considering
while making her decision to continue taking calls?

A. Time to consequences

B. Likelihood of effect

C. Relatedness

D. Reach of result

An assessment of what is right or wrong can rarely be divorced from a variety of


considerations. One of these considerations is the likelihood of effect which
refers to the probability that harm or benefit will occur if one undertakes an
action.

AACSB: Reflective Thinking


Blooms: Apply
Learning Objective: 08-01 Define ethics and describe the two factors that affect how you make a decision concerning an ethical
issue.
Level of Difficulty: 2 Medium
Topic: Ethics
16. An assessment of what is right or wrong can be determined by considering ____,
which refers to the probability that the harm or benefit will occur if one
undertakes an action.

A. the likelihood of effect

B. society's opinion

C. the time to consequences

D. relatedness

An assessment of what is right or wrong can rarely be divorced from a variety of


considerations. The likelihood of effect refers to the probability that the harm or
benefit will occur if one undertakes an action.

AACSB: Ethics
Blooms: Remember
Learning Objective: 08-01 Define ethics and describe the two factors that affect how you make a decision concerning an ethical
issue.
Level of Difficulty: 1 Easy
Topic: Ethics
17. An assessment of what is right or wrong can be determined by considering the
____, which may be defined as how long it will take for the benefit or harm to
take effect.

A. likelihood of effect

B. reach of result

C. time to consequences

D. consequences

An assessment of what is right or wrong can rarely be divorced from a variety of


considerations. The time to consequences focuses on how long it will take for
the benefit or harm to take effect.

AACSB: Ethics
Blooms: Remember
Learning Objective: 08-01 Define ethics and describe the two factors that affect how you make a decision concerning an ethical
issue.
Level of Difficulty: 1 Easy
Topic: Ethics
18. _____ refers to the extent to which one identifies with the person or persons who
will receive the benefit or suffer the harm associated with a particular decision.

A. Reach of result

B. Tangibility

C. Likelihood of effect

D. Relatedness

An assessment of what is right or wrong can rarely be divorced from a variety of


considerations. Relatedness refers to the extent to which one identifies with the
person or persons who will receive the benefit or suffer the harm associated
with a particular decision.

AACSB: Ethics
Blooms: Remember
Learning Objective: 08-01 Define ethics and describe the two factors that affect how you make a decision concerning an ethical
issue.
Level of Difficulty: 1 Easy
Topic: Ethics
19. An assessment of what is right or wrong can be made by considering _____
which focuses on the number of people that will be affected by one's action.

A. society's opinion

B. the consequences

C. the likelihood of effect

D. the reach of result

An assessment of what is right or wrong can rarely be divorced from a variety of


considerations. The reach of result refers to the number of people that will be
affected by one's action.

AACSB: Ethics
Blooms: Remember
Learning Objective: 08-01 Define ethics and describe the two factors that affect how you make a decision concerning an ethical
issue.
Level of Difficulty: 1 Easy
Topic: Ethics
20. The management at Corpus Inc. is weighing the pros and cons of moving their
factory from Michigan to Vermont. They know that the move will lower their
operating costs, however, they are also aware that several of their factory
workers will be left without a job because of their inability to relocate. Which of
the following considerations is the company taking into account while making
their decision?

A. Time to consequences

B. Reach of result

C. Causes

D. Society's opinion

An assessment of what is right or wrong can rarely be divorced from a variety of


considerations. Reach of result refers to the number of people that will be
affected by an action.

AACSB: Reflective Thinking


Blooms: Apply
Learning Objective: 08-01 Define ethics and describe the two factors that affect how you make a decision concerning an ethical
issue.
Level of Difficulty: 2 Medium
Topic: Ethics
21. The software development team at Magnus Corporation recently created a
unique mobile application that helps users locate themselves anywhere on the
globe. In addition, the software provides information on traffic jams, fueling
stations, restaurants, and hotels. This is an example of ____.

A. public property

B. intellectual property

C. real property

D. personal property

Intellectual property is intangible creative work that is embodied in physical


form. A company's product sketches, software, schematics and other proprietary
documents are all examples of intellectual property.

AACSB: Reflective Thinking


Blooms: Apply
Learning Objective: 08-02 Define and describe intellectual property; copyright; Fair Use Doctrine; and pirated software.
Level of Difficulty: 2 Medium
Topic: Ethics
22. _____ refers to intangible creative work that is embodied in physical form.

A. Real property

B. Public property

C. Intellectual property

D. Immovable property

Intellectual property is intangible creative work that is embodied in physical


form. Music, novels, paintings, and sculptures are all examples of intellectual
property.

AACSB: Ethics
Blooms: Remember
Learning Objective: 08-02 Define and describe intellectual property; copyright; Fair Use Doctrine; and pirated software.
Level of Difficulty: 1 Easy
Topic: Ethics
23. An architectural firm's blueprints, sketches and other proprietary documents are
examples of ____.

A. public property

B. intellectual property

C. real property

D. immovable property

Intellectual property is intangible creative work that is embodied in physical


form. A company's product sketches, software, schematics and other proprietary
documents are all examples of intellectual property.

AACSB: Ethics
Blooms: Understand
Learning Objective: 08-02 Define and describe intellectual property; copyright; Fair Use Doctrine; and pirated software.
Level of Difficulty: 2 Medium
Topic: Ethics
24. Katherine Wood, a critically acclaimed feminist poet, recently published her
second anthology of poetry. Which of the following will protect her work from
being used by other people without her permission?

A. Copyright law

B. Patent law

C. Trademark law

D. Fair use

Copyright law protects the authorship of literary and dramatic works, musical
and theatrical compositions, and works of art. Copyright is the legal protection
afforded an expression of an idea, such as a song, video game, and some types
of proprietary documents.

AACSB: Reflective Thinking


Blooms: Apply
Learning Objective: 08-02 Define and describe intellectual property; copyright; Fair Use Doctrine; and pirated software.
Level of Difficulty: 2 Medium
Topic: Ethics
25. A _____ refers to the legal protection offered for the expression of an idea, such
as a song, video game, and some types of proprietary documents.

A. copyright

B. trademark

C. patent

D. fair use agreement

Copyright law protects the authorship of literary and dramatic works, musical
and theatrical compositions, and works of art. Copyright is the legal protection
offered for the expression of an idea, such as a song, video game, and some
types of proprietary documents.

AACSB: Ethics
Blooms: Remember
Learning Objective: 08-02 Define and describe intellectual property; copyright; Fair Use Doctrine; and pirated software.
Level of Difficulty: 1 Easy
Topic: Ethics
26. The _____ says that you may use copyrighted material in certain situations, for
example, in the creation of new work or, within certain limits, for teaching
purposes.

A. Fair Use Doctrine

B. First-Sale Doctrine

C. Orphan work rule

D. Open-source rule

The Fair Use Doctrine says that one may use copyrighted material in certain
situations, for example, in the creation of new work or, within certain limits, for
teaching purposes. One of those limits is on the amount of the copyrighted
material one may use.

AACSB: Ethics
Blooms: Remember
Learning Objective: 08-02 Define and describe intellectual property; copyright; Fair Use Doctrine; and pirated software.
Level of Difficulty: 1 Easy
Topic: Ethics
27. Jeanne Sanders, a celebrity chef, recently published a book titled "Easy to Bake
Cakes and Pastries." However, in spite of copyrighting her work, James Riley, a
critic with News Today, used some excerpts from her book for his news article.
Jeanne is upset and consults her lawyer who tells her that, according to law,
James has the right to use excerpts from her book and has not violated any
laws. This is an example of ____.

A. a Creative Commons license

B. the open-source rule

C. the Fair Use Doctrine

D. the First-Sale doctrine

The Fair Use Doctrine says that one may use copyrighted material in certain
situations, for example, in the creation of new work or, within certain limits, for
teaching purposes. One of those limits is on the amount of the copyrighted
material one may use.

AACSB: Reflective Thinking


Blooms: Apply
Learning Objective: 08-02 Define and describe intellectual property; copyright; Fair Use Doctrine; and pirated software.
Level of Difficulty: 3 Hard
Topic: Ethics
28. Alice recently prepared a report on the impact of climate change on developing
countries. While writing her report, she referred to several online articles and
took excerpts from them. Which of the following should Alice provide in the
report to indicate that these excerpts are not her original work?

A. Annotations

B. Citations

C. Watermarks

D. Inscriptions

In preparing material, keep one simple rule in mind: If it is not your original
work, then provide a citation.

AACSB: Reflective Thinking


Blooms: Apply
Learning Objective: 08-02 Define and describe intellectual property; copyright; Fair Use Doctrine; and pirated software.
Level of Difficulty: 3 Hard
Topic: Ethics
29. _____ is the unauthorized use, duplication, distribution, or sale of copyrighted
software.

A. Pirated software

B. File sharing

C. Torrent poisoning

D. Phishing

Pirated software is the unauthorized use, duplication, distribution, or sale of


copyrighted software. Software piracy costs businesses billions of dollars a year
in lost revenue.

AACSB: Ethics
AACSB: Technology
Blooms: Remember
Learning Objective: 08-02 Define and describe intellectual property; copyright; Fair Use Doctrine; and pirated software.
Level of Difficulty: 1 Easy
Topic: Ethics
30. Sarah recently downloaded a few songs by her favorite artist a month before
the artist's album was released. After downloading the songs, she distributed
them to all her friends. Which of the following is Sarah doing?

A. Spamming

B. Phishing

C. Pirating

D. Spoofing

Copyright law protects the authorship of literary and dramatic works, musical
and theatrical compositions, and works of art. Having a copyright means that no
one can use your song or video game without your permission. Pirated software
is the unauthorized use, duplication, distribution, or sale of copyrighted
software. If one copies copyrighted software and gives it to another person, the
person is pirating the software.

AACSB: Ethics
AACSB: Technology
Blooms: Understand
Learning Objective: 08-02 Define and describe intellectual property; copyright; Fair Use Doctrine; and pirated software.
Level of Difficulty: 2 Medium
Topic: Ethics
31. _____ is the right to be left alone when one wants to be, to have control over
one's own personal possessions, and not to be observed without one's consent.

A. Non-disclosure

B. Intellectual property

C. Personalization

D. Privacy

Privacy is the right to be left alone when one wants to be, to have control over
one's own personal possessions, and not to be observed without one's consent.
It is the right to be free of unwanted intrusion into one's private life.

AACSB: Ethics
AACSB: Technology
Blooms: Remember
Learning Objective: 08-03 Define privacy and describe ways in which it can be threatened.
Level of Difficulty: 1 Easy
Topic: Privacy
32. _____ refers to programs that Web sites offer to help people monitor what is
happening on a computer.

A. Abandonware

B. Snoop ware

C. Freeware

D. Shareware

Many Web sites offer programs, collectively referred to as snoopware, to help


people monitor what's happening on a computer.

AACSB: Ethics
AACSB: Technology
Blooms: Remember
Learning Objective: 08-03 Define privacy and describe ways in which it can be threatened.
Level of Difficulty: 1 Easy
Topic: Privacy
33. Claytons and Sons, a finance firm in Manhattan, has a large number of
employees who handle huge amounts of online transactions everyday. The
management feels that it is crucial to monitor their online activities. Which of the
following can the company use for this purpose?

A. Snoopware

B. Sneakware

C. Spyware

D. Stealthware

Many Web sites offer programs, collectively referred to as snoopware, to help


people monitor what's happening on a computer.

AACSB: Ethics
AACSB: Technology
Blooms: Understand
Learning Objective: 08-03 Define privacy and describe ways in which it can be threatened.
Level of Difficulty: 2 Medium
Topic: Privacy
34. Which of the following is a program that, when installed on a computer, records
every mouse click?

A. Honeypot

B. Spear phishing

C. Clickstreaming

D. Key logger

Key logger, or key trapper, software, is a program that, when installed on a


computer, records every keystroke and mouse click. It records all e-mails, instant
messages, chat room exchanges, Web sites you visit, applications you run, and
passwords you type in on a computer.

AACSB: Technology
Blooms: Remember
Learning Objective: 08-03 Define privacy and describe ways in which it can be threatened.
Level of Difficulty: 1 Easy
Topic: Privacy
35. Starlit Corporation recently had an incident where one of their employees sent
out confidential information to a competitor. The company has now decided to
use a certain software which tracks their employees' online activities based on
their mouse clicks. Which of the following is the company most likely planning
to use?

A. Spear phishing

B. Spyware

C. Key trapper software

D. Clickstream

Key logger, or key trapper, software, is a program that, when installed on a


computer, records every keystroke and mouse click. It records all e-mails, instant
messages, chat room exchanges, Web sites you visit, applications you run, and
passwords you type in on that computer.

AACSB: Reflective Thinking


Blooms: Apply
Learning Objective: 08-03 Define privacy and describe ways in which it can be threatened.
Level of Difficulty: 2 Medium
Topic: Privacy
36. Janice works in the IT department of a multinational bank and is responsible for
monitoring information that is being transmitted over a digital network. This
helps her ensure that there is no breach in security. Which of the following is
Janice most likely using?

A. Spyware

B. Key logger

C. Packet sniffer

D. Rootkit

Tools for monitoring include packet sniffers that examine the information passing by on switches, hubs, or

routers (the devices on networks that connect computers to each other), and log analysis tools that keep
track of logons, deletions, and so forth.

AACSB: Reflective Thinking


Blooms: Apply
Learning Objective: 08-03 Define privacy and describe ways in which it can be threatened.
Level of Difficulty: 2 Medium
Topic: Privacy
37. _____ refer(s) to devices on networks that connect computers to each other.

A. Packet sniffers

B. Routers

C. Adware

D. Modems

Tools for monitoring computer use include packet sniffers that examine the
information passing by on switches, hubs, or routers (the devices on networks
that connect computers to each other), and log analysis tools that keep track of
logons, deletions, and so forth.

AACSB: Technology
Blooms: Remember
Learning Objective: 08-03 Define privacy and describe ways in which it can be threatened.
Level of Difficulty: 1 Easy
Topic: Privacy
38. _____ is a kind of identity theft where the victim knows the person who stole
his/her identity.

A. Friendly fraud

B. PayPal

C. Peer-to-peer computing

D. Pretexting

Identity theft is the forging of someone's identity for the purpose of fraud. A
kind of identity theft where the victim knows the person who stole their identity
is called friendly fraud.

AACSB: Ethics
AACSB: Technology
Blooms: Remember
Learning Objective: 08-03 Define privacy and describe ways in which it can be threatened.
Level of Difficulty: 1 Easy
Topic: Privacy
39. _____ is a technique to gain personal information for the purpose of identity
theft, usually by means of fraudulent e-mail.

A. Greylisting

B. Phishing

C. Sniffing

D. Wire fraud

Phishing, also called carding or brand spoofing, is a technique to gain personal


information for the purpose of identity theft, usually by means of fraudulent e-
mail.

AACSB: Ethics
AACSB: Technology
Blooms: Remember
Learning Objective: 08-03 Define privacy and describe ways in which it can be threatened.
Level of Difficulty: 1 Easy
Topic: Privacy
40. Ashley recently received an e-mail from a bank asking for her account number
and verification of her password. The e-mail contained the bank's logo and was
signed by the branch manager. She immediately replied to the e-mail, providing
the requested details. However, a few days later, she noticed that her bank
statement showed a zero balance. On checking with the bank authorities, she
was told that the e-mail was not sent by them. Ashley was most likely a victim of
which of the following types of fraud?

A. Brand spoofing

B. Key logging

C. Pirating

D. Pharming

Phishing, also called carding or brand spoofing, is a technique to gain personal


information for the purpose of identity theft, usually by means of fraudulent e-
mail.

AACSB: Reflective Thinking


Blooms: Apply
Learning Objective: 08-03 Define privacy and describe ways in which it can be threatened.
Level of Difficulty: 3 Hard
Topic: Privacy
41. _____ is a technique to gain personal information for the purpose of identity
theft, where specific individuals are targeted and the creator of a fraudulent e-
mail already has some of the victim's personal information and wants more.

A. Spear phishing

B. Vishing

C. Spy-phishing

D. Pharming

Spear phishing refers to phishing that is targeted at specific individuals. In this


case, the creator of the fraudulent e-mail already has some of your personal
information and wants more.

AACSB: Ethics
AACSB: Technology
Blooms: Remember
Learning Objective: 08-03 Define privacy and describe ways in which it can be threatened.
Level of Difficulty: 1 Easy
Topic: Privacy
42. _____ is the use of phishing targeted at senior business executives, government
leaders, and other types of high-profile individuals.

A. Spamming

B. Whaling

C. Vishing

D. Keystroke logging

Whaling refers to the use of phishing targeted at senior business executives,


government leaders, and other types of high-profile individuals.

AACSB: Ethics
AACSB: Technology
Blooms: Remember
Learning Objective: 08-03 Define privacy and describe ways in which it can be threatened.
Level of Difficulty: 1 Easy
Topic: Privacy
43. Which of the following should a person do to protect their personal
information?

A. Avoid using special characters in passwords.

B. Do not provide information to people who contact you by e-mail.

C. Avoid providing answers that are hard to guess as responses to security


questions.

D. Do not enter those Web sites where https:// appears in the Web browser.

In order to protect your personal information, do not provide information to


people who contact you over the phone, through the mail, or by e-mail.

AACSB: Ethics
AACSB: Technology
Blooms: Understand
Learning Objective: 08-03 Define privacy and describe ways in which it can be threatened.
Level of Difficulty: 2 Medium
Topic: Privacy
44. The most recent federal bill that addressed electronic monitoring of employees
is the ____.

A. Homeland Security Act of 2002

B. Electronic Communications Privacy Act of 1986

C. Sarbanes-Oxley Act of 2002

D. USA Patriot Act of 2003

The most recent federal bill that addressed electronic monitoring of employees
is the Electronic Communications Privacy Act of 1986. Although, in general, it
forbids the interception of wired or electronic communications, it has exceptions
for both prior consent and business use.

AACSB: Ethics
AACSB: Technology
Blooms: Remember
Learning Objective: 08-03 Define privacy and describe ways in which it can be threatened.
Level of Difficulty: 2 Medium
Topic: Privacy
45. A _____ is a small file that contains information about a person and his/her Web
activities, which a Web site one visits places on their computer.

A. cookie

B. bot

C. cache

D. key logger

A cookie is a small file that contains information about you and your Web
activities, which a Web site you visit places on your computer. A cookie has
many uses. For example, it is used to keep ID and password information so that
one does not have to go through the whole verification process every time they
log onto a Web site.

AACSB: Ethics
AACSB: Technology
Blooms: Remember
Learning Objective: 08-03 Define privacy and describe ways in which it can be threatened.
Level of Difficulty: 1 Easy
Topic: Privacy
46. _____ refers to unsolicited e-mail (electronic junk mail) from businesses that
advertise goods and services.

A. Adware

B. Spyware

C. Pharming

D. Spam

Spam is unsolicited e-mail (electronic junk mail) from businesses that advertise
goods and services. Often spam mass mailings advertise pornography, get-rich-
quick schemes, and miracle cures.

AACSB: Ethics
AACSB: Technology
Blooms: Remember
Learning Objective: 08-03 Define privacy and describe ways in which it can be threatened.
Level of Difficulty: 1 Easy
Topic: Privacy
47. Jennifer recently installed a free media player for downloading music onto her
laptop. Without her knowledge, along with the media player, a software was
installed on her system which constantly tracked her online activities in addition
to the data saved on her laptop. Which of the following was most likely
downloaded without Jennifer's knowledge?

A. Adware

B. Spyware

C. Firmware

D. Cookie

Spyware (also called sneakware or stealthware) is malicious software that


collects information about a person and one's computer and reports it to
someone without their permission. It usually comes hidden in downloadable
software and tracks one's online movements and/or mines the information
stored on their computer.

AACSB: Reflective Thinking


Blooms: Apply
Learning Objective: 08-03 Define privacy and describe ways in which it can be threatened.
Level of Difficulty: 2 Medium
Topic: Privacy
48. _____ refers to software that generates advertisements and installs itself on your
computer when you download some other, usually free, program from the
Web.

A. Antivirus software

B. Adware

C. Spyware

D. AdSense

Adware is software to generate ads that installs itself on your computer when
you download some other (usually free) program from the Web. Adware is a
type of Trojan horse software. It is software that you do not want hidden inside
software you do want.

AACSB: Ethics
AACSB: Technology
Blooms: Remember
Learning Objective: 08-03 Define privacy and describe ways in which it can be threatened.
Level of Difficulty: 1 Easy
Topic: Privacy
49. _____ refers to malicious software that collects information about a person and
his/her computer and reports it to someone without their permission.

A. Firmware

B. Spyware

C. Adware

D. Spam

Spyware refers to malicious software that collects information about a person


and his/her computer and reports it to someone without their permission. It
usually comes hidden in downloadable software and tracks a person's online
movements and/or mines the information stored on their computer.

AACSB: Ethics
AACSB: Technology
Blooms: Remember
Learning Objective: 08-03 Define privacy and describe ways in which it can be threatened.
Level of Difficulty: 1 Easy
Topic: Privacy
50. Spyware is also known as ____.

A. adware

B. malware

C. stealthware

D. firmware

Spyware is also called sneakware or stealthware. It refers to malicious software


that collects information about a person and his/her computer and reports it to
someone without their permission. It usually comes hidden in downloadable
software and tracks a person's online movements and/or mines the information
stored on their computer.

AACSB: Ethics
AACSB: Technology
Blooms: Remember
Learning Objective: 08-03 Define privacy and describe ways in which it can be threatened.
Level of Difficulty: 1 Easy
Topic: Privacy
51. A _____ consists of one line of information for every visitor to a Web site and is
usually stored on a Web server.

A. Web log

B. firewall

C. cookie

D. copyright

A Web log consists of one line of information for every visitor to a Web site and
is usually stored on a Web server. Even without spyware, a Web site can tell a lot
about its Web visitors from its Web log.

AACSB: Ethics
AACSB: Technology
Blooms: Remember
Learning Objective: 08-03 Define privacy and describe ways in which it can be threatened.
Level of Difficulty: 1 Easy
Topic: Privacy
52. A _____ records information about you during a Web surfing session such as
what Web sites you visited, how long you were there, what ads you looked at,
and what you bought.

A. copyright

B. key logger

C. firewall

D. clickstream

A clickstream records information about you during a Web surfing session such
as what Web sites you visited, how long you were there, what ads you looked at,
and what you bought.

AACSB: Ethics
AACSB: Technology
Blooms: Remember
Learning Objective: 08-03 Define privacy and describe ways in which it can be threatened.
Level of Difficulty: 1 Easy
Topic: Privacy
53. The _____ allows law enforcement to get access to almost any information,
including library records, video rentals, bookstore purchases, and business
records when investigating any act of terrorism or hostile intelligence activities.

A. USA Patriot Act

B. Sarbanes-Oxley Act

C. CAN-Spam Act

D. Homeland Security Act

The USA Patriot Act of 2001 and 2003 allows law enforcement to get access to
almost any information, including library records, video rentals, bookstore
purchases, and business records when investigating any act of terrorism or
hostile intelligence activities. In 2003 Patriot II broadened the original law.

AACSB: Ethics
AACSB: Technology
Blooms: Remember
Learning Objective: 08-03 Define privacy and describe ways in which it can be threatened.
Level of Difficulty: 1 Easy
Topic: Privacy
54. The _____ sought to protect investors by improving the accuracy and reliability
of corporate disclosures and requires companies to implement extensive and
detailed policies to prevent illegal activity within the company and respond in a
timely manner to investigate illegal activity.

A. USA Patriot Act

B. Homeland Security Act

C. Sarbanes-Oxley Act

D. Fair and Accurate Credit Transactions Act

The Sarbanes-Oxley Act of 2002 sought to protect investors by improving the


accuracy and reliability of corporate disclosures and requires companies to (1)
implement extensive and detailed policies to prevent illegal activity within the
company and (2) respond in a timely manner to investigate illegal activity.

AACSB: Ethics
AACSB: Technology
Blooms: Remember
Learning Objective: 08-03 Define privacy and describe ways in which it can be threatened.
Level of Difficulty: 1 Easy
Topic: Privacy
55. The _____ provided new authority to government agencies to mine data on
individuals and groups including e-mails and Web site visits, and put limits on
the information available under the Freedom of Information Act.

A. CAN-Spam Act

B. Sarbanes-Oxley Act

C. Homeland Security Act

D. USA Patriot Act

The Homeland Security Act, 2002, provided new authority to government


agencies to mine data on individuals and groups including e-mails and Web site
visits. It put limits on the information available under the Freedom of
Information Act, and gave new powers to government agencies to declare
national heath emergencies.

AACSB: Ethics
AACSB: Technology
Blooms: Remember
Learning Objective: 08-03 Define privacy and describe ways in which it can be threatened.
Level of Difficulty: 1 Easy
Topic: Privacy
56. The _____ sought to regulate interstate commerce by imposing limitations and
penalties on businesses sending unsolicited e-mail to consumers.

A. USA Patriot Act

B. Identity Theft and Assumption Deterrence Act

C. Homeland Security Act

D. CAN-Spam Act

The CAN-Spam Act of 2003 sought to regulate interstate commerce by


imposing limitations and penalties on businesses sending unsolicited e-mail to
consumers. The law forbids deceptive subject lines, headers, return addresses,
etc., as well as harvesting e-mail addresses from Web sites. It requires
businesses that send spam to maintain a do-not-spam list and to include a
postal mailing address in the message.

AACSB: Ethics
AACSB: Technology
Blooms: Remember
Learning Objective: 08-03 Define privacy and describe ways in which it can be threatened.
Level of Difficulty: 1 Easy
Topic: Privacy
57. _____ are types of hackers who break into other people's computer systems and
may just look around. They may steal credit card numbers or destroy
information, or otherwise do damage.

A. Zombies

B. White-hat hackers

C. Black-hat hackers

D. Drones

Hackers are generally knowledgeable computer users who use their knowledge
to invade other people's computers. They have varying motives. Black-hat
hackers break into other people's computer systems and may just look around,
or they may steal credit card numbers or destroy information, or otherwise do
damage.

AACSB: Ethics
AACSB: Technology
Blooms: Remember
Learning Objective: 08-04 Describe the ways in which information on your computer or network is vulnerable and list measures
you can take to protect it.
Level of Difficulty: 1 Easy
Topic: Security
58. _____ have philosophical and political reasons for breaking into systems and
often deface Web sites as a sign of protest.

A. Zombies

B. White-hat hackers

C. Hacktivists

D. Screenagers

Hackers are generally knowledgeable computer users who use their knowledge
to invade other people's computers. They have varying motives. Hacktivists have
philosophical and political reasons for breaking into systems. They often deface
a Web site as a protest.

AACSB: Ethics
AACSB: Technology
Blooms: Remember
Learning Objective: 08-04 Describe the ways in which information on your computer or network is vulnerable and list measures
you can take to protect it.
Level of Difficulty: 2 Medium
Topic: Security
59. A _____ floods a server or network with so many requests for service that it slows
down or crashes.

A. rootkit

B. denial-of-service attack

C. wiki

D. Trojan horse

A denial-of-service attack (DoS) floods a server or network with so many


requests for service that it slows down or crashes. The objective is to prevent
legitimate customers from accessing the target site.

AACSB: Ethics
AACSB: Technology
Blooms: Remember
Learning Objective: 08-04 Describe the ways in which information on your computer or network is vulnerable and list measures
you can take to protect it.
Level of Difficulty: 1 Easy
Topic: Security
60. A(n) ______ is hardware and/or software that protects a computer or a network
from intruders.

A. Web log

B. worm

C. firewall

D. public key

A firewall is hardware and/or software that protects a computer or network from


intruders. The firewall examines each message as it seeks entrance to the
network.

AACSB: Ethics
AACSB: Technology
Blooms: Remember
Learning Objective: 08-04 Describe the ways in which information on your computer or network is vulnerable and list measures
you can take to protect it.
Level of Difficulty: 1 Easy
Topic: Security
61. _____ refers to the use of physiological characteristics such as fingerprints, the
blood vessels in the iris of the eye, and the sound of one's voice to provide
identification.

A. Pharming

B. Biometrics

C. Intellectual property

D. Whaling

Biometrics is the use of physiological characteristics—such as your fingerprint,


the blood vessels in the iris of your eye, the sound of your voice, or perhaps
even your breath—to provide identification.

AACSB: Ethics
AACSB: Technology
Blooms: Remember
Learning Objective: 08-04 Describe the ways in which information on your computer or network is vulnerable and list measures
you can take to protect it.
Level of Difficulty: 1 Easy
Topic: Security
62. _____ is a way of protecting messages and files by scrambling the contents of a
file so that one cannot read it without having the right key.

A. Encryption

B. Feature creep

C. Biometrics

D. Encapsulation

Encryption scrambles the contents of a file so that you cannot read it without
having the right decryption key. There are various ways of encrypting messages.

AACSB: Ethics
AACSB: Technology
Blooms: Remember
Learning Objective: 08-04 Describe the ways in which information on your computer or network is vulnerable and list measures
you can take to protect it.
Level of Difficulty: 1 Easy
Topic: Security

True / False Questions


63. An ethical dilemma refers to the choice of whether or not to be ethical.

FALSE

Even the most ethical people must face the nearly inevitable dilemmas involving
choices between incompatible good outcomes and conflicting loyalties. An
ethical dilemma is not the choice of whether or not to be ethical. An ethical
dilemma is when one's responsibilities seem to lead in opposite directions.

AACSB: Ethics
Blooms: Remember
Learning Objective: 08-01 Define ethics and describe the two factors that affect how you make a decision concerning an ethical
issue.
Level of Difficulty: 1 Easy
Topic: Ethics

64. Intellectual property is defined as the principles and standards that guide our
behavior toward other people.

FALSE

Ethics can be defined as the principles and standards that guide our behavior
toward other people. One might add that ethics is also about the reasons we
give for thinking we ought to live one way rather than another, make one
decision rather than another, or opt for one policy over another.

AACSB: Ethics
Blooms: Remember
Learning Objective: 08-01 Define ethics and describe the two factors that affect how you make a decision concerning an ethical
issue.
Level of Difficulty: 1 Easy
Topic: Ethics

65. A factor that affects how one makes a decision when faced with an ethical
dilemma is one's basic ethical structure, which develops as one grows up.

TRUE

Two factors affect how one makes a decision when one is faced with an ethical
dilemma. The first is one's basic ethical structure, which develops as one grows
up. The second is the set of practical circumstances inevitably involved in the
decision that one is trying to make.

AACSB: Ethics
Blooms: Remember
Learning Objective: 08-01 Define ethics and describe the two factors that affect how you make a decision concerning an ethical
issue.
Level of Difficulty: 1 Easy
Topic: Ethics

66. Intellectual property refers to tangible creative work that is embodied in non-
physical form.

FALSE

Intellectual property is intangible creative work that is embodied in physical


form. Music, novels, paintings, and sculptures are all examples of intellectual
property.

AACSB: Ethics
Blooms: Remember
Learning Objective: 08-02 Define and describe intellectual property; copyright; Fair Use Doctrine; and pirated software.
Level of Difficulty: 1 Easy
Topic: Ethics

67. Copyright law completely forbids the use of intellectual property.

FALSE

Copyright law does not forbid the use of intellectual property completely. It has
some notable exceptions. For example, a TV program could show a video game
that a person developed without his/her permission. This would be an example
of the use of copyrighted material for the creation of new material, i.e., the TV
program. This is legal because it falls under the Fair Use Doctrine.

AACSB: Ethics
Blooms: Remember
Learning Objective: 08-02 Define and describe intellectual property; copyright; Fair Use Doctrine; and pirated software.
Level of Difficulty: 1 Easy
Topic: Ethics
68. In the United States, making a copy of copyrighted software for backup
purposes amounts to software piracy.

FALSE

It is illegal to copy copyrighted software. But there's one exception to that rule:
In the United States, you may always make one copy of copyrighted software for
backup purposes.

AACSB: Ethics
AACSB: Technology
Blooms: Understand
Learning Objective: 08-02 Define and describe intellectual property; copyright; Fair Use Doctrine; and pirated software.
Level of Difficulty: 2 Medium
Topic: Ethics

69. In order to monitor computer use, screen capture programs can be used to
capture every single screen that a user views.

FALSE

Screen capture programs periodically record what is on the screen. These


programs do not trap every single screen, just whatever is on the screen when
the capturing program activates.

AACSB: Ethics
AACSB: Technology
Blooms: Remember
Learning Objective: 08-03 Define privacy and describe ways in which it can be threatened.
Level of Difficulty: 2 Medium
Topic: Privacy
70. Log analysis is a monitoring tool that keeps track of logons, deletions, and so
forth.

TRUE

Tools for monitoring include packet sniffers that examine the information
passing by on switches, hubs, or routers, and log analysis tools that keep track
of logons, deletions, and so forth.

AACSB: Ethics
AACSB: Technology
Blooms: Remember
Learning Objective: 08-03 Define privacy and describe ways in which it can be threatened.
Level of Difficulty: 1 Easy
Topic: Privacy

71. Identity theft is often for financial gain, and the stolen identity is used to apply
for and use credit cards in the victim's name or to apply for loans.

TRUE

Identity theft is the forging of someone's identity for the purpose of fraud. The
fraud is often for financial gain, and the stolen identity is used to apply for and
use credit cards in the victim's name or to apply for loans. But it can also be
simply to disguise a real identity, particularly if the thief is hiding from law
enforcement or is running some sort of scam.

AACSB: Ethics
AACSB: Technology
Blooms: Remember
Learning Objective: 08-03 Define privacy and describe ways in which it can be threatened.
Level of Difficulty: 1 Easy
Topic: Privacy

72. Phishing is a technique which delays incoming e-mail messages for a long
period of time to defend one's computer against viruses and worms.

FALSE

Phishing (also called carding or brand spoofing) is a technique to gain personal


information for the purpose of identity theft, usually by means of fraudulent e-
mail. One way this is done is to send out e-mail messages that look as though
they came from legitimate businesses.

AACSB: Ethics
AACSB: Technology
Blooms: Remember
Learning Objective: 08-03 Define privacy and describe ways in which it can be threatened.
Level of Difficulty: 2 Medium
Topic: Privacy
73. Key logging refers to the rerouting of a person's request for a legitimate Web
site to a fake site which then collects information from the person.

FALSE

A more sophisticated variation on phishing is pharming, which is the rerouting


of a person's request for a legitimate Web site. A person may type in the correct
address for a bank and be redirected to a fake site that collects information
from the person.

AACSB: Ethics
AACSB: Technology
Blooms: Remember
Learning Objective: 08-03 Define privacy and describe ways in which it can be threatened.
Level of Difficulty: 2 Medium
Topic: Privacy

74. Pharming is accomplished by getting access to the giant databases that Internet
providers use to route Web traffic.

TRUE

Pharming is accomplished by getting access to the giant databases that Internet


providers use to route Web traffic. Once they have access, they can make little
changes so that people are diverted to the fake site either before or after they
access the real one. It works well because it is very hard to spot the fake site.

AACSB: Ethics
AACSB: Technology
Blooms: Remember
Learning Objective: 08-03 Define privacy and describe ways in which it can be threatened.
Level of Difficulty: 1 Easy
Topic: Privacy

75. A reason that companies monitor employees' e-mail is that they can be sued for
what their employees send to each other and to people outside the company.

TRUE

After you're hired, your employer can monitor where you go, what you do, what
you say, and what you write in e-mails—at least during working hours. One
reason that companies monitor employees' e-mail is that they can be sued for
what their employees send to each other and to people outside the company.

AACSB: Ethics
AACSB: Technology
Blooms: Remember
Learning Objective: 08-03 Define privacy and describe ways in which it can be threatened.
Level of Difficulty: 1 Easy
Topic: Privacy
76. A hardware key logger cannot capture backspaces and deletions.

FALSE

A hardware key logger is a hardware device that captures keystrokes on their


journey from the keyboard to the motherboard. These devices cannot capture
anything that is not typed, but they do capture every keystroke, including
backspace, delete, insert, and all the others.

AACSB: Ethics
AACSB: Technology
Blooms: Remember
Learning Objective: 08-03 Define privacy and describe ways in which it can be threatened.
Level of Difficulty: 2 Medium
Topic: Privacy
77. A unique cookie is one that started out as a common cookie, but the original
site sold access to it to a third party.

FALSE

A cookie can be used to track your Web activity. It can monitor and record what
sites you visit, how long you stay there, what Web pages you visited, what site
you came from and the next site you went to. This type of cookie is called a
unique cookie. A common cookie on the other hand, is one that started out as a
unique cookie, but the original site sold access to it to a third party that can
then change the cookie so that the third party can track the surfer's activity
across many sites.

AACSB: Ethics
AACSB: Technology
Blooms: Remember
Learning Objective: 08-03 Define privacy and describe ways in which it can be threatened.
Level of Difficulty: 2 Medium
Topic: Privacy

78. One way to block cookies is to set one's browser to accept or reject all cookies.

TRUE

There are two ways to block cookies. First, one can set the browser to accept or
reject all cookies. Second, one can get cookie management software with
additional options that are not available on one's browser.

AACSB: Ethics
AACSB: Technology
Blooms: Remember
Learning Objective: 08-03 Define privacy and describe ways in which it can be threatened.
Level of Difficulty: 1 Easy
Topic: Privacy

79. Spammers can penetrate through spam filters by including nonprinting


characters in their subject lines.

TRUE

A person can get spam filters to block out spam, but spammers are clever about
including nonprinting characters in their subject lines and addresses that fool
the filters into letting them pass.

AACSB: Ethics
AACSB: Technology
Blooms: Understand
Learning Objective: 08-03 Define privacy and describe ways in which it can be threatened.
Level of Difficulty: 2 Medium
Topic: Privacy
80. The CAN-Spam Act is an anti-spam law passed by the Federal Government
which bans spamming entirely.

FALSE

The CAN-Spam Act is an anti-spam law passed by the Federal Government


which sets down rules for spamming. It was widely criticized by anti-spam
activists as legitimizing spam, since it set down rules for spamming rather than
banning it altogether.

AACSB: Ethics
AACSB: Technology
Blooms: Remember
Learning Objective: 08-03 Define privacy and describe ways in which it can be threatened.
Level of Difficulty: 1 Easy
Topic: Privacy

81. Adware is software to generate ads that installs itself on your computer when
you download some other program from the Web.

TRUE

Adware is software to generate ads that installs itself on your computer when
you download some other (usually free) program from the Web. It is a type of
Trojan horse software.

AACSB: Ethics
AACSB: Technology
Blooms: Remember
Learning Objective: 08-03 Define privacy and describe ways in which it can be threatened.
Level of Difficulty: 1 Easy
Topic: Privacy

82. Spyware is a kind of software that blocks malicious software from entering one's
computer.

FALSE

Spyware is malicious software that collects information about a person and


his/her computer and reports it to someone without the person's permission.

AACSB: Ethics
AACSB: Technology
Blooms: Remember
Learning Objective: 08-03 Define privacy and describe ways in which it can be threatened.
Level of Difficulty: 1 Easy
Topic: Privacy

83. Without spyware, a Web site cannot tell a lot about its Web visitors.

FALSE

Even without spyware, a Web site can tell a lot about its Web visitors from its
Web log. A Web log consists of one line of information for every visitor to a
Web site and is usually stored on a Web server.

AACSB: Ethics
AACSB: Technology
Blooms: Understand
Learning Objective: 08-03 Define privacy and describe ways in which it can be threatened.
Level of Difficulty: 2 Medium
Topic: Privacy
84. Anonymous Web browsing (AWB) services help in hiding a person's identity
from the Web sites one visits.

TRUE

Anonymous Web browsing (AWB) services help in hiding a person's identity


from the Web sites one visits.

AACSB: Ethics
AACSB: Technology
Blooms: Remember
Learning Objective: 08-03 Define privacy and describe ways in which it can be threatened.
Level of Difficulty: 1 Easy
Topic: Privacy

85. The Homeland Security Act of 2002 sought to protect investors by improving
the accuracy and reliability of corporate disclosures.

FALSE

The Homeland Security Act of 2002 provided new authority to government


agencies to mine data on individuals and groups including e-mails and Web site
visits. It put limits on the information available under the Freedom of
Information Act and gave new powers to government agencies to declare
national heath emergencies.

AACSB: Ethics
AACSB: Technology
Blooms: Remember
Learning Objective: 08-03 Define privacy and describe ways in which it can be threatened.
Level of Difficulty: 2 Medium
Topic: Privacy

86. Hackers who have a philosophical or political message that they want to share
are called hacktivists.

TRUE

Hackers are generally knowledgeable computer users who use their knowledge
to invade other people's computers. They have varying motives and some just
do it for the fun of it. Others, known as hacktivists, have a philosophical or
political message that they want to share.

AACSB: Ethics
AACSB: Technology
Blooms: Remember
Learning Objective: 08-04 Describe the ways in which information on your computer or network is vulnerable and list measures
you can take to protect it.
Level of Difficulty: 1 Easy
Topic: Security
87. Black-hat hackers are known as the "good guys" who test the vulnerability of
systems so that protective measures may be taken.

FALSE

Hackers are generally knowledgeable computer users who use their knowledge
to invade other people's computers. They have varying motives and some just
do it for the fun of it. There are also "good guys," called white-hat hackers, who
test the vulnerability of systems so that protective measures may be taken.

AACSB: Ethics
AACSB: Technology
Blooms: Remember
Learning Objective: 08-04 Describe the ways in which information on your computer or network is vulnerable and list measures
you can take to protect it.
Level of Difficulty: 2 Medium
Topic: Security

88. A virus is software that is written with malicious intent to cause annoyance or
damage.

TRUE

A computer virus, also known as a virus, is software that is written with malicious
intent to cause annoyance or damage. It can be benign or malicious.

AACSB: Ethics
AACSB: Technology
Blooms: Remember
Learning Objective: 08-04 Describe the ways in which information on your computer or network is vulnerable and list measures
you can take to protect it.
Level of Difficulty: 1 Easy
Topic: Security

89. Benign viruses are the worst kinds of viruses as they have the capacity to
damage computers.

FALSE

A virus can be benign or malicious. The benign ones just display a message on
the screen or slow the computer down, but do not do any damage.

AACSB: Ethics
AACSB: Technology
Blooms: Remember
Learning Objective: 08-04 Describe the ways in which information on your computer or network is vulnerable and list measures
you can take to protect it.
Level of Difficulty: 1 Easy
Topic: Security

90. Script kiddies work at the request of the owners of computer systems, find
vulnerabilities in systems, and plug the holes.

FALSE

Script kiddies, or script bunnies, find hacking code on the Internet and click-
and-point their way into systems, to cause damage or spread viruses.

AACSB: Ethics
AACSB: Technology
Blooms: Remember
Learning Objective: 08-04 Describe the ways in which information on your computer or network is vulnerable and list measures
you can take to protect it.
Level of Difficulty: 2 Medium
Topic: Security

91. The objective of a denial-of-service attack is to prevent legitimate customers


from accessing the target site.

TRUE

A denial-of-service attack (DoS) floods a server or network with so many


requests for service that it slows down or crashes. The objective is to prevent
legitimate customers from accessing the target site.

AACSB: Ethics
AACSB: Technology
Blooms: Remember
Learning Objective: 08-04 Describe the ways in which information on your computer or network is vulnerable and list measures
you can take to protect it.
Level of Difficulty: 1 Easy
Topic: Security

92. A virus has the capacity to hurt the processor of a computer.

FALSE

A virus cannot hurt the hardware of a computer, such as the monitor, or


processor. They also cannot hurt any files they were not designed to attack.

AACSB: Ethics
AACSB: Technology
Blooms: Remember
Learning Objective: 08-04 Describe the ways in which information on your computer or network is vulnerable and list measures
you can take to protect it.
Level of Difficulty: 1 Easy
Topic: Security

93. A drawback of spam protection is that it may mark something as spam when it
is not.

TRUE

Spam protection is good to have, although it may let some spam through and
may mark something as spam when it is not.

AACSB: Ethics
AACSB: Technology
Blooms: Remember
Learning Objective: 08-04 Describe the ways in which information on your computer or network is vulnerable and list measures
you can take to protect it.
Level of Difficulty: 1 Easy
Topic: Security

94. Anti-phishing software protects a person from identity theft.

TRUE

Anti-phishing software protects a person from identity theft. Anti-phishing


toolbars warns a person when they arrive at a known phishing site.

AACSB: Ethics
AACSB: Technology
Blooms: Remember
Learning Objective: 08-04 Describe the ways in which information on your computer or network is vulnerable and list measures
you can take to protect it.
Level of Difficulty: 1 Easy
Topic: Security

95. A firewall examines each message as it seeks entrance to the network.

TRUE

A firewall is hardware and/or software that protects a computer or network from


intruders. The firewall examines each message as it seeks entrance to the
network.

AACSB: Ethics
AACSB: Technology
Blooms: Remember
Learning Objective: 08-04 Describe the ways in which information on your computer or network is vulnerable and list measures
you can take to protect it.
Level of Difficulty: 1 Easy
Topic: Security

Fill in the Blank Questions


96. A(n) _____ is when a person's responsibilities seem to lead in opposite
directions.

ethical dilemma

An ethical dilemma is not the choice of whether or not to be ethical. An ethical


dilemma is when one's responsibilities seem to lead in opposite directions.

AACSB: Ethics
Blooms: Remember
Learning Objective: 08-01 Define ethics and describe the two factors that affect how you make a decision concerning an ethical
issue.
Level of Difficulty: 1 Easy
Topic: Ethics

97. _____ are the principles and standards that guide our behavior toward other
people.

Ethics

Ethics can be defined as the principles and standards that guide our behavior
toward other people. One might add that ethics is also about the reasons we
give for thinking we ought to live one way rather than another, make one
decision rather than another, or opt for one policy over another.

AACSB: Ethics
Blooms: Remember
Learning Objective: 08-01 Define ethics and describe the two factors that affect how you make a decision concerning an ethical
issue.
Level of Difficulty: 1 Easy
Topic: Ethics
98. The _____ level of an individual's ethical structure consists of actions that are
serious ethical violations.

innermost

At the innermost level of an individual's ethical structure are ethical violations


that one would surely consider very serious, such as embezzling funds or selling
company records to a competitor.

AACSB: Ethics
Blooms: Remember
Learning Objective: 08-01 Define ethics and describe the two factors that affect how you make a decision concerning an ethical
issue.
Level of Difficulty: 1 Easy
Topic: Ethics

99. _____ refers to intangible creative work that is embodied in physical form.

Intellectual property

Intellectual property is intangible creative work that is embodied in physical


form. Music, novels, paintings, and sculptures are all examples of intellectual
property.

AACSB: Ethics
Blooms: Remember
Learning Objective: 08-02 Define and describe intellectual property; copyright; Fair Use Doctrine; and pirated software.
Level of Difficulty: 1 Easy
Topic: Ethics
100. _____ refers to the legal protection afforded to the expression of an idea, such as
a song, video game, and some types of proprietary documents.

Copyright

Copyright is the legal protection afforded to the expression of an idea, such as a


song, video game, and some types of proprietary documents. Having a
copyright means that no one can use the person's song, video game, or
proprietary documents without their permission.

AACSB: Ethics
Blooms: Remember
Learning Objective: 08-02 Define and describe intellectual property; copyright; Fair Use Doctrine; and pirated software.
Level of Difficulty: 1 Easy
Topic: Ethics

101. The _____ states that one may use copyrighted material in certain situations but
places a limit on the amount of the copyrighted material that one may use.

Fair Use Doctrine

The Fair Use Doctrine states that one may use copyrighted material in certain
situations but puts a limit on the amount of the copyrighted material that one
may use.

AACSB: Ethics
AACSB: Technology
Blooms: Remember
Learning Objective: 08-02 Define and describe intellectual property; copyright; Fair Use Doctrine; and pirated software.
Level of Difficulty: 1 Easy
Topic: Ethics

102. _____ refers to the unauthorized use, duplication, distribution, or sale of


copyrighted software.

Pirated software

Pirated software is the unauthorized use, duplication, distribution, or sale of


copyrighted software. Software piracy costs businesses billions of dollars a year
in lost revenue.

AACSB: Ethics
AACSB: Technology
Blooms: Remember
Learning Objective: 08-02 Define and describe intellectual property; copyright; Fair Use Doctrine; and pirated software.
Level of Difficulty: 1 Easy
Topic: Ethics

103. _____ refers to the right to be left alone when one wants to be, to have control
over one's own personal possessions, and not to be observed without one's
consent.

Privacy

Privacy is the right to be left alone when you want to be, to have control over
your own personal possessions, and not to be observed without your consent. It
is the right to be free of unwanted intrusion into your private life.

AACSB: Ethics
AACSB: Technology
Blooms: Remember
Learning Objective: 08-03 Define privacy and describe ways in which it can be threatened.
Level of Difficulty: 1 Easy
Topic: Privacy

104. _____ is a program that, when installed on a computer, records every keystroke
and mouse click.

Key logger

Key logger, or key trapper is a program that, when installed on a computer,


records every keystroke and mouse click. It records all e-mails, instant messages,
chat room exchanges, Web sites people visit, applications they run, and
passwords they type in on computers.

AACSB: Ethics
AACSB: Technology
Blooms: Remember
Learning Objective: 08-03 Define privacy and describe ways in which it can be threatened.
Level of Difficulty: 1 Easy
Topic: Privacy

105. _____ refers to the forging of someone's identity for the purpose of fraud.

Identity theft

Identity theft is the forging of someone's identity for the purpose of fraud. The
fraud is often for financial gain, and the stolen identity is used to apply for and
use credit cards in the victim's name or to apply for loans.

AACSB: Ethics
AACSB: Technology
Blooms: Remember
Learning Objective: 08-03 Define privacy and describe ways in which it can be threatened.
Level of Difficulty: 1 Easy
Topic: Privacy

106. Phishing is also known as ____.

carding/brand spoofing

Phishing is also called carding or brand spoofing. It is a technique to gain


personal information for the purpose of identity theft, usually by means of
fraudulent e-mail.

AACSB: Ethics
AACSB: Technology
Blooms: Remember
Learning Objective: 08-03 Define privacy and describe ways in which it can be threatened.
Level of Difficulty: 1 Easy
Topic: Privacy

107. _____ is phishing targeted at senior business executives, government leaders,


and other types of high-profile individuals.

Whaling

Whaling refers to the use of phishing targeted at senior business executives,


government leaders, and other types of high-profile individuals.

AACSB: Ethics
AACSB: Technology
Blooms: Remember
Learning Objective: 08-03 Define privacy and describe ways in which it can be threatened.
Level of Difficulty: 1 Easy
Topic: Privacy

108. A(n) _____ is a hardware device that captures keystrokes on their journey from
the keyboard to the motherboard.

hardware key logger

A hardware key logger is a hardware device that captures keystrokes on their


journey from the keyboard to the motherboard. These devices can be in the
form of a connector on the system-unit end of the cable between the keyboard
and the system unit.

AACSB: Ethics
AACSB: Technology
Blooms: Remember
Learning Objective: 08-03 Define privacy and describe ways in which it can be threatened.
Level of Difficulty: 1 Easy
Topic: Privacy
109. A(n) _____ is a small file that contains information about you and your Web
activities, which a Web site you visit places on your computer.

cookie

The basic tool of consumer Web monitoring is the cookie. A cookie is a small file
that contains information about a person and their Web activities, which a Web
site the person visits places on their computer.

AACSB: Ethics
AACSB: Technology
Blooms: Remember
Learning Objective: 08-03 Define privacy and describe ways in which it can be threatened.
Level of Difficulty: 1 Easy
Topic: Privacy

110. A(n) _____ is a cookie that started out as a unique cookie, but the original site
sold access to it to a third party, that can then change the cookie so that the
third party can track the surfer's activity across many sites.

common cookie

A common cookie is a cookie that started out as a unique cookie, but the
original site sold access to it to a third party, that can then change the cookie so
that the third party can track the surfer's activity across many sites. The third
party collects information about surfers without names or other identifiable
personal information.

AACSB: Ethics
AACSB: Technology
Blooms: Remember
Learning Objective: 08-03 Define privacy and describe ways in which it can be threatened.
Level of Difficulty: 1 Easy
Topic: Privacy

111. _____ is unsolicited e-mail from businesses that advertise goods and services.

Spam

Spam is unsolicited e-mail (electronic junk mail) from businesses that advertise
goods and services. Often spam mass mailings advertise pornography, get-rich-
quick schemes, and miracle cures.

AACSB: Ethics
AACSB: Technology
Blooms: Remember
Learning Objective: 08-03 Define privacy and describe ways in which it can be threatened.
Level of Difficulty: 1 Easy
Topic: Privacy
112. _____ is software to generate advertisements that installs itself on a person's
computer when they download some other program from the Web.

Adware

Adware is software to generate ads that installs itself on your computer when
you download some other (usually free) program from the Web. For instance,
when a person downloads a game or other software from the Web for free, they
may notice that it came with banner ads. These ads are collectively known as
adware.

AACSB: Ethics
AACSB: Technology
Blooms: Remember
Learning Objective: 08-03 Define privacy and describe ways in which it can be threatened.
Level of Difficulty: 1 Easy
Topic: Privacy

113. _____ is malicious software that collects information about a person and their
computer and reports it to someone without their permission.

Spyware

Spyware is also called sneakware or stealthware. It refers to malicious software


that collects information about a person and their computer and reports it to
someone without their permission.

AACSB: Ethics
AACSB: Technology
Blooms: Remember
Learning Objective: 08-03 Define privacy and describe ways in which it can be threatened.
Level of Difficulty: 1 Easy
Topic: Privacy

114. A(n) _____ consists of one line of information for every visitor to a Web site and
is usually stored on a Web server.

Web log

A Web log consists of one line of information for every visitor to a Web site and
is usually stored on a Web server. At the very least, a Web log can provide a
Web site company with a record of your clickstream.

AACSB: Ethics
AACSB: Technology
Blooms: Remember
Learning Objective: 08-03 Define privacy and describe ways in which it can be threatened.
Level of Difficulty: 1 Easy
Topic: Privacy
115. A(n) _____ records information about a person during a Web surfing session
such as what Web sites the person visited, how long they were there, what ads
they looked at, and what they purchased.

clickstream

A clickstream records information about a person during a Web surfing session


such as what Web sites the person visited, how long they were there, what ads
they looked at, and what they purchased. If, as a consumer, one wants to
protect information about their surfing habits, they can use various software
packages to do so.

AACSB: Ethics
AACSB: Technology
Blooms: Remember
Learning Objective: 08-03 Define privacy and describe ways in which it can be threatened.
Level of Difficulty: 1 Easy
Topic: Privacy

116. In addition to cookie management software, a person can use _____ services to
hide their identity from the Web sites they visit.

anonymous Web browsing (AWB)

Apart from cookie management software, one can avail anonymous Web
browsing (AWB) services, which, in effect, hide a person's identity from the Web
sites they visit.

AACSB: Ethics
AACSB: Technology
Blooms: Remember
Learning Objective: 08-03 Define privacy and describe ways in which it can be threatened.
Level of Difficulty: 1 Easy
Topic: Privacy

117. The _____ allows law enforcement to get access to almost any information,
including library records, video rentals, bookstore purchases, and business
records when investigating any act of terrorism or hostile intelligence activities.

USA Patriot Act, 2001 and 2003

The USA Patriot Act, 2001 and 2003, allows law enforcement to get access to
almost any information, including library records, video rentals, bookstore
purchases, and business records when investigating any act of terrorism or
hostile intelligence activities. In 2003, Patriot II broadened the original law.

AACSB: Ethics
AACSB: Technology
Blooms: Remember
Learning Objective: 08-03 Define privacy and describe ways in which it can be threatened.
Level of Difficulty: 1 Easy
Topic: Privacy
118. The _____ sought to regulate interstate commerce by imposing limitations and
penalties on businesses sending unsolicited e-mail to consumers.

CAN-Spam Act, 2003

The CAN-Spam Act, 2003, sought to regulate interstate commerce by imposing


limitations and penalties on businesses sending unsolicited e-mail to consumers.
The law forbids deceptive subject lines, headers, return addresses, etc., as well as
harvesting e-mail addresses from Web sites. It requires businesses that send
spam to maintain a do-not-spam list and to include a postal mailing address in
the message.

AACSB: Ethics
AACSB: Technology
Blooms: Remember
Learning Objective: 08-03 Define privacy and describe ways in which it can be threatened.
Level of Difficulty: 1 Easy
Topic: Privacy

119. _____ are knowledgeable computer users who use their knowledge to invade
other people's computers and have varying motives behind their actions.

Hackers

Hackers are generally knowledgeable computer users who use their knowledge
to invade other people's computers. They have varying motives. Some just do it
for the fun of it.

AACSB: Ethics
AACSB: Technology
Blooms: Remember
Learning Objective: 08-04 Describe the ways in which information on your computer or network is vulnerable and list measures
you can take to protect it.
Level of Difficulty: 1 Easy
Topic: Security

120. A(n) _____ is a type of virus that spreads itself, not just from file to file, but from
computer to computer via e-mail and other Internet traffic.

worm

A worm is a type of virus that spreads itself, not just from file to file, but from
computer to computer via e-mail and other Internet traffic. It finds your e-mail
address book and helps itself to the addresses and sends itself to your contacts,
using your e-mail address as the return address.

AACSB: Ethics
AACSB: Technology
Blooms: Remember
Learning Objective: 08-04 Describe the ways in which information on your computer or network is vulnerable and list measures
you can take to protect it.
Level of Difficulty: 1 Easy
Topic: Security
121. Of the various types of hackers, _____ have philosophical and political reasons
for breaking into systems. They often deface a Web site as a protest.

hacktivists

Hacktivists have philosophical and political reasons for breaking into systems.
They often deface a Web site as a protest.

AACSB: Ethics
AACSB: Technology
Blooms: Remember
Learning Objective: 08-04 Describe the ways in which information on your computer or network is vulnerable and list measures
you can take to protect it.
Level of Difficulty: 1 Easy
Topic: Security

122. _____ break into other people's computer systems and may just look around, or
they may steal credit card numbers or destroy information, or otherwise do
damage.

Black-hat hackers

Black-hat hackers break into other people's computer systems and may just look
around, or they may steal credit card numbers or destroy information, or
otherwise do damage.

AACSB: Ethics
AACSB: Technology
Blooms: Remember
Learning Objective: 08-04 Describe the ways in which information on your computer or network is vulnerable and list measures
you can take to protect it.
Level of Difficulty: 1 Easy
Topic: Security

123. A(n) _____ floods a server or network with so many requests for service that it
slows down or crashes.

denial-of-service attack (DoS)

A denial-of-service attack (DoS) floods a server or network with so many


requests for service that it slows down or crashes. The objective is to prevent
legitimate customers from accessing the target site.

AACSB: Ethics
AACSB: Technology
Blooms: Remember
Learning Objective: 08-04 Describe the ways in which information on your computer or network is vulnerable and list measures
you can take to protect it.
Level of Difficulty: 1 Easy
Topic: Security

124. A(n) _____ is hardware and/or software that protects a computer or network
from intruders.

firewall

A firewall is hardware and/or software that protects a computer or network from


intruders. The firewall examines each message as it seeks entrance to the
network.

AACSB: Ethics
AACSB: Technology
Blooms: Remember
Learning Objective: 08-04 Describe the ways in which information on your computer or network is vulnerable and list measures
you can take to protect it.
Level of Difficulty: 1 Easy
Topic: Security

125. _____ is the use of physiological characteristics such as fingerprints, the blood
vessels in the iris of the eye, the sound of a person's voice, or perhaps even
breath, to provide identification.

Biometrics

Biometrics is the use of physiological characteristics such as fingerprint, the


blood vessels in the iris of the eye, the sound of a person's voice, or perhaps
even breath, to provide identification. Roughly, a dozen different types of
biometric devices are available at the moment, with fingerprint readers being
the most popular.

AACSB: Ethics
AACSB: Technology
Blooms: Remember
Learning Objective: 08-04 Describe the ways in which information on your computer or network is vulnerable and list measures
you can take to protect it.
Level of Difficulty: 1 Easy
Topic: Security
126. _____ scrambles the contents of a file so that you cannot read it without having
the right decryption key.

Encryption

Encryption scrambles the contents of a file so that you cannot read it without
having the right decryption key. There are various ways of encrypting messages.
You can switch the order of the characters, replace characters with other
characters, or insert or remove characters.

AACSB: Ethics
AACSB: Technology
Blooms: Remember
Learning Objective: 08-04 Describe the ways in which information on your computer or network is vulnerable and list measures
you can take to protect it.
Level of Difficulty: 1 Easy
Topic: Security

Vous aimerez peut-être aussi