Related Topics
Take Another Quiz

MIS Chapter 9

45 Questions
Management Quizzes & Trivia

MIS Chapter 9

Questions and Answers
  • 1. 
    A spam filter is software that attempts to block unwanted e-mail.
    • A. 

      True

    • B. 

      False

  • 2. 
    “Shoulder surfing “occurs when an identity thief simply stands next to someone at a public office, such as the Bureau of Motor Vehicles, and watches as the person fills out personal information on a form.
    • A. 

      True

    • B. 

      False

  • 3. 
                     Originally, a cracker was a person who enjoys computer technology and spends time learning and using computer systems.
    • A. 

      True

    • B. 

      False

  • 4. 
                     Worms can create copies on the same computer or can send the copies to other computers via a network.
    • A. 

      True

    • B. 

      False

  • 5. 
    All antivirus software are capable of repairing common virus infections automatically, without interrupting your work.
    • A. 

      True

    • B. 

      False

  • 6. 
    Disk defragmentation reorganizes the contents of the disk to store the pieces of each file close together and contiguously.
    • A. 

      True

    • B. 

      False

  • 7. 
    Criminal hackers sometimes warn the public of a new and devastating virus that does not exist in order to create fear.
    • A. 

      True

    • B. 

      False

  • 8. 
    Using a password sniffer, a criminal hacker can gain access to computers and networks to steal data and information, invade privacy, plant viruses, and disrupt computer operations.
    • A. 

      True

    • B. 

      False

  • 9. 
    A bot is a variable value that is applied using an algorithm to a string or block of unencrypted text to produce encrypted text or to decrypt encrypted text.
    • A. 

      True

    • B. 

      False

  • 10. 
    A firewall can include both hardware and software that act as a barrier between an organization’s information system and the outside world.
    • A. 

      True

    • B. 

      False

  • 11. 
    E-mail messages that have been erased from hard disks can be retrieved and used in lawsuits because the laws of discovery demand that companies produce all relevant business documents.
    • A. 

      True

    • B. 

      False

  • 12. 
    Instead of forcing users to find and read through the privacy policy for each site they visit, the intrusion detection software in a computer’s browser will download the privacy policy from each site, scan it, and notify the user if the policy does not match his or her preferences.
    • A. 

      True

    • B. 

      False

  • 13. 
                     The Children’s Online Privacy Protection Act (COPPA) was passed by Congress in October 2002.
    • A. 

      True

    • B. 

      False

  • 14. 
    There is currently no federal law that bans unsolicited fax advertisements.
    • A. 

      True

    • B. 

      False

  • 15. 
    CTS involves wrist pain, a feeling of tingling and numbness, and difficulty grasping and holding objects.
    • A. 

      True

    • B. 

      False

  • 16. 
    Many organizations implement ____ to measure actual results against established goals, such as percentage of end-user reports produced on time, percentage of data input errors detected, number of input transactions entered per eight-hour shift, and so on.
    • A. 

      Ergonomics

    • B. 

      Internal audits

    • C. 

      Biometrics

    • D. 

      External audits

  • 17. 
    ____ involves the use of one’s social skills to get computer users to provide you with information to access an information system and/or its data.
    • A. 

      Dumpster diving

    • B. 

      Social engineering

    • C. 

      Software piracy

    • D. 

      Password sniffing

  • 18. 
                     ____ are parasitic computer programs that replicate but do not infect other computer program files.
    • A. 

      Viruses

    • B. 

      Worms

    • C. 

      Trojans

    • D. 

      Biometrics

  • 19. 
    The term ____ is used to describe software programs that, when loaded into a computer system, will destroy, interrupt, or cause errors in processing.
    • A. 

      Ergonomics

    • B. 

      Malware

    • C. 

      Biometrics

    • D. 

      PKI

  • 20. 
    A ____ is a malicious program that disguises itself as a useful application and purposefully does something the user does not expect.
    • A. 

      Virus

    • B. 

      Worm

    • C. 

      Trojan horse

    • D. 

      Biometric

  • 21. 
                     ____ law protects authored works such as art, books, film, and music.
    • A. 

      Patent

    • B. 

      Copyright

    • C. 

      Intrusion detection

    • D. 

      Internet security

  • 22. 
    ____ laws protect processes, machines, objects made by humans or machines, compositions of matter, and new uses of these items.
    • A. 

      Intrusion detection

    • B. 

      Copyright

    • C. 

      Patent

    • D. 

      Internet security

  • 23. 
                     ____ responds to network security breaches and monitors systems for emerging threats.
    • A. 

      DARPA

    • B. 

      The World Wide Consortium

    • C. 

      CERT

    • D. 

      The Software and Information Industry Alliance

  • 24. 
    ____ is the process of converting an original electronic message into a form that can be understood only by the intended recipients.
    • A. 

      Decryption

    • B. 

      Software piracy

    • C. 

      Intrusion detection

    • D. 

      Encryption

  • 25. 
    A(n) ____ monitors system and network resources and notifies network security personnel when it senses a possible intrusion.
    • A. 

      Password sniffer

    • B. 

      Intrusion detection system

    • C. 

      Trojan horse

    • D. 

      Antivirus software

  • 26. 
    The specific goals of ____ are to protect children from potentially harmful material, while also safeguarding free speech on the Internet.
    • A. 

      CERT

    • B. 

      DARPA

    • C. 

      The Internet Content Rating Association

    • D. 

      The Software and Information Industry Alliance

  • 27. 
    ____, an international industry group whose members include Apple, Commerce One, Ericsson, and Microsoft, is supporting the development of P3P.
    • A. 

      CERT

    • B. 

      DARPA

    • C. 

      The World Wide Web Consortium

    • D. 

      The Software and Information Industry Alliance

  • 28. 
    The ____ is a screening technology that shields users from Web sites that do not provide the level of privacy protection they desire.
    • A. 

      Platform for Privacy Preferences

    • B. 

      RFID tag

    • C. 

      CTS

    • D. 

      Security dashboard

  • 29. 
    ____ are embedded in many of the products we buy such as medicine containers, clothing, computer printers, car keys, library books, and tires.
    • A. 

      RFID tags

    • B. 

      Bots

    • C. 

      Security dashboards

    • D. 

      Geolocation tools

  • 30. 
    The purpose of the ____ act is to provide certain safeguards for people against an invasion of personal privacy by requiring federal agencies to do a number of things including permitting people to determine what records pertaining to them are collected, maintained, used, or disseminated by such agencies.
    • A. 

      PA74

    • B. 

      HIPPA

    • C. 

      Gramm-Leach-Bliley Financial Services Modernization

    • D. 

      Sarbanes-Oxley

  • 31. 
    The ____ act established a Privacy Study Commission to study existing databases and to recommend rules and legislation for consideration by Congress.
    • A. 

      Sarbanes-Oxley

    • B. 

      PA74

    • C. 

      Gramm-Leach-Bliley

    • D. 

      USA Patriot

  • 32. 
    Under the ____ Act, Internet service providers and telephone companies must turn over customer information, including numbers called, without a court order if the FBI claims that the records are relevant to a terrorism investigation.
    • A. 

      USA Patriot

    • B. 

      PA74

    • C. 

      Gramm-Leach-Bliley

    • D. 

      Sarbanes-Oxley

  • 33. 
                     The ____ prohibits transmissions of harmful computer programs and code, including viruses.
    • A. 

      Computer Matching and Privacy Act of 1988

    • B. 

      Computer Abuse Amendments Act of 1994

    • C. 

      Video Privacy Act of 1988

    • D. 

      USA Patriot Act of 2001

  • 34. 
    The hazardous activities associated with poorly designed work environments are collectively referred to as ____.
    • A. 

      Malware

    • B. 

      Biometrics

    • C. 

      Carpal tunnel syndrome

    • D. 

      Work stressors

  • 35. 
    Practitioners in many professions subscribe to a ____ that states the principles and core values that are essential to their work and thus governs their behavior.
    • A. 

      Standard

    • B. 

      Protocol

    • C. 

      Law

    • D. 

      Code of ethics

  • 36. 
    Computer-related ____________________ refer to errors, failures, and other computer problems that make computer output incorrect or not useful, caused mostly by human error.
  • 37. 
    A(n) ____________________ is someone who intimidates or coerces a government or organization to advance his or her political or social objectives by launching computer-based attacks against computers, networks, and the information stored on them.
  • 38. 
    Under the ______________________________ Act, the Federal Trade Commission (FTC) is assigned responsibility to help victims restore their credit and erase the impact of the imposter.
  • 39. 
    The U.S. Congress passed the ______________________________ Act of 1998 to fight identity theft.
  • 40. 
    ____________________ are wannabe crackers with little technical savvy - crackers who download programs called scripts - that automate the job of breaking into computers.
  • 41. 
    A(n) ____________________ is a modified version of a virus that is produced by the virus’s author or another person who amends the original virus code.
  • 42. 
    A(n) ____________________ is a small program hidden in a network or a computer system that records identification numbers and passwords.
  • 43. 
    ____________________ occurs when someone makes unauthorized use of another’s patent. If a court determines that a patent infringement is intentional, it can award up to three times the amount of damages claimed by the patent holder.
  • 44. 
                     ____________________ is the aggravation of the pathway for nerves that travel through the wrist.
  • 45. 
    ____________________ screens provide a much better viewing experience for your eyes by virtually eliminating flicker and while still being bright without harsh incandescence.