Chapter 8 - Incorrect Q.1 are types of hackers who break...

Info icon This preview shows pages 1–4. Sign up to view the full content.

View Full Document Right Arrow Icon
Incorrect Q.1) _____ are types of hackers who break into other people's computer systems and may just look around. They may steal credit card numbers or destroy information, or otherwise do damage. A. Zombies B. White-hat hackers (Your Answer) C. Black-hat hackers (Correct Answer) D. Drones Incorrect Q.2) The _____ sought to regulate interstate commerce by imposing limitations and penalties on businesses sending unsolicited e-mail to consumers. A. USA Patriot Act B. Identity Theft and Assumption Deterrence Act (Your Answer) C. Homeland Security Act D. CAN-Spam Act (Correct Answer) Incorrect Q.3) _____ refers to the use of physiological characteristics such as fingerprints, the blood vessels in the iris of the eye, and the sound of one's voice to provide identification. A. Pharming (Your Answer) B. Biometrics (Correct Answer) C. Intellectual property D. Whaling Incorrect Q.4) _____ is the unauthorized use, duplication, distribution, or sale of copyrighted software. A. Pirated software (Correct Answer) B. File sharing C. Torrent poisoning (Your Answer)
Image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full Document Right Arrow Icon
D. Phishing Incorrect Q.5) _____ refers to unsolicited e-mail (electronic junk mail) from businesses that advertise goods and services. A. Adware (Your Answer) B. Spyware C. Pharming D. Spam (Correct Answer) Incorrect Q.6) The _____ sought to protect investors by improving the accuracy and reliability of corporate disclosures and requires companies to implement extensive and detailed policies to prevent illegal activity within the company and respond in a timely manner to investigate illegal activity. A. USA Patriot Act (Your Answer) B. Homeland Security Act C. Sarbanes-Oxley Act (Correct Answer) D. Fair and Accurate Credit Transactions Act Correct Q.7) _____ is the use of phishing targeted at senior business executives, government leaders, and other types of high-profile individuals. A. Spamming B. Whaling (Your Answer) C. Vishing D. Keystroke logging Incorrect Q.8) _____ is a technique to gain personal information for the purpose of identity theft, where specific individuals are targeted and the creator of a fraudulent e-mail already has some of the victim's personal information and wants more. A. Spear phishing (Correct Answer) B. Vishing (Your Answer) C. Spy-phishing
Image of page 2
D. Pharming Incorrect Q.9) An assessment of what is right or wrong can be made by considering _____ which focuses on the number of people that will be affected by one's action. A. society's opinion B. the consequences C. the likelihood of effect (Your Answer) D. the reach of result (Correct Answer) Incorrect Q.10) Which of the following is true of an ethical dilemma? A. It is faced exclusively by unethical, immoral people. B. It occurs when one's responsibilities seem to lead in opposite directions. (Correct Answer) C. It is the choice of whether or not to act ethically. D. It involves choosing between compatible good outcomes.
Image of page 3

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full Document Right Arrow Icon
Image of page 4
This is the end of the preview. Sign up to access the rest of the document.

{[ snackBarMessage ]}

What students are saying

  • Left Quote Icon

    As a current student on this bumpy collegiate pathway, I stumbled upon Course Hero, where I can find study resources for nearly all my courses, get online help from tutors 24/7, and even share my old projects, papers, and lecture notes with other students.

    Student Picture

    Kiran Temple University Fox School of Business ‘17, Course Hero Intern

  • Left Quote Icon

    I cannot even describe how much Course Hero helped me this summer. It’s truly become something I can always rely on and help me. In the end, I was not only able to survive summer classes, but I was able to thrive thanks to Course Hero.

    Student Picture

    Dana University of Pennsylvania ‘17, Course Hero Intern

  • Left Quote Icon

    The ability to access any university’s resources through Course Hero proved invaluable in my case. I was behind on Tulane coursework and actually used UCLA’s materials to help me move forward and get everything together on time.

    Student Picture

    Jill Tulane University ‘16, Course Hero Intern