78
Chapter 3 Hughes Question 1 0 out of 1 points Improvements in information technologies are leading to a decreasing number of ethical problems. Answer Selected Answer: Tru e Correct Answer: Fa lse Response Feedback: Question 2 1 out of 1 points The computing skills necessary to be a hacker are increasing. Answer Selected Answer: Fa lse Correct Answer: Fa lse Response Feedback: Question 3 1 out of 1 points

Chapter 3 Hughes

Embed Size (px)

DESCRIPTION

Computer Programing

Citation preview

Page 1: Chapter 3 Hughes

Chapter 3 Hughes

Question 1

0 out of 1 points

Improvements in information technologies are leading to a decreasing number of ethical problems.Answer Selected Answer:  TrueCorrect Answer:  FalseResponse Feedback:  

Question 2

1 out of 1 points

The computing skills necessary to be a hacker are increasing.Answer Selected Answer:  FalseCorrect Answer:  FalseResponse Feedback:  

Question 3

1 out of 1 points

When you interview for a job at a company, it is likely that the company will Google you and search social networking sites for information on you.Answer Selected Answer:  TrueCorrect Answer:  TrueResponse Feedback:  

Question 4

Page 2: Chapter 3 Hughes

1 out of 1 points

The higher the level of an employee in organization, the lower the threat that he or she poses to the organization.Answer Selected Answer:  FalseCorrect Answer:  FalseResponse Feedback:  

Question 5

1 out of 1 points

A password refers to “something the user is.”Answer Selected Answer:  FalseCorrect Answer:  FalseResponse Feedback:  

Question 6

1 out of 1 points

To defend itself against downstream liability, a company must prove that it practices due diligence in information security.Answer Selected Answer:  TrueCorrect Answer:  TrueResponse Feedback:  

Question 7

0 out of 1 points

Page 3: Chapter 3 Hughes

Dumpster diving is:Answer

Selected Answer:  D.  always illegal because it is considered trespassing.

Correct Answer:  C.  typically committed for the purpose of identity theft.

Response Feedback: Threats to Information Security

Question 8

0 out of 1 points

Which of the following factors are not increasing the threats to information security?Answer

Selected Answer:  E.  due diligence

Correct Answer:  A.  limited storage capacity on portable devices

Response Feedback: Threats to Information Security

Question 9

1 out of 1 points

Passwords and passphrases are examples of:Answer

Selected Answer:  A.  something the user knows.

Correct Answer:  A.  something the user knows.

Response Feedback: Protecting Information Resources

Question 10

1 out of 1 points

Page 4: Chapter 3 Hughes

An organization's e-mail policy has the least impact on which of the following software attacks?Answer

Selected Answer:  C.  zero-day

Correct Answer:  C.  zero-day

Response Feedback: Threats to Information Security

Question 11

1 out of 1 points

What is _____ is not necessarily _____.Answer

Selected Answer:  A.  Unethical, illegal

Correct Answer:  A.  Unethical, illegal

Response Feedback: Ethical Issues

Question 12

0 out of 1 points

Which of the following statements is correct?Answer

Selected Answer:

 A.  Consistent international privacy and security laws help companies with their regulatory requirements from country to country.

Correct Answer:

 D.  International privacy and security laws have led to a complex global legal framework.

Response Feedback: Ethical Issues

Page 5: Chapter 3 Hughes

Question 1

0 out of 1 points

_____ is clandestine software that is installed on your PC through duplicitous channels, but is not very malicious.Answer

Selected Answer:  A.  Worm

Correct Answer:  E.  Alien software

Response Feedback: Threats to Information Security

Question 2

1 out of 1 points

_____ uses deception to fraudulently acquire sensitive personal information by masquerading as an official e-mail.Answer

Selected Answer:  D.  Phishing

Correct Answer:  D.  Phishing

Response Feedback: Threats to Information Security

Question 3

1 out of 1 points

Biometrics are an example of:Answer

Selected Answer:  E.  something the user is.

Correct Answer:  E. 

Page 6: Chapter 3 Hughes

something the user is.

Response Feedback: Protecting Information Resources

Question 4

1 out of 1 points

Which of the following factors are not increasing the threats to information security?Answer

Selected Answer:  C.  limited storage capacity on portable devices

Correct Answer:  C.  limited storage capacity on portable devices

Response Feedback: Threats to Information Security

Question 5

1 out of 1 points

Dumpster diving is:Answer

Selected Answer:  A.  typically committed for the purpose of identity theft.

Correct Answer:  A.  typically committed for the purpose of identity theft.

Response Feedback: Threats to Information Security

Question 6

1 out of 1 points

An organization's e-mail policy has the least impact on which of the following software attacks?Answer

Page 7: Chapter 3 Hughes

Selected Answer:  C.  zero-day

Correct Answer:  C.  zero-day

Response Feedback: Threats to Information Security

Question 7

1 out of 1 points

Trojan horses are software programs that hide in other computer programs and reveal their designed behavior only when they are activated.Answer Selected Answer:  TrueCorrect Answer:  TrueResponse Feedback:  

Question 8

1 out of 1 points

Public-key encryption uses two different keys, one public and one private.Answer Selected Answer:  TrueCorrect Answer:  TrueResponse Feedback:  

Question 9

0 out of 1 points

An individual or organization faced with an ethical decision is basically considering whether to break the law.Answer Selected Answer:  True

Page 8: Chapter 3 Hughes

Correct Answer:  FalseResponse Feedback:  

Question 10

1 out of 1 points

The higher the level of an employee in organization, the lower the threat that he or she poses to the organization.Answer Selected Answer:  FalseCorrect Answer:  FalseResponse Feedback:  

Question 11

1 out of 1 points

Purchasing insurance is a type of risk acceptance.Answer Selected Answer:  FalseCorrect Answer:  FalseResponse Feedback:  

Question 12

1 out of 1 points

A password refers to “something the user is.”Answer Selected Answer:  FalseCorrect Answer:  False

Question 1

Page 9: Chapter 3 Hughes

0 out of 1 points

Which of the following is the most important issue raised by the numerous security breaches at NASA?Answer

Selected Answer:

 E.  Should NASA be required to detail its problems with cyberespionage to the taxpayers?

Correct Answer:

 C.  Is it possible to secure the Internet?

Response Feedback: Chapter Opening Case

Question 2

1 out of 1 points

_____ is the process in which an organization assesses the value of each asset being protected, estimates the probability that each asset might be compromised, and compares the probable costs of each being compromised with the costs of protecting it.Answer

Selected Answer:  D.  Risk analysis

Correct Answer:  D.  Risk analysis

Response Feedback: Protecting Information Resources

Question 3

1 out of 1 points

_____ is designed to use your computer as a launch pad for sending unsolicited e-mail to other computers.Answer

Selected Answer:  D.  Spamware

Page 10: Chapter 3 Hughes

Correct Answer:  D.  Spamware

Response Feedback: Threats to Information Security

Question 4

1 out of 1 points

A(n) _____ is any danger to which an information resource may be exposed.Answer

Selected Answer:  B.  threat

Correct Answer:  B.  threat

Response Feedback: Threats to Information Security

Question 5

1 out of 1 points

An organization's e-mail policy has the least impact on which of the following software attacks?Answer

Selected Answer:  B.  zero-day

Correct Answer:  B.  zero-day

Response Feedback: Threats to Information Security

Question 6

0 out of 1 points

Which of the following is not a characteristic of strong passwords?Answer

Page 11: Chapter 3 Hughes

Selected Answer:

 C.  should be difficult to guess

Correct Answer:  A.  should be shorter rather than longer so the password can be remembered

Response Feedback: Protecting Information Resources

Question 7

1 out of 1 points

When you interview for a job at a company, it is likely that the company will Google you and search social networking sites for information on you.Answer Selected Answer:  TrueCorrect Answer:  TrueResponse Feedback:  

Question 8

0 out of 1 points

Dumpster diving is always illegal because it involves trespassing on private property.Answer Selected Answer:  TrueCorrect Answer:  FalseResponse Feedback:  

Question 9

1 out of 1 points

When companies require users to accurately select characters in turn from a series of boxes, attackers use screen scrapers to capture this information.Answer

Page 12: Chapter 3 Hughes

Selected Answer:  TrueCorrect Answer:  TrueResponse Feedback:  

Question 10

1 out of 1 points

To defend itself against downstream liability, a company must prove that it practices due diligence in information security.Answer Selected Answer:  TrueCorrect Answer:  TrueResponse Feedback:  

Question 11

1 out of 1 points

Improvements in information technologies are leading to a decreasing number of ethical problems.Answer Selected Answer:  FalseCorrect Answer:  FalseResponse Feedback:  

Question 12

1 out of 1 points

The higher the level of an employee in organization, the lower the threat that he or she poses to the organization.Answer Selected Answer:  FalseCorrect Answer:  Fals

Page 13: Chapter 3 Hughes

Question 1

0 out of 1 points

_____ involves building an inappropriate trust relationship with employees for the purpose of gaining sensitive information or unauthorized access privileges.Answer

Selected Answer:  A.  Hacking

Correct Answer:  E.  Social engineering

Response Feedback: Threats to Information Security

Question 2

1 out of 1 points

A(n) _____ is intellectual work that is known only to a company and is not based on public information.Answer

Selected Answer:  D.  trade secret

Correct Answer:  D.  trade secret

Response Feedback: Threats to Information Security

Question 3

1 out of 1 points

Bob is using public key encryption to send a message to Ted. Bob encrypts the message with Ted's _____ key and Ted decrypts the message using his _____ key.Answer

Selected Answer:  B.  public, private

Page 14: Chapter 3 Hughes

Correct Answer:  B.  public, private

Response Feedback: See Protecting Information Resources

Question 4

1 out of 1 points

_____ is the process in which an organization assesses the value of each asset being protected, estimates the probability that each asset might be compromised, and compares the probable costs of each being compromised with the costs of protecting it.Answer

Selected Answer:  C.  Risk analysis

Correct Answer:  C.  Risk analysis

Response Feedback: Protecting Information Resources

Question 5

1 out of 1 points

In _____, the organization takes concrete actions against risks.Answer

Selected Answer:  B.  risk mitigation

Correct Answer:  B.  risk mitigation

Response Feedback: Protecting Information Resources

Question 6

0 out of 1 points

Page 15: Chapter 3 Hughes

The process of profiling:Answer

Selected Answer:  A.  is legal, but unethical.

Correct Answer:  C.  decreases individual privacy.

Response Feedback: Ethical Issues

Question 7

0 out of 1 points

An individual or organization faced with an ethical decision is basically considering whether to break the law.Answer Selected Answer:  TrueCorrect Answer:  FalseResponse Feedback:  

Question 8

1 out of 1 points

A code of ethics is a collection of principles that are intended to guide decision making by members of the organization.Answer Selected Answer:  TrueCorrect Answer:  TrueResponse Feedback:  

Question 9

0 out of 1 points

Page 16: Chapter 3 Hughes

In most cases, cookies track your path through Web sites and are therefore invasions of your privacy.Answer Selected Answer:  TrueCorrect Answer:  FalseResponse Feedback:  

Question 10

1 out of 1 points

Cyberterrorism and cyberwarfare can attack supervisory control and data acquisition systems to cause widespread physical damage.Answer Selected Answer:  TrueCorrect Answer:  TrueResponse Feedback:  

Question 11

1 out of 1 points

A password refers to “something the user is.”Answer Selected Answer:  FalseCorrect Answer:  FalseResponse Feedback:  

Question 12

1 out of 1 points

In a distributed denial-of-service attack, a coordinated stream of requests is launched against a target from many compromised computers at the same time.Answer

Page 17: Chapter 3 Hughes

Selected Answer:  TrueCorrect Answer:  True

Question 1

1 out of 1 points

Cyberterrorism and cyberwarfare can attack supervisory control and data acquisition systems to cause widespread physical damage.Answer Selected Answer:  TrueCorrect Answer:  TrueResponse Feedback:  

Question 2

1 out of 1 points

The computing skills necessary to be a hacker are increasing.Answer Selected Answer:  FalseCorrect Answer:  FalseResponse Feedback:  

Question 3

1 out of 1 points

An individual or organization faced with an ethical decision is basically considering whether to break the law.Answer Selected Answer:  FalseCorrect Answer:  FalseResponse Feedback:  

Page 18: Chapter 3 Hughes

Question 4

1 out of 1 points

A password refers to “something the user is.”Answer Selected Answer:  FalseCorrect Answer:  FalseResponse Feedback:  

Question 5

0 out of 1 points

The security of each computer on the Internet is independent of the security of all other computers on the Internet.Answer Selected Answer:  TrueCorrect Answer:  FalseResponse Feedback:  

Question 6

0 out of 1 points

Dumpster diving is always illegal because it involves trespassing on private property.Answer Selected Answer:  TrueCorrect Answer:  FalseResponse Feedback:  

Question 7

1 out of 1 points

Page 19: Chapter 3 Hughes

Biometrics are an example of:Answer

Selected Answer:  A.  something the user is.

Correct Answer:  A.  something the user is.

Response Feedback: Protecting Information Resources

Question 8

1 out of 1 points

In _____, the organization takes concrete actions against risks.Answer

Selected Answer:  A.  risk mitigation

Correct Answer:  A.  risk mitigation

Response Feedback: Protecting Information Resources

Question 9

0 out of 1 points

Employees in which functional areas of the organization pose particularly grave threats to information security?Answer

Selected Answer:  B.  finance, management information systems

Correct Answer:  D.  human resources, management information systems

Response Feedback: Threats to Information Security

Question 10

Page 20: Chapter 3 Hughes

0 out of 1 points

A(n) _____ is any danger to which an information resource may be exposed.Answer

Selected Answer:  A.  risk

Correct Answer:  D.  threat

Response Feedback: Threats to Information Security

Question 11

0 out of 1 points

Voice and signature recognition are examples of:Answer

Selected Answer:  E.  something the user knows.

Correct Answer:  B.  something the user does.

Response Feedback: Protecting Information Resources

Question 12

0 out of 1 points

_____ are segments of computer code embedded within an organization's existing computer programs that activate and perform a destructive action at a certain time or date.Answer

Selected Answer:  D.  Viruses

Correct Answer:  A.  Logic bomb

Page 21: Chapter 3 Hughes

Response Feedback: Threats to Information Security

Question 1

0 out of 1 points

Unintentional threats to information systems include all of the following except:Answer

Selected Answer:  A.  tornados

Correct Answer:  B.  malicious software

Response Feedback: Threats to Information Security

Question 2

0 out of 1 points

Rank the following in terms of dollar value of the crime, from highest to lowest.Answer

Selected Answer:  D.  cybercrime – robbery – white collar crime

Correct Answer:  E.  cybercrime – white collar crime – robbery

Response Feedback: Threats to Information Security

Question 3

0 out of 1 points

The most overlooked people in information security are:Answer

Selected Answer:  C.  executives and executive secretaries.

Page 22: Chapter 3 Hughes

Correct Answer:  D.  janitors and guards.

Response Feedback: Threats to Information Security

Question 4

0 out of 1 points

In a(n) _____ attack, a coordinated stream of requests is launched against a target system from many compromised computers at the same time.Answer

Selected Answer:  B.  denial-of-service

Correct Answer:  C.  distributed denial-of-service

Response Feedback: Threats to Information Security

Question 5

0 out of 1 points

Which of the following statements is not correct concerning the difficulties in protecting information resources?Answer

Selected Answer:

 C.  Computer crimes often remain undetected for a long period of time.

Correct Answer:  A.  Rapid technological changes ensure that controls are effective for years.

Response Feedback: Protecting Information Resources

Question 6

0 out of 1 points

Page 23: Chapter 3 Hughes

When companies attempt to counter _____ by requiring users to accurately select characters in turn from a series of boxes, attackers use _____.Answer

Selected Answer:  B.  spam, keyloggers

Correct Answer:  A.  keyloggers, screen scrapers

Response Feedback: Threats to Information Security

Question 7

1 out of 1 points

The computing skills necessary to be a hacker are increasing.Answer Selected Answer:  FalseCorrect Answer:  FalseResponse Feedback:  

Question 8

0 out of 1 points

Zero-day attacks use descriptive e-mails to acquire sensitive personal information.Answer Selected Answer:  TrueCorrect Answer:  FalseResponse Feedback:  

Question 9

1 out of 1 points

Improvements in information technologies are leading to a decreasing number of ethical problems.

Page 24: Chapter 3 Hughes

Answer Selected Answer:  FalseCorrect Answer:  FalseResponse Feedback:  

Question 10

1 out of 1 points

Public-key encryption uses two different keys, one public and one private.Answer Selected Answer:  TrueCorrect Answer:  TrueResponse Feedback:  

Question 11

1 out of 1 points

In a distributed denial-of-service attack, a coordinated stream of requests is launched against a target from many compromised computers at the same time.Answer Selected Answer:  TrueCorrect Answer:  TrueResponse Feedback:  

Question 12

1 out of 1 points

A password refers to “something the user is.”Answer Selected Answer:  FalseCorrect Answer:  False

Page 25: Chapter 3 Hughes

Question 1

1 out of 1 points

To defend itself against downstream liability, a company must prove that it practices due diligence in information security.Answer Selected Answer:  TrueCorrect Answer:  TrueResponse Feedback:  

Question 2

1 out of 1 points

In reverse social engineering, the employees approach the attacker.Answer Selected Answer:  TrueCorrect Answer:  TrueResponse Feedback:  

Question 3

1 out of 1 points

The computing skills necessary to be a hacker are increasing.Answer Selected Answer:  FalseCorrect Answer:  FalseResponse Feedback:  

Question 4

1 out of 1 points

Page 26: Chapter 3 Hughes

In most cases, cookies track your path through Web sites and are therefore invasions of your privacy.Answer Selected Answer:  FalseCorrect Answer:  FalseResponse Feedback:  

Question 5

1 out of 1 points

Improvements in information technologies are leading to a decreasing number of ethical problems.Answer Selected Answer:  FalseCorrect Answer:  FalseResponse Feedback:  

Question 6

1 out of 1 points

Trojan horses are software programs that hide in other computer programs and reveal their designed behavior only when they are activated.Answer Selected Answer:  TrueCorrect Answer:  TrueResponse Feedback:  

Question 7

1 out of 1 points

Page 27: Chapter 3 Hughes

Your company's computers have been taken over by an attacker and used to attack another organization's information systems. Your problem is which of the following?Answer

Selected Answer:  D.  downstream liability

Correct Answer:  D.  downstream liability

Response Feedback: Threats to Information Security

Question 8

1 out of 1 points

Which of the following statements is not correct?Answer

Selected Answer:

 E.  As with normal first-class mail, employers cannot read employee e-mail.

Correct Answer:  E.  As with normal first-class mail, employers cannot read employee e-mail.

Response Feedback: Ethical Issues

Question 9

1 out of 1 points

The most overlooked people in information security are:Answer

Selected Answer:  D.  janitors and guards.

Correct Answer:  D.  janitors and guards.

Response Feedback: Threats to Information Security

Question 10

Page 28: Chapter 3 Hughes

0 out of 1 points

Which attack method would most typically be used in cyberwarfare?Answer

Selected Answer:  C.  distributed denial-of-service

Correct Answer:  E.  supervisory control and data acquisition

Response Feedback: Threats to Information Security

Question 11

1 out of 1 points

_____ are segments of computer code embedded within an organization's existing computer programs that activate and perform a destructive action at a certain time or date.Answer

Selected Answer:  E.  Logic bomb

Correct Answer:  E.  Logic bomb

Response Feedback: Threats to Information Security

Question 12

1 out of 1 points

The process of profiling:Answer

Selected Answer:  B.  decreases individual privacy.

Correct Answer:  B.  decreases individual privacy.

Page 29: Chapter 3 Hughes

Question 1

1 out of 1 points

A(n) _____ is a document that grants the holder exclusive rights on an invention for 20 years.Answer

Selected Answer:  B.  patent

Correct Answer:  B.  patent

Response Feedback: Threats to Information Security

Question 2

1 out of 1 points

_____ issues involve who may obtain information and how much they should pay for this information.Answer

Selected Answer:  E.  Accessibility

Correct Answer:  E.  Accessibility

Response Feedback: Ethical Issues

Question 3

1 out of 1 points

Which of the following statements is correct?Answer

Selected Answer:

 B.  International privacy and security laws have led to a complex global legal framework.

Page 30: Chapter 3 Hughes

Correct Answer:

 B.  International privacy and security laws have led to a complex global legal framework.

Response Feedback: Ethical Issues

Question 4

0 out of 1 points

The computing skills necessary to be a hacker are decreasing for which of the following reasons?Answer

Selected Answer:

 A.  International organized crime is training hackers.

Correct Answer:

 B.  Computer attack programs, called scripts, are available for download from the Internet.

Response Feedback: Threats to Information Security

Question 5

0 out of 1 points

Your company's computers have been taken over by an attacker and used to attack another organization's information systems. Your problem is which of the following?Answer

Selected Answer:  E.  poor security policies and procedures

Correct Answer:  C.  downstream liability

Response Feedback: Threats to Information Security

Question 6

1 out of 1 points

Page 31: Chapter 3 Hughes

_____ involves building an inappropriate trust relationship with employees for the purpose of gaining sensitive information or unauthorized access privileges.Answer

Selected Answer:  A.  Social engineering

Correct Answer:  A.  Social engineering

Response Feedback: Threats to Information Security

Question 7

0 out of 1 points

A password refers to “something the user is.”Answer Selected Answer:  TrueCorrect Answer:  FalseResponse Feedback:  

Question 8

1 out of 1 points

In a distributed denial-of-service attack, a coordinated stream of requests is launched against a target from many compromised computers at the same time.Answer Selected Answer:  TrueCorrect Answer:  TrueResponse Feedback:  

Question 9

1 out of 1 points

Page 32: Chapter 3 Hughes

Dumpster diving is always illegal because it involves trespassing on private property.Answer Selected Answer:  FalseCorrect Answer:  FalseResponse Feedback:  

Question 10

1 out of 1 points

When you interview for a job at a company, it is likely that the company will Google you and search social networking sites for information on you.Answer Selected Answer:  TrueCorrect Answer:  TrueResponse Feedback:  

Question 11

1 out of 1 points

A code of ethics is a collection of principles that are intended to guide decision making by members of the organization.Answer Selected Answer:  TrueCorrect Answer:  TrueResponse Feedback:  

Question 12

1 out of 1 points

When companies require users to accurately select characters in turn from a series of boxes, attackers use screen scrapers to capture this information.

Page 33: Chapter 3 Hughes

Answer Selected Answer:  TrueCorrect Answer:  True

Question 1

0 out of 1 points

Biometrics are an example of:Answer

Selected Answer:  A.  something the user does.

Correct Answer:  C.  something the user is.

Response Feedback: Protecting Information Resources

Question 2

1 out of 1 points

_____ are software programs that hide in other computer programs and reveal their designed behavior only when they are activated.Answer

Selected Answer:  D.  Trojan horses

Correct Answer:  D.  Trojan horses

Response Feedback: Threats to Information Security

Question 3

1 out of 1 points

A(n) information system's _____ is the possibility that the system will suffer harm by a threat.

Page 34: Chapter 3 Hughes

Answer

Selected Answer:  A.  vulnerability

Correct Answer:  A.  vulnerability

Response Feedback: Threats to Information Security

Question 4

1 out of 1 points

Which of the following statements is not correct concerning the difficulties in protecting information resources?Answer

Selected Answer:

 A.  Rapid technological changes ensure that controls are effective for years.

Correct Answer:  A.  Rapid technological changes ensure that controls are effective for years.

Response Feedback: Protecting Information Resources

Question 5

0 out of 1 points

_____ issues involve collecting, storing and disseminating information about individuals.Answer

Selected Answer:  B.  Accessibility

Correct Answer:  A.  Privacy

Response Feedback: Ethical Issues

Question 6

Page 35: Chapter 3 Hughes

0 out of 1 points

Various organizations that promote fair and responsible use of information systems often develop _____:Answer

Selected Answer:  A.  a strategic plan

Correct Answer:  E.  a code of ethics

Response Feedback: Ethical Issues

Question 7

1 out of 1 points

Trojan horses are software programs that hide in other computer programs and reveal their designed behavior only when they are activated.Answer Selected Answer:  TrueCorrect Answer:  TrueResponse Feedback:  

Question 8

0 out of 1 points

A code of ethics is a collection of principles that are intended to guide decision making by members of the organization.Answer Selected Answer:  FalseCorrect Answer:  TrueResponse Feedback:  

Question 9

Page 36: Chapter 3 Hughes

0 out of 1 points

The security of each computer on the Internet is independent of the security of all other computers on the Internet.Answer Selected Answer:  TrueCorrect Answer:  FalseResponse Feedback:  

Question 10

0 out of 1 points

The computing skills necessary to be a hacker are increasing.Answer Selected Answer:  TrueCorrect Answer:  FalseResponse Feedback:  

Question 11

1 out of 1 points

To defend itself against downstream liability, a company must prove that it practices due diligence in information security.Answer Selected Answer:  TrueCorrect Answer:  TrueResponse Feedback:  

Question 12

1 out of 1 points

Page 37: Chapter 3 Hughes

When companies require users to accurately select characters in turn from a series of boxes, attackers use screen scrapers to capture this information.Answer Selected Answer:  TrueCorrect Answer:  True

Question 1

1 out of 1 points

In a distributed denial-of-service attack, a coordinated stream of requests is launched against a target from many compromised computers at the same time.Answer Selected Answer:  TrueCorrect Answer:  TrueResponse Feedback:  

Question 2

1 out of 1 points

Human errors cause more than half of the security-related problems in many organizations.Answer Selected Answer:  TrueCorrect Answer:  TrueResponse Feedback:  

Question 3

1 out of 1 points

The higher the level of an employee in organization, the lower the threat that he or she poses to the organization.Answer Selected Answer:  False

Page 38: Chapter 3 Hughes

Correct Answer:  FalseResponse Feedback:  

Question 4

1 out of 1 points

To defend itself against downstream liability, a company must prove that it practices due diligence in information security.Answer Selected Answer:  TrueCorrect Answer:  TrueResponse Feedback:  

Question 5

1 out of 1 points

Cyberterrorism and cyberwarfare can attack supervisory control and data acquisition systems to cause widespread physical damage.Answer Selected Answer:  TrueCorrect Answer:  TrueResponse Feedback:  

Question 6

1 out of 1 points

Trojan horses are software programs that hide in other computer programs and reveal their designed behavior only when they are activated.Answer Selected Answer:  TrueCorrect Answer:  TrueResponse Feedback:  

Page 39: Chapter 3 Hughes

Question 7

1 out of 1 points

_____ issues involve collecting, storing and disseminating information about individuals.Answer

Selected Answer:  C.  Privacy

Correct Answer:  C.  Privacy

Response Feedback: Ethical Issues

Question 8

1 out of 1 points

A(n) _____ is any danger to which an information resource may be exposed.Answer

Selected Answer:  A.  threat

Correct Answer:  A.  threat

Response Feedback: Threats to Information Security

Question 9

1 out of 1 points

Biometrics are an example of:Answer

Selected Answer:  E.  something the user is.

Correct Answer:  E.  something the user is.

Page 40: Chapter 3 Hughes

Response Feedback: Protecting Information Resources

Question 10

1 out of 1 points

_____ are segments of computer code embedded within an organization's existing computer programs that activate and perform a destructive action at a certain time or date.Answer

Selected Answer:  C.  Logic bomb

Correct Answer:  C.  Logic bomb

Response Feedback: Threats to Information Security

Question 11

0 out of 1 points

In _____, the attacker approaches employees, where in _____ the employees approach the attacker.Answer

Selected Answer:  C.  phishing, social engineering

Correct Answer:  A.  social engineering, reverse social engineering

Response Feedback: Threats to Information Security

Question 12

0 out of 1 points

Which of the following statements is correct?Answer

Page 41: Chapter 3 Hughes

Selected Answer:  A.  An individual's right to privacy supersedes the needs of society.

Correct Answer:  B.  It is difficult to determine and enforce privacy regulations.

Question 1

1 out of 1 points

Trojan horses are software programs that hide in other computer programs and reveal their designed behavior only when they are activated.Answer Selected Answer:  TrueCorrect Answer:  TrueResponse Feedback:  

Question 2

1 out of 1 points

In most cases, cookies track your path through Web sites and are therefore invasions of your privacy.Answer Selected Answer:  FalseCorrect Answer:  FalseResponse Feedback:  

Question 3

1 out of 1 points

In reverse social engineering, the employees approach the attacker.Answer Selected Answer:  TrueCorrect Answer:  True

Page 42: Chapter 3 Hughes

Response Feedback:  

Question 4

1 out of 1 points

The higher the level of an employee in organization, the lower the threat that he or she poses to the organization.Answer Selected Answer:  FalseCorrect Answer:  FalseResponse Feedback:  

Question 5

1 out of 1 points

When you interview for a job at a company, it is likely that the company will Google you and search social networking sites for information on you.Answer Selected Answer:  TrueCorrect Answer:  TrueResponse Feedback:  

Question 6

1 out of 1 points

Human errors cause more than half of the security-related problems in many organizations.Answer Selected Answer:  TrueCorrect Answer:  TrueResponse Feedback:  

Page 43: Chapter 3 Hughes

Question 7

1 out of 1 points

Which of the following statements is correct?Answer

Selected Answer:  B.  It is difficult to determine and enforce privacy regulations.

Correct Answer:  B.  It is difficult to determine and enforce privacy regulations.

Response Feedback: Ethical Issues

Question 8

1 out of 1 points

_____ is designed to use your computer as a launch pad for sending unsolicited e-mail to other computers.Answer

Selected Answer:  C.  Spamware

Correct Answer:  C.  Spamware

Response Feedback: Threats to Information Security

Question 9

1 out of 1 points

Employees in which functional areas of the organization pose particularly grave threats to information security?Answer

Selected Answer:  B.  human resources, management information systems

Correct Answer:  B. 

Page 44: Chapter 3 Hughes

human resources, management information systems

Response Feedback: Threats to Information Security

Question 10

0 out of 1 points

_____ issues involve the authenticity and fidelity of information that is collected and processed.Answer

Selected Answer:  B.  Privacy

Correct Answer:  A.  Accuracy

Response Feedback: Ethical Issues

Question 11

1 out of 1 points

Various organizations that promote fair and responsible use of information systems often develop _____:Answer

Selected Answer:  B.  a code of ethics

Correct Answer:  B.  a code of ethics

Response Feedback: Ethical Issues

Question 12

0 out of 1 points

In its study of various organizations, the Ponemon Institute found that the most common cause of data breaches was which of the following?

Page 45: Chapter 3 Hughes

Answer

Selected Answer:  E.  weak passwords

Correct Answer:  A.  employee negligence

Question 1

1 out of 1 points

Cyberterrorism and cyberwarfare can attack supervisory control and data acquisition systems to cause widespread physical damage.Answer Selected Answer:  TrueCorrect Answer:  TrueResponse Feedback:  

Question 2

1 out of 1 points

Dumpster diving is always illegal because it involves trespassing on private property.Answer Selected Answer:  FalseCorrect Answer:  FalseResponse Feedback:  

Question 3

1 out of 1 points

In reverse social engineering, the employees approach the attacker.Answer Selected Answer:  TrueCorrect Answer:  True

Page 46: Chapter 3 Hughes

Response Feedback:  

Question 4

1 out of 1 points

An individual or organization faced with an ethical decision is basically considering whether to break the law.Answer Selected Answer:  FalseCorrect Answer:  FalseResponse Feedback:  

Question 5

1 out of 1 points

The security of each computer on the Internet is independent of the security of all other computers on the Internet.Answer Selected Answer:  FalseCorrect Answer:  FalseResponse Feedback:  

Question 6

1 out of 1 points

Human errors cause more than half of the security-related problems in many organizations.Answer Selected Answer:  TrueCorrect Answer:  TrueResponse Feedback:  

Page 47: Chapter 3 Hughes

Question 7

1 out of 1 points

_____ uses deception to fraudulently acquire sensitive personal information by masquerading as an official e-mail.Answer

Selected Answer:  B.  Phishing

Correct Answer:  B.  Phishing

Response Feedback: Threats to Information Security

Question 8

1 out of 1 points

_____ issues involve the authenticity and fidelity of information that is collected and processed.Answer

Selected Answer:  D.  Accuracy

Correct Answer:  D.  Accuracy

Response Feedback: Ethical Issues

Question 9

1 out of 1 points

A(n) information system's _____ is the possibility that the system will suffer harm by a threat.Answer

Selected Answer:  A.  vulnerability

Page 48: Chapter 3 Hughes

Correct Answer:  A.  vulnerability

Response Feedback: Threats to Information Security

Question 10

1 out of 1 points

Various organizations that promote fair and responsible use of information systems often develop _____:Answer

Selected Answer:  D.  a code of ethics

Correct Answer:  D.  a code of ethics

Response Feedback: Ethical Issues

Question 11

0 out of 1 points

Access controls involve _____ before _____.Answer

Selected Answer:  B.  authorization, authentication

Correct Answer:  D.  authentication, authorization

Response Feedback: Protecting Information Resources

Question 12

1 out of 1 points

Your company's computers have been taken over by an attacker and used to attack another organization's information systems. Your problem is which of the following?

Page 49: Chapter 3 Hughes

Answer

Selected Answer:  B.  downstream liability

Correct Answer:  B.  downstream liability

Question 1

1 out of 1 points

Which of the following is not a characteristic of strong passwords?Answer

Selected Answer:

 E.  should be shorter rather than longer so the password can be remembered

Correct Answer:  E.  should be shorter rather than longer so the password can be remembered

Response Feedback: Protecting Information Resources

Question 2

1 out of 1 points

Which of the following statements is not correct?Answer

Selected Answer:

 C.  As with normal first-class mail, employers cannot read employee e-mail.

Correct Answer:  C.  As with normal first-class mail, employers cannot read employee e-mail.

Response Feedback: Ethical Issues

Question 3

Page 50: Chapter 3 Hughes

1 out of 1 points

_____ is clandestine software that is installed on your PC through duplicitous channels, but is not very malicious.Answer

Selected Answer:  C.  Alien software

Correct Answer:  C.  Alien software

Response Feedback: Threats to Information Security

Question 4

0 out of 1 points

_____ means verifying processing by checking for known outputs using specific inputs.Answer

Selected Answer:  D.  Auditing through the computer

Correct Answer:  E.  Auditing around the computer

Response Feedback: Protecting Information Resources

Question 5

1 out of 1 points

Passwords and passphrases are examples of:Answer

Selected Answer:  D.  something the user knows.

Correct Answer:  D.  something the user knows.

Response Feedback: Protecting Information Resources

Page 51: Chapter 3 Hughes

Question 6

1 out of 1 points

_____ uses deception to fraudulently acquire sensitive personal information by masquerading as an official e-mail.Answer

Selected Answer:  A.  Phishing

Correct Answer:  A.  Phishing

Response Feedback: Threats to Information Security

Question 7

1 out of 1 points

A password refers to “something the user is.”Answer Selected Answer:  FalseCorrect Answer:  FalseResponse Feedback:  

Question 8

1 out of 1 points

A code of ethics is a collection of principles that are intended to guide decision making by members of the organization.Answer Selected Answer:  TrueCorrect Answer:  TrueResponse Feedback:  

Question 9

Page 52: Chapter 3 Hughes

1 out of 1 points

Cyberterrorism and cyberwarfare can attack supervisory control and data acquisition systems to cause widespread physical damage.Answer Selected Answer:  TrueCorrect Answer:  TrueResponse Feedback:  

Question 10

1 out of 1 points

Dumpster diving is always illegal because it involves trespassing on private property.Answer Selected Answer:  FalseCorrect Answer:  FalseResponse Feedback:  

Question 11

1 out of 1 points

In most cases, cookies track your path through Web sites and are therefore invasions of your privacy.Answer Selected Answer:  FalseCorrect Answer:  FalseResponse Feedback:  

Question 12

1 out of 1 points

Page 53: Chapter 3 Hughes

Public-key encryption uses two different keys, one public and one private.Answer Selected Answer:  TrueCorrect Answer:  True

Question 1

1 out of 1 points

The process of profiling:Answer

Selected Answer:  B.  decreases individual privacy.

Correct Answer:  B.  decreases individual privacy.

Response Feedback: Ethical Issues

Question 2

1 out of 1 points

_____ is designed to use your computer as a launch pad for sending unsolicited e-mail to other computers.Answer

Selected Answer:  E.  Spamware

Correct Answer:  E.  Spamware

Response Feedback: Threats to Information Security

Question 3

1 out of 1 points

Page 54: Chapter 3 Hughes

A(n) _____ is a document that grants the holder exclusive rights on an invention for 20 years.Answer

Selected Answer:  C.  patent

Correct Answer:  C.  patent

Response Feedback: Threats to Information Security

Question 4

1 out of 1 points

Passwords and passphrases are examples of:Answer

Selected Answer:  B.  something the user knows.

Correct Answer:  B.  something the user knows.

Response Feedback: Protecting Information Resources

Question 5

1 out of 1 points

A(n) _____ is any danger to which an information resource may be exposed.Answer

Selected Answer:  E.  threat

Correct Answer:  E.  threat

Response Feedback: Threats to Information Security

Question 6

1 out of 1 points

Page 55: Chapter 3 Hughes

Which of the following statements is correct?Answer

Selected Answer:  D.  It is difficult to determine and enforce privacy regulations.

Correct Answer:  D.  It is difficult to determine and enforce privacy regulations.

Response Feedback: Ethical Issues

Question 7

1 out of 1 points

In most cases, cookies track your path through Web sites and are therefore invasions of your privacy.Answer Selected Answer:  FalseCorrect Answer:  FalseResponse Feedback:  

Question 8

1 out of 1 points

A code of ethics is a collection of principles that are intended to guide decision making by members of the organization.Answer Selected Answer:  TrueCorrect Answer:  TrueResponse Feedback:  

Question 9

1 out of 1 points

Page 56: Chapter 3 Hughes

The security of each computer on the Internet is independent of the security of all other computers on the Internet.Answer Selected Answer:  FalseCorrect Answer:  FalseResponse Feedback:  

Question 10

1 out of 1 points

In a distributed denial-of-service attack, a coordinated stream of requests is launched against a target from many compromised computers at the same time.Answer Selected Answer:  TrueCorrect Answer:  TrueResponse Feedback:  

Question 11

1 out of 1 points

A password refers to “something the user is.”Answer Selected Answer:  FalseCorrect Answer:  FalseResponse Feedback:  

Question 12

1 out of 1 points

Public-key encryption uses two different keys, one public and one private.Answer

Page 57: Chapter 3 Hughes

Selected Answer:  TrueCorrect Answer:  True