Information Systems Today 7th Edition by Valacich – Test Bank
Information Systems Today, 7e (Valacich)
Chapter 10Â Securing Information Systems
Â
1) Which of the following is the most accurate definition of a computer crime?
- A) the act of using a computer to commit an illegal act
- B) the act of using someone’s computer to browse the Internet
- C) the act of using someone’s computer to check e-mail
- D) the act of stealing a computer and related hardware
- E) the act of providing personal information to Web sites when shopping
Answer:Â A
AACSB:Â Information technology
Difficulty:Â Easy
Learning Obj.:Â 10.1: Define computer crime and describe several types of computer crime.
Classification:Â Concept
2) The individuals who are knowledgeable enough to gain access to computer systems without authorization are referred to as ________.
- A) hackers
- B) bots
- C) online predators
- D) worms
- E) power users
Answer:Â A
AACSB:Â Information technology
Difficulty:Â Easy
Learning Obj.:Â 10.1: Define computer crime and describe several types of computer crime.
Classification:Â Concept
3) Which of the following is one of the main federal laws against computer crimes in the United States?
- A) Satellite Act of 1962
- B) Trade Expansions Act of 1962
- C) United States Information and Educational Exchange Act
- D) Central Intelligence Agency Act
- E) Electronic Communications Privacy Act of 1986
Answer:Â E
AACSB:Â Information technology; Ethical understanding and reasoning
Difficulty:Â Easy
Learning Obj.:Â 10.1: Define computer crime and describe several types of computer crime.
Classification:Â Concept
4) The Computer Fraud and Abuse Act of 1986 prohibits ________.
- A) accessing company intranet and confidential information from public computers
- B) stealing or compromising data about national defense, foreign relations, atomic energy, or other restricted information
- C) the use of external devices to provide access and information to companies’ confidential information
- D) signing contracts with consultants outside the United States to process information
- E) access to companies’ extranets when outsourcing work to clients overseas
Answer:Â B
AACSB:Â Information technology; Ethical understanding and reasoning
Difficulty:Â Easy
Learning Obj.:Â 10.1: Define computer crime and describe several types of computer crime.
Classification:Â Concept
5) Which of the following U.S. laws amended the Computer Fraud and Abuse Act to allow investigators to easily access voice-related communications?
- A) the Non-Detention Act
- B) the Espionage Act
- C) the Patriot Act
- D) the Video Privacy Protection Act
- E) the Clery Act
Answer:Â C
AACSB:Â Information technology; Ethical understanding and reasoning
Difficulty:Â Easy
Learning Obj.:Â 10.1: Define computer crime and describe several types of computer crime.
Classification:Â Concept
6) Violating data belonging to banks or other financial institutions is a crime in the United States. Which of the following legislations prohibit such violations?
- A) the Foreign Intelligence Surveillance Act
- B) the Computer Fraud and Abuse Act
- C) the Patriot Act
- D) the Glass-Steagall Act
- E) the Electronic Communications Privacy Act
Answer:Â B
AACSB:Â Information technology; Ethical understanding and reasoning
Difficulty:Â Easy
Learning Obj.:Â 10.1: Define computer crime and describe several types of computer crime.
Classification:Â Concept
7) Some violations of state and federal computer crime laws are punishable by fines and by not more than one year in prison. Such violations are charged as ________.
- A) misdemeanors
- B) felonies
- C) embezzlements
- D) indictments
- E) larcenies
Answer:Â A
AACSB:Â Information technology
Difficulty:Â Easy
Learning Obj.:Â 10.1: Define computer crime and describe several types of computer crime.
Classification:Â Concept
8) Computer criminals who attempt to break into systems or deface Web sites to promote political or ideological goals are called ________.
- A) hacktivists
- B) crackers
- C) social promoters
- D) internet activists
- E) online predators
Answer:Â A
AACSB:Â Information technology
Difficulty:Â Easy
Learning Obj.:Â 10.1: Define computer crime and describe several types of computer crime.
Classification:Â Concept
9) People who break into computer systems with the intention of doing damage or committing a crime are called ________.
- A) bots
- B) white hats
- C) worms
- D) cyber spies
- E) crackers
Answer:Â E
AACSB:Â Information technology
Difficulty: Â Easy
Learning Obj.:Â 10.1: Define computer crime and describe several types of computer crime.
Classification:Â Concept
10) WikiLeaks is a famous not-for-profit whistleblower Web site. MasterCard and Visa stopped payments to WikiLeaks after a series of leaks by the site. An anonymous group attacked the Web sites of both MasterCard and Visa reacting to this. These Web vandals, who tried to protect WikiLeaks, are called ________.
- A) hacktivists
- B) bots
- C) ethical hackers
- D) patriot hackers
- E) cyber soldiers
Answer:Â A
AACSB:Â Analytical thinking; Information technology
Difficulty:Â Moderate
Learning Obj.:Â 10.1: Define computer crime and describe several types of computer crime.
Classification:Â Concept
11) Employees steal time on company computers to do personal business. This is an example of ________.
- A) unauthorized access
- B) hacking
- C) vandalism
- D) cyberstalking
- E) functional inconvenience
Answer:Â A
AACSB:Â Information technology
Difficulty:Â Easy
Learning Obj.:Â 10.1: Define computer crime and describe several types of computer crime.
Classification:Â Concept
12) Identify a true statement about a vulnerability scanner.
- A) It analyzes network traffic and captures unencrypted passwords.
- B) It presents a view of long-term technology integration.
- C) It tests targeted systems for weaknesses.
- D) It presents a view of short-term technology integration.
- E) It ensures high-quality leads when a search is conducted online.
Answer:Â C
AACSB:Â Analytical thinking; Information technology
Difficulty:Â Moderate
Learning Obj.:Â 10.1: Define computer crime and describe several types of computer crime.
Classification:Â Concept
13) ________ targeted at networks is designed to spread by itself without the need for an infected host file to be shared.
- A) Adware
- B) Spyware
- C) A worm
- D) Spam
- E) A logic bomb
Answer:Â C
AACSB:Â Information technology
Difficulty:Â Easy
Learning Obj.:Â 10.1: Define computer crime and describe several types of computer crime.
Classification:Â Concept
14) Ronald downloads a movie from the Internet onto his company’s computer. During this process, his system gets infected with a virus. The virus spreads rapidly in the company’s network causing the server to crash. This type of virus is most likely to be ________.
- A) adware
- B) phishing mail
- C) spam
- D) a worm
- E) a Trojan horse
Answer:Â D
AACSB:Â Analytical thinking; Information technology
Difficulty:Â Moderate
Learning Obj.:Â 10.1: Define computer crime and describe several types of computer crime.
Classification:Â Application
Reviews
There are no reviews yet.