Chapter 5 As shown in the accompanying figure, most operating systems require that users

subject Type Homework Help
subject Pages 9
subject Words 2057
subject Authors Misty E. Vermaat

Unlock document.

This document is partially blurred.
Unlock all pages and 1 million more documents.
Get Access
page-pf1
Name:
Class:
Date:
DC Chapter 05: Inside Computers and Mobile Devices
94. Which of the following statements is not true about intellectual property rights?
a.
The term fair use refers to the rights which creators are entitled for their work.
b.
Intellectual property refers to unique and original works such as ideas, inventions, company logos, and more.
c.
A copyright protects any tangible form of expression.
d.
Digital rights management is a strategy designed to prevent illegal distribution of digital content.
95. Which of the following terms refers to a written list of guidelines that might include rules that prevent employees from
using software illegally or using computers to steal?
a.
a software license
b.
an IT code of conduct
c.
digital rights management
d.
fair use
96. In order to safeguard your personal information, which of the following is recommended?
a.
Fill out rebates and warranty forms completely to provide the manufacturer with as much information as
possible in case you need to contact them.
b.
Clear your history file when you are finished browsing.
c.
Preprint your telephone number on your personal checks so businesses can reach you quickly if they determine
there is a problem with your purchase.
d.
Use shopping club and buying cards when shopping to remain anonymous.
97. Which of the following terms is used to describe a small text file that a web server stores on your computer?
a.
a breadcrumb
b.
a nugget
c.
a cracker
d.
a cookie
page-pf2
Name:
Class:
Date:
DC Chapter 05: Inside Computers and Mobile Devices
98. Which of the following terms is used to describe a scam in which a website includes a button, image or link that
contains a malicious program?
a.
war driving
b.
spitting
c.
clickjacking
d.
spimming
99. Social engineering, as it pertains to computers, is _____________.
a.
creating consumer and personal profiles by tracking website history and electronic purchases
b.
compiling data from multiple computer users in order to make predictions about computer trends
c.
filtering Internet content to targeted users based on their personal preferences
d.
gaining unauthorized access or obtaining confidential information by taking advantage of the trusting nature or
naivety of users
100. What term is used to describe the process of restricting access to certain material on the web?
a.
content filtering
b.
information monitoring
c.
data mining
d.
social profiling
101. Any illegal act involving a computer generally is referred to as a computer crime.
a.
True
b.
False
102. Combating cybercrime is not one of the FBI's top priorities.
a.
True
b.
False
page-pf3
Name:
Class:
Date:
DC Chapter 05: Inside Computers and Mobile Devices
103. Cybercrime laws are consistent between states and countries, making it easy to reach a consensus as to what is
illegal.
a.
True
b.
False
104. A cyberextortionist uses the Internet or network to destroy or damage computers for political reasons.
a.
True
b.
False
105. Programmers often build trapdoors into programs during system development.
a.
True
b.
False
106. A rootkit can be a back door.
a.
True
b.
False
107. Perpetrators of back doors trick their victims into interacting with phony websites.
a.
True
b.
False
page-pf4
Name:
Class:
Date:
DC Chapter 05: Inside Computers and Mobile Devices
108. Personal firewalls constantly monitor all transmissions to and from a computer and may inform a user of any
attempted intrusion.
a.
True
b.
False
109. Both Windows and Mac operating systems include firewall capabilities.
a.
True
b.
False
110. Many companies use access controls to minimize the chance that a perpetrator may intentionally access or an
employee may accidentally access confidential information on a computer, mobile device, or network.
a.
True
b.
False
111. Audit trails only record unsuccessful access attempts.
a.
True
b.
False
page-pf5
Name:
Class:
Date:
DC Chapter 05: Inside Computers and Mobile Devices
112. As shown in the accompanying figure, most operating systems require that users correctly enter a user name and
password before they can access the data, information, and programs stored on a computer, mobile device, or network.
a.
True
b.
False
113. If a program or device has a default password, be sure to retain it.
a.
True
b.
False
114. PINs are not the same as passwords.
a.
True
b.
False
page-pf6
115. If you are nervous, a signature might not match the one on file in a signature verification system.
a.
True
b.
False
116. A digital forensics examiner must have knowledge of the law, technical experience with many types of hardware and
software products, superior communication skills, and the like.
a.
True
b.
False
117. Biometric objects are entirely foolproof.
a.
True
b.
False
118. To promote a better understanding of software piracy problems and, if necessary, to take legal action, a number of
major worldwide software companies formed the BSA.
a.
True
b.
False
119. Many organizations and businesses have strict written policies governing the installation and use of software and
enforce their rules by checking networked or online computers periodically to ensure that all software is licensed properly.
a.
True
b.
False
page-pf7
Name:
Class:
Date:
DC Chapter 05: Inside Computers and Mobile Devices
120. Some operating systems and email programs allow you to encrypt the contents of files and messages that are stored
on your computer.
a.
True
b.
False
121. Secure sites typically use digital certificates along with security protocols.
a.
True
b.
False
122. Digital signatures often are used to ensure that an imposter is not participating in an Internet transaction.
a.
True
b.
False
123. Analog signatures help to prevent email forgery.
a.
True
b.
False
124. Passwords and passphrases that are more than four characters, contain uppercase and lowercase letters, numbers, and
special characters are the most secure.
a.
True
b.
False
page-pf8
Name:
Class:
Date:
DC Chapter 05: Inside Computers and Mobile Devices
125. Any device that connects to the Internet is susceptible to mobile malware.
a.
True
b.
False
126. One way to reduce electrical waste is for organizations to consolidate servers by user concatenation.
a.
True
b.
False
127. One way to reduce electrical waste is for organizations to use outside air to cool data centers and computer facilities.
a.
True
b.
False
128. Websites often collect data about you so that they can customize advertisements and send you personalized email
messages.
a.
True
b.
False
page-pf9
Name:
Class:
Date:
DC Chapter 05: Inside Computers and Mobile Devices
129. Online shopping sites generally use a session cookie to keep track of items in a user’s shopping cart as shown in the
accompanying figure.
a.
True
b.
False
130. Users can purchase a software program that selectively blocks cookies like the kind shown in the accompanying
figure.
a.
True
b.
False
131. Your browsing history is a list of all websites you have visited over a period of time.
a.
True
b.
False
132. During virtual browsing, your browser does not keep track of the websites you are visiting.
a.
True
b.
False
page-pfa
Name:
Class:
Date:
DC Chapter 05: Inside Computers and Mobile Devices
133. Proximity sharing gives websites access to your current location.
a.
True
b.
False
134. Phishing is an unsolicited email message or newsgroup posting sent to many recipients or newsgroups at once.
a.
True
b.
False
135. To remove spyware, users need to obtain a special program that can detect and delete it.
a.
True
b.
False
136. Information collected and stored about individuals should be limited to what is necessary to carry out the function of
the business or government agency collecting the data.
a.
True
b.
False
137. To protect yourself from social engineering scams, shred all sensitive or confidential documents.
a.
True
b.
False
page-pfb
Name:
Class:
Date:
DC Chapter 05: Inside Computers and Mobile Devices
138. Many businesses use spyware to limit employees’ web access.
a.
True
b.
False
139. COPPA protects minors from inappropriate content when accessing the Internet in schools and libraries.
a.
True
b.
False
140. The Computer Abuse Amendments Act outlaws transmission of harmful computer code such as viruses like the kind
shown in the accompanying figure.
a.
True
page-pfc
Name:
Class:
Date:
DC Chapter 05: Inside Computers and Mobile Devices
b.
False
141. The ECPA protects consumers from disclosure of their personal financial information and requires institutions to
alert customers of information disclosure policies.
a.
True
b.
False
142. FOIA enables public access to most government records.
a.
True
b.
False
143. HIPAA protects individuals against the wrongful disclosure of their health information.
a.
True
b.
False
144. The PATRIOT Act gives law enforcement the right to monitor people's activities, including web and email habits.
a.
True
b.
False
145. The Privacy Act forbids federal agencies from allowing information to be used for a reason other than that for which
it was collected.
a.
True
b.
False
page-pfd
Name:
Class:
Date:
DC Chapter 05: Inside Computers and Mobile Devices
146. It is illegal for employers to use software programs that monitor employees.
a.
True
b.
False
147. If a company does not have a formal email policy, it can read email messages without employee notification.
a.
True
b.
False
148. Content filtering opponents argue that banning any materials violates constitutional guarantees of free speech and
personal rights.
a.
True
b.
False
149. Many Internet security programs include a firewall, antivirus program, and filtering capabilities combined.
a.
True
b.
False
150. COPPA requires that schools and libraries use content filtering software in order to receive certain federal funds.
a.
True
b.
False
page-pfe
Name:
Class:
Date:
DC Chapter 05: Inside Computers and Mobile Devices
151. The term ____________________ describes an attack whose goal ranges from disabling a government's computer
network to crippling a country.
152. A(n) ____________________ is a program that hides in a computer or mobile device and allows someone from a
remote location to take full control of the computer or devices.
153. Computer viruses like the kind in the accompanying figurealong with worms, and Trojan horsesdeliver their
____________________ on a computer or mobile device when a user opens an infected file or runs an infected program.

Trusted by Thousands of
Students

Here are what students say about us.

Copyright ©2022 All rights reserved. | CoursePaper is not sponsored or endorsed by any college or university.