1.
Controlling access to sensitive electronic information so only those with a legitimate need to access it are allowed to do so is known as?
Correct Answer
C. IT Security
Explanation
Controlling access to sensitive electronic information so only those with a legitimate need to access it are allowed to do so is known as IT Security. This involves implementing measures such as passwords, encryption, firewalls, and access controls to protect information from unauthorized access, modification, or theft. IT security ensures the confidentiality, integrity, and availability of electronic information, safeguarding it from potential threats and vulnerabilities.
2.
Data cannot be changed without authorization is an example of?
Correct Answer
B. Integrity
Explanation
The statement "Data cannot be changed without authorization" reflects the concept of integrity in information security. Integrity ensures that data remains accurate, complete, and unaltered throughout its lifecycle. By requiring authorization to modify data, organizations can maintain the integrity of their information and prevent unauthorized changes or tampering. This helps to ensure the reliability and trustworthiness of the data, protecting its integrity.
3.
Backups, Data Encryption, Data Masking, and Data Erasure are components of?
Correct Answer
C. Data security
Explanation
Backups, Data Encryption, Data Masking, and Data Erasure are all measures that contribute to ensuring the security of data. Backups help in recovering data in case of loss or damage, while data encryption protects data by converting it into a code that can only be accessed with the correct decryption key. Data masking involves disguising sensitive data to protect it from unauthorized access, and data erasure ensures that data is completely deleted and cannot be recovered. Therefore, these components collectively contribute to data security.
4.
_____________ is used to ensure that an organization’s selection and application of human resources (both employee and contractor) are controlled to promote security.
Correct Answer
A. Personnel security
Explanation
Personnel security is used to ensure that an organization's selection and application of human resources (both employee and contractor) are controlled to promote security. This involves implementing measures such as background checks, screening processes, and security clearances to ensure that individuals with malicious intent or who may pose a security risk are not granted access to sensitive information or resources. By carefully managing and monitoring the personnel within an organization, the risk of insider threats and unauthorized access can be mitigated, thus promoting overall security.
5.
_____________ raises employee awareness about basic information security, and to train individuals with information security roles to increase their knowledge, skills and abilities.
Correct Answer
A. Training and awareness
Explanation
Training and awareness programs are designed to educate employees about basic information security practices and to enhance the knowledge, skills, and abilities of individuals with information security roles. These programs aim to raise employee awareness about the importance of information security and provide them with the necessary training to effectively handle security threats and protect sensitive information. By increasing employee knowledge and skills in information security, organizations can mitigate the risk of security breaches and ensure the confidentiality and integrity of their data.
6.
A purchased,
legal copy that is installed on more computers than the copy is licensed for is
what?
Correct Answer
A. End-User piracy
Explanation
End-User piracy refers to the act of using a purchased, legal copy of software on more computers than the license permits. This is a form of copyright infringement where the user exceeds the authorized usage limits. It is different from internet piracy, which involves the unauthorized distribution of copyrighted material over the internet. Captain Hook is not a relevant term in this context. Software Counterfeiting refers to the unauthorized reproduction and distribution of software, which is different from using a legal copy on multiple computers.
7.
Who does
piracy hurt?
Correct Answer
D. All of the above
Explanation
Piracy hurts all of the above mentioned parties. Retail stores suffer from lost sales and decreased profits due to the availability of pirated software. Software developers lose revenue and potential customers when their products are illegally copied and distributed. Legal software users are affected as well, as pirated software often lacks necessary updates and support, putting them at a disadvantage compared to those who purchase legitimate copies. Therefore, all parties involved are negatively impacted by piracy.
8.
Software
Piracy cost an estimated how much worldwide during 2007?
Correct Answer
D. $40 billion
Explanation
During 2007, software piracy cost an estimated $40 billion worldwide. This means that the illegal copying, distribution, and use of software resulted in a significant financial loss for the software industry. This loss can be attributed to the lost sales and potential revenue that could have been generated if the software had been purchased legally. Software piracy continues to be a major issue, impacting both the software developers and the global economy.
9.
Approximately
how much of the world's software is pirated?
Correct Answer
C. 35%
Explanation
Approximately 35% of the world's software is pirated. This means that a significant portion of software is being used without proper authorization or payment. This high percentage reflects the ongoing issue of software piracy globally, which has negative impacts on the software industry and intellectual property rights. It is important to continue efforts to combat piracy and promote the use of legitimate software.
10.
Which of the following are member of the Business
Software Alliance?
Correct Answer
D. All of the above
Explanation
Apple, McAfee, and Symantec are all members of the Business Software Alliance. The Business Software Alliance is an industry association that represents companies in the software industry. These three companies are well-known software companies and are part of the alliance, which works to promote legal and ethical practices in the software industry.
11.
What state has the highest fraud rate in the United States?
Correct Answer
C. California
Explanation
California has the highest fraud rate in the United States. This may be due to various factors such as its large population, diverse economy, and high level of technological advancement. California is home to many major cities and industries, making it an attractive target for fraudsters. Additionally, the state's proximity to international borders and its status as a global economic hub may contribute to its higher fraud rate compared to other states.
12.
What percentage of spyware transmits information
about users browsing habits?
Correct Answer
D. 60%
Explanation
The correct answer is 60%. This means that a majority of spyware transmits information about users' browsing habits. Spyware is a type of malicious software that is designed to gather information without the user's knowledge or consent. It can track and record browsing activities, including websites visited, search history, and online purchases. Therefore, it is important to have proper antivirus and anti-spyware software to protect against these threats.
13.
In what year was the concept of computer ethics created by
Walter Maner?
Correct Answer
C. 1976
Explanation
Walter Maner created the concept of computer ethics in 1976.
14.
Which of the following is another IT Ethics
issue that was not covered?
Correct Answer
C. Spam
Explanation
Spam is another IT Ethics issue that was not covered. Spam refers to the unsolicited and unwanted emails or messages that are sent in bulk to a large number of recipients. It is considered unethical because it violates the privacy of individuals, wastes resources, and can be used for malicious purposes such as phishing or spreading malware.
15.
The largest demographic age of people being affected by fraud is?
Correct Answer
C. 30 - 39
Explanation
The largest demographic age group being affected by fraud is the 30 - 39 age group. This suggests that individuals in their thirties are more vulnerable to fraudulent activities compared to other age groups. It could be due to various reasons such as increased financial responsibilities, lack of experience in dealing with scams, or being targeted by fraudsters who specifically prey on this age group.