A Gift of Fire Social Legal and Ethical Issues for Computing Technology 4th Edition – Test Bank

$15.00

Pay And Download 

Complete Test Bank With Answers

 

 

Sample Questions Posted Below

 

Chapter 5

1. Which of the following is an example of biometrics:

(a) DNA

(b) Fingerprints

(c) Voice prints

(d) All of the above

Correct answer: d – pg 257-258

2. In the early days of computing (1960’s to the early 1970’s), a “hacker” was:

(a) An incompetent programmer who wrote programs that did not work properly

(b) A busy programmer who reused code to save time

(c) A creative programmer who wrote very elegant or clever programs

(d) A new programmer who wrote simple programs

Correct answer: c – pg 231

3. Hacktivism is:

(a) A political activist group promoting tougher anti-hacking laws

(b) The counter-hacking techniques used by the FBI and other law enforcement agencies

(c) The use of hacking to promote a political cause

(d) A newsletter for hackers

Correct answer: c – pg 236

4. Web sites that look attractive to hackers, but are closely monitored so that everything the hacker does at the site is recorded and studied are known as:

(a) Honey pots

(b) Digital surveillance

(c) Computer entrapment

(d) Hacker crackdown

Correct answer: a – pg 246

5. Which of the following is NOT a program used by hackers to gain access to your computer:

(a) Keyloggers 

(b) Trojans 

(c) Rootkits 

(d) Honey pots

Correct answer: d – pg 246

6. In 2000, a French court ordered Yahoo! to block access by French people to

(a) Web sites containing pornography

(b) an Al Qaeda training manual

(c) online auction sites containing Nazi materials

(d) a Web site containing instructions for making bombs

Correct answer: c – pg 260-261 

 

Chapter 5

______ The government cannot monitor online activity of suspected hackers without a court order. (F)

______ Computer forensics specialists cannot recover deleted files from an erased disk. (F)

 

Chapter 5

1. Give two ways to identify an email as a phishing attempt

2. How did the USA PATRIOT Act expand the Computer Fraud and Abuse Act?

3. What are two significant issues raised by the Stuxnet worm, which damaged equipment in a uranium enrichment plant in Iran?

4. Why is “harmless hacking” not harmless?

5. Give arguments for and against hiring former hackers to enhance security.

 

Chapter 5

denial-of-service (DOS) an attack in which hackers overload a target site with requests for information.
hactivism hacking to promote a political cause
honey pots Web sites that are specifically designed to be attractive to hackers
phishing sending millions of emails fishing for information to use to impersonate someone and steal money or goods
pharming planting false Internet addresses in the tables on a Domain Name Server (DNS) so that when someone types a URL, they are re-directed to a bogus site
biometrics biological characteristics that are unique to an individual
libel written defamation
slander verbal defamation
CFAA   a law which covers unauthorized access to computers over which the federal government has jurisdiction, such as government  computers, financial  systems, medical systems, and activities that involve computers in more than one state 
Category:
Updating…
  • No products in the cart.