BUSINESS DRIVEN TECHNOLOGY 7Th Edition By PAIGE BALTZAN – TEST BANK

$20.00

Pay And Download
Complete Test Bank With Answers
 
 
Sample Questions Posted Below

 

 

 

 

Chapter 05

Organizational Structures That Support Strategic Initiatives

 

True / False Questions

1. Ethics and security are two fundamental building blocks for all organizations.

True    False

 

2. Privacy is the legal protection afforded an expression of an idea, such as a song, book, or video game.

True    False

 

3. Information governance is a method or system of government for information management or control.

True    False

 

4. Confidentiality is the right to be left alone when you want to be, to have control over your own personal possessions, and not to be observed without your consent.

True    False

 

5. Digital rights management is a technological solution that allows publishers to control their digital media to discourage, limit, or prevent illegal copying and distribution.

True    False

 

6. The Child Online Protection Act was passed to protect minors from accessing inappropriate material on the Internet.

True    False

 

7. Counterfeit software is the unauthorized use, duplication, distribution, or sale of copyrighted software.

True    False

 

8. Pirated software is software that is manufactured to look like the real thing and sold as such.

True    False

 

9. A patent is the legal protection afforded an expression of an idea, such as a song, book, or video game.

True    False

 

10. Intellectual property is intangible creative work that is embodied in physical form and includes copyrights, trademarks, and patents.

True    False

 

11. Copyright is an exclusive right to make, use, and sell an invention and is granted by a government to the inventor.

True    False

 

12. Information management examines the organizational resource of information and regulates its definitions, uses, value, and distribution ensuring it has the types of data/information required to function and grow effectively.

True    False

 

13. Information compliance is the act of conforming, acquiescing, or yielding information.

True    False

 

14. Information property is an ethical issue that focuses on who owns information about individuals and how information can be sold and exchanged.

True    False

 

15. Information secrecy is an ethical issue that focuses on who owns information about individuals and how information can be sold and exchanged.

True    False

 

16. Information secrecy is the category of computer security that addresses the protection of data from unauthorized disclosure and confirmation of data source authenticity.

True    False

 

17. Information property is the category of computer security that addresses the protection of data from unauthorized disclosure and confirmation of data source authenticity.

True    False

 

18. Spyware is software that, while purporting to serve some useful function and often fulfilling that function, also allows Internet advertisers to display advertisements without the consent of the computer user.

True    False

 

19. The Trojan-horse virus hides inside other software, usually as an attachment or a downloadable file.

True    False

 

20. Information security is a broad term encompassing the protection of information from accidental or intentional misuse by persons inside or outside an organization.

True    False

 

21. Two of the common forms of viruses discussed in the book include the Trojan-horse virus and the acceptance-of-service attack.

True    False

 

22. A hacker weapon called a splog (spam blog) is a fake blog created solely to raise the search engine rank of affiliated websites.

True    False

 

23. Information security is a high priority for protection of the company’s information and it is critical to implement an information security procedure to combat misuse of this information.

True    False

 

24. Smoking areas are targeted by hackers as they regularly use smoking entrances to enter the building where they pose as employees to gain access to the company network.

True    False

 

25. Downtime refers to a period of time when a system is unavailable, and unplanned downtime can strike at any time for various reasons.

True    False

 

26. Drive-by hacking is a computer attack where an attacker accesses a wireless computer network, intercepts data, uses network services, and/or sends attack instructions without entering the office or organization that owns the network.

True    False

 

27. White-hat hackers break into other people’s computer systems and may just look around or may steal and destroy information.

True    False

 

28. Black-hat hackers work at the request of the system owners to find system vulnerabilities and plug the holes.

True    False

 

29. Ransomware is a form of malicious software that infects your computer and asks for money.

True    False

 

30. Simplelocker is a new ransomware program that encrypts your personal files and demands payment for the files’ decryption keys.

True    False

 

31. A worm is a form of malicious software that infects your computer and asks for money.

True    False

 

32. A worm spreads itself not only from file to file but also from computer to computer.

True    False

 

33. Script-kiddies have criminal intent when hacking.

True    False

 

34. Cyberterrorists seek to cause harm to people or to destroy critical systems or information and use the Internet as a weapon of mass destruction.

True    False

 

35. White-hat hackers have philosophical and political reasons for breaking into systems and will often deface the website as a protest.

True    False

 

36. Script kiddies or script bunnies find hacking code on the Internet and click-and-point their way into systems to cause damage or spread viruses.

True    False

 

37. Worm spreads itself, not only from file to file, but also from computer to computer. The primary difference between a virus and a worm is that a virus must attach to something, such as an executable file, to spread. Worms do not need to attach to anything to spread and can tunnel themselves into computers.

True    False

 

38. Backdoor programs change their form as they propagate.

True    False

 

39. Backdoor programs open a way into the network for future attacks.

True    False

 

40. Denial-of-service attack (DoS) floods a website with so many requests for service that it slows down or crashes the site.

True    False

 

 

Multiple Choice Questions

41. Which of the following represents the two fundamental building blocks that protect organizational information?

A. Security and sales

 

B. Human resources and security

 

C. Ethics and security

 

D. Ethics and technology

 

42. What is the legal protection afforded an expression of an idea, such as a song, book, or video game?

A. Privacy

 

B. Confidentiality

 

C. Intellectual property

 

D. Copyright

 

43. What is intangible creative work that is embodied in physical form and includes trademarks and patents?

A. Intellectual software

 

B. Intellectual property

 

C. Trademark property

 

D. Ethical property

 

44. Trust between companies, customers, partners, and suppliers is the support structure of which of the following?

A. Ebusiness

 

B. Eharmony

 

C. Esoftware

 

D. Epolicies

 

45. In relation to privacy, which of the following is the assurance that messages and information remain available only to those authorized to view them?

A. Contentment

 

B. Ethical standard

 

C. Confidentiality

 

D. Firewall security

 

46. Which of the following key terms represents the principles and standards that guide our behavior toward other people?

A. Ethics

 

B. Intellectual property

 

C. Standards of living

 

D. Security

 

47. What is the difference between pirated and counterfeit software?

A. Counterfeit refers to fake technology products, whereas pirated refers to invisible technological cameras placed online.

 

B. Pirated refers to the unauthorized use, duplication, distribution, or sale of copyrighted software, whereas counterfeit refers to software that is manufactured to look like the real thing and sold as such.

 

C. Counterfeit refers to the unauthorized use, duplication, distribution, or sale of copyrighted software, whereas pirated refers to software manufactured to look like the real thing and sold as such.

 

D. Pirated refers to stolen software used to hack into a company’s classified material, whereas counterfeit refers to a fake version of firewall software.

 

48. Which of the following governs the ethical and moral issues arising from the development and use of information technologies, and the creation, collection, duplication, distribution, and processing of information?

A. Ethical information

 

B. Information technology

 

C. Information policies

 

D. Information ethics

 

49. Which of the following means the right to be left alone when you want to be, to have control over your personal possessions, and to not be observed without your consent?

A. Safety

 

B. Ethical standard

 

C. Privacy

 

D. Confidentiality

 

50. Determining what is ethical can sometimes be difficult because certain actions can be justified or condemned depending on how you view the relationship between ___________.

A. Legal and confidential

 

B. Legal and ethical

 

C. Legal and technical

 

D. Confidential and open

 

51. What is a technological solution that allows publishers to control their digital media to discourage, limit, or prevent illegal copying and distribution?

A. Digital rights management

 

B. Counterfeit software

 

C. Privacy

 

D. Pirated software

 

52. Which of the following examines the organizational resource of information and regulates its definitions, uses, value, and distribution ensuring it has the types of data or information required to function and grow effectively?

A. Information code

 

B. Information technology

 

C. Information management

 

D. Information governance

 

53. Sophie Black works as a computer programmer for a software company. Her boss, Mike Jones, is responsible for developing a new software game for the Wii. After completion of the project, Mike gives all of the team members a free copy of the game without consent from the company. Sophie is a little hesitant and unsure about accepting the game because legally it would be considered _________.

A. Counterfeit software

 

B. Pirated software

 

C. Ethical software

 

D. Governance software

 

54. What is the method or system of government for information management or control?

A. Information management

 

B. Information compliance

 

C. Information governance

 

D. Information secrecy

 

55. What is the category of computer security that addresses the protection of data from unauthorized disclosure and confirmation of data source authenticity?

A. Information management

 

B. Information compliance

 

C. Information secrecy

 

D. Information ethics

 

56. Which of the following represents the definition of information property?

A. An ethical issue that focuses on who owns information about individuals and how information can be sold and exchanged.

 

B. A method or system of government for information management or control.

 

C. The category of computer security that addresses the protection of data from unauthorized disclosure and confirmation of data source authenticity.

 

D. The organizational resource of information and the regulation of its definitions, uses, values, and distribution to ensure that the organization has the types of data/information required to function and grow effectively.

 

57. Which of the following represents the definition of information governance?

A. The act of conforming, acquiescing, or yielding information.

 

B. A method or system of government for information management or control.

 

C. The category of computer security that addresses the protection of data from unauthorized disclosure and confirmation of data source authenticity.

 

D. The examination of an organization’s resource of information and the regulation of its definitions, uses, values, and distribution to ensure that the organization has the types of data/information required to function and grow effectively.

 

58. Which of the below represents the definition of information secrecy?

A. The act of conforming, acquiescing, or yielding information.

 

B. A method or system of government for information management or control.

 

C. The category of computer security that addresses the protection of data from unauthorized disclosure and confirmation of data source authenticity.

 

D. The regulation of the definitions, uses, values, and distribution of the organization’s resource of information to ensure that the organization has the types of data/information required to function and grow effectively.

 

59. Which of the below represents the definition of information management?

A. The act of conforming, acquiescing, or yielding information.

 

B. A method or system of government for information management or control.

 

C. The protection of data from unauthorized disclosure and confirmation of data source authenticity.

 

D. The examination of an organization’s resource of information and the regulation of its definitions, uses, values, and distribution to ensure that the organization has the types of data/information required to function and grow effectively.

 

60. Which of the below represents the definition of information compliance?

A. The act of conforming, acquiescing, or yielding information.

 

B. A method or system of government for information management or control.

 

C. Information secrecy is the category of computer security that addresses the protection of data from unauthorized disclosure and confirmation of data source authenticity.

 

D. The organization’s resource of information and regulation of its definitions, uses, values, and distribution to ensure that the organization has the types of data/information required to function and grow effectively.

 

61. Which of the following represents the definition of information compliance?

A. The act of conforming, acquiescing, or yielding information.

 

B. The ability to comply with software.

 

C. The understanding of technology.

 

D. The verbalization of information governance in a company’s policies and procedures.

 

62. Which of the following serves as key evidence in many legal cases today and also provides a faster, easier way to search and organize paper documents?

A. Confidentiality

 

B. Digital information

 

C. Privacy policies

 

D. Information ethics

 

63. Which of the following refers to the ability of a company to identify, search, gather, seize, or export digital information in responding to a litigation, audit, investigation, or an information inquiry?

A. Eauthorization

 

B. Emanagement

 

C. Ediscovery

 

D. Epolicies

 

64. In the information technology world, which of the following are examples of ethical issues that a company may have to manage?

A. Employees copying and distributing company owned software.

 

B. Employees searching other employee’s private information without consent.

 

C. Employees intentionally creating or spreading viruses to confuse IT.

 

D. All of these.

 

65. As the president of a local trade company, Kristin is faced with leadership, ethical, and operational decisions on a daily basis. Kristen’s responsibilities include examining the organizational resource of information and regulating its definitions, uses, value, and distribution to ensure the company has the types of information required to function and grow effectively. What is Kristin overseeing for the company?

A. Information codes

 

B. Information management

 

C. Information deployment

 

D. Information security

 

66. What is intangible creative work that is embodied in physical form and includes copyrights, trademarks, and patents?

A. Ethics

 

B. Intellectual property

 

C. Privacy

 

D. Confidentiality

 

67. Which of the following describes privacy?

A. The assurance that messages and data are available only to those who are authorized to view them.

 

B. Policies and procedures that address the ethical use of computers and Internet usage in the business environment.

 

C. The right to be left alone when you want to be, to have control over your own personal possessions, and to not be observed without your consent.

 

D. The principles and standards that guide our behavior toward other people.

 

68. Which of the following is an example of acting ethically?

A. Individuals copy, use, and distribute software.

 

B. Employees search organizational databases for sensitive corporate and personal information.

 

C. Individuals hack into computer systems to steal proprietary information.

 

D. None of these offers an example of acting ethically

 

69. Which of the following describes confidentiality?

A. The assurance that messages and information are available only to those who are authorized to view them.

 

B. Policies and procedures that address the ethical use of computers and Internet usage in the business environment.

 

C. The right to be left alone when you want to be, to have control over your own personal possessions, and to not be observed without your consent.

 

D. The principles and standards that guide our behavior toward other people.

 

70. What refers to the ability of a company to identify, search, gather, seize, or export digital information in responding to a litigation, audit, investigation, or information inquiry?

A. Ediscovery

 

B. Child Online Protection Act

 

C. Digital rights management

 

D. Pirated software

 

71. What was passed to protect minors from accessing inappropriate material on the Internet?

A. Ediscovery

 

B. Child Online Protection Act

 

C. Digital rights management

 

D. Pirated software

 

72. What is a technological solution that allows publishers to control their digital media to discourage, limit, or prevent illegal copying and distribution?

A. Ediscovery

 

B. Child Online Protection Act

 

C. Digital rights management

 

D. Pirated software

 

73. What is the unauthorized use, duplication, distribution, or sale of copyrighted software?

A. Ediscovery

 

B. Child Online Protection Act

 

C. Digital rights management

 

D. Pirated software

 

74. What is ediscovery?

A. The unauthorized use, duplication, distribution, or sale of copyrighted software.

 

B. The ability of a company to identify, search, gather, seize, or export digital information in responding to a litigation, audit, investigation, or information inquiry.

 

C. A law passed to protect minors from accessing inappropriate material on the Internet.

 

D. A technological solution that allows publishers to control their digital media to discourage, limit, or prevent illegal copying and distribution.

 

75. What is the Child Online Protection Act?

A. The unauthorized use, duplication, distribution, or sale of copyrighted software.

 

B. Refers to the ability of a company to identify, search, gather, seize, or export digital information in responding to a litigation, audit, investigation, or information inquiry.

 

C. A law passed to protect minors from accessing inappropriate material on the Internet.

 

D. A technological solution that allows publishers to control their digital media to discourage, limit, or prevent illegal copying and distribution.

 

76. What is digital rights management?

A. The unauthorized use, duplication, distribution, or sale of copyrighted software.

 

B. The ability of a company to identify, search, gather, seize, or export digital information in responding to a litigation, audit, investigation, or information inquiry.

 

C. Law passed to protect minors from accessing inappropriate material on the Internet.

 

D. A technological solution that allows publishers to control their digital media to discourage, limit, or prevent illegal copying and distribution.

 

77. What is pirated software?

A. The unauthorized use, duplication, distribution, or sale of copyrighted software.

 

B. The ability of a company to identify, search, gather, seize, or export digital information in responding to a litigation, audit, investigation, or information inquiry.

 

C. A law passed to protect minors from accessing inappropriate material on the Internet.

 

D. A technological solution that allows publishers to control their digital media to discourage, limit, or prevent illegal copying and distribution.

 

78. Which of the following refers to a period of time when a system is unavailable?

A. Downtime

 

B. MIS down

 

C. Direct data loss

 

D. Downtown

 

79. Which of the following is not an example of unplanned downtime?

A. Power outages

 

B. Tornados

 

C. A system upgrade

 

D. Network failure

 

80. Which of the following is a cost of downtime in addition to lost revenue?

A. Legal expenses

 

B. Loss in financial performance

 

C. Damage to reputation

 

D. All of these

 

81. A company should be able to calculate the cost of downtime by which of the following?

A. Per hour, per day, and per week

 

B. Per employee, per computer, and per company

 

C. Per stock, per stockholder, and per investment capital

 

D. None of these

 

82. Which category of the cost of downtime includes equipment rental, overtime costs, and travel expenses?

A. Fiscal responsibility

 

B. Damaged reputation

 

C. Other expenses

 

D. Regeneration quadrant

 

83. Jensen is a senior developer for HackersRUs, a company that helps secure management information systems. Jensen’s new task is to break into the computer system of one of HackersRUs’ top clients to identify system vulnerabilities and plug the holes. What type of hacker is Jensen?

A. Cracker

 

B. White-hat hacker

 

C. Script bunnies

 

D. Black-hat hacker

 

84. Which of the following defines information security?

A. A broad term encompassing the protection of information.

 

B. Protection of information from accidental misuse.

 

C. Protection of information from intentional misuse.

 

D. All of these

 

85. What are experts in technology who use their knowledge to break into computers and networks for profit or just as a challenge known as?

A. Elevation of privilege

 

B. Virus

 

C. Hacker

 

D. Worm

 

86. What is a hacker who breaks into other people’s computer systems and may just look around or steal and destroy information?

A. Script kiddies

 

B. Black-hat hacker

 

C. White-hat hacker

 

D. Cracker

 

87. Which of the following is the correct list of the six different types of hackers listed in your text?

A. Black-hat, cracker, cyberterrorist, hactivist, script kiddies, and white-hat hackers

 

B. Black-top, cookie, script kids, environment, Web 3.0, and white-top hackers

 

C. Black-hat, script kiddies, script bats, spider crawlers, Ad spiders, and white-hat hackers

 

D. None of these

 

88. What is software written with malicious intent to cause annoyance or damage?

A. Elevation of privilege

 

B. Spoofing

 

C. Sniffer

 

D. Virus

 

89. What includes a variety of threats such as viruses, worms, and Trojan horses?

A. Malicious code

 

B. Hoaxes

 

C. Spoofing

 

D. Sniffer

 

90. What is the forging of the return address on an email so that the email message appears to come from someone other than the actual sender?

A. Malicious code

 

B. Hoaxes

 

C. Spoofing

 

D. Sniffer

 

91. What is a special class of adware that collects data about the user and transmits it over the Internet without the user’s knowledge or permission?

A. Sniffer

 

B. Spyware

 

C. Spoofware

 

D. Splog

 

92. What is a new ransomware program that encrypts your personal files and demands payment for the files’ decryption keys?

A. Sniffer

 

B. Spyware

 

C. Spoofware

 

D. Simplelocker

 

93. What is a form of malicious software that infects your computer and asks for money?

A. Sniffer

 

B. Spyware

 

C. Spoofware

 

D. Ransomware

 

94. What is ransomware?

A. A form of malicious software that infects your computer and asks for money.

 

B. A new ransomware program that encrypts your personal files and demands payment for the file’s decryption keys.

 

C. Software that allows Internet advertisers to display advertisements without the consent of the computer user.

 

D. A special class of adware that collects data about the user and transmits it over the Internet without the user’s knowledge or permission.

 

95. What is simplelocker?

A. A form of malicious software that infects your computer and asks for money.

 

B. A new ransomware program that encrypts your personal files and demands payment for the file’s decryption keys.

 

C. Software that allows Internet advertisers to display advertisements without the consent of the computer user.

 

D. A special class of adware that collects data about the user and transmits it over the Internet without the user’s knowledge or permission.

 

96. What is adware?

A. A form of malicious software that infects your computer and asks for money.

 

B. A new ransomware program that encrypts your personal files and demands payment for the file’s decryption keys.

 

C. Software that allows Internet advertisers to display advertisements without the consent of the computer user.

 

D. A special class of adware that collects data about the user and transmits it over the Internet without the user’s knowledge or permission.

 

97. What is spyware?

A. A form of malicious software that infects your computer and asks for money.

 

B. A new ransomware program that encrypts your personal files and demands payment for the file’s decryption keys.

 

C. Software that allows Internet advertisers to display advertisements without the consent of the computer user.

 

D. A special class of adware that collects data about the user and transmits it over the Internet without the user’s knowledge or permission.

 

98. What is the primary difference between a worm and a virus?

A. A worm must attach to something to spread, where a virus does not need to attach to anything to spread and can tunnel itself into the computer.

 

B. A virus is copied and spread by a person, where a worm takes a string of tag words and deletes websites.

 

C. A virus must attach to something to spread, where a worm does not need to attach to anything to spread and can tunnel itself into the computer.

 

D. All of these

 

99. What is a process by which a user misleads a system into granting unauthorized rights, usually for the purpose of compromising or destroying the system?

A. Elevation of privilege

 

B. Packet tampering

 

C. Spoofing

 

D. Spyware

 

100. A DDoS stands for one of the common forms of viruses that attack multiple computers to flood a website until it slows or crashes. What does DDoS stand for?

A. Data distribution of systems attack.

 

B. Data denial-of-software attack.

 

C. Distributed data online systems attack.

 

D. Distributed denial-of-service attack.

 

101. Which of the following are all common forms of viruses?

A. Packet tampering, worms, cakes, and Trojan viruses

 

B. Polymorphic, sniffer, splogs, and denial-of-service viruses

 

C. Backdoor program, worm, Trojan-horse viruses

 

D. All of these

 

102. What is the software called that allows Internet advertisers to display advertisements without the consent of the computer user?

A. Sploging

 

B. Adware

 

C. Spygloss

 

D. CPU buzzer

 

103. Who are hackers with criminal intent?

A. Crackers

 

B. Black-hat hacker

 

C. Hoaxes

 

D. Cyberterrorists

 

104. Who are those who seek to cause harm to people or to destroy critical systems or information and use the Internet as a weapon of mass destruction?

A. White-hat hacker

 

B. Black-hat hacker

 

C. Cyberterrorists

 

D. Script bunnies

 

105. Which of the following types of viruses spread themselves, not just from file to file, but also from computer to computer?

A. Polymorphic virus

 

B. Worm

 

C. Trojan-horse virus

 

D. Backdoor programs

 

106. What is the one of the most common forms of computer vulnerabilities that can cause massive computer damage?

A. Virus

 

B. White-hat hackers

 

C. Dumpster diving

 

D. All of these

 

107. Which of the following changes its form as it propagates?

A. Backdoor programs

 

B. Strikers

 

C. Polymorphic viruses and worms

 

D. Splogs

 

108. Which of the following is a computer attack where an attacker accesses a wireless computer network, intercepts data, uses network services, and/or sends attack instructions without entering the office or organization that owns the network?

A. Backdoor programs

 

B. Drive-by hacking

 

C. Polymorphic viruses and worms

 

D. Hacker

 

109. What is a broad term encompassing the protection of information from accidental or intentional misuse by persons inside or outside an organization?

A. Information security

 

B. Physical security

 

C. Drive-by hacking

 

D. Adware

 

110. Who are experts in technology who use their knowledge to break into computers and computer networks, either for profit or just motivated by the challenge?

A. Information spy

 

B. Hacker

 

C. Spyware

 

D. Adware

 

111. What is a computer attack where an attacker accesses a wireless computer network, intercepts data, uses network services, and/or sends attack instructions without entering the office or organization that owns the network?

A. Spyware

 

B. Hacker

 

C. Drive-by hacking

 

D. Adware

 

112. What is a special class of adware that collects data about the user and transmits it over the Internet without the user’s knowledge or permission?

A. Spyware

 

B. Hacker

 

C. Drive-by hacking

 

D. Adware

 

113. What is software that while purporting to serve some useful function and often fulfilling that function also allows Internet advertisers to display advertisements without the consent of the computer user?

A. Spyware

 

B. Hacker

 

C. Drive-by hacking

 

D. Adware

 

114. What is spyware?

A. A special class of adware that collects data about the user and transmits it over the Internet without the user’s knowledge or permission.

 

B. Experts in technology who use their knowledge to break into computers and computer networks, either for profit or just motivated by the challenge.

 

C. A computer attack where an attacker accesses a wireless computer network, intercepts data, uses network services, and/or sends attack instructions without entering the office or organization that owns the network.

 

D. Software that while purporting to serve some useful function and often fulfilling that function also allows Internet advertisers to display advertisements without the consent of the computer user.

 

115. What is adware?

A. A special class of adware that collects data about the user and transmits it over the Internet without the user’s knowledge or permission.

 

B. Experts in technology who use their knowledge to break into computers and computer networks, either for profit or just motivated by the challenge.

 

C. A computer attack where an attacker accesses a wireless computer network, intercepts data, uses network services, and/or sends attack instructions without entering the office or organization that owns the network.

 

D. Software that while purporting to serve some useful function and often fulfilling that function also allows Internet advertisers to display advertisements without the consent of the computer user.

 

116. What is drive-by hacking?

A. A special class of adware that collects data about the user and transmits it over the Internet without the user’s knowledge or permission.

 

B. Experts in technology who use their knowledge to break into computers and computer networks, either for profit or just motivated by the challenge.

 

C. A computer attack where an attacker accesses a wireless computer network, intercepts data, uses network services, and/or sends attack instructions without entering the office or organization that owns the network.

 

D. Software that while purporting to serve some useful function and often fulfilling that function also allows Internet advertisers to display advertisements without the consent of the computer user.

 

117. What is a hacker?

A. A special class of adware that collects data about the user and transmits it over the Internet without the user’s knowledge or permission.

 

B. Experts in technology who use their knowledge to break into computers and computer networks, either for profit or just motivated by the challenge.

 

C. A computer attack where an attacker accesses a wireless computer network, intercepts data, uses network services, and/or sends attack instructions without entering the office or organization that owns the network.

 

D. Software that while purporting to serve some useful function and often fulfilling that function also allows Internet advertisers to display advertisements without the consent of the computer user.

 

118. What is information security?

A. A broad term encompassing the protection of information from accidental or intentional misuse by persons inside or outside an organization.

 

B. A special class of adware that collects data about the user and transmits it over the Internet without the user’s knowledge or permission.

 

C. A computer attack where an attacker accesses a wireless computer network, intercepts data, uses network services, and/or sends attack instructions without entering the office or organization that owns the network.

 

D. Software that while purporting to serve some useful function and often fulfilling that function also allows Internet advertisers to display advertisements without the consent of the computer user.

 

 

Essay Questions

119. Explain the ethical issues in the use of information technology.

 

 

 

 

120. Describe the relationship between ethics and privacy.

 

 

 

 

121. Describe the relationships and differences between hackers and viruses.

 

 

 

 

Chapter 05 Organizational Structures That Support Strategic Initiatives Answer Key

True / False Questions

1. Ethics and security are two fundamental building blocks for all organizations.

TRUE

 

Accessibility: Keyboard Navigation
Blooms: Remember
Difficulty: 1 Easy
Learning Objective: 05-01 Explain information ethics and its associated issues.
Topic: Information Ethics

 

2. Privacy is the legal protection afforded an expression of an idea, such as a song, book, or video game.

FALSE

Copyright is the legal protection afforded an expression of an idea, such as a song, book, or video game.

 

 

Accessibility: Keyboard Navigation
Blooms: Remember
Difficulty: 1 Easy
Learning Objective: 05-01 Explain information ethics and its associated issues.
Topic: Information Ethics

 

3. Information governance is a method or system of government for information management or control.

TRUE

 

Accessibility: Keyboard Navigation
Blooms: Remember
Difficulty: 1 Easy
Learning Objective: 05-01 Explain information ethics and its associated issues.
Topic: Information Ethics

 

4. Confidentiality is the right to be left alone when you want to be, to have control over your own personal possessions, and not to be observed without your consent.

FALSE

Privacy is the right to be left alone when you want to be, to have control over your own personal possessions, and not to be observed without your consent.

 

 

Accessibility: Keyboard Navigation
Blooms: Remember
Difficulty: 1 Easy
Learning Objective: 05-01 Explain information ethics and its associated issues.
Topic: Information Ethics

 

5. Digital rights management is a technological solution that allows publishers to control their digital media to discourage, limit, or prevent illegal copying and distribution.

TRUE

 

Accessibility: Keyboard Navigation
Blooms: Remember
Difficulty: 1 Easy
Learning Objective: 05-01 Explain information ethics and its associated issues.
Topic: Information Ethics

 

6. The Child Online Protection Act was passed to protect minors from accessing inappropriate material on the Internet.

TRUE

 

Accessibility: Keyboard Navigation
Blooms: Remember
Difficulty: 1 Easy
Learning Objective: 05-01 Explain information ethics and its associated issues.
Topic: Information Ethics

 

7. Counterfeit software is the unauthorized use, duplication, distribution, or sale of copyrighted software.

FALSE

Pirated software is the unauthorized use, duplication, distribution, or sale of copyrighted software.

 

 

Accessibility: Keyboard Navigation
Blooms: Remember
Difficulty: 1 Easy
Learning Objective: 05-01 Explain information ethics and its associated issues.
Topic: Information Ethics

 

8. Pirated software is software that is manufactured to look like the real thing and sold as such.

FALSE

Counterfeit software is software that is manufactured to look like the real thing and sold as such.

 

 

Accessibility: Keyboard Navigation
Blooms: Remember
Difficulty: 1 Easy
Learning Objective: 05-01 Explain information ethics and its associated issues.
Topic: Information Ethics

 

9. A patent is the legal protection afforded an expression of an idea, such as a song, book, or video game.

FALSE

Copyright is the legal protection afforded an expression of an idea, such as a song, book, or video game.

 

 

Accessibility: Keyboard Navigation
Blooms: Remember
Difficulty: 1 Easy
Learning Objective: 05-01 Explain information ethics and its associated issues.
Topic: Information Ethics

 

10. Intellectual property is intangible creative work that is embodied in physical form and includes copyrights, trademarks, and patents.

TRUE

 

Accessibility: Keyboard Navigation
Blooms: Remember
Difficulty: 1 Easy
Learning Objective: 05-01 Explain information ethics and its associated issues.
Topic: Information Ethics

 

11. Copyright is an exclusive right to make, use, and sell an invention and is granted by a government to the inventor.

FALSE

A patent is an exclusive right to make, use, and sell an invention and is granted by a government to the inventor.

 

 

Accessibility: Keyboard Navigation
Blooms: Remember
Difficulty: 1 Easy
Learning Objective: 05-01 Explain information ethics and its associated issues.
Topic: Information Ethics

 

12. Information management examines the organizational resource of information and regulates its definitions, uses, value, and distribution ensuring it has the types of data/information required to function and grow effectively.

TRUE

 

Accessibility: Keyboard Navigation
Blooms: Remember
Difficulty: 1 Easy
Learning Objective: 05-01 Explain information ethics and its associated issues.
Topic: Information Ethics

 

13. Information compliance is the act of conforming, acquiescing, or yielding information.

TRUE

 

Accessibility: Keyboard Navigation
Blooms: Remember
Difficulty: 1 Easy
Learning Objective: 05-01 Explain information ethics and its associated issues.
Topic: Information Ethics

 

14. Information property is an ethical issue that focuses on who owns information about individuals and how information can be sold and exchanged.

TRUE

 

Accessibility: Keyboard Navigation
Blooms: Remember
Difficulty: 1 Easy
Learning Objective: 05-01 Explain information ethics and its associated issues.
Topic: Information Ethics

 

15. Information secrecy is an ethical issue that focuses on who owns information about individuals and how information can be sold and exchanged.

FALSE

Information property is an ethical issue that focuses on who owns information about individuals and how information can be sold and exchanged.

 

 

Accessibility: Keyboard Navigation
Blooms: Remember
Difficulty: 1 Easy
Learning Objective: 05-01 Explain information ethics and its associated issues.
Topic: Information Ethics

 

16. Information secrecy is the category of computer security that addresses the protection of data from unauthorized disclosure and confirmation of data source authenticity.

TRUE

 

Accessibility: Keyboard Navigation
Blooms: Remember
Difficulty: 1 Easy
Learning Objective: 05-01 Explain information ethics and its associated issues.
Topic: Information Ethics

 

17. Information property is the category of computer security that addresses the protection of data from unauthorized disclosure and confirmation of data source authenticity.

FALSE

Information property is an ethical issue that focuses on who owns information about individuals and how information can be sold and exchanged.

 

 

Accessibility: Keyboard Navigation
Blooms: Remember
Difficulty: 1 Easy
Learning Objective: 05-01 Explain information ethics and its associated issues.
Topic: Information Ethics

 

18. Spyware is software that, while purporting to serve some useful function and often fulfilling that function, also allows Internet advertisers to display advertisements without the consent of the computer user.

FALSE

Adware is software that, while purporting to serve some useful function and often fulfilling that function, also allows Internet advertisers to display advertisements without the consent of the computer user.

 

 

Accessibility: Keyboard Navigation
Blooms: Remember
Difficulty: 1 Easy
Learning Objective: 05-02 Describe information security and the difference between hackers and viruses.
Topic: Protecting Intellectual Assets

 

19. The Trojan-horse virus hides inside other software, usually as an attachment or a downloadable file.

TRUE

 

Accessibility: Keyboard Navigation
Blooms: Remember
Difficulty: 1 Easy
Learning Objective: 05-02 Describe information security and the difference between hackers and viruses.
Topic: Protecting Intellectual Assets

 

20. Information security is a broad term encompassing the protection of information from accidental or intentional misuse by persons inside or outside an organization.

TRUE

This is the definition of information security.

 

 

Accessibility: Keyboard Navigation
Blooms: Remember
Difficulty: 1 Easy
Learning Objective: 05-02 Describe information security and the difference between hackers and viruses.
Topic: Protecting Intellectual Assets

 

21. Two of the common forms of viruses discussed in the book include the Trojan-horse virus and the acceptance-of-service attack.

FALSE

Among the common forms of viruses discussed in the book are Trojan-horse virus and the denial-of-service attack (DoS) not acceptance-of-service attack.

 

 

Accessibility: Keyboard Navigation
Blooms: Remember
Difficulty: 1 Easy
Learning Objective: 05-02 Describe information security and the difference between hackers and viruses.
Topic: Protecting Intellectual Assets

 

22. A hacker weapon called a splog (spam blog) is a fake blog created solely to raise the search engine rank of affiliated websites.

TRUE

 

Accessibility: Keyboard Navigation
Blooms: Remember
Difficulty: 1 Easy
Learning Objective: 05-02 Describe information security and the difference between hackers and viruses.
Topic: Protecting Intellectual Assets

 

23. Information security is a high priority for protection of the company’s information and it is critical to implement an information security procedure to combat misuse of this information.

TRUE

This is part of the definition of information security.

 

 

Accessibility: Keyboard Navigation
Blooms: Remember
Difficulty: 1 Easy
Learning Objective: 05-02 Describe information security and the difference between hackers and viruses.
Topic: Protecting Intellectual Assets

 

24. Smoking areas are targeted by hackers as they regularly use smoking entrances to enter the building where they pose as employees to gain access to the company network.

TRUE

 

Accessibility: Keyboard Navigation
Blooms: Remember
Difficulty: 1 Easy
Learning Objective: 05-02 Describe information security and the difference between hackers and viruses.
Topic: Protecting Intellectual Assets

 

25. Downtime refers to a period of time when a system is unavailable, and unplanned downtime can strike at any time for various reasons.

TRUE

 

Accessibility: Keyboard Navigation
Blooms: Remember
Difficulty: 1 Easy
Learning Objective: 05-02 Describe information security and the difference between hackers and viruses.
Topic: Protecting Intellectual Assets

 

26. Drive-by hacking is a computer attack where an attacker accesses a wireless computer network, intercepts data, uses network services, and/or sends attack instructions without entering the office or organization that owns the network.

TRUE

 

Accessibility: Keyboard Navigation
Blooms: Remember
Difficulty: 1 Easy
Learning Objective: 05-02 Describe information security and the difference between hackers and viruses.
Topic: Protecting Intellectual Assets

 

27. White-hat hackers break into other people’s computer systems and may just look around or may steal and destroy information.

FALSE

Black-hat hackers break into other people’s computer systems and may just look around or may steal and destroy information.

 

 

Accessibility: Keyboard Navigation
Blooms: Remember
Difficulty: 1 Easy
Learning Objective: 05-02 Describe information security and the difference between hackers and viruses.
Topic: Protecting Intellectual Assets

 

28. Black-hat hackers work at the request of the system owners to find system vulnerabilities and plug the holes.

FALSE

White-hat hackers work at the request of the system owners to find system vulnerabilities and plug the holes.

 

 

Accessibility: Keyboard Navigation
Blooms: Remember
Difficulty: 1 Easy
Learning Objective: 05-02 Describe information security and the difference between hackers and viruses.
Topic: Protecting Intellectual Assets

 

29. Ransomware is a form of malicious software that infects your computer and asks for money.

TRUE

 

Accessibility: Keyboard Navigation
Blooms: Remember
Difficulty: 1 Easy
Learning Objective: 05-02 Describe information security and the difference between hackers and viruses.
Topic: Protecting Intellectual Assets

 

30. Simplelocker is a new ransomware program that encrypts your personal files and demands payment for the files’ decryption keys.

TRUE

 

Accessibility: Keyboard Navigation
Blooms: Remember
Difficulty: 1 Easy
Learning Objective: 05-02 Describe information security and the difference between hackers and viruses.
Topic: Protecting Intellectual Assets

 

31. A worm is a form of malicious software that infects your computer and asks for money.

FALSE

Ransomware is a form of malicious software that infects your computer and asks for money.

 

 

Accessibility: Keyboard Navigation
Blooms: Remember
Difficulty: 1 Easy
Learning Objective: 05-02 Describe information security and the difference between hackers and viruses.
Topic: Protecting Intellectual Assets

 

32. A worm spreads itself not only from file to file but also from computer to computer.

TRUE

 

Accessibility: Keyboard Navigation
Blooms: Remember
Difficulty: 1 Easy
Learning Objective: 05-02 Describe information security and the difference between hackers and viruses.
Topic: Protecting Intellectual Assets

 

33. Script-kiddies have criminal intent when hacking.

FALSE

Crackers have criminal intent when hacking.

 

 

Accessibility: Keyboard Navigation
Blooms: Remember
Difficulty: 1 Easy
Learning Objective: 05-02 Describe information security and the difference between hackers and viruses.
Topic: Protecting Intellectual Assets

 

34. Cyberterrorists seek to cause harm to people or to destroy critical systems or information and use the Internet as a weapon of mass destruction.

TRUE

 

Accessibility: Keyboard Navigation
Blooms: Remember
Difficulty: 1 Easy
Learning Objective: 05-02 Describe information security and the difference between hackers and viruses.
Topic: Protecting Intellectual Assets

 

35. White-hat hackers have philosophical and political reasons for breaking into systems and will often deface the website as a protest.

FALSE

Hactivists have philosophical and political reasons for breaking into systems and will often deface the website as a protest.

 

 

Accessibility: Keyboard Navigation
Blooms: Remember
Difficulty: 1 Easy
Learning Objective: 05-02 Describe information security and the difference between hackers and viruses.
Topic: Protecting Intellectual Assets

 

36. Script kiddies or script bunnies find hacking code on the Internet and click-and-point their way into systems to cause damage or spread viruses.

TRUE

 

Accessibility: Keyboard Navigation
Blooms: Remember
Difficulty: 1 Easy
Learning Objective: 05-02 Describe information security and the difference between hackers and viruses.
Topic: Protecting Intellectual Assets

 

37. Worm spreads itself, not only from file to file, but also from computer to computer. The primary difference between a virus and a worm is that a virus must attach to something, such as an executable file, to spread. Worms do not need to attach to anything to spread and can tunnel themselves into computers.

TRUE

 

Accessibility: Keyboard Navigation
Blooms: Remember
Difficulty: 1 Easy
Learning Objective: 05-02 Describe information security and the difference between hackers and viruses.
Topic: Protecting Intellectual Assets

 

38. Backdoor programs change their form as they propagate.

FALSE

Polymorphic viruses and worms change their form as they propagate.

 

 

Accessibility: Keyboard Navigation
Blooms: Remember
Difficulty: 1 Easy
Learning Objective: 05-02 Describe information security and the difference between hackers and viruses.
Topic: Protecting Intellectual Assets

 

39. Backdoor programs open a way into the network for future attacks.

TRUE

 

Accessibility: Keyboard Navigation
Blooms: Remember
Difficulty: 1 Easy
Learning Objective: 05-02 Describe information security and the difference between hackers and viruses.
Topic: Protecting Intellectual Assets

 

40. Denial-of-service attack (DoS) floods a website with so many requests for service that it slows down or crashes the site.

TRUE

 

Accessibility: Keyboard Navigation
Blooms: Remember
Difficulty: 1 Easy
Learning Objective: 05-02 Describe information security and the difference between hackers and viruses.
Topic: Protecting Intellectual Assets

 

Multiple Choice Questions

41. Which of the following represents the two fundamental building blocks that protect organizational information?

A. Security and sales

 

B. Human resources and security

 

C. Ethics and security

 

D. Ethics and technology

The two fundamental building blocks to protecting any organization should include ethics and security.

 

 

Accessibility: Keyboard Navigation
Blooms: Remember
Difficulty: 1 Easy
Learning Objective: 05-01 Explain information ethics and its associated issues.
Topic: Information Ethics

 

42. What is the legal protection afforded an expression of an idea, such as a song, book, or video game?

A. Privacy

 

B. Confidentiality

 

C. Intellectual property

 

D. Copyright

Copyright is the legal protection afforded an expression of an idea, such as a song, book, or video game.

 

 

Accessibility: Keyboard Navigation
Blooms: Remember
Difficulty: 1 Easy
Learning Objective: 05-01 Explain information ethics and its associated issues.
Topic: Information Ethics

 

43. What is intangible creative work that is embodied in physical form and includes trademarks and patents?

A. Intellectual software

 

B. Intellectual property

 

C. Trademark property

 

D. Ethical property

Intellectual property is intangible creative work that is embodied in physical form and includes trademarks and patents.

 

 

Accessibility: Keyboard Navigation
Blooms: Remember
Difficulty: 1 Easy
Learning Objective: 05-01 Explain information ethics and its associated issues.
Topic: Information Ethics

 

44. Trust between companies, customers, partners, and suppliers is the support structure of which of the following?

A. Ebusiness

 

B. Eharmony

 

C. Esoftware

 

D. Epolicies

Trust between companies, customers, partners, and suppliers is the support structure of ebusiness.

 

 

Accessibility: Keyboard Navigation
Blooms: Understand
Difficulty: 2 Medium
Learning Objective: 05-01 Explain information ethics and its associated issues.
Topic: Information Ethics

 

45. In relation to privacy, which of the following is the assurance that messages and information remain available only to those authorized to view them?

A. Contentment

 

B. Ethical standard

 

C. Confidentiality

 

D. Firewall security

This is the definition of confidentiality.

 

 

Accessibility: Keyboard Navigation
Blooms: Remember
Difficulty: 1 Easy
Learning Objective: 05-01 Explain information ethics and its associated issues.
Topic: Information Ethics

 

46. Which of the following key terms represents the principles and standards that guide our behavior toward other people?

A. Ethics

 

B. Intellectual property

 

C. Standards of living

 

D. Security

Ethics are the principles and standards that guide our behavior toward other people.

 

 

Accessibility: Keyboard Navigation
Blooms: Remember
Difficulty: 1 Easy
Learning Objective: 05-01 Explain information ethics and its associated issues.
Topic: Information Ethics

 

47. What is the difference between pirated and counterfeit software?

A. Counterfeit refers to fake technology products, whereas pirated refers to invisible technological cameras placed online.

 

B. Pirated refers to the unauthorized use, duplication, distribution, or sale of copyrighted software, whereas counterfeit refers to software that is manufactured to look like the real thing and sold as such.

 

C. Counterfeit refers to the unauthorized use, duplication, distribution, or sale of copyrighted software, whereas pirated refers to software manufactured to look like the real thing and sold as such.

 

D. Pirated refers to stolen software used to hack into a company’s classified material, whereas counterfeit refers to a fake version of firewall software.

Pirated refers to the unauthorized use, duplication, distribution, or sale of copyrighted software, whereas counterfeit refers to software manufactured to look like the real thing and sold as such.

 

 

Accessibility: Keyboard Navigation
Blooms: Remember
Difficulty: 1 Easy
Learning Objective: 05-01 Explain information ethics and its associated issues.
Topic: Information Ethics

 

48. Which of the following governs the ethical and moral issues arising from the development and use of information technologies, and the creation, collection, duplication, distribution, and processing of information?

A. Ethical information

 

B. Information technology

 

C. Information policies

 

D. Information ethics

Information ethics governs the ethical and moral issues arising from the development and use of information technologies, and the creation, collection, duplication, distribution, and processing of information.

 

 

Accessibility: Keyboard Navigation
Blooms: Remember
Difficulty: 1 Easy
Learning Objective: 05-01 Explain information ethics and its associated issues.
Topic: Information Ethics

 

49. Which of the following means the right to be left alone when you want to be, to have control over your personal possessions, and to not be observed without your consent?

A. Safety

 

B. Ethical standard

 

C. Privacy

 

D. Confidentiality

Privacy means the right to be left alone when you want to be, to have control over your personal possessions, and to not be observed without your consent.

 

 

Accessibility: Keyboard Navigation
Blooms: Remember
Difficulty: 1 Easy
Learning Objective: 05-01 Explain information ethics and its associated issues.
Topic: Information Ethics

 

50. Determining what is ethical can sometimes be difficult because certain actions can be justified or condemned depending on how you view the relationship between ___________.

A. Legal and confidential

 

B. Legal and ethical

 

C. Legal and technical

 

D. Confidential and open

When discussing information ethics, determining what is ethical can sometimes be difficult because certain actions can be justified or condemned depending on how you view the relationship between legal and ethical.

 

 

Accessibility: Keyboard Navigation
Blooms: Understand
Difficulty: 2 Medium
Learning Objective: 05-01 Explain information ethics and its associated issues.
Topic: Information Ethics

 

51. What is a technological solution that allows publishers to control their digital media to discourage, limit, or prevent illegal copying and distribution?

A. Digital rights management

 

B. Counterfeit software

 

C. Privacy

 

D. Pirated software

Digital rights management is a technological solution that allows publishers to control their digital media to discourage, limit, or prevent illegal copying and distribution.

 

 

Accessibility: Keyboard Navigation
Blooms: Remember
Difficulty: 1 Easy
Learning Objective: 05-01 Explain information ethics and its associated issues.
Topic: Information Ethics

 

52. Which of the following examines the organizational resource of information and regulates its definitions, uses, value, and distribution ensuring it has the types of data or information required to function and grow effectively?

A. Information code

 

B. Information technology

 

C. Information management

 

D. Information governance

Information management examines the organizational resource of information and regulates its definitions, uses, value, and distribution ensuring it has the types of data or information required to function, and grow effectively.

 

 

Accessibility: Keyboard Navigation
Blooms: Remember
Difficulty: 1 Easy
Learning Objective: 05-01 Explain information ethics and its associated issues.
Topic: Information Ethics

 

53. Sophie Black works as a computer programmer for a software company. Her boss, Mike Jones, is responsible for developing a new software game for the Wii. After completion of the project, Mike gives all of the team members a free copy of the game without consent from the company. Sophie is a little hesitant and unsure about accepting the game because legally it would be considered _________.

A. Counterfeit software

 

B. Pirated software

 

C. Ethical software

 

D. Governance software

Pirated software is the unauthorized use, duplication, distribution, or sale of copyrighted software.

 

 

Accessibility: Keyboard Navigation
Blooms: Analyze
Difficulty: 3 Hard
Learning Objective: 05-01 Explain information ethics and its associated issues.
Topic: Information Ethics

 

54. What is the method or system of government for information management or control?

A. Information management

 

B. Information compliance

 

C. Information governance

 

D. Information secrecy

Information governance is the method or system of government for information management or control.

 

 

Accessibility: Keyboard Navigation
Blooms: Remember
Difficulty: 1 Easy
Learning Objective: 05-01 Explain information ethics and its associated issues.
Topic: Information Ethics

 

55. What is the category of computer security that addresses the protection of data from unauthorized disclosure and confirmation of data source authenticity?

A. Information management

 

B. Information compliance

 

C. Information secrecy

 

D. Information ethics

Information secrecy is the category of computer security that addresses the protection of data from unauthorized disclosure and confirmation of data source authenticity.

 

 

Accessibility: Keyboard Navigation
Blooms: Remember
Difficulty: 1 Easy
Learning Objective: 05-01 Explain information ethics and its associated issues.
Topic: Information Ethics

 

56. Which of the following represents the definition of information property?

A. An ethical issue that focuses on who owns information about individuals and how information can be sold and exchanged.

 

B. A method or system of government for information management or control.

 

C. The category of computer security that addresses the protection of data from unauthorized disclosure and confirmation of data source authenticity.

 

D. The organizational resource of information and the regulation of its definitions, uses, values, and distribution to ensure that the organization has the types of data/information required to function and grow effectively.

Information property is an ethical issue that focuses on who owns information about individuals and how information can be sold and exchanges.

 

 

Accessibility: Keyboard Navigation
Blooms: Remember
Difficulty: 1 Easy
Learning Objective: 05-01 Explain information ethics and its associated issues.
Topic: Information Ethics

 

57. Which of the following represents the definition of information governance?

A. The act of conforming, acquiescing, or yielding information.

 

B. A method or system of government for information management or control.

 

C. The category of computer security that addresses the protection of data from unauthorized disclosure and confirmation of data source authenticity.

 

D. The examination of an organization’s resource of information and the regulation of its definitions, uses, values, and distribution to ensure that the organization has the types of data/information required to function and grow effectively.

Information governance is a method or system of government for information management or control.

 

 

Accessibility: Keyboard Navigation
Blooms: Remember
Difficulty: 1 Easy
Learning Objective: 05-01 Explain information ethics and its associated issues.
Topic: Information Ethics

 

58. Which of the below represents the definition of information secrecy?

A. The act of conforming, acquiescing, or yielding information.

 

B. A method or system of government for information management or control.

 

C. The category of computer security that addresses the protection of data from unauthorized disclosure and confirmation of data source authenticity.

 

D. The regulation of the definitions, uses, values, and distribution of the organization’s resource of information to ensure that the organization has the types of data/information required to function and grow effectively.

Information secrecy is the category of computer security that addresses the protection of data from unauthorized disclosure and confirmation of data source authenticity.

 

 

Accessibility: Keyboard Navigation
Blooms: Remember
Difficulty: 1 Easy
Learning Objective: 05-01 Explain information ethics and its associated issues.
Topic: Information Ethics

 

59. Which of the below represents the definition of information management?

A. The act of conforming, acquiescing, or yielding information.

 

B. A method or system of government for information management or control.

 

C. The protection of data from unauthorized disclosure and confirmation of data source authenticity.

 

D. The examination of an organization’s resource of information and the regulation of its definitions, uses, values, and distribution to ensure that the organization has the types of data/information required to function and grow effectively.

Information management examines the organizational resource of information and regulates its definitions, uses, values, and distribution to ensure that the organization has the types of data/information required to function and grow effectively.

 

 

Accessibility: Keyboard Navigation
Blooms: Remember
Difficulty: 1 Easy
Learning Objective: 05-01 Explain information ethics and its associated issues.
Topic: Information Ethics

 

60. Which of the below represents the definition of information compliance?

A. The act of conforming, acquiescing, or yielding information.

 

B. A method or system of government for information management or control.

 

C. Information secrecy is the category of computer security that addresses the protection of data from unauthorized disclosure and confirmation of data source authenticity.

 

D. The organization’s resource of information and regulation of its definitions, uses, values, and distribution to ensure that the organization has the types of data/information required to function and grow effectively.

Information compliance is the act of conforming, acquiescing, or yielding information.

 

 

Accessibility: Keyboard Navigation
Blooms: Remember
Difficulty: 1 Easy
Learning Objective: 05-01 Explain information ethics and its associated issues.
Topic: Information Ethics

 

61. Which of the following represents the definition of information compliance?

A. The act of conforming, acquiescing, or yielding information.

 

B. The ability to comply with software.

 

C. The understanding of technology.

 

D. The verbalization of information governance in a company’s policies and procedures.

This is the definition of information compliance.

 

 

Accessibility: Keyboard Navigation
Blooms: Remember
Difficulty: 1 Easy
Learning Objective: 05-01 Explain information ethics and its associated issues.
Topic: Information Ethics

 

62. Which of the following serves as key evidence in many legal cases today and also provides a faster, easier way to search and organize paper documents?

A. Confidentiality

 

B. Digital information

 

C. Privacy policies

 

D. Information ethics

Digital information, in today’s world, often serves as key evidence in many legal cases and provides a faster, easier way to search and organize paper documents.

 

 

Accessibility: Keyboard Navigation
Blooms: Understand
Difficulty: 2 Medium
Learning Objective: 05-01 Explain information ethics and its associated issues.
Topic: Information Ethics

 

63. Which of the following refers to the ability of a company to identify, search, gather, seize, or export digital information in responding to a litigation, audit, investigation, or an information inquiry?

A. Eauthorization

 

B. Emanagement

 

C. Ediscovery

 

D. Epolicies

This is the definition of ediscovery, or electronic discovery.

 

 

Accessibility: Keyboard Navigation
Blooms: Remember
Difficulty: 1 Easy
Learning Objective: 05-01 Explain information ethics and its associated issues.
Topic: Information Ethics

 

64. In the information technology world, which of the following are examples of ethical issues that a company may have to manage?

A. Employees copying and distributing company owned software.

 

B. Employees searching other employee’s private information without consent.

 

C. Employees intentionally creating or spreading viruses to confuse IT.

 

D. All of these.

All of these are examples of ethical issues companies face today with IT.

 

 

Accessibility: Keyboard Navigation
Blooms: Understand
Difficulty: 2 Medium
Learning Objective: 05-01 Explain information ethics and its associated issues.
Topic: Information Ethics

 

65. As the president of a local trade company, Kristin is faced with leadership, ethical, and operational decisions on a daily basis. Kristen’s responsibilities include examining the organizational resource of information and regulating its definitions, uses, value, and distribution to ensure the company has the types of information required to function and grow effectively. What is Kristin overseeing for the company?

A. Information codes

 

B. Information management

 

C. Information deployment

 

D. Information security

Information management examines the organizational resource of information and regulates its definitions, uses, value, and distribution to ensure the organization has the types of information required to function and grow effectively.

 

 

Accessibility: Keyboard Navigation
Blooms: Analyze
Difficulty: 3 Hard
Learning Objective: 05-01 Explain information ethics and its associated issues.
Topic: Information Ethics

 

66. What is intangible creative work that is embodied in physical form and includes copyrights, trademarks, and patents?

A. Ethics

 

B. Intellectual property

 

C. Privacy

 

D. Confidentiality

Intellectual property is intangible creative work that is embodied in physical form and includes copyrights, trademarks, and patents.

 

 

Accessibility: Keyboard Navigation
Blooms: Remember
Difficulty: 1 Easy
Learning Objective: 05-01 Explain information ethics and its associated issues.
Topic: Information Ethics

 

67. Which of the following describes privacy?

A. The assurance that messages and data are available only to those who are authorized to view them.

 

B. Policies and procedures that address the ethical use of computers and Internet usage in the business environment.

 

C. The right to be left alone when you want to be, to have control over your own personal possessions, and to not be observed without your consent.

 

D. The principles and standards that guide our behavior toward other people.

This is the definition of privacy.

 

 

Accessibility: Keyboard Navigation
Blooms: Remember
Difficulty: 1 Easy
Learning Objective: 05-01 Explain information ethics and its associated issues.
Topic: Information Ethics

 

68. Which of the following is an example of acting ethically?

A. Individuals copy, use, and distribute software.

 

B. Employees search organizational databases for sensitive corporate and personal information.

 

C. Individuals hack into computer systems to steal proprietary information.

 

D. None of these offers an example of acting ethically

None of the above are examples of acting ethically.

 

 

Accessibility: Keyboard Navigation
Blooms: Remember
Difficulty: 1 Easy
Learning Objective: 05-01 Explain information ethics and its associated issues.
Topic: Information Ethics

 

69. Which of the following describes confidentiality?

A. The assurance that messages and information are available only to those who are authorized to view them.

 

B. Policies and procedures that address the ethical use of computers and Internet usage in the business environment.

 

C. The right to be left alone when you want to be, to have control over your own personal possessions, and to not be observed without your consent.

 

D. The principles and standards that guide our behavior toward other people.

This is the definition of confidentiality.

 

 

Accessibility: Keyboard Navigation
Blooms: Remember
Difficulty: 1 Easy
Learning Objective: 05-01 Explain information ethics and its associated issues.
Topic: Information Ethics

 

70. What refers to the ability of a company to identify, search, gather, seize, or export digital information in responding to a litigation, audit, investigation, or information inquiry?

A. Ediscovery

 

B. Child Online Protection Act

 

C. Digital rights management

 

D. Pirated software

Ediscovery (or electronic discovery) refers to the ability of a company to identify, search, gather, seize, or export digital information in responding to a litigation, audit, investigation, or information inquiry.

 

 

Accessibility: Keyboard Navigation
Blooms: Remember
Difficulty: 1 Easy
Learning Objective: 05-01 Explain information ethics and its associated issues.
Topic: Information Ethics

 

71. What was passed to protect minors from accessing inappropriate material on the Internet?

A. Ediscovery

 

B. Child Online Protection Act

 

C. Digital rights management

 

D. Pirated software

The Child Online Protection Act was passed to protect minors from accessing inappropriate material on the Internet.

 

 

Accessibility: Keyboard Navigation
Blooms: Remember
Difficulty: 1 Easy
Learning Objective: 05-01 Explain information ethics and its associated issues.
Topic: Information Ethics

 

72. What is a technological solution that allows publishers to control their digital media to discourage, limit, or prevent illegal copying and distribution?

A. Ediscovery

 

B. Child Online Protection Act

 

C. Digital rights management

 

D. Pirated software

Digital rights management is a technological solution that allows publishers to control their digital media to discourage, limit, or prevent illegal copying and distribution.

 

 

Accessibility: Keyboard Navigation
Blooms: Remember
Difficulty: 1 Easy
Learning Objective: 05-01 Explain information ethics and its associated issues.
Topic: Information Ethics

 

73. What is the unauthorized use, duplication, distribution, or sale of copyrighted software?

A. Ediscovery

 

B. Child Online Protection Act

 

C. Digital rights management

 

D. Pirated software

Pirated software is the unauthorized use, duplication, distribution, or sale of copyrighted software.

 

 

Accessibility: Keyboard Navigation
Blooms: Remember
Difficulty: 1 Easy
Learning Objective: 05-01 Explain information ethics and its associated issues.
Topic: Information Ethics

 

74. What is ediscovery?

A. The unauthorized use, duplication, distribution, or sale of copyrighted software.

 

B. The ability of a company to identify, search, gather, seize, or export digital information in responding to a litigation, audit, investigation, or information inquiry.

 

C. A law passed to protect minors from accessing inappropriate material on the Internet.

 

D. A technological solution that allows publishers to control their digital media to discourage, limit, or prevent illegal copying and distribution.

Ediscovery refers to the ability of a company to identify, search, gather, seize, or export digital information in responding to a litigation, audit, investigation, or information inquiry.

 

 

Accessibility: Keyboard Navigation
Blooms: Remember
Difficulty: 1 Easy
Learning Objective: 05-01 Explain information ethics and its associated issues.
Topic: Information Ethics

 

75. What is the Child Online Protection Act?

A. The unauthorized use, duplication, distribution, or sale of copyrighted software.

 

B. Refers to the ability of a company to identify, search, gather, seize, or export digital information in responding to a litigation, audit, investigation, or information inquiry.

 

C. A law passed to protect minors from accessing inappropriate material on the Internet.

 

D. A technological solution that allows publishers to control their digital media to discourage, limit, or prevent illegal copying and distribution.

The Child Online Protection Act was passed to protect minors from accessing inappropriate material on the Internet.

 

 

Accessibility: Keyboard Navigation
Blooms: Remember
Difficulty: 1 Easy
Learning Objective: 05-01 Explain information ethics and its associated issues.
Topic: Information Ethics

 

76. What is digital rights management?

A. The unauthorized use, duplication, distribution, or sale of copyrighted software.

 

B. The ability of a company to identify, search, gather, seize, or export digital information in responding to a litigation, audit, investigation, or information inquiry.

 

C. Law passed to protect minors from accessing inappropriate material on the Internet.

 

D. A technological solution that allows publishers to control their digital media to discourage, limit, or prevent illegal copying and distribution.

Digital rights management is a technological solution that allows publishers to control their digital media to discourage, limit, or prevent illegal copying and distribution.

 

 

Accessibility: Keyboard Navigation
Blooms: Remember
Difficulty: 1 Easy
Learning Objective: 05-01 Explain information ethics and its associated issues.
Topic: Information Ethics

 

77. What is pirated software?

A. The unauthorized use, duplication, distribution, or sale of copyrighted software.

 

B. The ability of a company to identify, search, gather, seize, or export digital information in responding to a litigation, audit, investigation, or information inquiry.

 

C. A law passed to protect minors from accessing inappropriate material on the Internet.

 

D. A technological solution that allows publishers to control their digital media to discourage, limit, or prevent illegal copying and distribution.

Pirated software is the unauthorized use, duplication, distribution, or sale of copyrighted software.

 

 

Accessibility: Keyboard Navigation
Blooms: Remember
Difficulty: 1 Easy
Learning Objective: 05-01 Explain information ethics and its associated issues.
Topic: Information Ethics

 

78. Which of the following refers to a period of time when a system is unavailable?

A. Downtime

 

B. MIS down

 

C. Direct data loss

 

D. Downtown

This is the definition of downtime.

 

 

Accessibility: Keyboard Navigation
Blooms: Remember
Blooms: Understand
Difficulty: 1 Easy
Learning Objective: 05-02 Describe information security and the difference between hackers and viruses.
Topic: Protecting Intellectual Assets

 

79. Which of the following is not an example of unplanned downtime?

A. Power outages

 

B. Tornados

 

C. A system upgrade

 

D. Network failure

There are many examples of unplanned downtown which include: power outages, tornados, network failures, fire, flood, fraud, strike, terrorism, snowstorm, theft, smoke damage, wind, virus, insects, hail, hacker, and many more. A system upgrade is planned downtime.

 

 

Accessibility: Keyboard Navigation
Blooms: Remember
Difficulty: 1 Easy
Learning Objective: 05-02 Describe information security and the difference between hackers and viruses.
Topic: Protecting Intellectual Assets

 

80. Which of the following is a cost of downtime in addition to lost revenue?

A. Legal expenses

 

B. Loss in financial performance

 

C. Damage to reputation

 

D. All of these

The costs of downtime are not only associated with lost revenues, but also with financial performance, damage to reputations, and even travel or legal expenses.

 

 

Accessibility: Keyboard Navigation
Blooms: Understand
Difficulty: 2 Medium
Learning Objective: 05-02 Describe information security and the difference between hackers and viruses.
Topic: Protecting Intellectual Assets

 

81. A company should be able to calculate the cost of downtime by which of the following?

A. Per hour, per day, and per week

 

B. Per employee, per computer, and per company

 

C. Per stock, per stockholder, and per investment capital

 

D. None of these

When calculating the cost of downtime, you should know your costs of downtime by per hour, per day, and per week.

 

 

Accessibility: Keyboard Navigation
Blooms: Understand
Difficulty: 2 Medium
Learning Objective: 05-02 Describe information security and the difference between hackers and viruses.
Topic: Protecting Intellectual Assets

 

82. Which category of the cost of downtime includes equipment rental, overtime costs, and travel expenses?

A. Fiscal responsibility

 

B. Damaged reputation

 

C. Other expenses

 

D. Regeneration quadrant

The Other Expenses quadrant of the cost of downtime figure includes: temporary employees, equipment rental, overtime costs, extra shipping charges, travel expenses, and legal obligations.

 

 

Accessibility: Keyboard Navigation
Blooms: Understand
Difficulty: 2 Medium
Learning Objective: 05-02 Describe information security and the difference between hackers and viruses.
Topic: Protecting Intellectual Assets

 

83. Jensen is a senior developer for HackersRUs, a company that helps secure management information systems. Jensen’s new task is to break into the computer system of one of HackersRUs’ top clients to identify system vulnerabilities and plug the holes. What type of hacker is Jensen?

A. Cracker

 

B. White-hat hacker

 

C. Script bunnies

 

D. Black-hat hacker

A white-hat hacker works at the request of the system owners to find system vulnerabilities and plug the holes.

 

 

Accessibility: Keyboard Navigation
Blooms: Understand
Difficulty: 2 Medium
Learning Objective: 05-02 Describe information security and the difference between hackers and viruses.
Topic: Protecting Intellectual Assets

 

84. Which of the following defines information security?

A. A broad term encompassing the protection of information.

 

B. Protection of information from accidental misuse.

 

C. Protection of information from intentional misuse.

 

D. All of these

All of the above are included in the definition of information security.

 

 

Accessibility: Keyboard Navigation
Blooms: Remember
Difficulty: 1 Easy
Learning Objective: 05-02 Describe information security and the difference between hackers and viruses.
Topic: Protecting Intellectual Assets

 

85. What are experts in technology who use their knowledge to break into computers and networks for profit or just as a challenge known as?

A. Elevation of privilege

 

B. Virus

 

C. Hacker

 

D. Worm

This is the definition of a hacker.

 

 

Accessibility: Keyboard Navigation
Blooms: Remember
Difficulty: 1 Easy
Learning Objective: 05-02 Describe information security and the difference between hackers and viruses.
Topic: Protecting Intellectual Assets

 

86. What is a hacker who breaks into other people’s computer systems and may just look around or steal and destroy information?

A. Script kiddies

 

B. Black-hat hacker

 

C. White-hat hacker

 

D. Cracker

Black-hat hackers break into other people’s computer systems and may just look around or steal and destroy information.

 

 

Accessibility: Keyboard Navigation
Blooms: Remember
Difficulty: 1 Easy
Learning Objective: 05-02 Describe information security and the difference between hackers and viruses.
Topic: Protecting Intellectual Assets

 

87. Which of the following is the correct list of the six different types of hackers listed in your text?

A. Black-hat, cracker, cyberterrorist, hactivist, script kiddies, and white-hat hackers

 

B. Black-top, cookie, script kids, environment, Web 3.0, and white-top hackers

 

C. Black-hat, script kiddies, script bats, spider crawlers, Ad spiders, and white-hat hackers

 

D. None of these

The common types of hackers listed in the book are (1) black-hat hackers, (2) cracker hackers, (3) cyberterrorist hackers, (4) hactivist hackers, (5) script kiddies or script bunnies, and (6) white-hat hackers.

 

 

Accessibility: Keyboard Navigation
Blooms: Understand
Difficulty: 2 Medium
Learning Objective: 05-02 Describe information security and the difference between hackers and viruses.
Topic: Protecting Intellectual Assets

 

88. What is software written with malicious intent to cause annoyance or damage?

A. Elevation of privilege

 

B. Spoofing

 

C. Sniffer

 

D. Virus

This is the definition of a virus.

 

 

Accessibility: Keyboard Navigation
Blooms: Remember
Difficulty: 1 Easy
Learning Objective: 05-02 Describe information security and the difference between hackers and viruses.
Topic: Protecting Intellectual Assets

 

89. What includes a variety of threats such as viruses, worms, and Trojan horses?

A. Malicious code

 

B. Hoaxes

 

C. Spoofing

 

D. Sniffer

This is the definition of malicious code.

 

 

Accessibility: Keyboard Navigation
Blooms: Understand
Difficulty: 2 Medium
Learning Objective: 05-02 Describe information security and the difference between hackers and viruses.
Topic: Protecting Intellectual Assets

 

90. What is the forging of the return address on an email so that the email message appears to come from someone other than the actual sender?

A. Malicious code

 

B. Hoaxes

 

C. Spoofing

 

D. Sniffer

This is the definition of spoofing.

 

 

Accessibility: Keyboard Navigation
Blooms: Remember
Difficulty: 1 Easy
Learning Objective: 05-02 Describe information security and the difference between hackers and viruses.
Topic: Protecting Intellectual Assets

 

91. What is a special class of adware that collects data about the user and transmits it over the Internet without the user’s knowledge or permission?

A. Sniffer

 

B. Spyware

 

C. Spoofware

 

D. Splog

This is the definition of spyware.

 

 

Accessibility: Keyboard Navigation
Blooms: Remember
Blooms: Understand
Difficulty: 1 Easy
Learning Objective: 05-02 Describe information security and the difference between hackers and viruses.
Topic: Protecting Intellectual Assets

 

92. What is a new ransomware program that encrypts your personal files and demands payment for the files’ decryption keys?

A. Sniffer

 

B. Spyware

 

C. Spoofware

 

D. Simplelocker

Simplelocker is a new ransomware program that encrypts your personal files and demands payment for the files’ decryption keys.

 

 

Accessibility: Keyboard Navigation
Blooms: Remember
Blooms: Understand
Difficulty: 2 Medium
Learning Objective: 05-02 Describe information security and the difference between hackers and viruses.
Topic: Protecting Intellectual Assets

 

93. What is a form of malicious software that infects your computer and asks for money?

A. Sniffer

 

B. Spyware

 

C. Spoofware

 

D. Ransomware

Ransomware is a form of malicious software that infects your computer and asks for money.

 

 

Accessibility: Keyboard Navigation
Blooms: Remember
Blooms: Understand
Difficulty: 1 Easy
Learning Objective: 05-02 Describe information security and the difference between hackers and viruses.
Topic: Protecting Intellectual Assets

 

94. What is ransomware?

A. A form of malicious software that infects your computer and asks for money.

 

B. A new ransomware program that encrypts your personal files and demands payment for the file’s decryption keys.

 

C. Software that allows Internet advertisers to display advertisements without the consent of the computer user.

 

D. A special class of adware that collects data about the user and transmits it over the Internet without the user’s knowledge or permission.

Ransomware is a form of malicious software that infects your computer and asks for money.

 

 

Accessibility: Keyboard Navigation
Blooms: Remember
Blooms: Understand
Difficulty: 1 Easy
Learning Objective: 05-02 Describe information security and the difference between hackers and viruses.
Topic: Protecting Intellectual Assets

 

95. What is simplelocker?

A. A form of malicious software that infects your computer and asks for money.

 

B. A new ransomware program that encrypts your personal files and demands payment for the file’s decryption keys.

 

C. Software that allows Internet advertisers to display advertisements without the consent of the computer user.

 

D. A special class of adware that collects data about the user and transmits it over the Internet without the user’s knowledge or permission.

Simplelocker is a new ransomware program that encrypts your personal files and demands payment for the file’s decryption keys.

 

 

Accessibility: Keyboard Navigation
Blooms: Remember
Blooms: Understand
Difficulty: 1 Easy
Learning Objective: 05-02 Describe information security and the difference between hackers and viruses.
Topic: Protecting Intellectual Assets

 

96. What is adware?

A. A form of malicious software that infects your computer and asks for money.

 

B. A new ransomware program that encrypts your personal files and demands payment for the file’s decryption keys.

 

C. Software that allows Internet advertisers to display advertisements without the consent of the computer user.

 

D. A special class of adware that collects data about the user and transmits it over the Internet without the user’s knowledge or permission.

Adware is software that allows Internet advertisers to display advertisements without the consent of the computer user.

 

 

Accessibility: Keyboard Navigation
Blooms: Remember
Blooms: Understand
Difficulty: 1 Easy
Learning Objective: 05-02 Describe information security and the difference between hackers and viruses.
Topic: Protecting Intellectual Assets

 

97. What is spyware?

A. A form of malicious software that infects your computer and asks for money.

 

B. A new ransomware program that encrypts your personal files and demands payment for the file’s decryption keys.

 

C. Software that allows Internet advertisers to display advertisements without the consent of the computer user.

 

D. A special class of adware that collects data about the user and transmits it over the Internet without the user’s knowledge or permission.

Spyware is a special class of adware that collects data about the user and transmits it over the Internet without the user’s knowledge or permission.

 

 

Accessibility: Keyboard Navigation
Blooms: Remember
Blooms: Understand
Difficulty: 1 Easy
Learning Objective: 05-02 Describe information security and the difference between hackers and viruses.
Topic: Protecting Intellectual Assets

 

98. What is the primary difference between a worm and a virus?

A. A worm must attach to something to spread, where a virus does not need to attach to anything to spread and can tunnel itself into the computer.

 

B. A virus is copied and spread by a person, where a worm takes a string of tag words and deletes websites.

 

C. A virus must attach to something to spread, where a worm does not need to attach to anything to spread and can tunnel itself into the computer.

 

D. All of these

A virus must attach to something to spread, where a worm doesn’t need to attach to anything to spread and can tunnel itself into the computer.

 

 

Accessibility: Keyboard Navigation
Blooms: Understand
Difficulty: 2 Medium
Learning Objective: 05-02 Describe information security and the difference between hackers and viruses.
Topic: Protecting Intellectual Assets

 

99. What is a process by which a user misleads a system into granting unauthorized rights, usually for the purpose of compromising or destroying the system?

A. Elevation of privilege

 

B. Packet tampering

 

C. Spoofing

 

D. Spyware

Elevation of privilege is a process by which a user misleads a system into granting unauthorized rights, usually for the purpose of compromising or destroying the system.

 

 

Accessibility: Keyboard Navigation
Blooms: Remember
Difficulty: 1 Easy
Learning Objective: 05-02 Describe information security and the difference between hackers and viruses.
Topic: Protecting Intellectual Assets

 

100. A DDoS stands for one of the common forms of viruses that attack multiple computers to flood a website until it slows or crashes. What does DDoS stand for?

A. Data distribution of systems attack.

 

B. Data denial-of-software attack.

 

C. Distributed data online systems attack.

 

D. Distributed denial-of-service attack.

A distributed denial-of-service attack stands for DDoS, which is one of the common forms of viruses that attacks multiple computers to flood a website until it slows or crashes.

 

 

Accessibility: Keyboard Navigation
Blooms: Remember
Difficulty: 1 Easy
Learning Objective: 05-02 Describe information security and the difference between hackers and viruses.
Topic: Protecting Intellectual Assets

 

101. Which of the following are all common forms of viruses?

A. Packet tampering, worms, cakes, and Trojan viruses

 

B. Polymorphic, sniffer, splogs, and denial-of-service viruses

 

C. Backdoor program, worm, Trojan-horse viruses

 

D. All of these

The types of viruses listed in the book are (1) backdoor programs, (2) denial-of-service attack (DoS), (3) distributed denial-of-service attack (DDoS), (4) polymorphic viruses and worms, (5) Trojan-horse, and (6) worm viruses.

 

 

Accessibility: Keyboard Navigation
Blooms: Understand
Difficulty: 2 Medium
Learning Objective: 05-02 Describe information security and the difference between hackers and viruses.
Topic: Protecting Intellectual Assets

 

102. What is the software called that allows Internet advertisers to display advertisements without the consent of the computer user?

A. Sploging

 

B. Adware

 

C. Spygloss

 

D. CPU buzzer

Adware is software that allows Internet advertisers to display advertisements without the consent of the computer user.

 

 

Accessibility: Keyboard Navigation
Blooms: Remember
Difficulty: 1 Easy
Learning Objective: 05-02 Describe information security and the difference between hackers and viruses.
Topic: Protecting Intellectual Assets

 

103. Who are hackers with criminal intent?

A. Crackers

 

B. Black-hat hacker

 

C. Hoaxes

 

D. Cyberterrorists

This is the definition of crackers.

 

 

Accessibility: Keyboard Navigation
Blooms: Remember
Difficulty: 1 Easy
Learning Objective: 05-02 Describe information security and the difference between hackers and viruses.
Topic: Protecting Intellectual Assets

 

104. Who are those who seek to cause harm to people or to destroy critical systems or information and use the Internet as a weapon of mass destruction?

A. White-hat hacker

 

B. Black-hat hacker

 

C. Cyberterrorists

 

D. Script bunnies

This is the definition of cyberterrorists.

 

 

Accessibility: Keyboard Navigation
Blooms: Remember
Difficulty: 1 Easy
Learning Objective: 05-02 Describe information security and the difference between hackers and viruses.
Topic: Protecting Intellectual Assets

 

105. Which of the following types of viruses spread themselves, not just from file to file, but also from computer to computer?

A. Polymorphic virus

 

B. Worm

 

C. Trojan-horse virus

 

D. Backdoor programs

This is the definition of a worm.

 

 

Accessibility: Keyboard Navigation
Blooms: Remember
Difficulty: 1 Easy
Learning Objective: 05-02 Describe information security and the difference between hackers and viruses.
Topic: Protecting Intellectual Assets

 

106. What is the one of the most common forms of computer vulnerabilities that can cause massive computer damage?

A. Virus

 

B. White-hat hackers

 

C. Dumpster diving

 

D. All of these

One of the most common forms of computer vulnerabilities that cause massive computer damage are viruses.

 

 

Accessibility: Keyboard Navigation
Blooms: Understand
Difficulty: 2 Medium
Learning Objective: 05-02 Describe information security and the difference between hackers and viruses.
Topic: Protecting Intellectual Assets

 

107. Which of the following changes its form as it propagates?

A. Backdoor programs

 

B. Strikers

 

C. Polymorphic viruses and worms

 

D. Splogs

This is the definition of polymorphic viruses and worms.

 

 

Accessibility: Keyboard Navigation
Blooms: Remember
Difficulty: 1 Easy
Learning Objective: 05-02 Describe information security and the difference between hackers and viruses.
Topic: Protecting Intellectual Assets

 

108. Which of the following is a computer attack where an attacker accesses a wireless computer network, intercepts data, uses network services, and/or sends attack instructions without entering the office or organization that owns the network?

A. Backdoor programs

 

B. Drive-by hacking

 

C. Polymorphic viruses and worms

 

D. Hacker

Drive-by hacking is a computer attack where an attacker accesses a wireless computer network, intercepts data, uses network services, and/or sends attack instructions without entering the office or organization that owns the network.

 

 

Accessibility: Keyboard Navigation
Blooms: Remember
Difficulty: 1 Easy
Learning Objective: 05-02 Describe information security and the difference between hackers and viruses.
Topic: Protecting Intellectual Assets

 

109. What is a broad term encompassing the protection of information from accidental or intentional misuse by persons inside or outside an organization?

A. Information security

 

B. Physical security

 

C. Drive-by hacking

 

D. Adware

Information security is a broad term encompassing the protection of information from accidental or intentional misuse by persons inside or outside an organization.

 

 

Accessibility: Keyboard Navigation
Blooms: Remember
Difficulty: 1 Easy
Learning Objective: 05-02 Describe information security and the difference between hackers and viruses.
Topic: Protecting Intellectual Assets

 

110. Who are experts in technology who use their knowledge to break into computers and computer networks, either for profit or just motivated by the challenge?

A. Information spy

 

B. Hacker

 

C. Spyware

 

D. Adware

Hackers are experts in technology who use their knowledge to break into computers and computer networks, either for profit or just motivated by the challenge.

 

 

Accessibility: Keyboard Navigation
Blooms: Remember
Difficulty: 1 Easy
Learning Objective: 05-02 Describe information security and the difference between hackers and viruses.
Topic: Protecting Intellectual Assets

 

111. What is a computer attack where an attacker accesses a wireless computer network, intercepts data, uses network services, and/or sends attack instructions without entering the office or organization that owns the network?

A. Spyware

 

B. Hacker

 

C. Drive-by hacking

 

D. Adware

Drive-by hacking is a computer attack where an attacker accesses a wireless computer network, intercepts data, uses network services, and/or sends attack instructions without entering the office or organization that owns the network.

 

 

Accessibility: Keyboard Navigation
Blooms: Remember
Difficulty: 1 Easy
Learning Objective: 05-02 Describe information security and the difference between hackers and viruses.
Topic: Protecting Intellectual Assets

 

112. What is a special class of adware that collects data about the user and transmits it over the Internet without the user’s knowledge or permission?

A. Spyware

 

B. Hacker

 

C. Drive-by hacking

 

D. Adware

Spyware is a special class of adware that collects data about the user and transmits it over the Internet without the user’s knowledge or permission.

 

 

Accessibility: Keyboard Navigation
Blooms: Remember
Difficulty: 1 Easy
Learning Objective: 05-02 Describe information security and the difference between hackers and viruses.
Topic: Protecting Intellectual Assets

 

113. What is software that while purporting to serve some useful function and often fulfilling that function also allows Internet advertisers to display advertisements without the consent of the computer user?

A. Spyware

 

B. Hacker

 

C. Drive-by hacking

 

D. Adware

Adware is software that while purporting to serve some useful function and often fulfilling that function also allows Internet advertisers to display advertisements without the consent of the computer user.

 

 

Accessibility: Keyboard Navigation
Blooms: Remember
Difficulty: 1 Easy
Learning Objective: 05-02 Describe information security and the difference between hackers and viruses.
Topic: Protecting Intellectual Assets

 

114. What is spyware?

A. A special class of adware that collects data about the user and transmits it over the Internet without the user’s knowledge or permission.

 

B. Experts in technology who use their knowledge to break into computers and computer networks, either for profit or just motivated by the challenge.

 

C. A computer attack where an attacker accesses a wireless computer network, intercepts data, uses network services, and/or sends attack instructions without entering the office or organization that owns the network.

 

D. Software that while purporting to serve some useful function and often fulfilling that function also allows Internet advertisers to display advertisements without the consent of the computer user.

Spyware is a special class of adware that collects data about the user and transmits it over the Internet without the user’s knowledge or permission.

 

 

Accessibility: Keyboard Navigation
Blooms: Remember
Difficulty: 1 Easy
Learning Objective: 05-02 Describe information security and the difference between hackers and viruses.
Topic: Protecting Intellectual Assets

 

115. What is adware?

A. A special class of adware that collects data about the user and transmits it over the Internet without the user’s knowledge or permission.

 

B. Experts in technology who use their knowledge to break into computers and computer networks, either for profit or just motivated by the challenge.

 

C. A computer attack where an attacker accesses a wireless computer network, intercepts data, uses network services, and/or sends attack instructions without entering the office or organization that owns the network.

 

D. Software that while purporting to serve some useful function and often fulfilling that function also allows Internet advertisers to display advertisements without the consent of the computer user.

Adware is software that while purporting to serve some useful function and often fulfilling that function also allows Internet advertisers to display advertisements without the consent of the computer user.

 

 

Accessibility: Keyboard Navigation
Blooms: Remember
Difficulty: 1 Easy
Learning Objective: 05-02 Describe information security and the difference between hackers and viruses.
Topic: Protecting Intellectual Assets

 

116. What is drive-by hacking?

A. A special class of adware that collects data about the user and transmits it over the Internet without the user’s knowledge or permission.

 

B. Experts in technology who use their knowledge to break into computers and computer networks, either for profit or just motivated by the challenge.

 

C. A computer attack where an attacker accesses a wireless computer network, intercepts data, uses network services, and/or sends attack instructions without entering the office or organization that owns the network.

 

D. Software that while purporting to serve some useful function and often fulfilling that function also allows Internet advertisers to display advertisements without the consent of the computer user.

Drive-by hacking is a computer attack where an attacker accesses a wireless computer network, intercepts data, uses network services, and/or sends attack instructions without entering the office or organization that owns the network.

 

 

Accessibility: Keyboard Navigation
Blooms: Remember
Difficulty: 1 Easy
Learning Objective: 05-02 Describe information security and the difference between hackers and viruses.
Topic: Protecting Intellectual Assets

 

117. What is a hacker?

A. A special class of adware that collects data about the user and transmits it over the Internet without the user’s knowledge or permission.

 

B. Experts in technology who use their knowledge to break into computers and computer networks, either for profit or just motivated by the challenge.

 

C. A computer attack where an attacker accesses a wireless computer network, intercepts data, uses network services, and/or sends attack instructions without entering the office or organization that owns the network.

 

D. Software that while purporting to serve some useful function and often fulfilling that function also allows Internet advertisers to display advertisements without the consent of the computer user.

Hackers are experts in technology who use their knowledge to break into computers and computer networks, either for profit or just motivated by the challenge.

 

 

Accessibility: Keyboard Navigation
Blooms: Remember
Difficulty: 1 Easy
Learning Objective: 05-02 Describe information security and the difference between hackers and viruses.
Topic: Protecting Intellectual Assets

 

118. What is information security?

A. A broad term encompassing the protection of information from accidental or intentional misuse by persons inside or outside an organization.

 

B. A special class of adware that collects data about the user and transmits it over the Internet without the user’s knowledge or permission.

 

C. A computer attack where an attacker accesses a wireless computer network, intercepts data, uses network services, and/or sends attack instructions without entering the office or organization that owns the network.

 

D. Software that while purporting to serve some useful function and often fulfilling that function also allows Internet advertisers to display advertisements without the consent of the computer user.

Information security is a broad term encompassing the protection of information from accidental or intentional misuse by persons inside or outside an organization.

 

 

Accessibility: Keyboard Navigation
Blooms: Remember
Difficulty: 1 Easy
Learning Objective: 05-02 Describe information security and the difference between hackers and viruses.
Topic: Protecting Intellectual Assets

 

Essay Questions

119. Explain the ethical issues in the use of information technology.

Information ethics govern the ethical and moral issues arising from the development and use of information technologies, as well as the creation, collection, duplication, distribution, and processing of information itself (with or without the aid of computer technologies). Ethical dilemmas in this area usually arise not as simple, clear-cut situations but as clashes between competing goals, responsibilities, and loyalties. Inevitably, there will be more than one socially acceptable or “correct” decision. For this reason, acting ethically and legally are not always the same.

 

Blooms: Analyze
Difficulty: 3 Hard
Learning Objective: 05-01 Explain information ethics and its associated issues.
Topic: Information Ethics

 

120. Describe the relationship between ethics and privacy.

Ethics are the principles and standards that guide our behavior toward other people. Privacy is the right to be left alone when you want to be, to have control over your own personal possessions, and to not be observed without your consent. Privacy is an ethical issue.

 

Blooms: Analyze
Blooms: Apply
Difficulty: 3 Hard
Learning Objective: 05-01 Explain information ethics and its associated issues.
Topic: Information Ethics

 

121. Describe the relationships and differences between hackers and viruses.

Hackers are experts in technology who use their knowledge to break into computers and computer networks, either for profit or just motivated by the challenge. A virus is software written with malicious intent to cause annoyance or damage. Some hackers create and leave viruses causing massive computer damage.

 

Blooms: Remember
Blooms: Understand
Difficulty: 1 Easy
Learning Objective: 05-02 Describe information security and the difference between hackers and viruses.
Topic: Protecting Intellectual Assets

 

There are no reviews yet.

Add a review

Be the first to review “BUSINESS DRIVEN TECHNOLOGY 7Th Edition By PAIGE BALTZAN – TEST BANK”

Your email address will not be published. Required fields are marked *

Category:
Updating…
  • No products in the cart.