1.
_____ is a kind of identity theft where the victim knows the person who stole his/her identity.
Correct Answer
A. Friendly fraud
Explanation
Friendly fraud refers to a type of identity theft where the victim is acquainted with the person who stole their identity. This means that the perpetrator may be a friend, family member, or someone known to the victim. In such cases, the fraudster may use the victim's personal information to commit fraudulent activities without their knowledge or consent. This form of identity theft can be particularly damaging as it involves a breach of trust within personal relationships.
2.
_____ is a technique to gain personal information for the purpose of identity theft, where specific individuals are targeted and the creator of a fraudulent e-mail already has some of the victim's personal information and wants more.
Correct Answer
A. Spear pHishing
Explanation
Spear phishing is a technique used to gain personal information for identity theft, specifically targeting certain individuals. The creator of a fraudulent email already possesses some of the victim's personal information and aims to obtain more.
3.
An assessment of what is right or wrong can be determined by considering ____, which can be understood as the benefit or harm that will come from a particular decision.
Correct Answer
A. The consequences
Explanation
The correct answer is "the consequences." When assessing what is right or wrong, considering the consequences is important. This refers to the potential benefits or harms that will result from a particular decision. By evaluating the consequences, one can determine the ethical implications of their actions and make a more informed judgment about what is right or wrong.
4.
_____ is the use of phishing targeted at senior business executives, government leaders, and other types of high-profile individuals.
Correct Answer
B. Whaling
Explanation
Whaling is the correct answer because it refers to the use of phishing techniques specifically targeted at senior business executives, government leaders, and other high-profile individuals. This type of phishing attack aims to trick these individuals into revealing sensitive information or performing actions that could be detrimental to their organizations. It is called "whaling" because it focuses on "big fish" targets.
5.
_____ are types of hackers who break into other people's computer systems and may just look around. They may steal credit card numbers or destroy information, or otherwise do damage.
Correct Answer
C. Black-hat hackers
Explanation
Black-hat hackers are types of hackers who break into other people's computer systems and may engage in malicious activities such as stealing credit card numbers, destroying information, or causing damage. They do not have permission to access these systems and their actions are illegal and unethical.
6.
_____ can be defined as the principles and standards that guide our behavior toward other people.
Correct Answer
A. Ethics
Explanation
Ethics refers to the principles and standards that govern our behavior towards other people. It involves determining what is morally right or wrong and making decisions based on those principles. Ethics helps individuals and societies establish guidelines for how to treat others fairly, honestly, and with respect. It guides our actions and interactions with others, ensuring that we consider the impact of our behavior on others and strive to act in a morally responsible manner.
7.
_____ refers to unsolicited e-mail (electronic junk mail) from businesses that advertise goods and services.
Correct Answer
D. Spam
Explanation
Spam refers to unsolicited e-mail (electronic junk mail) from businesses that advertise goods and services.
8.
_____ refers to intangible creative work that is embodied in physical form.
Correct Answer
C. Intellectual property
Explanation
Intellectual property refers to intangible creative work that is embodied in physical form. This includes creations such as inventions, designs, artwork, music, and literature that are protected by copyright, trademarks, and patents. It is called intellectual property because it is the product of someone's intellect and creativity, and it is considered a form of property because it can be bought, sold, and protected by law.
9.
The _____ sought to protect investors by improving the accuracy and reliability of corporate disclosures and requires companies to implement extensive and detailed policies to prevent illegal activity within the company and respond in a timely manner to investigate illegal activity.
Correct Answer
C. Sarbanes-Oxley Act
Explanation
The Sarbanes-Oxley Act sought to protect investors by improving the accuracy and reliability of corporate disclosures. It requires companies to implement extensive and detailed policies to prevent illegal activity within the company and respond in a timely manner to investigate illegal activity. This act was passed in response to the accounting scandals of the early 2000s, such as Enron and WorldCom, and aims to increase transparency and accountability in the corporate sector.
10.
An assessment of what is right or wrong can be determined by considering the ____, which may be defined as how long it will take for the benefit or harm to take effect.
Correct Answer
C. Time to consequences
Explanation
The correct answer is "time to consequences". This refers to the amount of time it will take for the benefit or harm to occur as a result of a certain action or decision. By considering the time to consequences, one can evaluate the potential impact and determine whether the action or decision is right or wrong.
11.
Which of the following is an example of the unethical use of computers?
Correct Answer
B. Employees searching organizational databases for information on celebrities and friends.
Explanation
Employees searching organizational databases for information on celebrities and friends is an example of the unethical use of computers because it violates privacy and security policies. Accessing confidential information without a legitimate reason and using it for personal purposes is a breach of trust and can lead to legal consequences.
12.
_____ is the right to be left alone when one wants to be, to have control over one's own personal possessions, and not to be observed without one's consent.
Correct Answer
D. Privacy
Explanation
Privacy is the right to be left alone when one wants to be, to have control over one's own personal possessions, and not to be observed without one's consent. It refers to the ability to keep certain information or aspects of one's life private and to have the freedom to make choices about what is shared with others. Privacy is important for maintaining autonomy, personal security, and individuality. It allows individuals to establish boundaries and protect their personal space and possessions.
13.
_____ is a way of protecting messages and files by scrambling the contents of a file so that one cannot read it without having the right key.
Correct Answer
A. Encryption
Explanation
Encryption is a method used to secure messages and files by altering the content in a way that it becomes unreadable without the correct key. It ensures that only authorized individuals can access and understand the information, providing confidentiality and protection against unauthorized access.
14.
An assessment of what is right or wrong can be determined by considering ____, which refers to the probability that the harm or benefit will occur if one undertakes an action.
Correct Answer
A. The likelihood of effect
Explanation
The correct answer is "the likelihood of effect". When assessing what is right or wrong, considering the likelihood of effect refers to evaluating the probability that harm or benefit will occur if a particular action is taken. This means analyzing the chances of the intended consequences of an action actually happening. By considering the likelihood of effect, one can make more informed decisions about the potential outcomes and determine the ethical implications of their actions.
15.
_____ have philosophical and political reasons for breaking into systems and often deface Web sites as a sign of protest.
Correct Answer
C. Hacktivists
Explanation
Hacktivists are individuals who engage in hacking activities for philosophical and political reasons. They break into systems and deface websites as a form of protest, using their hacking skills to make a statement or raise awareness about certain issues. This distinguishes them from other groups like zombies or screenagers, who may not have the same motivations or objectives when it comes to hacking. White-hat hackers, on the other hand, are ethical hackers who use their skills to identify vulnerabilities and help improve security systems, rather than engaging in illegal activities like hacktivists.
16.
Which of the following is part of the outermost level of an individual's ethical structure?
Correct Answer
D. Actions that most people would not consider unacceptable or unethical.
Explanation
The outermost level of an individual's ethical structure refers to actions that are generally accepted by society and not considered unacceptable or unethical by most people. This level represents the basic standards of behavior that are widely recognized and followed by the majority.
17.
An architectural firm's blueprints, sketches and other proprietary documents are examples of ____.
Correct Answer
B. Intellectual property
Explanation
The blueprints, sketches, and other proprietary documents of an architectural firm are considered intellectual property. Intellectual property refers to creations of the mind, such as inventions, artistic works, designs, symbols, and names, that are protected by law. These documents are unique and original creations of the firm and are protected by copyright, allowing the firm to have exclusive rights over their use and distribution.
18.
A _____ records information about you during a Web surfing session such as what Web sites you visited, how long you were there, what ads you looked at, and what you bought.
Correct Answer
D. Clickstream
Explanation
A clickstream is a type of data that records information about a user's online activity during a web surfing session. It includes details such as the websites visited, the duration of the visit, the advertisements viewed, and the purchases made. Clickstream data is often used for analyzing user behavior, improving website design, and targeting advertisements.
19.
A _____ refers to the legal protection offered for the expression of an idea, such as a song, video game, and some types of proprietary documents.
Correct Answer
A. Copyright
Explanation
Copyright refers to the legal protection offered for the expression of an idea, such as a song, video game, and some types of proprietary documents. It grants the creator of an original work exclusive rights to its use and distribution, preventing others from copying or using the work without permission. Trademark refers to the protection of unique symbols, names, or logos that distinguish a company or brand. Patent protects inventions or new processes. Fair use agreement is a legal doctrine that allows limited use of copyrighted material without permission.
20.
_____ refers to malicious software that collects information about a person and his/her computer and reports it to someone without their permission.
Correct Answer
B. Spyware
Explanation
Spyware is a type of malicious software that secretly collects information about a person and their computer without their knowledge or consent. This information is then sent to someone else, usually for malicious purposes such as identity theft or unauthorized surveillance. Spyware can gather various types of data, including browsing history, keystrokes, passwords, and personal information. It can be installed on a computer through deceptive tactics such as email attachments, software downloads, or malicious websites. Once installed, spyware operates silently in the background, making it difficult for the user to detect or remove.
21.
A _____ consists of one line of information for every visitor to a Web site and is usually stored on a Web server.
Correct Answer
A. Web log
Explanation
A web log, also known as a weblog or blog, consists of one line of information for every visitor to a website and is usually stored on a web server. It records details such as the visitor's IP address, the pages they accessed, the time of their visit, and other relevant information. This log is useful for analyzing website traffic, identifying trends, and troubleshooting any issues that may arise.
22.
Which of the following is a program that, when installed on a computer, records every mouse click?
Correct Answer
D. Key logger
Explanation
A key logger is a program that records every mouse click on a computer when installed. It is a type of surveillance software that can be used to monitor and track user activity. Unlike other options listed, such as honeypot, spear phishing, and clickstreaming, a key logger specifically focuses on capturing mouse clicks.
23.
The _____ says that you may use copyrighted material in certain situations, for example, in the creation of new work or, within certain limits, for teaching purposes.
Correct Answer
A. Fair Use Doctrine
Explanation
The Fair Use Doctrine allows for the use of copyrighted material in certain situations, such as creating new work or for teaching purposes. It provides a legal framework for determining whether the use of copyrighted material is considered fair and does not infringe upon the rights of the copyright holder. This doctrine is important in balancing the rights of copyright holders with the need for creativity, education, and innovation.
24.
The _____ sought to regulate interstate commerce by imposing limitations and penalties on businesses sending unsolicited e-mail to consumers.
Correct Answer
D. CAN-Spam Act
Explanation
The CAN-Spam Act sought to regulate interstate commerce by imposing limitations and penalties on businesses sending unsolicited e-mail to consumers. This act was passed in 2003 and aimed to reduce the amount of spam emails being sent to consumers, as well as provide guidelines for legitimate businesses engaging in email marketing. The act requires businesses to include accurate header information, provide an opt-out mechanism for recipients, and prohibit deceptive subject lines and false header information. It also establishes penalties for violations of the act, including fines and imprisonment.
25.
_____ is a technique to gain personal information for the purpose of identity theft, usually by means of fraudulent e-mail.
Correct Answer
B. pHishing
Explanation
Phishing is a technique used to gain personal information for the purpose of identity theft, typically through fraudulent emails. In phishing attacks, the attacker poses as a legitimate entity and tricks the recipient into providing sensitive information, such as passwords or credit card numbers. This information is then used for malicious purposes, such as accessing the victim's accounts or making unauthorized transactions. Phishing attacks are a common form of cybercrime and can have serious consequences for individuals and organizations.
26.
A(n) ______ is hardware and/or software that protects a computer or a network from intruders.
Correct Answer
C. Firewall
Explanation
A firewall is a hardware and/or software that protects a computer or a network from intruders. It acts as a barrier between the internal network and the external network, monitoring and controlling incoming and outgoing network traffic based on predetermined security rules. It helps to prevent unauthorized access, malicious attacks, and data breaches by filtering and blocking potentially harmful traffic.
27.
The _____ provided new authority to government agencies to mine data on individuals and groups including e-mails and Web site visits, and put limits on the information available under the Freedom of Information Act.
Correct Answer
C. Homeland Security Act
Explanation
The Homeland Security Act provided new authority to government agencies to mine data on individuals and groups including e-mails and Web site visits, and put limits on the information available under the Freedom of Information Act.
28.
An assessment of what is right or wrong can be made by considering _____ which focuses on the number of people that will be affected by one's action.
Correct Answer
D. The reach of result
Explanation
The correct answer is "the reach of result." This is because considering the reach of the result means evaluating how many people will be affected by one's actions. This assessment helps determine what is right or wrong by taking into account the potential impact on others.
29.
A _____ is a small file that contains information about a person and his/her Web activities, which a Web site one visits places on their computer.
Correct Answer
A. Cookie
Explanation
A cookie is a small file that contains information about a person and his/her Web activities, which a website one visits places on their computer. Cookies are used by websites to remember user preferences, track user behavior, and provide personalized experiences. They can store information such as login credentials, shopping cart items, and browsing history.
30.
Which of the following is true of an ethical dilemma?
Correct Answer
B. It occurs when one's responsibilities seem to lead in opposite directions.
Explanation
An ethical dilemma refers to a situation where a person is faced with conflicting ethical responsibilities or obligations. In such a scenario, the individual may find it challenging to make a decision because their responsibilities seem to lead in opposite directions. This means that they are torn between two or more choices, each of which has ethical implications. It does not imply that only unethical or immoral people face ethical dilemmas, but rather that anyone can encounter such a situation where they have to navigate conflicting ethical responsibilities.
31.
_____ refers to the use of physiological characteristics such as fingerprints, the blood vessels in the iris of the eye, and the sound of one's voice to provide identification.
Correct Answer
B. Biometrics
Explanation
Biometrics refers to the use of physiological characteristics such as fingerprints, the blood vessels in the iris of the eye, and the sound of one's voice to provide identification. It involves the use of unique physical traits to verify and authenticate individuals.
32.
_____ refers to software that generates advertisements and installs itself on your computer when you download some other, usually free, program from the Web.
Correct Answer
B. Adware
Explanation
Adware refers to software that generates advertisements and installs itself on your computer when you download some other, usually free, program from the Web. It is a type of malicious software that displays unwanted ads and can collect personal information without the user's consent. Unlike spyware, which is designed to gather information covertly, adware is more focused on generating revenue through advertising. Antivirus software, on the other hand, is designed to detect and remove various types of malicious software, including adware. AdSense is a program by Google that allows website owners to display targeted advertisements on their sites.
33.
A _____ floods a server or network with so many requests for service that it slows down or crashes.
Correct Answer
B. Denial-of-service attack
Explanation
A denial-of-service attack is a type of cyber attack where the attacker floods a server or network with an overwhelming amount of requests for service, causing it to slow down or crash. This is usually done by exploiting vulnerabilities in the target system or by using a botnet, a network of compromised computers. The intention behind such attacks can vary, ranging from causing disruption to a website or network, to extorting money from the target by threatening to continue the attack.
34.
_____ refer(s) to devices on networks that connect computers to each other.
Correct Answer
B. Routers
Explanation
Routers are devices on networks that connect computers to each other. They receive data packets from one network and forward them to another network, ensuring that the data reaches its intended destination. Routers are responsible for directing traffic and determining the most efficient path for data transmission. They play a crucial role in connecting multiple devices and networks together, allowing them to communicate and share resources.
35.
_____ refers to the extent to which one identifies with the person or persons who will receive the benefit or suffer the harm associated with a particular decision.
Correct Answer
D. Relatedness
Explanation
Relatedness refers to the extent to which one identifies with the person or persons who will receive the benefit or suffer the harm associated with a particular decision. It involves considering the connection and empathy one feels towards those who will be affected by the decision. This factor can influence the level of concern and consideration given to the potential impact on others, ultimately affecting the decision-making process.
36.
_____ is the unauthorized use, duplication, distribution, or sale of copyrighted software.
Correct Answer
A. Pirated software
Explanation
Pirated software refers to the unauthorized use, duplication, distribution, or sale of copyrighted software. This means that someone is using, copying, sharing, or selling software without the permission of the copyright holder. This is illegal and a violation of intellectual property rights.
37.
Claytons and Sons, a finance firm in Manhattan, has a large number of employees who handle huge amounts of online transactions everyday. The management feels that it is crucial to monitor their online activities. Which of the following can the company use for this purpose?
Correct Answer
A. Snoopware
Explanation
The company can use snoopware to monitor the online activities of its employees. Snoopware refers to software that allows monitoring and recording of online activities without the user's knowledge. This would enable the management to track the online transactions and activities of the employees to ensure security and prevent any potential fraudulent or unauthorized activities.
38.
The _____ allows law enforcement to get access to almost any information, including library records, video rentals, bookstore purchases, and business records when investigating any act of terrorism or hostile intelligence activities.
Correct Answer
A. USA Patriot Act
Explanation
The USA Patriot Act allows law enforcement to get access to almost any information, including library records, video rentals, bookstore purchases, and business records when investigating any act of terrorism or hostile intelligence activities. This act was implemented in response to the 9/11 terrorist attacks in the United States and aimed to enhance the government's ability to prevent future attacks. It grants law enforcement agencies broader surveillance powers and the authority to collect and analyze data from various sources in order to track and combat potential threats to national security.
39.
Which of the following is part of the innermost level of an individual's ethical structure?
Correct Answer
A. Ethical violations that one would consider extremely serious.
Explanation
The innermost level of an individual's ethical structure refers to their personal beliefs and values. This answer choice suggests that it includes ethical violations that are considered extremely serious by the individual. This implies that the individual has a strong moral compass and holds certain actions as morally wrong. These violations would be at the core of their ethical framework, guiding their behavior and decision-making.
40.
_____ refers to programs that Web sites offer to help people monitor what is happening on a computer.
Correct Answer
B. Snoopware
Explanation
Snoopware refers to programs that Web sites offer to help people monitor what is happening on a computer. This type of software is often used for surveillance or tracking purposes, allowing users to monitor activities such as internet browsing, keystrokes, and online communication. Snoopware can be used for legitimate purposes, such as parental control or employee monitoring, but it can also be used maliciously for spying or invading someone's privacy.