Bus 230 Chap 5 Exam 2

Any illegal act involving a computer generally is referred to as a computer crime.

True

Combating cybercrime is NOT one of the FBI's top priorities.

False

Cybercrime laws are consistent between states and countries, making it easy to reach a consensus as to what is illegal.

False

A cyberextortionist uses the Internet or network to destroy or damage computers for political reasons.

...

Programmers often build trapdoors into programs during system development.

...

A rootkit can be a back door.

...

Perpetrators of back doors trick their victims into interacting with phony websites.

...

Personal firewalls constantly monitor all transmissions to and from a computer and may inform a user of any attempted intrusion.

...

Both Windows and Mac operating systems include firewall capabilities.

...

Many companies use access controls to minimize the chance that a perpetrator may intentionally access or an employee may accidentally access confidential information on a computer, mobile device, or network.

True

Audit trails only record unsuccessful access attempts.

False

Most operating systems require that users correctly enter a user name and password before they can access the data, information, and programs stored on a computer, mobile device, or network.

True

If a program or device has a default password, be sure to retain it.

False

PINs are not the same as passwords.

False

If you are nervous, a signature might not match the one on file in a signature verification system.

True

A digital forensics examiner must have knowledge of the law, technical experience with many types of hardware and software products, superior communication skills, and the like.

True

Biometric objects are entirely foolproof.

False

To promote a better understanding of software piracy problems and, if necessary, to take legal action, a number of major worldwide software companies formed the BSA.

True

Many organizations and businesses have strict written policies governing the installation and use of software and enforce their rules by checking networked or online computers periodically to ensure that all software is licensed properly.

True

Some operating systems and email programs allow you to encrypt the contents of files and messages that are stored on your computer.

True

Secure sites typically use digital certificates along with security protocols.

True

Digital signatures often are used to ensure that an imposter is not participating in an Internet transaction.

True

Analog signatures help to prevent email forgery.

False

Passwords and passphrases that are more than four characters, contain uppercase and lowercase letters, numbers, and special characters are the most secure.

False

Any device that connects to the Internet is susceptible to mobile malware.

True

One way to reduce electrical waste is for organizations to use outside air to cool data centers and computer facilities.

True

Websites often collect data about you so that they can customize advertisements and send you personalized email messages.

True

Online shopping sites generally use a session cookie to keep track of items in a user's shopping cart as shown in the accompanying figure.

True

Users can purchase a software program that selectively blocks cookies like the kind shown in the accompanying figure.

True

Your browsing history is a list of all websites you have visited over a period of time.

True

During virtual browsing, your browser does not keep track of the websites you are visiting.

False

Proximity sharing gives websites access to your current location.

False

Phishing is an unsolicited email message or newsgroup posting sent to many recipients or newsgroups at once.

False

To remove spyware, users need to obtain a special program that can detect and delete it.

True

Information collected and stored about individuals should be limited to what is necessary to carry out the function of the business or government agency collecting the data.

True

To protect yourself from social engineering scams, shred all sensitive or confidential documents.

True`=

Many businesses use spyware to limit employees' web access.

False

COPPA protects minors from inappropriate content when accessing the Internet in schools and libraries.

False

The Computer Abuse Amendments Act outlaws transmission of harmful computer code such as viruses like the kind shown in the accompanying figure.

True

The ECPA protects consumers from disclosure of their personal financial information and requires institutions to alert customers of information disclosure policies.

False

FOIA enables public access to most government records.

True

HIPAA protects individuals against the wrongful disclosure of their health information.

True

The PATRIOT Act gives law enforcement the right to monitor people's activities, including web and email habits.

True

The Privacy Act forbids federal agencies from allowing information to be used for a reason other than that for which it was collected.

True

It is illegal for employers to use software programs that monitor employees.

False

If a company does not have a formal email policy, it can read email messages without employee notification.

True

Content filtering opponents argue that banning any materials violates constitutional guarantees of free speech and personal rights.

True

Many Internet security programs include a firewall, antivirus program, and filtering capabilities combined.

True

COPPA requires that schools and libraries use content filtering software in order to receive certain federal funds.

False

Bus 230 Chap 5 Exam 2 - Subjecto.com

Bus 230 Chap 5 Exam 2

Your page rank:

Total word count: 842
Pages: 3

Calculate the Price

- -
275 words
Looking for Expert Opinion?
Let us have a look at your work and suggest how to improve it!
Get a Consultant

Any illegal act involving a computer generally is referred to as a computer crime.

True

Combating cybercrime is NOT one of the FBI’s top priorities.

False

Cybercrime laws are consistent between states and countries, making it easy to reach a consensus as to what is illegal.

False

A cyberextortionist uses the Internet or network to destroy or damage computers for political reasons.

Programmers often build trapdoors into programs during system development.

A rootkit can be a back door.

Perpetrators of back doors trick their victims into interacting with phony websites.

Personal firewalls constantly monitor all transmissions to and from a computer and may inform a user of any attempted intrusion.

Both Windows and Mac operating systems include firewall capabilities.

Many companies use access controls to minimize the chance that a perpetrator may intentionally access or an employee may accidentally access confidential information on a computer, mobile device, or network.

True

Audit trails only record unsuccessful access attempts.

False

Most operating systems require that users correctly enter a user name and password before they can access the data, information, and programs stored on a computer, mobile device, or network.

True

If a program or device has a default password, be sure to retain it.

False

PINs are not the same as passwords.

False

If you are nervous, a signature might not match the one on file in a signature verification system.

True

A digital forensics examiner must have knowledge of the law, technical experience with many types of hardware and software products, superior communication skills, and the like.

True

Biometric objects are entirely foolproof.

False

To promote a better understanding of software piracy problems and, if necessary, to take legal action, a number of major worldwide software companies formed the BSA.

True

Many organizations and businesses have strict written policies governing the installation and use of software and enforce their rules by checking networked or online computers periodically to ensure that all software is licensed properly.

True

Some operating systems and email programs allow you to encrypt the contents of files and messages that are stored on your computer.

True

Secure sites typically use digital certificates along with security protocols.

True

Digital signatures often are used to ensure that an imposter is not participating in an Internet transaction.

True

Analog signatures help to prevent email forgery.

False

Passwords and passphrases that are more than four characters, contain uppercase and lowercase letters, numbers, and special characters are the most secure.

False

Any device that connects to the Internet is susceptible to mobile malware.

True

One way to reduce electrical waste is for organizations to use outside air to cool data centers and computer facilities.

True

Websites often collect data about you so that they can customize advertisements and send you personalized email messages.

True

Online shopping sites generally use a session cookie to keep track of items in a user’s shopping cart as shown in the accompanying figure.

True

Users can purchase a software program that selectively blocks cookies like the kind shown in the accompanying figure.

True

Your browsing history is a list of all websites you have visited over a period of time.

True

During virtual browsing, your browser does not keep track of the websites you are visiting.

False

Proximity sharing gives websites access to your current location.

False

Phishing is an unsolicited email message or newsgroup posting sent to many recipients or newsgroups at once.

False

To remove spyware, users need to obtain a special program that can detect and delete it.

True

Information collected and stored about individuals should be limited to what is necessary to carry out the function of the business or government agency collecting the data.

True

To protect yourself from social engineering scams, shred all sensitive or confidential documents.

True`=

Many businesses use spyware to limit employees’ web access.

False

COPPA protects minors from inappropriate content when accessing the Internet in schools and libraries.

False

The Computer Abuse Amendments Act outlaws transmission of harmful computer code such as viruses like the kind shown in the accompanying figure.

True

The ECPA protects consumers from disclosure of their personal financial information and requires institutions to alert customers of information disclosure policies.

False

FOIA enables public access to most government records.

True

HIPAA protects individuals against the wrongful disclosure of their health information.

True

The PATRIOT Act gives law enforcement the right to monitor people’s activities, including web and email habits.

True

The Privacy Act forbids federal agencies from allowing information to be used for a reason other than that for which it was collected.

True

It is illegal for employers to use software programs that monitor employees.

False

If a company does not have a formal email policy, it can read email messages without employee notification.

True

Content filtering opponents argue that banning any materials violates constitutional guarantees of free speech and personal rights.

True

Many Internet security programs include a firewall, antivirus program, and filtering capabilities combined.

True

COPPA requires that schools and libraries use content filtering software in order to receive certain federal funds.

False

Share This
Flashcard

More flashcards like this

NCLEX 10000 Integumentary Disorders

When assessing a client with partial-thickness burns over 60% of the body, which finding should the nurse report immediately? a) ...

Read more

NCLEX 300-NEURO

A client with amyotrophic lateral sclerosis (ALS) tells the nurse, "Sometimes I feel so frustrated. I can’t do anything without ...

Read more

NASM Flashcards

Which of the following is the process of getting oxygen from the environment to the tissues of the body? Diffusion ...

Read more

Unfinished tasks keep piling up?

Let us complete them for you. Quickly and professionally.

Check Price

Successful message
sending