• Home
  • Nursing Test Bank
  • Exams
    • NCLEX Exam
    • Ati Exams
  • Blog
Nursingtestbankltd Nursingtestbankltd
  • Contact us
Login / Register
Search
Wishlist
1 item / $25.00
Menu
Nursingtestbankltd
Search
1 item $25.00
“Information Technology Auditing 4e James A Hall” has been added to your cart. View cart
Click to enlarge
Home information system Information Systems Today 7th Edition by Valacich – Test Bank
Information Systems International Edition 10th Edition by Ralph M. Stair - Test Bank
Information Systems International Edition 10th Edition by Ralph M. Stair - Test Bank $25.00
Back to products
INFORMATION SYSTEMS TODAY MANAGING THE DIGITAL WORLD, 8E JOSEPH  - TEST BANK
INFORMATION SYSTEMS TODAY MANAGING THE DIGITAL WORLD, 8E JOSEPH - TEST BANK $25.00

Information Systems Today 7th Edition by Valacich – Test Bank

$25.00

Edition: 7th Edition

Format: Downloadable ZIP File

Resource Type: Test bank

Duration: Unlimited downloads

Delivery: Instant Download

Add to wishlist
Add to wishlist
Compare
Category: information system
Share:
  • Description
  • Reviews (0)
Description

Information Systems Today 7th Edition by Valacich – Test Bank

Information Systems Today, 7e (Valacich)

Chapter 10  Securing Information Systems

 

1) Which of the following is the most accurate definition of a computer crime?

  1. A) the act of using a computer to commit an illegal act
  2. B) the act of using someone’s computer to browse the Internet
  3. C) the act of using someone’s computer to check e-mail
  4. D) the act of stealing a computer and related hardware
  5. E) the act of providing personal information to Web sites when shopping

Answer:  A

AACSB:  Information technology

Difficulty:  Easy

Learning Obj.:  10.1: Define computer crime and describe several types of computer crime.

Classification:  Concept

 

2) The individuals who are knowledgeable enough to gain access to computer systems without authorization are referred to as ________.

  1. A) hackers
  2. B) bots
  3. C) online predators
  4. D) worms
  5. E) power users

Answer:  A

AACSB:  Information technology

Difficulty:  Easy

Learning Obj.:  10.1: Define computer crime and describe several types of computer crime.

Classification:  Concept

 

3) Which of the following is one of the main federal laws against computer crimes in the United States?

  1. A) Satellite Act of 1962
  2. B) Trade Expansions Act of 1962
  3. C) United States Information and Educational Exchange Act
  4. D) Central Intelligence Agency Act
  5. E) Electronic Communications Privacy Act of 1986

Answer:  E

AACSB:  Information technology; Ethical understanding and reasoning

Difficulty:  Easy

Learning Obj.:  10.1: Define computer crime and describe several types of computer crime.

Classification:  Concept

 

4) The Computer Fraud and Abuse Act of 1986 prohibits ________.

  1. A) accessing company intranet and confidential information from public computers
  2. B) stealing or compromising data about national defense, foreign relations, atomic energy, or other restricted information
  3. C) the use of external devices to provide access and information to companies’ confidential information
  4. D) signing contracts with consultants outside the United States to process information
  5. E) access to companies’ extranets when outsourcing work to clients overseas

Answer:  B

AACSB:  Information technology; Ethical understanding and reasoning

Difficulty:  Easy

Learning Obj.:  10.1: Define computer crime and describe several types of computer crime.

Classification:  Concept

 

5) Which of the following U.S. laws amended the Computer Fraud and Abuse Act to allow investigators to easily access voice-related communications?

  1. A) the Non-Detention Act
  2. B) the Espionage Act
  3. C) the Patriot Act
  4. D) the Video Privacy Protection Act
  5. E) the Clery Act

Answer:  C

AACSB:  Information technology; Ethical understanding and reasoning

Difficulty:  Easy

Learning Obj.:  10.1: Define computer crime and describe several types of computer crime.

Classification:  Concept

 

6) Violating data belonging to banks or other financial institutions is a crime in the United States. Which of the following legislations prohibit such violations?

  1. A) the Foreign Intelligence Surveillance Act
  2. B) the Computer Fraud and Abuse Act
  3. C) the Patriot Act
  4. D) the Glass-Steagall Act
  5. E) the Electronic Communications Privacy Act

Answer:  B

AACSB:  Information technology; Ethical understanding and reasoning

Difficulty:  Easy

Learning Obj.:  10.1: Define computer crime and describe several types of computer crime.

Classification:  Concept

 

 

7) Some violations of state and federal computer crime laws are punishable by fines and by not more than one year in prison. Such violations are charged as ________.

  1. A) misdemeanors
  2. B) felonies
  3. C) embezzlements
  4. D) indictments
  5. E) larcenies

Answer:  A

AACSB:  Information technology

Difficulty:  Easy

Learning Obj.:  10.1: Define computer crime and describe several types of computer crime.

Classification:  Concept

8) Computer criminals who attempt to break into systems or deface Web sites to promote political or ideological goals are called ________.

  1. A) hacktivists
  2. B) crackers
  3. C) social promoters
  4. D) internet activists
  5. E) online predators

Answer:  A

AACSB:  Information technology

Difficulty:  Easy

Learning Obj.:  10.1: Define computer crime and describe several types of computer crime.

Classification:  Concept

 

9) People who break into computer systems with the intention of doing damage or committing a crime are called ________.

  1. A) bots
  2. B) white hats
  3. C) worms
  4. D) cyber spies
  5. E) crackers

Answer:  E

AACSB:  Information technology

Difficulty:  Easy

Learning Obj.:  10.1: Define computer crime and describe several types of computer crime.

Classification:  Concept

 

 

10) WikiLeaks is a famous not-for-profit whistleblower Web site. MasterCard and Visa stopped payments to WikiLeaks after a series of leaks by the site. An anonymous group attacked the Web sites of both MasterCard and Visa reacting to this. These Web vandals, who tried to protect WikiLeaks, are called ________.

  1. A) hacktivists
  2. B) bots
  3. C) ethical hackers
  4. D) patriot hackers
  5. E) cyber soldiers

Answer:  A

AACSB:  Analytical thinking; Information technology

Difficulty:  Moderate

Learning Obj.:  10.1: Define computer crime and describe several types of computer crime.

Classification:  Concept

 

11) Employees steal time on company computers to do personal business. This is an example of ________.

  1. A) unauthorized access
  2. B) hacking
  3. C) vandalism
  4. D) cyberstalking
  5. E) functional inconvenience

Answer:  A

AACSB:  Information technology

Difficulty:  Easy

Learning Obj.:  10.1: Define computer crime and describe several types of computer crime.

Classification:  Concept

12) Identify a true statement about a vulnerability scanner.

  1. A) It analyzes network traffic and captures unencrypted passwords.
  2. B) It presents a view of long-term technology integration.
  3. C) It tests targeted systems for weaknesses.
  4. D) It presents a view of short-term technology integration.
  5. E) It ensures high-quality leads when a search is conducted online.

Answer:  C

AACSB:  Analytical thinking; Information technology

Difficulty:  Moderate

Learning Obj.:  10.1: Define computer crime and describe several types of computer crime.

Classification:  Concept

 

 

13) ________ targeted at networks is designed to spread by itself without the need for an infected host file to be shared.

  1. A) Adware
  2. B) Spyware
  3. C) A worm
  4. D) Spam
  5. E) A logic bomb

Answer:  C

AACSB:  Information technology

Difficulty:  Easy

Learning Obj.:  10.1: Define computer crime and describe several types of computer crime.

Classification:  Concept

 

14) Ronald downloads a movie from the Internet onto his company’s computer. During this process, his system gets infected with a virus. The virus spreads rapidly in the company’s network causing the server to crash. This type of virus is most likely to be ________.

  1. A) adware
  2. B) phishing mail
  3. C) spam
  4. D) a worm
  5. E) a Trojan horse

Answer:  D

AACSB:  Analytical thinking; Information technology

Difficulty:  Moderate

Learning Obj.:  10.1: Define computer crime and describe several types of computer crime.

Classification:  Application

Related

Reviews (0)

Reviews

There are no reviews yet.

Be the first to review “Information Systems Today 7th Edition by Valacich – Test Bank” Cancel reply

Your email address will not be published. Required fields are marked *

Related products

Add to cart
Quick view
Compare
Add to wishlist

Information Technology Project Management 8th Edition Kathy Schwalbe

information system
$25.00 Compare
Add to cart
Quick view
Compare
Add to wishlist

Information Technology Auditing 4th Edition By James A.Hall – Test Bank

information system
$25.00 Compare
Add to cart
Quick view
Compare
Add to wishlist

INFORMATION SYSTEMS TODAY MANAGING THE DIGITAL WORLD, 8E JOSEPH – TEST BANK

information system
$25.00 Compare
Add to cart
Quick view
Compare
Add to wishlist

Information Technology For Managers 2nd Edition By by George Reynolds – Test Bank

information system
$25.00 Compare
Add to cart
Quick view
Compare
Add to wishlist

Information Technology Auditing 4e James A Hall

information system
$25.00 Compare

Nursingtestbankltd

  • 100 E San Fernando St, San Jose, CA 95112, United States
  • Whatsapp: +1-6269466008
  • Email: Nursingtestbankltd@gmail.com

Useful links
  • FAQs
  • Privacy Policy
  • Terms & Conditions
  • Contact Us
Categories
  • Nursing Test Bank
  • NCLEX Exam
Pages
  • Home
  • Nursing Test Bank
  • Exams
    • NCLEX Exam
    • Ati Exams
  • Blog
Recent post
  • Digitization of Test Banks in the 21st Century
  • Nursing Test Bank: The Guide to Excellence
Nursingtestbankltd
payments
  • Menu
  • Categories
  • Nursing Test Bank
  • NCLEX Exam
  • Home
  • Nursing Test Bank
  • Exams
    • NCLEX Exam
    • Ati Exams
  • Blog
  • Wishlist
  • Login / Register
Shopping cart
Close
Sign in
Close

Lost your password?

No account yet?

Create an Account
Start typing to see products you are looking for.
Shop
Wishlist
1 item Cart
My account

Do you need any help?