1.
A spam filter is software that attempts to block unwanted e-mail.
Correct Answer
A. True
Explanation
A spam filter is a type of software designed to identify and block unwanted or unsolicited emails. It uses various algorithms and techniques to analyze the content, sender, and other attributes of an email to determine whether it is spam or not. By flagging or blocking spam emails, the filter helps to reduce the amount of unwanted and potentially harmful messages that users receive in their inbox. Therefore, the statement "A spam filter is software that attempts to block unwanted e-mail" is true.
2.
“Shoulder surfing “occurs when an identity thief simply stands next to someone at a public office, such as the Bureau of Motor Vehicles, and watches as the person fills out personal information on a form.
Correct Answer
A. True
Explanation
Shoulder surfing is a form of identity theft where the thief stands close to someone in a public place and watches them as they enter personal information on a form or device. This allows the thief to gather sensitive information without the victim's knowledge. Therefore, the statement that "Shoulder surfing occurs when an identity thief simply stands next to someone at a public office, such as the Bureau of Motor Vehicles, and watches as the person fills out personal information on a form" is true.
3.
Originally, a cracker was a person who enjoys computer technology and spends time learning and using computer systems.
Correct Answer
B. False
Explanation
The statement is false because the original meaning of a cracker is not someone who enjoys computer technology, but rather someone who breaks into computer systems or networks with malicious intent.
4.
Worms can create copies on the same computer or can send the copies to other computers via a network.
Correct Answer
A. True
Explanation
Worms are a type of malware that can self-replicate and spread to other computers through a network. They are designed to exploit vulnerabilities in computer systems and can create copies of themselves on the same computer or send copies to other computers. This allows them to quickly spread and infect multiple systems, causing damage and potentially stealing sensitive information. Therefore, the statement that worms can create copies on the same computer or send copies to other computers via a network is true.
5.
All antivirus software are capable of repairing common virus infections automatically, without interrupting your work.
Correct Answer
B. False
Explanation
This statement is false. While antivirus software is designed to detect and remove viruses, not all antivirus software have the capability to repair common virus infections automatically. Some antivirus software may require manual intervention or additional steps to remove the virus completely. Therefore, the statement is not accurate.
6.
Disk defragmentation reorganizes the contents of the disk to store the pieces of each file close together and contiguously.
Correct Answer
A. True
Explanation
Disk defragmentation is a process that rearranges the fragmented data on a disk so that the pieces of each file are stored close together and in a contiguous manner. This helps to improve the efficiency and performance of the disk by reducing the time it takes to access and retrieve data. Therefore, the statement is true as it accurately describes the purpose and function of disk defragmentation.
7.
Criminal hackers sometimes warn the public of a new and devastating virus that does not exist in order to create fear.
Correct Answer
A. True
Explanation
Criminal hackers may spread false information about a new and dangerous virus that doesn't actually exist. They do this to instill fear and panic among the public, which can lead to various negative consequences such as people falling for scams or downloading malicious software out of fear. This tactic is often used by hackers to exploit people's emotions and manipulate them for their own gain.
8.
Using a password sniffer, a criminal hacker can gain access to computers and networks to steal data and information, invade privacy, plant viruses, and disrupt computer operations.
Correct Answer
A. True
Explanation
A password sniffer is a tool that allows a hacker to intercept and capture passwords and login credentials. By using this tool, a criminal hacker can gain unauthorized access to computers and networks. Once inside, they can steal sensitive data and information, invade privacy by accessing personal files and communications, plant viruses or malware to cause damage, and disrupt computer operations. Therefore, the statement that a criminal hacker can use a password sniffer to gain access and carry out malicious activities is true.
9.
A bot is a variable value that is applied using an algorithm to a string or block of unencrypted text to produce encrypted text or to decrypt encrypted text.
Correct Answer
B. False
Explanation
The statement is incorrect because a bot is not a variable value that is applied using an algorithm to encrypt or decrypt text. A bot is actually an automated software program that performs tasks on the internet, such as crawling websites, interacting with users, or providing information. It does not have a direct role in encryption or decryption processes.
10.
A firewall can include both hardware and software that act as a barrier between an organization’s information system and the outside world.
Correct Answer
A. True
Explanation
A firewall is a security measure that protects an organization's information system from unauthorized access and potential threats from the outside world. It can consist of both hardware and software components that work together to create a barrier, monitoring and controlling the incoming and outgoing network traffic. This prevents malicious activities and helps maintain the confidentiality, integrity, and availability of the organization's data and resources. Therefore, the statement is true.
11.
E-mail messages that have been erased from hard disks can be retrieved and used in lawsuits because the laws of discovery demand that companies produce all relevant business documents.
Correct Answer
A. True
Explanation
The statement is true because the laws of discovery require companies to produce all relevant business documents, including e-mail messages that have been erased from hard disks. This means that even if the messages have been deleted, they can still be retrieved and used as evidence in lawsuits.
12.
Instead of forcing users to find and read through the privacy policy for each site they visit, the intrusion detection software in a computer’s browser will download the privacy policy from each site, scan it, and notify the user if the policy does not match his or her preferences.
Correct Answer
B. False
Explanation
The given statement suggests that intrusion detection software in a computer's browser will download and scan the privacy policy of each site visited, and notify the user if the policy does not match their preferences. However, this statement is false. Intrusion detection software is primarily used to monitor and detect unauthorized access or malicious activities on a computer network. It does not typically have the capability to download and scan privacy policies of websites, nor does it have the ability to notify users about policy mismatches.
13.
The Children’s Online Privacy Protection Act (COPPA) was passed by Congress in October 2002.
Correct Answer
B. False
Explanation
The given statement is false. The Children’s Online Privacy Protection Act (COPPA) was actually passed by Congress in October 1998, not 2002.
14.
There is currently no federal law that bans unsolicited fax advertisements.
Correct Answer
B. False
Explanation
The statement is false because there is a federal law that bans unsolicited fax advertisements. The Telephone Consumer Protection Act (TCPA) prohibits sending unsolicited fax advertisements without the recipient's prior express invitation or permission. This law was enacted in 1991 to protect consumers from unwanted fax advertisements and to regulate telemarketing practices. Therefore, the correct answer is false.
15.
CTS involves wrist pain, a feeling of tingling and numbness, and difficulty grasping and holding objects.
Correct Answer
A. True
Explanation
CTS, or Carpal Tunnel Syndrome, is a condition that causes wrist pain, tingling, numbness, and difficulty in grasping and holding objects. These symptoms occur due to the compression of the median nerve, which runs through the carpal tunnel in the wrist. The compression is often caused by repetitive hand movements, such as typing or using tools, and can be exacerbated by factors like obesity or pregnancy. Therefore, the given statement is true as it accurately describes the symptoms associated with CTS.
16.
Many organizations implement ____ to measure actual results against established goals, such as percentage of end-user reports produced on time, percentage of data input errors detected, number of input transactions entered per eight-hour shift, and so on.
Correct Answer
B. Internal audits
Explanation
Internal audits are implemented by many organizations to measure actual results against established goals. These audits help assess the effectiveness of internal controls, identify areas for improvement, and ensure compliance with policies and procedures. They can measure various performance indicators such as the percentage of end-user reports produced on time, percentage of data input errors detected, and number of input transactions entered per eight-hour shift. Internal audits provide valuable insights into the organization's performance and help drive continuous improvement.
17.
____ involves the use of one’s social skills to get computer users to provide you with information to access an information system and/or its data.
Correct Answer
B. Social engineering
Explanation
Social engineering involves the use of one's social skills to manipulate and deceive computer users into providing information that allows unauthorized access to an information system and/or its data. This can be done through techniques such as impersonation, manipulation, or deception to gain the trust of the target and convince them to disclose sensitive information or perform actions that compromise security.
18.
____ are parasitic computer programs that replicate but do not infect other computer program files.
Correct Answer
B. Worms
Explanation
Worms are parasitic computer programs that replicate themselves, but unlike viruses, they do not infect other computer program files. Worms are standalone programs that can spread across networks and systems, often exploiting vulnerabilities to gain unauthorized access. They can cause damage by consuming system resources, slowing down networks, or even deleting files. Unlike viruses, worms do not need a host program to attach themselves to, making them self-contained and capable of spreading independently.
19.
The term ____ is used to describe software programs that, when loaded into a computer system, will destroy, interrupt, or cause errors in processing.
Correct Answer
B. Malware
Explanation
Malware is the correct answer because it refers to software programs that are designed to harm or disrupt computer systems. These programs can cause damage by destroying files, interrupting normal processes, or causing errors in the system. Malware includes various types such as viruses, worms, Trojans, ransomware, and spyware, which are intentionally created to compromise the security and functionality of computer systems.
20.
A ____ is a malicious program that disguises itself as a useful application and purposefully does something the user does not expect.
Correct Answer
C. Trojan horse
Explanation
A Trojan horse is a type of malicious program that pretends to be a legitimate and helpful application, but actually performs actions that the user is not aware of or does not expect. Unlike viruses and worms, which can replicate and spread on their own, a Trojan horse relies on the user to unknowingly download and install it. Once inside a system, it can carry out various harmful activities such as stealing personal information, damaging files, or allowing unauthorized access to the system.
21.
____ law protects authored works such as art, books, film, and music.
Correct Answer
B. Copyright
Explanation
Copyright law protects authored works such as art, books, film, and music. It grants the creator of a work exclusive rights to reproduce, distribute, display, and perform their work. This means that others cannot use or profit from the work without the creator's permission. Copyright is important for artists, authors, musicians, and filmmakers as it allows them to control how their work is used and ensures that they receive credit and compensation for their creations.
22.
____ laws protect processes, machines, objects made by humans or machines, compositions of matter, and new uses of these items.
Correct Answer
C. Patent
Explanation
Patent laws protect processes, machines, objects made by humans or machines, compositions of matter, and new uses of these items. These laws grant exclusive rights to inventors, allowing them to prevent others from making, using, or selling their inventions without permission. By obtaining a patent, inventors can protect their intellectual property and have the opportunity to profit from their creations.
23.
____ responds to network security breaches and monitors systems for emerging threats.
Correct Answer
C. CERT
Explanation
CERT, which stands for Computer Emergency Response Team, is an organization that responds to network security breaches and monitors systems for emerging threats. They work to coordinate responses to cyber incidents, provide vulnerability assessments, and offer guidance and support to organizations and individuals in order to enhance their cybersecurity. CERT is known for its expertise in incident response and plays a crucial role in ensuring the security of networks and systems.
24.
____ is the process of converting an original electronic message into a form that can be understood only by the intended recipients.
Correct Answer
D. Encryption
Explanation
Encryption is the process of converting an original electronic message into a form that can be understood only by the intended recipients. It involves encoding the message using an algorithm and a key, making it unreadable to anyone who does not possess the corresponding key to decrypt it. Encryption is commonly used to protect sensitive information and ensure its confidentiality during transmission or storage.
25.
A(n) ____ monitors system and network resources and notifies network security personnel when it senses a possible intrusion.
Correct Answer
B. Intrusion detection system
Explanation
An intrusion detection system is a tool that monitors system and network resources to identify potential intrusions or unauthorized access attempts. It analyzes network traffic, system logs, and other data to detect patterns or anomalies that may indicate a security breach. When it senses a possible intrusion, it alerts network security personnel so that they can take appropriate action to prevent further damage or unauthorized access.
26.
The specific goals of ____ are to protect children from potentially harmful material, while also safeguarding free speech on the Internet.
Correct Answer
C. The Internet Content Rating Association
Explanation
The Internet Content Rating Association (ICRA) is the correct answer because its specific goals are to protect children from potentially harmful material and at the same time safeguard free speech on the Internet. ICRA is an organization that provides a voluntary content rating system for websites, allowing parents and guardians to filter and control the content their children can access online. This rating system helps in creating a balance between protecting children from inappropriate material and ensuring that freedom of expression is not compromised on the internet.
27.
____, an international industry group whose members include Apple, Commerce One, Ericsson, and Microsoft, is supporting the development of P3P.
Correct Answer
C. The World Wide Web Consortium
Explanation
The correct answer is The World Wide Web Consortium. The question asks for the international industry group that is supporting the development of P3P. The World Wide Web Consortium (W3C) is an international community that develops web standards and guidelines, and its members include Apple, Commerce One, Ericsson, and Microsoft. Therefore, it is the most suitable option for the given question.
28.
The ____ is a screening technology that shields users from Web sites that do not provide the level of privacy protection they desire.
Correct Answer
A. Platform for Privacy Preferences
Explanation
The Platform for Privacy Preferences is a screening technology that allows users to set their desired level of privacy protection on websites. It enables users to specify their privacy preferences and ensures that websites adhere to these preferences. This technology acts as a shield, preventing users from accessing websites that do not meet their privacy requirements.
29.
____ are embedded in many of the products we buy such as medicine containers, clothing, computer printers, car keys, library books, and tires.
Correct Answer
A. RFID tags
Explanation
RFID tags are small electronic devices that can be embedded in various products. They are commonly used for tracking and identification purposes. RFID tags can be found in a wide range of products, including medicine containers, clothing, computer printers, car keys, library books, and tires. These tags use radio frequency signals to transmit data, allowing for easy and efficient tracking of the products they are attached to.
30.
The purpose of the ____ act is to provide certain safeguards for people against an invasion of personal privacy by requiring federal agencies to do a number of things including permitting people to determine what records pertaining to them are collected, maintained, used, or disseminated by such agencies.
Correct Answer
A. PA74
Explanation
The correct answer is PA74, which refers to the Privacy Act of 1974. This act is designed to protect individuals' privacy by requiring federal agencies to disclose what personal information they collect, maintain, use, and share. It gives individuals the right to access and correct their records, and establishes rules for how agencies can collect and handle personal information. The purpose of the act is to provide safeguards against invasion of personal privacy and give individuals control over their own information.
31.
The ____ act established a Privacy Study Commission to study existing databases and to recommend rules and legislation for consideration by Congress.
Correct Answer
B. PA74
Explanation
PA74 refers to the Privacy Act of 1974, which established a Privacy Study Commission to study existing databases and recommend rules and legislation for consideration by Congress. The Sarbanes-Oxley Act is not related to privacy but rather focuses on corporate governance and financial reporting. The Gramm-Leach-Bliley Act addresses financial privacy and the USA Patriot Act focuses on national security and surveillance. Therefore, the correct answer is PA74.
32.
Under the ____ Act, Internet service providers and telephone companies must turn over customer information, including numbers called, without a court order if the FBI claims that the records are relevant to a terrorism investigation.
Correct Answer
A. USA Patriot
Explanation
The correct answer is USA Patriot. The USA Patriot Act is a law passed in the United States after the 9/11 terrorist attacks. It grants the FBI and other law enforcement agencies broader surveillance and investigative powers in order to combat terrorism. Under this act, internet service providers and telephone companies are required to provide customer information, such as numbers called, to the FBI without a court order if it is deemed relevant to a terrorism investigation.
33.
The ____ prohibits transmissions of harmful computer programs and code, including viruses.
Correct Answer
B. Computer Abuse Amendments Act of 1994
Explanation
The Computer Abuse Amendments Act of 1994 is the correct answer because it specifically addresses the prohibition of transmissions of harmful computer programs and code, including viruses. The other options listed do not pertain to this specific issue.
34.
The hazardous activities associated with poorly designed work environments are collectively referred to as ____.
Correct Answer
D. Work stressors
Explanation
The correct answer is work stressors. Work stressors refer to the various factors and conditions in a poorly designed work environment that can have a negative impact on employees' physical and mental well-being. These stressors can include excessive workload, lack of job control, poor communication, inadequate resources, and other factors that contribute to a hazardous and stressful work environment.
35.
Practitioners in many professions subscribe to a ____ that states the principles and core values that are essential to their work and thus governs their behavior.
Correct Answer
D. Code of ethics
Explanation
Practitioners in many professions follow a code of ethics, which outlines the fundamental principles and core values that are crucial to their work. This code serves as a guide for their behavior and governs their actions in their respective professions. It helps ensure that practitioners maintain high standards of conduct and integrity while carrying out their duties.
36.
Computer-related ____________________ refer to errors, failures, and other computer problems that make computer output incorrect or not useful, caused mostly by human error.
Correct Answer
Mistakes
mistakes
mistake
Mistake
Explanation
Computer-related mistakes refer to errors, failures, and other computer problems that make computer output incorrect or not useful, caused mostly by human error. These mistakes can include typos, incorrect data entry, programming errors, or incorrect configuration settings. They can lead to inaccurate calculations, faulty outputs, system crashes, or data corruption. It is important to minimize these mistakes through careful attention to detail, proper training, and implementing quality control measures.
37.
A(n) ____________________ is someone who intimidates or coerces a government or organization to advance his or her political or social objectives by launching computer-based attacks against computers, networks, and the information stored on them.
Correct Answer
cyberterrorist
cyber terrorist
Cyberterrorist
Cyber Terrorist
Cyber terrorist
Explanation
A cyberterrorist is someone who intimidates or coerces a government or organization to advance his or her political or social objectives by launching computer-based attacks against computers, networks, and the information stored on them.
38.
Under the ______________________________ Act, the Federal Trade Commission (FTC) is assigned responsibility to help victims restore their credit and erase the impact of the imposter.
Correct Answer
Identity Theft and Assumption Deterrence
Identity theft and assumption deterrence
identity theft and assumption deterrence
ITAD
Explanation
The correct answer is "Identity Theft and Assumption Deterrence." Under this act, the Federal Trade Commission (FTC) is responsible for assisting victims in restoring their credit and eliminating the effects of the imposter.
39.
The U.S. Congress passed the ______________________________ Act of 1998 to fight identity theft.
Correct Answer
Identity Theft and Assumption Deterrence
Identity theft and assumption deterrence
identity theft and assumption deterrence
ITAD
Explanation
The correct answer is "Identity Theft and Assumption Deterrence". This act was passed by the U.S. Congress in 1998 with the aim of combating identity theft. It was enacted to deter individuals from assuming another person's identity and engaging in fraudulent activities. The act addresses various aspects of identity theft, including prevention, detection, and punishment for offenders. It is an important legislation that has helped in raising awareness about identity theft and implementing measures to protect individuals from this crime.
40.
____________________ are wannabe crackers with little technical savvy - crackers who download programs called scripts - that automate the job of breaking into computers.
Correct Answer
Script Bunnies
Script bunnies
script bunnies
script Bunnies
Explanation
Script bunnies refers to individuals who aspire to be hackers but lack technical knowledge. They rely on downloading scripts, which are programs that automate the process of hacking into computers. The term "script bunnies" is used to describe these wannabe hackers who lack the skills and expertise of experienced crackers.
41.
A(n) ____________________ is a modified version of a virus that is produced by the virus’s author or another person who amends the original virus code.
Correct Answer
Variant
variant
Explanation
A variant is a modified version of a virus that is produced by the virus's author or another person who amends the original virus code. Variants can have different characteristics and behaviors compared to the original virus, making them potentially more dangerous or harder to detect and remove. These modifications can include changes in the way the virus spreads, its payload, or its ability to evade detection by antivirus software. Overall, variants are a common strategy used by virus authors to continuously evolve and adapt their malicious software.
42.
A(n) ____________________ is a small program hidden in a network or a computer system that records identification numbers and passwords.
Correct Answer
Password Sniffer
Password sniffer
password sniffer
password Sniffer
Explanation
A password sniffer is a small program that is covertly installed in a network or computer system with the purpose of capturing and recording identification numbers and passwords. It operates in a hidden manner, allowing it to intercept and collect sensitive login information without the user's knowledge or consent.
43.
____________________ occurs when someone makes unauthorized use of another’s patent. If a court determines that a patent infringement is intentional, it can award up to three times the amount of damages claimed by the patent holder.
Correct Answer
Patent infringement
Patent Infringement
patent infringement
patent Infringement
Explanation
Patent infringement occurs when someone makes unauthorized use of another's patent. If a court determines that a patent infringement is intentional, it can award up to three times the amount of damages claimed by the patent holder.
44.
____________________ is the aggravation of the pathway for nerves that travel through the wrist.
Correct Answer
CTS
Carpal Tunnel Syndrome
carpal tunnel syndrome
Carpal tunnel syndrome
Explanation
Carpal tunnel syndrome (CTS) is the aggravation of the pathway for nerves that travel through the wrist. This condition occurs when the median nerve, which runs from the forearm to the hand, becomes compressed or squeezed at the wrist. This compression can cause symptoms such as pain, numbness, tingling, and weakness in the hand and fingers. CTS is commonly caused by repetitive hand and wrist movements, as well as certain medical conditions such as arthritis and diabetes. Treatment options for CTS include wrist splints, medications, physical therapy, and in severe cases, surgery.
45.
____________________ screens provide a much better viewing experience for your eyes by virtually eliminating flicker and while still being bright without harsh incandescence.
Correct Answer
LCD
Liquid Crystal Display
liquid crystal display
lcd
Liquid crystal display
Explanation
LCD stands for Liquid Crystal Display, which is a type of screen that provides a much better viewing experience for the eyes compared to other types of screens. LCD screens virtually eliminate flickering, which can cause eye strain and fatigue. Additionally, LCD screens are bright without emitting harsh incandescent light, making them easier on the eyes.