Sie sind auf Seite 1von 56

Chapter 3 Hughes

Question 1
0 out of 1 points

Improvements in information technologies are leading to a decreasing number of ethical


problems.
Answer
Selected Answer:
Correct Answer:

True
False

Response Feedback:

Question 2

1 out of 1 points

The computing skills necessary to be a hacker are increasing.


Answer
Selected Answer:
Correct Answer:

False
False

Response Feedback:

Question 3

1 out of 1 points

When you interview for a job at a company, it is likely that the company will Google you
and search social networking sites for information on you.
Answer
Selected Answer:
Correct Answer:

True
True

Response Feedback:

Question 4

1 out of 1 points

The higher the level of an employee in organization, the lower the threat that he or she
poses to the organization.
Answer
Selected Answer:
Correct Answer:

False
False

Response Feedback:

Question 5

1 out of 1 points

A password refers to something the user is.


Answer
Selected Answer:
Correct Answer:

False
False

Response Feedback:

Question 6

1 out of 1 points

To defend itself against downstream liability, a company must prove that it practices due
diligence in information security.
Answer
Selected Answer:
Correct Answer:

True
True

Response Feedback:

Question 7

0 out of 1 points

Dumpster diving is:


Answer
Selected Answer:

D.
always illegal because it is considered trespassing.

Correct Answer:

C.
typically committed for the purpose of identity theft.

Response Feedback: Threats to Information Security

Question 8

0 out of 1 points

Which of the following factors are not increasing the threats to information security?
Answer
Selected Answer:

E.
due diligence

Correct Answer:

A.
limited storage capacity on portable devices

Response Feedback: Threats to Information Security

Question 9

1 out of 1 points

Passwords and passphrases are examples of:


Answer
Selected Answer:

A.
something the user knows.

Correct Answer:

A.
something the user knows.

Response Feedback: Protecting Information Resources

Question 10

1 out of 1 points

An organization's e-mail policy has the least impact on which of the following software
attacks?
Answer
Selected Answer:

C.
zero-day

Correct Answer:

C.
zero-day

Response Feedback: Threats to Information Security

Question 11

1 out of 1 points

What is _____ is not necessarily _____.


Answer
Selected Answer:

A.
Unethical, illegal

Correct Answer:

A.
Unethical, illegal

Response Feedback: Ethical Issues

Question 12

0 out of 1 points

Which of the following statements is correct?


Answer
Selected
Answer:

A.
Consistent international privacy and security laws help companies with
their regulatory requirements from country to country.

Correct
Answer:

D.
International privacy and security laws have led to a complex global
legal framework.

Response Feedback: Ethical Issues

Question 1
0 out of 1 points

_____ is clandestine software that is installed on your PC through duplicitous channels,


but is not very malicious.
Answer
Selected Answer:

A.
Worm

Correct Answer:

E.
Alien software

Response Feedback: Threats to Information Security

Question 2

1 out of 1 points

_____ uses deception to fraudulently acquire sensitive personal information by


masquerading as an official e-mail.
Answer
Selected Answer:

D.
Phishing

Correct Answer:

D.
Phishing

Response Feedback: Threats to Information Security

Question 3

1 out of 1 points

Biometrics are an example of:


Answer
Selected Answer:
Correct Answer:

E.
something the user is.
E.

something the user is.


Response Feedback: Protecting Information Resources

Question 4

1 out of 1 points

Which of the following factors are not increasing the threats to information security?
Answer
Selected Answer:

C.
limited storage capacity on portable devices

Correct Answer:

C.
limited storage capacity on portable devices

Response Feedback: Threats to Information Security

Question 5

1 out of 1 points

Dumpster diving is:


Answer
Selected Answer:

A.
typically committed for the purpose of identity theft.

Correct Answer:

A.
typically committed for the purpose of identity theft.

Response Feedback: Threats to Information Security

Question 6

1 out of 1 points

An organization's e-mail policy has the least impact on which of the following software
attacks?
Answer

Selected Answer:

C.
zero-day

Correct Answer:

C.
zero-day

Response Feedback: Threats to Information Security

Question 7

1 out of 1 points

Trojan horses are software programs that hide in other computer programs and reveal
their designed behavior only when they are activated.
Answer
Selected Answer:
Correct Answer:

True
True

Response Feedback:

Question 8

1 out of 1 points

Public-key encryption uses two different keys, one public and one private.
Answer
Selected Answer:
Correct Answer:

True
True

Response Feedback:

Question 9

0 out of 1 points

An individual or organization faced with an ethical decision is basically considering


whether to break the law.
Answer
Selected Answer:

True

Correct Answer:

False

Response Feedback:

Question 10

1 out of 1 points

The higher the level of an employee in organization, the lower the threat that he or she
poses to the organization.
Answer
Selected Answer:
Correct Answer:

False
False

Response Feedback:

Question 11

1 out of 1 points

Purchasing insurance is a type of risk acceptance.


Answer
Selected Answer:
Correct Answer:

False
False

Response Feedback:

Question 12

1 out of 1 points

A password refers to something the user is.


Answer
Selected Answer:
Correct Answer:

Question 1
0 out of 1 points

False
False

Which of the following is the most important issue raised by the numerous security
breaches at NASA?
Answer
Selected
Answer:

E.
Should NASA be required to detail its problems with cyberespionage
to the taxpayers?

Correct
Answer:

C.
Is it possible to secure the Internet?

Response Feedback: Chapter Opening Case

Question 2

1 out of 1 points

_____ is the process in which an organization assesses the value of each asset being
protected, estimates the probability that each asset might be compromised, and compares
the probable costs of each being compromised with the costs of protecting it.
Answer
Selected Answer:

D.
Risk analysis

Correct Answer:

D.
Risk analysis

Response Feedback: Protecting Information Resources

Question 3

1 out of 1 points

_____ is designed to use your computer as a launch pad for sending unsolicited e-mail to
other computers.
Answer
Selected Answer:

D.
Spamware

Correct Answer:

D.
Spamware

Response Feedback: Threats to Information Security

Question 4

1 out of 1 points

A(n) _____ is any danger to which an information resource may be exposed.


Answer
Selected Answer:

B.
threat

Correct Answer:

B.
threat

Response Feedback: Threats to Information Security

Question 5

1 out of 1 points

An organization's e-mail policy has the least impact on which of the following software
attacks?
Answer
Selected Answer:

B.
zero-day

Correct Answer:

B.
zero-day

Response Feedback: Threats to Information Security

Question 6

0 out of 1 points

Which of the following is not a characteristic of strong passwords?


Answer
Selected
Answer:

C.
should be difficult to guess

Correct Answer:

A.
should be shorter rather than longer so the password can be
remembered

Response Feedback: Protecting Information Resources

Question 7

1 out of 1 points

When you interview for a job at a company, it is likely that the company will Google you
and search social networking sites for information on you.
Answer
Selected Answer:
Correct Answer:

True
True

Response Feedback:

Question 8

0 out of 1 points

Dumpster diving is always illegal because it involves trespassing on private property.


Answer
Selected Answer:
Correct Answer:

True
False

Response Feedback:

Question 9

1 out of 1 points

When companies require users to accurately select characters in turn from a series of
boxes, attackers use screen scrapers to capture this information.
Answer
Selected Answer:
Correct Answer:

True
True

Response Feedback:

Question 10

1 out of 1 points

To defend itself against downstream liability, a company must prove that it practices due
diligence in information security.
Answer
Selected Answer:
Correct Answer:

True
True

Response Feedback:

Question 11

1 out of 1 points

Improvements in information technologies are leading to a decreasing number of ethical


problems.
Answer
Selected Answer:
Correct Answer:

False
False

Response Feedback:

Question 12

1 out of 1 points

The higher the level of an employee in organization, the lower the threat that he or she
poses to the organization.
Answer
Selected Answer:
Correct Answer:

Question 1

False
Fals

0 out of 1 points

_____ involves building an inappropriate trust relationship with employees for the
purpose of gaining sensitive information or unauthorized access privileges.
Answer
Selected Answer:

A.
Hacking

Correct Answer:

E.
Social engineering

Response Feedback: Threats to Information Security

Question 2

1 out of 1 points

A(n) _____ is intellectual work that is known only to a company and is not based on
public information.
Answer
Selected Answer:

D.
trade secret

Correct Answer:

D.
trade secret

Response Feedback: Threats to Information Security

Question 3

1 out of 1 points

Bob is using public key encryption to send a message to Ted. Bob encrypts the message
with Ted's _____ key and Ted decrypts the message using his _____ key.
Answer
Selected Answer:

B.
public, private

Correct Answer:

B.
public, private

Response Feedback: See Protecting Information Resources

Question 4

1 out of 1 points

_____ is the process in which an organization assesses the value of each asset being
protected, estimates the probability that each asset might be compromised, and compares
the probable costs of each being compromised with the costs of protecting it.
Answer
Selected Answer:

C.
Risk analysis

Correct Answer:

C.
Risk analysis

Response Feedback: Protecting Information Resources

Question 5

1 out of 1 points

In _____, the organization takes concrete actions against risks.


Answer
Selected Answer:

B.
risk mitigation

Correct Answer:

B.
risk mitigation

Response Feedback: Protecting Information Resources

Question 6

0 out of 1 points

The process of profiling:


Answer
Selected Answer:

A.

is legal, but unethical.


Correct Answer:

C.
decreases individual privacy.

Response Feedback: Ethical Issues

Question 7

0 out of 1 points

An individual or organization faced with an ethical decision is basically considering


whether to break the law.
Answer
Selected Answer:
Correct Answer:

True
False

Response Feedback:

Question 8

1 out of 1 points

A code of ethics is a collection of principles that are intended to guide decision making
by members of the organization.
Answer
Selected Answer:
Correct Answer:

True
True

Response Feedback:

Question 9

0 out of 1 points

In most cases, cookies track your path through Web sites and are therefore invasions of
your privacy.
Answer
Selected Answer:

True

Correct Answer:

False

Response Feedback:

Question 10

1 out of 1 points

Cyberterrorism and cyberwarfare can attack supervisory control and data acquisition
systems to cause widespread physical damage.
Answer
Selected Answer:
Correct Answer:

True
True

Response Feedback:

Question 11

1 out of 1 points

A password refers to something the user is.


Answer
Selected Answer:
Correct Answer:

False
False

Response Feedback:

Question 12

1 out of 1 points

In a distributed denial-of-service attack, a coordinated stream of requests is launched


against a target from many compromised computers at the same time.
Answer
Selected Answer:
Correct Answer:

Question 1

True
True

1 out of 1 points

Cyberterrorism and cyberwarfare can attack supervisory control and data acquisition
systems to cause widespread physical damage.
Answer
Selected Answer:
Correct Answer:

True
True

Response Feedback:

Question 2

1 out of 1 points

The computing skills necessary to be a hacker are increasing.


Answer
Selected Answer:
Correct Answer:

False
False

Response Feedback:

Question 3

1 out of 1 points

An individual or organization faced with an ethical decision is basically considering


whether to break the law.
Answer
Selected Answer:
Correct Answer:

False
False

Response Feedback:

Question 4

1 out of 1 points

A password refers to something the user is.


Answer
Selected Answer:
Correct Answer:

False
False

Response Feedback:

Question 5

0 out of 1 points

The security of each computer on the Internet is independent of the security of all other
computers on the Internet.
Answer
Selected Answer:
Correct Answer:

True
False

Response Feedback:

Question 6

0 out of 1 points

Dumpster diving is always illegal because it involves trespassing on private property.


Answer
Selected Answer:
Correct Answer:

True
False

Response Feedback:

Question 7

1 out of 1 points

Biometrics are an example of:


Answer
Selected Answer:

A.
something the user is.

Correct Answer:

A.
something the user is.

Response Feedback: Protecting Information Resources

Question 8

1 out of 1 points

In _____, the organization takes concrete actions against risks.


Answer
Selected Answer:

A.
risk mitigation

Correct Answer:

A.
risk mitigation

Response Feedback: Protecting Information Resources

Question 9

0 out of 1 points

Employees in which functional areas of the organization pose particularly grave threats to
information security?
Answer
Selected Answer:

B.
finance, management information systems

Correct Answer:

D.
human resources, management information systems

Response Feedback: Threats to Information Security

Question 10

0 out of 1 points

A(n) _____ is any danger to which an information resource may be exposed.


Answer

Selected Answer:

A.
risk

Correct Answer:

D.
threat

Response Feedback: Threats to Information Security

Question 11

0 out of 1 points

Voice and signature recognition are examples of:


Answer
Selected Answer:

E.
something the user knows.

Correct Answer:

B.
something the user does.

Response Feedback: Protecting Information Resources

Question 12

0 out of 1 points

_____ are segments of computer code embedded within an organization's existing


computer programs that activate and perform a destructive action at a certain time or
date.
Answer
Selected Answer:

D.
Viruses

Correct Answer:

A.
Logic bomb

Response Feedback: Threats to Information Security

Question 1
0 out of 1 points

Unintentional threats to information systems include all of the following except:


Answer
Selected Answer:

A.
tornados

Correct Answer:

B.
malicious software

Response Feedback: Threats to Information Security

Question 2

0 out of 1 points

Rank the following in terms of dollar value of the crime, from highest to lowest.
Answer
Selected Answer:

D.
cybercrime robbery white collar crime

Correct Answer:

E.
cybercrime white collar crime robbery

Response Feedback: Threats to Information Security

Question 3

0 out of 1 points

The most overlooked people in information security are:


Answer
Selected Answer:

C.
executives and executive secretaries.

Correct Answer:

D.
janitors and guards.

Response Feedback: Threats to Information Security

Question 4

0 out of 1 points

In a(n) _____ attack, a coordinated stream of requests is launched against a target system
from many compromised computers at the same time.
Answer
Selected Answer:

B.
denial-of-service

Correct Answer:

C.
distributed denial-of-service

Response Feedback: Threats to Information Security

Question 5

0 out of 1 points

Which of the following statements is not correct concerning the difficulties in protecting
information resources?
Answer
Selected
Answer:

C.
Computer crimes often remain undetected for a long period of time.

Correct Answer:

A.
Rapid technological changes ensure that controls are effective for
years.

Response Feedback: Protecting Information Resources

Question 6

0 out of 1 points

When companies attempt to counter _____ by requiring users to accurately select


characters in turn from a series of boxes, attackers use _____.
Answer
Selected Answer:
Correct Answer:

B.
spam, keyloggers
A.

keyloggers, screen scrapers


Response Feedback: Threats to Information Security

Question 7

1 out of 1 points

The computing skills necessary to be a hacker are increasing.


Answer
Selected Answer:
Correct Answer:

False
False

Response Feedback:

Question 8

0 out of 1 points

Zero-day attacks use descriptive e-mails to acquire sensitive personal information.


Answer
Selected Answer:
Correct Answer:

True
False

Response Feedback:

Question 9

1 out of 1 points

Improvements in information technologies are leading to a decreasing number of ethical


problems.
Answer
Selected Answer:
Correct Answer:

False
False

Response Feedback:

Question 10

1 out of 1 points

Public-key encryption uses two different keys, one public and one private.
Answer
Selected Answer:
Correct Answer:

True
True

Response Feedback:

Question 11

1 out of 1 points

In a distributed denial-of-service attack, a coordinated stream of requests is launched


against a target from many compromised computers at the same time.
Answer
Selected Answer:
Correct Answer:

True
True

Response Feedback:

Question 12

1 out of 1 points

A password refers to something the user is.


Answer
Selected Answer:
Correct Answer:

False
False

Question 1
1 out of 1 points

To defend itself against downstream liability, a company must prove that it practices due
diligence in information security.
Answer

Selected Answer:
Correct Answer:

True
True

Response Feedback:

Question 2

1 out of 1 points

In reverse social engineering, the employees approach the attacker.


Answer
Selected Answer:
Correct Answer:

True
True

Response Feedback:

Question 3

1 out of 1 points

The computing skills necessary to be a hacker are increasing.


Answer
Selected Answer:
Correct Answer:

False
False

Response Feedback:

Question 4

1 out of 1 points

In most cases, cookies track your path through Web sites and are therefore invasions of
your privacy.
Answer
Selected Answer:
Correct Answer:

False
False

Response Feedback:

Question 5

1 out of 1 points

Improvements in information technologies are leading to a decreasing number of ethical


problems.
Answer
Selected Answer:
Correct Answer:

False
False

Response Feedback:

Question 6

1 out of 1 points

Trojan horses are software programs that hide in other computer programs and reveal
their designed behavior only when they are activated.
Answer
Selected Answer:
Correct Answer:

True
True

Response Feedback:

Question 7

1 out of 1 points

Your company's computers have been taken over by an attacker and used to attack
another organization's information systems. Your problem is which of the following?
Answer
Selected Answer:

D.
downstream liability

Correct Answer:

D.
downstream liability

Response Feedback: Threats to Information Security

Question 8

1 out of 1 points

Which of the following statements is not correct?


Answer
Selected
Answer:

E.
As with normal first-class mail, employers cannot read employee email.

Correct Answer:

E.
As with normal first-class mail, employers cannot read employee email.

Response Feedback: Ethical Issues

Question 9

1 out of 1 points

The most overlooked people in information security are:


Answer
Selected Answer:

D.
janitors and guards.

Correct Answer:

D.
janitors and guards.

Response Feedback: Threats to Information Security

Question 10

0 out of 1 points

Which attack method would most typically be used in cyberwarfare?


Answer
Selected Answer:

C.
distributed denial-of-service

Correct Answer:

E.
supervisory control and data acquisition

Response Feedback: Threats to Information Security

Question 11

1 out of 1 points

_____ are segments of computer code embedded within an organization's existing


computer programs that activate and perform a destructive action at a certain time or
date.
Answer
Selected Answer:

E.
Logic bomb

Correct Answer:

E.
Logic bomb

Response Feedback: Threats to Information Security

Question 12

1 out of 1 points

The process of profiling:


Answer
Selected Answer:

B.
decreases individual privacy.

Correct Answer:

B.
decreases individual privacy.

Question 1
1 out of 1 points

A(n) _____ is a document that grants the holder exclusive rights on an invention for 20
years.
Answer
Selected Answer:

B.
patent

Correct Answer:

B.
patent

Response Feedback: Threats to Information Security

Question 2

1 out of 1 points

_____ issues involve who may obtain information and how much they should pay for this
information.
Answer
Selected Answer:

E.
Accessibility

Correct Answer:

E.
Accessibility

Response Feedback: Ethical Issues

Question 3

1 out of 1 points

Which of the following statements is correct?


Answer
Selected
Answer:

B.
International privacy and security laws have led to a complex global
legal framework.

Correct
Answer:

B.
International privacy and security laws have led to a complex global
legal framework.

Response Feedback: Ethical Issues

Question 4

0 out of 1 points

The computing skills necessary to be a hacker are decreasing for which of the following
reasons?
Answer

Selected
Answer:

A.
International organized crime is training hackers.

Correct
Answer:

B.
Computer attack programs, called scripts, are available for download
from the Internet.

Response Feedback: Threats to Information Security

Question 5

0 out of 1 points

Your company's computers have been taken over by an attacker and used to attack
another organization's information systems. Your problem is which of the following?
Answer
Selected Answer:

E.
poor security policies and procedures

Correct Answer:

C.
downstream liability

Response Feedback: Threats to Information Security

Question 6

1 out of 1 points

_____ involves building an inappropriate trust relationship with employees for the
purpose of gaining sensitive information or unauthorized access privileges.
Answer
Selected Answer:

A.
Social engineering

Correct Answer:

A.
Social engineering

Response Feedback: Threats to Information Security

Question 7

0 out of 1 points

A password refers to something the user is.


Answer
Selected Answer:
Correct Answer:

True
False

Response Feedback:

Question 8

1 out of 1 points

In a distributed denial-of-service attack, a coordinated stream of requests is launched


against a target from many compromised computers at the same time.
Answer
Selected Answer:
Correct Answer:

True
True

Response Feedback:

Question 9

1 out of 1 points

Dumpster diving is always illegal because it involves trespassing on private property.


Answer
Selected Answer:
Correct Answer:

False
False

Response Feedback:

Question 10

1 out of 1 points

When you interview for a job at a company, it is likely that the company will Google you
and search social networking sites for information on you.
Answer

Selected Answer:
Correct Answer:

True
True

Response Feedback:

Question 11

1 out of 1 points

A code of ethics is a collection of principles that are intended to guide decision making
by members of the organization.
Answer
Selected Answer:
Correct Answer:

True
True

Response Feedback:

Question 12

1 out of 1 points

When companies require users to accurately select characters in turn from a series of
boxes, attackers use screen scrapers to capture this information.
Answer
Selected Answer:
Correct Answer:

True
True

Question 1
0 out of 1 points

Biometrics are an example of:


Answer
Selected Answer:

A.
something the user does.

Correct Answer:

C.
something the user is.

Response Feedback: Protecting Information Resources

Question 2

1 out of 1 points

_____ are software programs that hide in other computer programs and reveal their
designed behavior only when they are activated.
Answer
Selected Answer:

D.
Trojan horses

Correct Answer:

D.
Trojan horses

Response Feedback: Threats to Information Security

Question 3

1 out of 1 points

A(n) information system's _____ is the possibility that the system will suffer harm by a
threat.
Answer
Selected Answer:

A.
vulnerability

Correct Answer:

A.
vulnerability

Response Feedback: Threats to Information Security

Question 4

1 out of 1 points

Which of the following statements is not correct concerning the difficulties in protecting
information resources?
Answer

Selected
Answer:

A.
Rapid technological changes ensure that controls are effective for
years.

Correct Answer:

A.
Rapid technological changes ensure that controls are effective for
years.

Response Feedback: Protecting Information Resources

Question 5

0 out of 1 points

_____ issues involve collecting, storing and disseminating information about individuals.
Answer
Selected Answer:

B.
Accessibility

Correct Answer:

A.
Privacy

Response Feedback: Ethical Issues

Question 6

0 out of 1 points

Various organizations that promote fair and responsible use of information systems often
develop _____:
Answer
Selected Answer:

A.
a strategic plan

Correct Answer:

E.
a code of ethics

Response Feedback: Ethical Issues

Question 7

1 out of 1 points

Trojan horses are software programs that hide in other computer programs and reveal
their designed behavior only when they are activated.
Answer
Selected Answer:
Correct Answer:

True
True

Response Feedback:

Question 8

0 out of 1 points

A code of ethics is a collection of principles that are intended to guide decision making
by members of the organization.
Answer
Selected Answer:
Correct Answer:

False
True

Response Feedback:

Question 9

0 out of 1 points

The security of each computer on the Internet is independent of the security of all other
computers on the Internet.
Answer
Selected Answer:
Correct Answer:

True
False

Response Feedback:

Question 10

0 out of 1 points

The computing skills necessary to be a hacker are increasing.


Answer
Selected Answer:
Correct Answer:

True
False

Response Feedback:

Question 11

1 out of 1 points

To defend itself against downstream liability, a company must prove that it practices due
diligence in information security.
Answer
Selected Answer:
Correct Answer:

True
True

Response Feedback:

Question 12

1 out of 1 points

When companies require users to accurately select characters in turn from a series of
boxes, attackers use screen scrapers to capture this information.
Answer
Selected Answer:
Correct Answer:

True
True

Question 1
1 out of 1 points

In a distributed denial-of-service attack, a coordinated stream of requests is launched


against a target from many compromised computers at the same time.
Answer
Selected Answer:
Correct Answer:

True
True

Response Feedback:

Question 2

1 out of 1 points

Human errors cause more than half of the security-related problems in many
organizations.
Answer
Selected Answer:
Correct Answer:

True
True

Response Feedback:

Question 3

1 out of 1 points

The higher the level of an employee in organization, the lower the threat that he or she
poses to the organization.
Answer
Selected Answer:
Correct Answer:

False
False

Response Feedback:

Question 4

1 out of 1 points

To defend itself against downstream liability, a company must prove that it practices due
diligence in information security.
Answer
Selected Answer:
Correct Answer:

True
True

Response Feedback:

Question 5

1 out of 1 points

Cyberterrorism and cyberwarfare can attack supervisory control and data acquisition
systems to cause widespread physical damage.
Answer
Selected Answer:
Correct Answer:

True
True

Response Feedback:

Question 6

1 out of 1 points

Trojan horses are software programs that hide in other computer programs and reveal
their designed behavior only when they are activated.
Answer
Selected Answer:
Correct Answer:

True
True

Response Feedback:

Question 7

1 out of 1 points

_____ issues involve collecting, storing and disseminating information about individuals.
Answer
Selected Answer:

C.
Privacy

Correct Answer:

C.
Privacy

Response Feedback: Ethical Issues

Question 8

1 out of 1 points

A(n) _____ is any danger to which an information resource may be exposed.


Answer
Selected Answer:

A.
threat

Correct Answer:

A.
threat

Response Feedback: Threats to Information Security

Question 9

1 out of 1 points

Biometrics are an example of:


Answer
Selected Answer:

E.
something the user is.

Correct Answer:

E.
something the user is.

Response Feedback: Protecting Information Resources

Question 10

1 out of 1 points

_____ are segments of computer code embedded within an organization's existing


computer programs that activate and perform a destructive action at a certain time or
date.
Answer
Selected Answer:

C.
Logic bomb

Correct Answer:

C.
Logic bomb

Response Feedback: Threats to Information Security

Question 11

0 out of 1 points

In _____, the attacker approaches employees, where in _____ the employees approach
the attacker.
Answer
Selected Answer:

C.
phishing, social engineering

Correct Answer:

A.
social engineering, reverse social engineering

Response Feedback: Threats to Information Security

Question 12

0 out of 1 points

Which of the following statements is correct?


Answer
Selected Answer:

A.
An individual's right to privacy supersedes the needs of society.

Correct Answer:

B.
It is difficult to determine and enforce privacy regulations.

Question 1
1 out of 1 points

Trojan horses are software programs that hide in other computer programs and reveal
their designed behavior only when they are activated.
Answer
Selected Answer:
Correct Answer:

True
True

Response Feedback:

Question 2

1 out of 1 points

In most cases, cookies track your path through Web sites and are therefore invasions of
your privacy.
Answer
Selected Answer:
Correct Answer:

False
False

Response Feedback:

Question 3

1 out of 1 points

In reverse social engineering, the employees approach the attacker.


Answer
Selected Answer:
Correct Answer:

True
True

Response Feedback:

Question 4

1 out of 1 points

The higher the level of an employee in organization, the lower the threat that he or she
poses to the organization.
Answer
Selected Answer:
Correct Answer:

False
False

Response Feedback:

Question 5

1 out of 1 points

When you interview for a job at a company, it is likely that the company will Google you
and search social networking sites for information on you.
Answer
Selected Answer:
Correct Answer:

True
True

Response Feedback:

Question 6

1 out of 1 points

Human errors cause more than half of the security-related problems in many
organizations.
Answer
Selected Answer:
Correct Answer:

True
True

Response Feedback:

Question 7

1 out of 1 points

Which of the following statements is correct?


Answer
Selected Answer:

B.
It is difficult to determine and enforce privacy regulations.

Correct Answer:

B.
It is difficult to determine and enforce privacy regulations.

Response Feedback: Ethical Issues

Question 8

1 out of 1 points

_____ is designed to use your computer as a launch pad for sending unsolicited e-mail to
other computers.
Answer
Selected Answer:

C.
Spamware

Correct Answer:

C.
Spamware

Response Feedback: Threats to Information Security

Question 9

1 out of 1 points

Employees in which functional areas of the organization pose particularly grave threats to
information security?
Answer
Selected Answer:

B.
human resources, management information systems

Correct Answer:

B.
human resources, management information systems

Response Feedback: Threats to Information Security

Question 10

0 out of 1 points

_____ issues involve the authenticity and fidelity of information that is collected and
processed.
Answer
Selected Answer:

B.
Privacy

Correct Answer:

A.
Accuracy

Response Feedback: Ethical Issues

Question 11

1 out of 1 points

Various organizations that promote fair and responsible use of information systems often
develop _____:
Answer
Selected Answer:

B.
a code of ethics

Correct Answer:

B.
a code of ethics

Response Feedback: Ethical Issues

Question 12

0 out of 1 points

In its study of various organizations, the Ponemon Institute found that the most common
cause of data breaches was which of the following?
Answer
Selected Answer:

E.
weak passwords

Correct Answer:

A.
employee negligence

Question 1
1 out of 1 points

Cyberterrorism and cyberwarfare can attack supervisory control and data acquisition
systems to cause widespread physical damage.
Answer
Selected Answer:
Correct Answer:

True
True

Response Feedback:

Question 2

1 out of 1 points

Dumpster diving is always illegal because it involves trespassing on private property.


Answer
Selected Answer:
Correct Answer:

False
False

Response Feedback:

Question 3

1 out of 1 points

In reverse social engineering, the employees approach the attacker.


Answer
Selected Answer:
Correct Answer:

True
True

Response Feedback:

Question 4

1 out of 1 points

An individual or organization faced with an ethical decision is basically considering


whether to break the law.
Answer
Selected Answer:
Correct Answer:

False
False

Response Feedback:

Question 5

1 out of 1 points

The security of each computer on the Internet is independent of the security of all other
computers on the Internet.
Answer
Selected Answer:
Correct Answer:

False
False

Response Feedback:

Question 6

1 out of 1 points

Human errors cause more than half of the security-related problems in many
organizations.
Answer
Selected Answer:
Correct Answer:

True
True

Response Feedback:

Question 7

1 out of 1 points

_____ uses deception to fraudulently acquire sensitive personal information by


masquerading as an official e-mail.
Answer
Selected Answer:

B.
Phishing

Correct Answer:

B.
Phishing

Response Feedback: Threats to Information Security

Question 8

1 out of 1 points

_____ issues involve the authenticity and fidelity of information that is collected and
processed.
Answer
Selected Answer:

D.
Accuracy

Correct Answer:

D.
Accuracy

Response Feedback: Ethical Issues

Question 9

1 out of 1 points

A(n) information system's _____ is the possibility that the system will suffer harm by a
threat.
Answer
Selected Answer:

A.
vulnerability

Correct Answer:

A.
vulnerability

Response Feedback: Threats to Information Security

Question 10

1 out of 1 points

Various organizations that promote fair and responsible use of information systems often
develop _____:
Answer
Selected Answer:

D.
a code of ethics

Correct Answer:

D.
a code of ethics

Response Feedback: Ethical Issues

Question 11

0 out of 1 points

Access controls involve _____ before _____.


Answer
Selected Answer:

B.
authorization, authentication

Correct Answer:

D.
authentication, authorization

Response Feedback: Protecting Information Resources

Question 12

1 out of 1 points

Your company's computers have been taken over by an attacker and used to attack
another organization's information systems. Your problem is which of the following?
Answer
Selected Answer:

B.
downstream liability

Correct Answer:

B.
downstream liability

Question 1
1 out of 1 points

Which of the following is not a characteristic of strong passwords?


Answer
Selected
Answer:

E.
should be shorter rather than longer so the password can be
remembered

Correct Answer:

E.
should be shorter rather than longer so the password can be
remembered

Response Feedback: Protecting Information Resources

Question 2

1 out of 1 points

Which of the following statements is not correct?


Answer
Selected
Answer:

C.
As with normal first-class mail, employers cannot read employee email.

Correct Answer:

C.
As with normal first-class mail, employers cannot read employee email.

Response Feedback: Ethical Issues

Question 3

1 out of 1 points

_____ is clandestine software that is installed on your PC through duplicitous channels,


but is not very malicious.
Answer
Selected Answer:

C.
Alien software

Correct Answer:

C.
Alien software

Response Feedback: Threats to Information Security

Question 4

0 out of 1 points

_____ means verifying processing by checking for known outputs using specific inputs.
Answer
Selected Answer:

D.
Auditing through the computer

Correct Answer:

E.
Auditing around the computer

Response Feedback: Protecting Information Resources

Question 5

1 out of 1 points

Passwords and passphrases are examples of:


Answer
Selected Answer:

D.
something the user knows.

Correct Answer:

D.
something the user knows.

Response Feedback: Protecting Information Resources

Question 6

1 out of 1 points

_____ uses deception to fraudulently acquire sensitive personal information by


masquerading as an official e-mail.
Answer
Selected Answer:

A.
Phishing

Correct Answer:

A.
Phishing

Response Feedback: Threats to Information Security

Question 7

1 out of 1 points

A password refers to something the user is.


Answer

Selected Answer:
Correct Answer:

False
False

Response Feedback:

Question 8

1 out of 1 points

A code of ethics is a collection of principles that are intended to guide decision making
by members of the organization.
Answer
Selected Answer:
Correct Answer:

True
True

Response Feedback:

Question 9

1 out of 1 points

Cyberterrorism and cyberwarfare can attack supervisory control and data acquisition
systems to cause widespread physical damage.
Answer
Selected Answer:
Correct Answer:

True
True

Response Feedback:

Question 10

1 out of 1 points

Dumpster diving is always illegal because it involves trespassing on private property.


Answer
Selected Answer:
Correct Answer:

False
False

Response Feedback:

Question 11

1 out of 1 points

In most cases, cookies track your path through Web sites and are therefore invasions of
your privacy.
Answer
Selected Answer:
Correct Answer:

False
False

Response Feedback:

Question 12

1 out of 1 points

Public-key encryption uses two different keys, one public and one private.
Answer
Selected Answer:
Correct Answer:

True
True

Question 1
1 out of 1 points

The process of profiling:


Answer
Selected Answer:

B.
decreases individual privacy.

Correct Answer:

B.
decreases individual privacy.

Response Feedback: Ethical Issues

Question 2

1 out of 1 points

_____ is designed to use your computer as a launch pad for sending unsolicited e-mail to
other computers.
Answer
Selected Answer:

E.
Spamware

Correct Answer:

E.
Spamware

Response Feedback: Threats to Information Security

Question 3

1 out of 1 points

A(n) _____ is a document that grants the holder exclusive rights on an invention for 20
years.
Answer
Selected Answer:

C.
patent

Correct Answer:

C.
patent

Response Feedback: Threats to Information Security

Question 4

1 out of 1 points

Passwords and passphrases are examples of:


Answer
Selected Answer:

B.
something the user knows.

Correct Answer:

B.
something the user knows.

Response Feedback: Protecting Information Resources

Question 5

1 out of 1 points

A(n) _____ is any danger to which an information resource may be exposed.


Answer
Selected Answer:

E.
threat

Correct Answer:

E.
threat

Response Feedback: Threats to Information Security

Question 6

1 out of 1 points

Which of the following statements is correct?


Answer
Selected Answer:

D.
It is difficult to determine and enforce privacy regulations.

Correct Answer:

D.
It is difficult to determine and enforce privacy regulations.

Response Feedback: Ethical Issues

Question 7

1 out of 1 points

In most cases, cookies track your path through Web sites and are therefore invasions of
your privacy.
Answer
Selected Answer:
Correct Answer:

False
False

Response Feedback:

Question 8

1 out of 1 points

A code of ethics is a collection of principles that are intended to guide decision making
by members of the organization.
Answer
Selected Answer:
Correct Answer:

True
True

Response Feedback:

Question 9

1 out of 1 points

The security of each computer on the Internet is independent of the security of all other
computers on the Internet.
Answer
Selected Answer:
Correct Answer:

False
False

Response Feedback:

Question 10

1 out of 1 points

In a distributed denial-of-service attack, a coordinated stream of requests is launched


against a target from many compromised computers at the same time.
Answer
Selected Answer:
Correct Answer:

True
True

Response Feedback:

Question 11

1 out of 1 points

A password refers to something the user is.


Answer
Selected Answer:
Correct Answer:

False
False

Response Feedback:

Question 12

1 out of 1 points

Public-key encryption uses two different keys, one public and one private.
Answer
Selected Answer:
Correct Answer:

True
True

Das könnte Ihnen auch gefallen