MIS Chapter 9

45 Questions | Total Attempts: 167

SettingsSettingsSettings
Please wait...
MIS Quizzes & Trivia

MIS Chapter 9


Questions and Answers
  • 1. 
    A spam filter is software that attempts to block unwanted e-mail.
    • A. 

      True

    • B. 

      False

  • 2. 
    “Shoulder surfing “occurs when an identity thief simply stands next to someone at a public office, such as the Bureau of Motor Vehicles, and watches as the person fills out personal information on a form.
    • A. 

      True

    • B. 

      False

  • 3. 
                     Originally, a cracker was a person who enjoys computer technology and spends time learning and using computer systems.
    • A. 

      True

    • B. 

      False

  • 4. 
                     Worms can create copies on the same computer or can send the copies to other computers via a network.
    • A. 

      True

    • B. 

      False

  • 5. 
    All antivirus software are capable of repairing common virus infections automatically, without interrupting your work.
    • A. 

      True

    • B. 

      False

  • 6. 
    Disk defragmentation reorganizes the contents of the disk to store the pieces of each file close together and contiguously.
    • A. 

      True

    • B. 

      False

  • 7. 
    Criminal hackers sometimes warn the public of a new and devastating virus that does not exist in order to create fear.
    • A. 

      True

    • B. 

      False

  • 8. 
    Using a password sniffer, a criminal hacker can gain access to computers and networks to steal data and information, invade privacy, plant viruses, and disrupt computer operations.
    • A. 

      True

    • B. 

      False

  • 9. 
    A bot is a variable value that is applied using an algorithm to a string or block of unencrypted text to produce encrypted text or to decrypt encrypted text.
    • A. 

      True

    • B. 

      False

  • 10. 
    A firewall can include both hardware and software that act as a barrier between an organization’s information system and the outside world.
    • A. 

      True

    • B. 

      False

  • 11. 
    E-mail messages that have been erased from hard disks can be retrieved and used in lawsuits because the laws of discovery demand that companies produce all relevant business documents.
    • A. 

      True

    • B. 

      False

  • 12. 
    Instead of forcing users to find and read through the privacy policy for each site they visit, the intrusion detection software in a computer’s browser will download the privacy policy from each site, scan it, and notify the user if the policy does not match his or her preferences.
    • A. 

      True

    • B. 

      False

  • 13. 
                     The Children’s Online Privacy Protection Act (COPPA) was passed by Congress in October 2002.
    • A. 

      True

    • B. 

      False

  • 14. 
    There is currently no federal law that bans unsolicited fax advertisements.
    • A. 

      True

    • B. 

      False

  • 15. 
    CTS involves wrist pain, a feeling of tingling and numbness, and difficulty grasping and holding objects.
    • A. 

      True

    • B. 

      False

  • 16. 
    Many organizations implement ____ to measure actual results against established goals, such as percentage of end-user reports produced on time, percentage of data input errors detected, number of input transactions entered per eight-hour shift, and so on.
    • A. 

      Ergonomics

    • B. 

      Internal audits

    • C. 

      Biometrics

    • D. 

      External audits

  • 17. 
    ____ involves the use of one’s social skills to get computer users to provide you with information to access an information system and/or its data.
    • A. 

      Dumpster diving

    • B. 

      Social engineering

    • C. 

      Software piracy

    • D. 

      Password sniffing

  • 18. 
                     ____ are parasitic computer programs that replicate but do not infect other computer program files.
    • A. 

      Viruses

    • B. 

      Worms

    • C. 

      Trojans

    • D. 

      Biometrics

  • 19. 
    The term ____ is used to describe software programs that, when loaded into a computer system, will destroy, interrupt, or cause errors in processing.
    • A. 

      Ergonomics

    • B. 

      Malware

    • C. 

      Biometrics

    • D. 

      PKI

  • 20. 
    A ____ is a malicious program that disguises itself as a useful application and purposefully does something the user does not expect.
    • A. 

      Virus

    • B. 

      Worm

    • C. 

      Trojan horse

    • D. 

      Biometric

  • 21. 
                     ____ law protects authored works such as art, books, film, and music.
    • A. 

      Patent

    • B. 

      Copyright

    • C. 

      Intrusion detection

    • D. 

      Internet security

  • 22. 
    ____ laws protect processes, machines, objects made by humans or machines, compositions of matter, and new uses of these items.
    • A. 

      Intrusion detection

    • B. 

      Copyright

    • C. 

      Patent

    • D. 

      Internet security

  • 23. 
                     ____ responds to network security breaches and monitors systems for emerging threats.
    • A. 

      DARPA

    • B. 

      The World Wide Consortium

    • C. 

      CERT

    • D. 

      The Software and Information Industry Alliance

  • 24. 
    ____ is the process of converting an original electronic message into a form that can be understood only by the intended recipients.
    • A. 

      Decryption

    • B. 

      Software piracy

    • C. 

      Intrusion detection

    • D. 

      Encryption

  • 25. 
    A(n) ____ monitors system and network resources and notifies network security personnel when it senses a possible intrusion.
    • A. 

      Password sniffer

    • B. 

      Intrusion detection system

    • C. 

      Trojan horse

    • D. 

      Antivirus software