135 its difficult to determine that theft of

Info icon This preview shows pages 9–12. Sign up to view the full content.

View Full Document Right Arrow Icon
135 It's difficult to determine that theft of information has occurred because A. It’s not a crime unless someone posts the information on the Internet. B. Most sites have inadequate audit logs. C. More often than not, the information is still there. D. Most law enforcement personnel don’t understand information technology. Answer: C See Chapter 9. When information is stolen, it’s most often copied, which means that the original information is still on the original system, unaltered. 136 The illegal acquisition of funds through manipulation or falsification of financial information is known as A. Embezzlement B. Conspiracy C. Blackmail D. Extortion Answer: A See Chapter 9. Embezzlement is basically stealing money from an organization by falsifying records. 137 The illegal acquisition of funds through intimidation is known as A. Embezzlement
Image of page 9

Info icon This preview has intentionally blurred sections. Sign up to view the full version.

View Full Document Right Arrow Icon
B. Conspiracy C. Blackmail D. Extortion Answer: D See Chapter 9. Unlike embezzlement (when the organization doesn’t know that it’s giving money away), extortion means that the organization is paying someone to do (or not do) something. 138 The categories of common law that relate to information systems are A. Patent, copyright, and trademark B. Misdemeanor and felony C. Criminal and civil D. Criminal, civil, regulatory, intellectual property, and privacy Answer: D See Chapter 9. Criminal, civil, and regulatory relate to all types of activities. Intellectual property and privacy are especially applicable to information systems. 139 The primary goal of information privacy laws is A. To require organizations to ask for permission each time they share information B. To discourage the abuse of individuals’ private information C. To require the use of government-operated databases, rather than private databases D. To prevent individuals from falsifying information about themselves Answer: B See Chapter 9. Privacy laws seek to curb the abuses of private information by organizations and individuals who want to misuse that information. 140 The chain of evidence ensures A. That evidence links the alleged perpetrator to the crime B. That those who collected it will be available to testify in court C. That it’s relevant and reliable D. The integrity of evidence, from collection through safekeeping Answer: D
Image of page 10
See Chapter 9. The chain of evidence ensures its integrity from the place of collection through preservation and finally presentation in court. 141 The only way to be absolutely sure that a hard disk hasn't been tampered with is to A. Write-protect the hard disk. B. Remove the hard disk from the computer. C. Create a digital signature based on the hard disk's entire contents. D. Back up the hard disk to tape and make comparisons later, as needed Answer: C See Chapter 9. A digital signature is by far the most reliable way of determining whether a hard disk has been tampered with. Write protection can be defeated; removing it from the computer doesn't assure that it can't be changed.
Image of page 11

Info icon This preview has intentionally blurred sections. Sign up to view the full version.

View Full Document Right Arrow Icon
Image of page 12
This is the end of the preview. Sign up to access the rest of the document.

{[ snackBarMessage ]}

What students are saying

  • Left Quote Icon

    As a current student on this bumpy collegiate pathway, I stumbled upon Course Hero, where I can find study resources for nearly all my courses, get online help from tutors 24/7, and even share my old projects, papers, and lecture notes with other students.

    Student Picture

    Kiran Temple University Fox School of Business ‘17, Course Hero Intern

  • Left Quote Icon

    I cannot even describe how much Course Hero helped me this summer. It’s truly become something I can always rely on and help me. In the end, I was not only able to survive summer classes, but I was able to thrive thanks to Course Hero.

    Student Picture

    Dana University of Pennsylvania ‘17, Course Hero Intern

  • Left Quote Icon

    The ability to access any university’s resources through Course Hero proved invaluable in my case. I was behind on Tulane coursework and actually used UCLA’s materials to help me move forward and get everything together on time.

    Student Picture

    Jill Tulane University ‘16, Course Hero Intern