Bus 230 Chap 5 Exam 2
Unlock all answers in this set
Unlock answersquestion
Any illegal act involving a computer generally is referred to as a computer crime.
answer
True
question
Combating cybercrime is NOT one of the FBI's top priorities.
answer
False
question
Cybercrime laws are consistent between states and countries, making it easy to reach a consensus as to what is illegal.
answer
False
question
Many companies use access controls to minimize the chance that a perpetrator may intentionally access or an employee may accidentally access confidential information on a computer, mobile device, or network.
answer
True
question
Audit trails only record unsuccessful access attempts.
answer
False
question
Most operating systems require that users correctly enter a user name and password before they can access the data, information, and programs stored on a computer, mobile device, or network.
answer
True
question
If a program or device has a default password, be sure to retain it.
answer
False
question
PINs are not the same as passwords.
answer
False
question
If you are nervous, a signature might not match the one on file in a signature verification system.
answer
True
question
A digital forensics examiner must have knowledge of the law, technical experience with many types of hardware and software products, superior communication skills, and the like.
answer
True
question
Biometric objects are entirely foolproof.
answer
False
question
To promote a better understanding of software piracy problems and, if necessary, to take legal action, a number of major worldwide software companies formed the BSA.
answer
True
question
Many organizations and businesses have strict written policies governing the installation and use of software and enforce their rules by checking networked or online computers periodically to ensure that all software is licensed properly.
answer
True
question
Some operating systems and email programs allow you to encrypt the contents of files and messages that are stored on your computer.
answer
True
question
Secure sites typically use digital certificates along with security protocols.
answer
True
question
Digital signatures often are used to ensure that an imposter is not participating in an Internet transaction.
answer
True
question
Analog signatures help to prevent email forgery.
answer
False
question
Passwords and passphrases that are more than four characters, contain uppercase and lowercase letters, numbers, and special characters are the most secure.
answer
False
question
Any device that connects to the Internet is susceptible to mobile malware.
answer
True
question
One way to reduce electrical waste is for organizations to use outside air to cool data centers and computer facilities.
answer
True
question
Websites often collect data about you so that they can customize advertisements and send you personalized email messages.
answer
True
question
Online shopping sites generally use a session cookie to keep track of items in a user's shopping cart as shown in the accompanying figure.
answer
True
question
Users can purchase a software program that selectively blocks cookies like the kind shown in the accompanying figure.
answer
True
question
Your browsing history is a list of all websites you have visited over a period of time.
answer
True
question
During virtual browsing, your browser does not keep track of the websites you are visiting.
answer
False
question
Proximity sharing gives websites access to your current location.
answer
False
question
Phishing is an unsolicited email message or newsgroup posting sent to many recipients or newsgroups at once.
answer
False
question
To remove spyware, users need to obtain a special program that can detect and delete it.
answer
True
question
Information collected and stored about individuals should be limited to what is necessary to carry out the function of the business or government agency collecting the data.
answer
True
question
To protect yourself from social engineering scams, shred all sensitive or confidential documents.
answer
True`=
question
Many businesses use spyware to limit employees' web access.
answer
False
question
COPPA protects minors from inappropriate content when accessing the Internet in schools and libraries.
answer
False
question
The Computer Abuse Amendments Act outlaws transmission of harmful computer code such as viruses like the kind shown in the accompanying figure.
answer
True
question
The ECPA protects consumers from disclosure of their personal financial information and requires institutions to alert customers of information disclosure policies.
answer
False
question
FOIA enables public access to most government records.
answer
True
question
HIPAA protects individuals against the wrongful disclosure of their health information.
answer
True
question
The PATRIOT Act gives law enforcement the right to monitor people's activities, including web and email habits.
answer
True
question
The Privacy Act forbids federal agencies from allowing information to be used for a reason other than that for which it was collected.
answer
True
question
It is illegal for employers to use software programs that monitor employees.
answer
False
question
If a company does not have a formal email policy, it can read email messages without employee notification.
answer
True
question
Content filtering opponents argue that banning any materials violates constitutional guarantees of free speech and personal rights.
answer
True
question
Many Internet security programs include a firewall, antivirus program, and filtering capabilities combined.
answer
True
question
COPPA requires that schools and libraries use content filtering software in order to receive certain federal funds.
answer
False