A Gift of Fire Social Legal and Ethical Issues for Computing Technology 4th Edition – Test Bank


Complete Test Bank With Answers




Sample Questions Posted Below






Chapter 5

  1. a. Briefly define identity theft.
  2. Describe two techniques criminals can use to gather the information they need to steal an identity.
  3. Describe two ways a person can protect their identity.
  4. Describe two ways a business can protect its customers from identity thieves.


  1. In the context of Internet content that some countries prohibit, discuss how the “responsibility to prevent access” differs from the “authority to prevent entry”. Include examples.



Chapter 5

denial-of-service (DOS) an attack in which hackers overload a target site with requests for information.


hactivism hacking to promote a political cause


honey pots Web sites that are specifically designed to be attractive to hackers


phishing sending millions of emails fishing for information to use to impersonate someone and steal money or goods


pharming planting false Internet addresses in the tables on a Domain Name Server (DNS) so that when someone types a URL, they are re-directed to a bogus site
biometrics biological characteristics that are unique to an individual


libel written defamation


slander verbal defamation


CFAA a law which covers unauthorized access to computers over which the federal government has jurisdiction, such as government  computers, financial  systems, medical systems, and activities that involve computers in more than one state




Chapter 5

  1. Which of the following is an example of biometrics:

(a) DNA

(b) Fingerprints

(c) Voice prints

(d) All of the above

Correct answer: d – pg 257-258


  1. In the early days of computing (1960’s to the early 1970’s), a “hacker” was:

(a) An incompetent programmer who wrote programs that did not work properly

(b) A busy programmer who reused code to save time

(c) A creative programmer who wrote very elegant or clever programs

(d) A new programmer who wrote simple programs

Correct answer: c – pg 231


  1. Hacktivism is:

(a) A political activist group promoting tougher anti-hacking laws

(b) The counter-hacking techniques used by the FBI and other law enforcement agencies

(c) The use of hacking to promote a political cause

(d) A newsletter for hackers

Correct answer: c – pg 236


  1. Web sites that look attractive to hackers, but are closely monitored so that everything the hacker does at the site is recorded and studied are known as:

(a) Honey pots

(b) Digital surveillance

(c) Computer entrapment

(d) Hacker crackdown

Correct answer: a – pg 246


  1. Which of the following is NOT a program used by hackers to gain access to your computer:

(a) Keyloggers

(b) Trojans

(c) Rootkits

(d) Honey pots

Correct answer: d – pg 246


  1. In 2000, a French court ordered Yahoo! to block access by French people to

(a) Web sites containing pornography

(b) an Al Qaeda training manual

(c) online auction sites containing Nazi materials

(d) a Web site containing instructions for making bombs

Correct answer: c – pg 260-261





Chapter 5

  1. Give two ways to identify an email as a phishing attempt
  2. How did the USA PATRIOT Act expand the Computer Fraud and Abuse Act?
  3. What are two significant issues raised by the Stuxnet worm, which damaged equipment in a uranium enrichment plant in Iran?
  4. Why is “harmless hacking” not harmless?
  5. Give arguments for and against hiring former hackers to enhance security.



Chapter 5

______ The government cannot monitor online activity of suspected hackers without a court order. (F)


______ Computer forensics specialists cannot recover deleted files from an erased disk. (F)


There are no reviews yet.

Add a review

Be the first to review “A Gift of Fire Social Legal and Ethical Issues for Computing Technology 4th Edition – Test Bank”

Your email address will not be published. Required fields are marked *

  • No products in the cart.