The Candid Test On Ch 8 MIS

40 Questions | Total Attempts: 75

SettingsSettingsSettings
Please wait...
MIS Quizzes & Trivia

Identity theft is one of the problems facing the world today as we try to move into a cashless economy where every payment can be done electronically. This is one of the topics that we got to extensively cover in chapter 8 of the management information system class. Do you think you properly understood the chapter and can adequately tackle the upcoming test? Take up the quiz below and get to find out!


Questions and Answers
  • 1. 
    _____ is a kind of identity theft where the victim knows the person who stole his/her identity.  
    • A. 

      Friendly fraud

    • B. 

      PayPal

    • C. 

      Peer-to-peer computing

    • D. 

      Pretexting

  • 2. 
    _____ is a technique to gain personal information for the purpose of identity theft, where specific individuals are targeted and the creator of a fraudulent e-mail already has some of the victim's personal information and wants more.  
    • A. 

      Spear phishing

    • B. 

      Vishing

    • C. 

      Spy-phishing

    • D. 

      Pharming

  • 3. 
    An assessment of what is right or wrong can be determined by considering ____, which can be understood as the benefit or harm that will come from a particular decision.  
    • A. 

      The consequences

    • B. 

      Society's opinion

    • C. 

      The time till the consequences take effect

    • D. 

      The reach of the result

  • 4. 
    _____ is the use of phishing targeted at senior business executives, government leaders, and other types of high-profile individuals.  
    • A. 

      Spamming

    • B. 

      Whaling

    • C. 

      Vishing

    • D. 

      Keystroke logging

  • 5. 
    _____ are types of hackers who break into other people's computer systems and may just look around. They may steal credit card numbers or destroy information, or otherwise do damage.  
    • A. 

      Zombies

    • B. 

      White-hat hackers

    • C. 

      Black-hat hackers

    • D. 

      Drones

  • 6. 
    _____ can be defined as the principles and standards that guide our behavior toward other people.  
    • A. 

      Ethics

    • B. 

      Models

    • C. 

      Eugenics

    • D. 

      Aesthetics

  • 7. 
    _____ refers to unsolicited e-mail (electronic junk mail) from businesses that advertise goods and services.  
    • A. 

      Adware

    • B. 

      Spyware

    • C. 

      Pharming

    • D. 

      Spam

  • 8. 
    _____ refers to intangible creative work that is embodied in physical form.  
    • A. 

      Real property

    • B. 

      Public property

    • C. 

      Intellectual property

    • D. 

      Immovable property

  • 9. 
    The _____ sought to protect investors by improving the accuracy and reliability of corporate disclosures and requires companies to implement extensive and detailed policies to prevent illegal activity within the company and respond in a timely manner to investigate illegal activity.  
    • A. 

      USA Patriot Act

    • B. 

      Homeland Security Act

    • C. 

      Sarbanes-Oxley Act

    • D. 

      Fair and Accurate Credit Transactions Act

  • 10. 
    An assessment of what is right or wrong can be determined by considering the ____, which may be defined as how long it will take for the benefit or harm to take effect.  
    • A. 

      Likelihood of effect

    • B. 

      Reach of result

    • C. 

      Time to consequences

    • D. 

      Consequences

  • 11. 
    Which of the following is an example of the unethical use of computers?  
    • A. 

      Employees failing to answer a large number of e-mail messages due to network problems.

    • B. 

      Employees searching organizational databases for information on celebrities and friends.

    • C. 

      Employees sending messages without spell checking and proofreading them.

    • D. 

      Employees updating their passwords at the end of every month.

  • 12. 
    _____ is the right to be left alone when one wants to be, to have control over one's own personal possessions, and not to be observed without one's consent.  
    • A. 

      Non-disclosure

    • B. 

      Intellectual property

    • C. 

      Personalization

    • D. 

      Privacy

  • 13. 
    _____ is a way of protecting messages and files by scrambling the contents of a file so that one cannot read it without having the right key.  
    • A. 

      Encryption

    • B. 

      Feature creep

    • C. 

      Biometrics

    • D. 

      Encapsulation

  • 14. 
    An assessment of what is right or wrong can be determined by considering ____, which refers to the probability that the harm or benefit will occur if one undertakes an action.  
    • A. 

      The likelihood of effect

    • B. 

      Society's opinion

    • C. 

      The time to consequences

    • D. 

      Relatedness

  • 15. 
    _____ have philosophical and political reasons for breaking into systems and often deface Web sites as a sign of protest.  
    • A. 

      Zombies

    • B. 

      White-hat hackers

    • C. 

      Hacktivists

    • D. 

      Screenagers

  • 16. 
    Which of the following is part of the outermost level of an individual's ethical structure?  
    • A. 

      Actions that are considered serious ethical violations by both society and oneself.

    • B. 

      Behavior that causes extreme ethical discomfort to the person.

    • C. 

      Behavior that calls for stringent measures against the person.

    • D. 

      Actions that most people would not consider unacceptable or unethical.

  • 17. 
    An architectural firm's blueprints, sketches and other proprietary documents are examples of ____.  
    • A. 

      Public property

    • B. 

      Intellectual property

    • C. 

      Real property

    • D. 

      Immovable property

  • 18. 
    A _____ records information about you during a Web surfing session such as what Web sites you visited, how long you were there, what ads you looked at, and what you bought.  
    • A. 

      Copyright

    • B. 

      Key logger

    • C. 

      Firewall

    • D. 

      Clickstream

  • 19. 
    A _____ refers to the legal protection offered for the expression of an idea, such as a song, video game, and some types of proprietary documents.  
    • A. 

      Copyright

    • B. 

      Trademark

    • C. 

      Patent

    • D. 

      Fair use agreement

  • 20. 
    _____ refers to malicious software that collects information about a person and his/her computer and reports it to someone without their permission.  
    • A. 

      Firmware

    • B. 

      Spyware

    • C. 

      Adware

    • D. 

      Spam

  • 21. 
    A _____ consists of one line of information for every visitor to a Web site and is usually stored on a Web server.  
    • A. 

      Web log

    • B. 

      Firewall

    • C. 

      Cookie

    • D. 

      Copyright

  • 22. 
    Which of the following is a program that, when installed on a computer, records every mouse click?  
    • A. 

      Honeypot

    • B. 

      Spear phishing

    • C. 

      Clickstreaming

    • D. 

      Key logger

  • 23. 
    The _____ says that you may use copyrighted material in certain situations, for example, in the creation of new work or, within certain limits, for teaching purposes.  
    • A. 

      Fair Use Doctrine

    • B. 

      First-Sale Doctrine

    • C. 

      Orphan work rule

    • D. 

      Open-source rule

  • 24. 
    The _____ sought to regulate interstate commerce by imposing limitations and penalties on businesses sending unsolicited e-mail to consumers.  
    • A. 

      USA Patriot Act

    • B. 

      Identity Theft and Assumption Deterrence Act

    • C. 

      Homeland Security Act

    • D. 

      CAN-Spam Act

  • 25. 
    _____ is a technique to gain personal information for the purpose of identity theft, usually by means of fraudulent e-mail.  
    • A. 

      Greylisting

    • B. 

      Phishing

    • C. 

      Sniffing

    • D. 

      Wire fraud