978-0133940305 Chapter 10 Part 2

subject Type Homework Help
subject Pages 9
subject Words 2386
subject Authors Christoph Schneider, Joseph Valacich

Unlock document.

This document is partially blurred.
Unlock all pages and 1 million more documents.
Get Access
page-pf1
31) ________ is the dubious practice of registering a domain name and then trying to sell the
name for big bucks to the person, company, or organization most likely to want it.
A) Cybersquatting
B) Bot herding
C) Spear phishing
D) Logic bombing
E) Hacktivism
Difficulty: Easy
Learning Obj.: 10.1: Define computer crime and describe several types of computer crime.
Classification: Concept
32) Fyroff consultants, a leading software consulting firm in the United States, decides to launch
an Enterprise Resource Planning (ERP) solution. The company chooses the brand name
FyroffEnterprise for the new solution. However, when the company attempts to register the
domain name, it finds that a small unknown firm is already registered under the same domain
name. The small firm is now attempting to sell the domain name to Fyroff. Which of the
following terms refers to this practice of buying a domain name only to sell it for big bucks?
A) cybersquatting
B) logic bombing
C) cyberbullying
D) bot herding
E) cyberstalking
Difficulty: Moderate
Learning Obj.: 10.1: Define computer crime and describe several types of computer crime.
Classification: Application
33) ________ refers to the use of a computer to communicate obscene, vulgar, or threatening
content that causes a reasonable person to endure distress.
A) Cyberharassment
B) Viral marketing
C) Hacktivism
D) Bot herding
E) Spam filtering
Difficulty: Easy
Learning Obj.: 10.1: Define computer crime and describe several types of computer crime.
Classification: Concept
11
page-pf2
34) The act of cybercriminals to gain information on a victim by monitoring online activities,
accessing databases, and making false accusations are forms of ________.
A) bot herding
B) cyberstalking
C) spam filtering
D) viral marketing
E) spear phishing
Difficulty: Easy
Learning Obj.: 10.1: Define computer crime and describe several types of computer crime.
Classification: Concept
35) ________ refers to offering stolen proprietary software for free over the Internet.
A) Bot herding
B) Warez peddling
C) Spam filtering
D) Viral marketing
E) Spear phishing
Difficulty: Easy
Learning Obj.: 10.1: Define computer crime and describe several types of computer crime.
Classification: Concept
36) Which of the following can be referred for a patent?
A) material inventions
B) software
C) music by an existing band
D) literature
E) art
Difficulty: Easy
Learning Obj.: 10.1: Define computer crime and describe several types of computer crime.
Classification: Concept
12
page-pf3
A) Apple's multitouch technology
B) music by an existing band
C) Amazon's one-click buying
D) mobile phones
E) tablets
Difficulty: Easy
Learning Obj.: 10.1: Define computer crime and describe several types of computer crime.
Classification: Concept
38) The term social engineering refers to misrepresenting oneself to trick others into revealing
information.
Difficulty: Easy
Learning Obj.: 10.1: Define computer crime and describe several types of computer crime.
Classification: Concept
39) The term shoulder surfing refers to looking over one's shoulder while the person is keying in
access information.
Difficulty: Easy
Learning Obj.: 10.1: Define computer crime and describe several types of computer crime.
Classification: Concept
40) Logic bombs are variations of a worm that can reproduce themselves to disrupt the normal
functioning of a computer.
Difficulty: Easy
Learning Obj.: 10.1: Define computer crime and describe several types of computer crime.
Classification: Concept
41) Spyware is electronic junk mail or junk newsgroup postings usually posted for the purpose of
advertising some product and/or service.
Difficulty: Easy
Learning Obj.: 10.1: Define computer crime and describe several types of computer crime.
Classification: Concept
13
page-pf4
42) Spam filters are used to reduce the amount of spam processed by central e-mail servers.
Difficulty: Easy
Learning Obj.: 10.1: Define computer crime and describe several types of computer crime.
Classification: Concept
43) Ransomware is a type of adware.
Difficulty: Easy
Learning Obj.: 10.1: Define computer crime and describe several types of computer crime.
Classification: Concept
44) The term dumpster diving refers to the task of modifying the operating system to remove
manufacturer or carrier restrictions in order to run applications other than those from the official
store.
Difficulty: Easy
Learning Obj.: 10.1: Define computer crime and describe several types of computer crime.
Classification: Concept
45) Making false accusations that damage the reputation of the victim on blogs, Web sites, chat
rooms, or e-commerce sites is a form of cyberstalking.
Difficulty: Easy
Learning Obj.: 10.1: Define computer crime and describe several types of computer crime.
Classification: Concept
46) Patents generally refer to creations of the mind such as music, literature, or software.
Difficulty: Easy
Learning Obj.: 10.1: Define computer crime and describe several types of computer crime.
Classification: Concept
14
page-pf5
47) Briefly explain the concept of computer crime.
Difficulty: Easy
Learning Obj.: 10.1: Define computer crime and describe several types of computer crime.
Classification: Concept
48) What is unauthorized access? Provide a few examples for unauthorized access.
Difficulty: Easy
Learning Obj.: 10.1: Define computer crime and describe several types of computer crime.
Classification: Concept
15
page-pf6
49) Compare and contrast computer viruses and a Trojan horse.
Difficulty: Easy
Learning Obj.: 10.1: Define computer crime and describe several types of computer crime.
Classification: Concept
50) What are cookies? Do they pose a threat to users?
Difficulty: Easy
Learning Obj.: 10.1: Define computer crime and describe several types of computer crime.
Classification: Concept
51) Briefly explain cyberstalking and cybersquatting.
Difficulty: Moderate
Learning Obj.: 10.1: Define computer crime and describe several types of computer crime.
Classification: Concept
16
page-pf7
52) ________ refers to an organized attempt by a country's military to disrupt or destroy the
information and communication systems of another country.
A) Cyberwar
B) Internet hoaxing
C) Cybersquatting
D) Web vandalism
E) Logic bombing
Difficulty: Easy
Learning Obj.: 10.2: Describe and explain the differences between cyberwar and cyberterrorism.
Classification: Concept
53) Independent citizens or supporters of a country that perpetrate attacks on perceived or real
enemies are called ________.
A) patriot hackers
B) bot herders
C) online predators
D) hacktivists
E) ethical hackers
Difficulty: Easy
Learning Obj.: 10.2: Describe and explain the differences between cyberwar and cyberterrorism.
Classification: Concept
54) ________ is the use of computer and networking technologies by individuals and organized
groups against persons or property to intimidate or coerce governments.
A) Cyberterrorism
B) Cybersquatting
C) Cyberforensics
D) Cyberstalking
E) Cyberbullying
Difficulty: Easy
Learning Obj.: 10.2: Describe and explain the differences between cyberwar and cyberterrorism.
Classification: Concept
17
page-pf8
55) A mass cyber attack occurred in a country when it took severe actions against a group of
citizens who protested against the country's religious policies. The attack involved a denial-of-
service in which selected sites were bombarded with traffic to force them offline. This is an
example of ________.
A) cyberterrorism
B) logic bombing
C) cyberforensics
D) cyberbullying
E) cybersquatting
Difficulty: Moderate
Learning Obj.: 10.2: Describe and explain the differences between cyberwar and cyberterrorism.
Classification: Application
56) ________ by terrorists refers to the use of the vast amount of information available on the
Internet regarding virtually any topic for planning, recruitment, and numerous other endeavors.
A) Data mining
B) Information dissemination
C) Location monitoring
D) Information sharing
E) Cybersquatting
Difficulty: Easy
Learning Obj.: 10.2: Describe and explain the differences between cyberwar and cyberterrorism.
Classification: Concept
57) Cyberwar refers to an organized attempt by a country's military to disrupt or destroy the
information and communication systems of another country.
Difficulty: Easy
Learning Obj.: 10.2: Describe and explain the differences between cyberwar and cyberterrorism.
Classification: Concept
58) Patriot hackers are independent citizens or supporters of a country that perpetrate attacks on
perceived or real enemies.
Difficulty: Easy
Learning Obj.: 10.2: Describe and explain the differences between cyberwar and cyberterrorism.
Classification: Concept
59) Information dissemination refers to the use of Web sites to provide information for recruiting
new members as well as utilizing more interactive Internet technologies.
page-pf9
Difficulty: Easy
Learning Obj.: 10.2: Describe and explain the differences between cyberwar and cyberterrorism.
Classification: Concept
60) Briefly explain cyberwar and cyberterrorism.
Difficulty: Moderate
Learning Obj.: 10.2: Describe and explain the differences between cyberwar and cyberterrorism.
Classification: Concept
61) ________ refers to precautions taken to keep all aspects of information systems safe from
destruction, manipulation, or unauthorized use or access.
A) Information systems security
B) Information systems resource
C) Information systems planning
D) Information systems audit
E) Information systems distribution
Difficulty: Easy
Learning Obj.: 10.3: Discuss the process of managing IS security and describe various IS
controls that can help in ensuring IS security.
Classification: Concept
19
page-pfa
62) Information systems ________ is done to obtain an understanding of the threats to the
confidentiality, integrity, and availability of data and systems.
A) risk assessment
B) quality testing
C) requirements analysis
D) security modeling
E) data processing
Difficulty: Easy
Learning Obj.: 10.3: Discuss the process of managing IS security and describe various IS
controls that can help in ensuring IS security.
Classification: Concept
63) An organization takes active countermeasures to protect its systems, such as installing
firewalls. This approach is known as ________.
A) risk reduction
B) risk acceptance
C) risk rescheduling
D) risk transference
E) risk elimination
Difficulty: Easy
Learning Obj.: 10.3: Discuss the process of managing IS security and describe various IS
controls that can help in ensuring IS security.
Classification: Concept
64) An organization does not implement countermeasures against information threats; instead it
simply absorbs the damages that occur. This approach is called ________.
A) risk acceptance
B) risk reduction
C) risk mitigation
D) risk transference
E) risk rescheduling
Difficulty: Easy
Learning Obj.: 10.3: Discuss the process of managing IS security and describe various IS
controls that can help in ensuring IS security.
Classification: Concept
20

Trusted by Thousands of
Students

Here are what students say about us.

Copyright ©2022 All rights reserved. | CoursePaper is not sponsored or endorsed by any college or university.