9. Privacy, Security, and Ethics

Ace your homework & exams now with Quizwiz!

Select all the items that use encryptions. A virtual private networks B. email C. web sites D. files E. in-person conversations F. wireless networks

A virtual private networks B. email C. web sites D. files F. wireless networks

The _____ makes it a crime for any unauthorized person to view, copy, or damage data using any computer across state lines. A. Computer Fraud and Abuse Act B. HIPAA C. FERPA D. CAN-SPAM Act

A. Computer Fraud and Abuse Act

The law that allows you to gain access to your credit report is called the _____ . A. Freedom of Information Act B. Identity Monitoring Program C. Mistaken Identity Bill

A. Freedom of Information Act

Select all the examples of computer crime. A. Internet scams B. identify theft C. denial of service attacks D. snoopware

A. Internet scams B. identify theft C. denial of service attacks - Also include data manipulation and ransomware

_____ enter a computer system disguised as something else and appear to be harmless. A. Trojan horse B. traditional cookies C. viruses D. worms

A. Trojan horse

_____ create a secure virtual connection to a company LAN across the Internet. A. VPNs B. hotspots C. zombies

A. VPNs (virtual private networks)

The _____ scanning devices are used to gain access to restricted systems or data. A. biometric B. firewall C. password

A. biometric

_____ is the use of the Internet, cell phones, or other devices to send or post content intended to hurt or embarrass another person. A. cyberbullying B. internet-bullying C. phishing

A. cyberbullying

_____ is concerned with protecting information stores in computer systems from unauthorized tampering or damage. A. data security B. version control C. quality control procedures

A. data security

Large organizations are constantly compiling information about us and storing the data in large _____. A. databases B. documents C. filing cabinets D. spreadsheets

A. databases

_____ software uses specialized cameras to identify users and grant them access to a system. A. facial recognition B. surveillance C. digital image

A. facial recognition

A _____ acts as a security buffer between a private network and all external networks. A. firewall B. security wall C. network scanner

A. firewall

___ file, is created by your browser and shows the locations of websites you've visited. A. history B. web C. cookie

A. history

Your online _____ is information about you that you post voluntarily on social networking, blogging, photo-sharing and video-sharing sites. A. identity B. privacy C. wiki

A. identity

Select all the examples of malicious hardware. A. infected USB flash drive B. rogue Wi-Fi hotspots C. worms D. zombie botnets (computers infected by a virus, worm, or Trojan horse that allows them to be remotely controlled for malicious purposes) E. viruses

A. infected USB flash drive B. rogue Wi-Fi hotspots D. zombie botnets

The owner of a website like Spokeo Enterprise would be a(n)_____ . A. information reseller B. hacker C. information keeper D. carder

A. information reseller

Select all the ways to restrict access to computer systems. A. password protection B. malware manipulation C. check identification D. guards at computer rooms

A. password protection C. check identification D. guards at computer rooms

If you found out that a website that you use to purchase goods is sharing your personal information you would want to check their _____ policy. A. privacy B. security C. ethics

A. privacy

_____ modes ensures that your browsing activity is not recorded on your hard disk. A. privacy B. spyware C. cookie

A. privacy

Select the most significant concerns when implementing computer technology with respect to the people using the information system. A. privacy B. security C. electrical specifications D. ethics

A. privacy B. security D. ethics

Select all the measures used to protect computer security. A. restricting access B. anticipating disasters C. introducing trojan horses D. encrypting data

A. restricting access B. anticipating disasters D. encrypting data

A _____ Wi-Fi hotspot secretly captures information, like user names and passwords, from unsuspecting users. A. rogue B. DoS C. zombie D. Trojan

A. rogue

_____ involves protecting information, hardware, and software from unauthorized use as well as damage from intrusions, sabotage, and natural disasters. A. security B. defense C. safety

A. security

_____ suites provide a collection of utility programs designed to alert users when certain kinds of viruses and worms enter their system. A. security B. productivity C. office D. cloud

A. security

The term for manipulating people to get them to divulge confidential or personal information is called _____ . A. social engineering B. cybersquatting C. the digital divide

A. social engineering

Viruses

Attach themselves to programs and databases and can alter or delete files.

The _____ makes it illegal to deactivate antipiracy technologies and also illegal to sell or give away copies of commercial programs. A. Computer Fraud and Abuse Act B. Digital Millennium Copyright Act C. CAN-SPAM Act

B. Digital Millennium Copyright Act

Select all the laws designed to protect privacy. A. CAN-SPAM Act B. Gramm-Leach-Bliley Act (protects personal financial information) C. HIPPA (protects medical records) D. FERPA (restricts disclosure of educational records)

B. Gramm-Leach-Bliley Act C. HIPPA D. FERPA

_____ is any program that is intended to disrupt or damage a computer. A. Adware B. Malware C. Snoopware

B. Malware

Select all the issues related to privacy. A. denial of service B. access C. property D. accuracy E. worms

B. access C. property D. accuracy

Select all the ways in which a company can attempt to prevent data loss. A. denial of service attacks B. auditing of data and programs C. RAID storage D. careful screening of job applicants E. guarding of passwords

B. auditing of data and programs C. RAID storage D. careful screening of job applicants E. guarding of passwords

With all of the digital data collected today the size and number of databases are exploding. This volume of data is often called _____ data. A. complex B. big C. large

B. big

Temporary internet files are also known as the _____ . A. history file B. browser cache C. browser history

B. browser cache

Just as we are concerned with our personal security, we need to be concerned with hackers which are the major threats to our _____ security. A. home B. computer C. car

B. computer

Websites you visit deposit small pieces of information, called _____ , on are hard disk. A. web bugs B. cookies C. spam

B. cookies

_____ is a legal concept that gives content creators the right to control use and distribution of their work. A. ethics B. copyright

B. copyright

_____ occurs when someone alters information for malicious purposes through unauthorized access to a computer network. A. data scam B. data manipulation C. identity theft

B. data manipulation

_____ encompasses various technologies that control access to electronic media and files. A. digital millennium copyright act B. digital rights management C. software piracy

B. digital rights management

People think that they can send email messages from their personal computers and that it cannot be traces. This is called the _____ . A. freedom of information act B. illusion of anonymity C. privacy act

B. illusion of anonymity

This type of computer monitoring software is so invasive it can record everything you types on your computer system. A. tracking cookie B. keylogger C. antispyware

B. keylogger

_____ is when you present someone else's work and ideas as your own without giving credit to the original source. A. piracy B. plagiarism C. ethics

B. plagiarism

What are issues that arise from increasing use of digital footprints containing people's personal information? A. collecting more information than computer systems can store B. spreading inaccurate information C. spreading information without consent D. collecting publicly available information that can identify individuals personally

B. spreading inaccurate information C. spreading information without consent D. collecting publicly available information that can identify individuals personally

A program that secretly records and reports your activities on the Internet would be considered ____ . A. shareware B. spyware C. freeware D. adware

B. spyware

_____ fill a computer system with self-replicating information, clogging the system so that its operations are slowed or stopped. A. viruses B. worms C. Trojan horses

B. worms

Web _____ are invisible images or HTML code hidden within a web page or email message and can be used to transmit information without your knowledge.

Bugs

A(n) _____ would be responsible for maintaining the security of a company's networks, systems, and data. A. database administrator B. software analyst C. IT security analyst

C. IT security analyst

A _____ attack is intended to slow or shut down a system or network, making it inaccessible to users. A. lottery B. phishing C. denial of service D. ransomware

C. denial of service

If a disaster occurs, the _____ should be implemented in order to continue operating until normal computer operations can be restored. A. data security plan B. physical security plan C. disaster recovery plan

C. disaster recovery plan

It is perfectly legal for your employer to monitor your activities on the internet and to search your email and computer files using _____ . A. malware B. mistaken identities C. employee-monitoring software

C. employee-monitoring software

The process of encoding information to make it unreadable except to those who have the key is called _____. A. restriction B. decryption C. encryption

C. encryption

Because technology is moving so fast and it is difficult for our legal system to catch up, _____ have become an essential element that governs computer use. A. arbitrary principles B. artificial law C. ethics

C. ethics

Select all the examples of Internet scams. A. Trojan horse B. worms C. fake antivirus software (a website or email warns you that you are at risk of being infected by a computer virus and you need to download and install the security software they recommend which ironically is fake) D. auction fraud (merchandise is selected and payment is sent. merchandise is never delivered) E. advance fee loans (guaranteed low-rate loans available to almost anyone. after the applicant provides personal loan-related information, the loan is granted subject to payment of an "insurance fee") F. Nigerian scam (email scam - the recipient receives an email from a wealthy foreigner in distress who needs your bank account information to safely store their wealth) G. zombies

C. fake antivirus software D. auction fraud E. advance fee loans F. Nigerian scam

A _____ cookie is used by the specific website you visit to provide customized service such as displaying your name and customized advertisements. A. third-party B. second-party C. first-party

C. first-party

Select all the terms that describe types of cookies. A . second-party B. independent-party C. first-party (one that is generated - and then read - only by the website you are currently visiting) D. third-party (generated by an advertising company that is affiliated with the website you are currently visiting)

C. first-party D. third-party

_____ is the illegal assumptions of someone's identity for the purpose of economic gain. A. electronic profiling B. information reselling C. identity theft

C. identity theft

_____ mode ensures that your browsing activity is not recorded on your hard disk. A. cookie B. spyware C. incognito

C. incognito

If your electronic profile is unintentionally switched with someone else it is said to be a case of _____ . A. information reselling B. identity theft C. mistaken identity

C. mistaken identity

_____ is a technique that attempts to lure people into giving out personal information by using a fake but official-looking website or email. A. data manipulation B. denial of service C. phishing

C. phishing

Software _____ is the unauthorized copying and distribution of software. A. plagiarism B. encryption C. piracy

C. piracy

_____ is malicious software that encrypts a users data and demands money in order for the user to regain access to their data. A. spyware B. employee monitoring software C. ransomware

C. ransomware

A _____ cookie records activities across different sites and are deposited on your hard disk by companies that market information. A. first-party B. second-party C. third-party

C. third-party

_____ are computers infected by viruses, worms, or Trojan horse that allows them to be remotely controlled for malicious purposes. A. hosts B. servers C. zombies

C. zombies

Disaster Recovery Plan

Continuing operations following a major disruption.

File

Encrypt before they are stored on a hard drive.

Virtual Private Network

Encrypts connections between company networks and remote users, such as workers connecting from home.

E-mail

Encrypts messages before they are sent in order to protect them as they move across the Internet.

Trojan Horses

Enter a computer system disguised as something else.

A _____ password is entered by moving your finger in a pattern across a touch screen or photo.

Picture

Physical Security

Protecting hardware from possible attack or destruction.

Data Security

Protecting software and data from unauthorized tampering and damage.

Wireless Networks

Restricts access to authorized users on the network.

Web Site

Secures web transcations.

Worms

Self-replicate to travel over the Internet and clog computer systems.


Related study sets

Insurance Law (Title 3 - Insurable Interest)

View Set

tax c239 ch 19 advanced tax questions 26-40

View Set

4 - PAP: Liability, Med Pay, and UM Coverage

View Set

series 66 Final exam incorrect answers

View Set

Stopping Distances and Reaction Time - Driver's Ed

View Set

Drivers ed chapter 8 and unit 2 review

View Set