Information Technology Reference
In-Depth Information
CHAPTER 14: SELF-ASSESSMENT TEST
Policies and procedures must be established to avoid waste
and mistakes associated with computer usage.
1.
10. Malware capable of spreading itself from one computer to
another is called a ___________.
a. logic bomb
b. Trojan horse
c. virus
d. worm
11. A(n) ____________ is a modified version of a virus that is
produced by the virus's author or another person amending
the original virus code.
12. The Business Software Alliance estimates that the software
industry lost over $48 billion in 2007 due to worldwide
software piracy. True or False?
Business managers and end users must work with IS pro-
fessionals to implement and follow proper IS usage policies
to ensure effective use of company resources. True or False?
2.
Computer-related waste and mistakes are major causes of
computer problems, contributing to unnecessarily high
____ and lost ____.
3.
Unwanted e-mail is often referred to as __________.
Computer crime is a serious and rapidly growing area of con-
cern requiring management attention.
4.
13. Phishing is a computer scam that seems to direct users to
a bank's Web site but actually captures key personal infor-
mation about its victims. True or False?
According to the 2007 FBI Internet Crime Report, the
dollar amount of Internet crime reported exceeded $250
million. True or False?
5.
______ is using one's skills to get computer users to provide
you with information to access an information system or
its data.
Jobs, equipment, and working conditions must be designed
to avoid negative health effects from computers.
14. CTS, or ______________________, is the aggravation of
the pathway of nerves that travel through the wrist.
6.
The vast majority of organizations conduct some form of
computer security audit. True or False?
7.
____________________ is a crime in which an imposter
obtains key pieces of personal identification information,
such as Social Security or driver's license numbers, to
impersonate someone else.
Practitioners in many professions subscribe to a code of ethics
that states the principles and core values that are essential to
their work.
15. Just because an activity is defined as legal, it does not mean
that it is ethical. True or False?
8.
Internet gambling in the United States is completely legal.
True or False?
CHAPTER 14: SELF-ASSESSMENT TEST ANSWERS
9.
A logic bomb is a type of Trojan horse that executes when
specific conditions occur. True or False?
(1) True (2) costs, profits (3) spam (4) False (5) Social engi-
neering (6) True (7) Identity theft (8) False (9) True (10) d
(11) variant (12) True (13) True (14) carpal tunnel syndrome
(15) True
REVIEW QUESTIONS
1.
What is a spam filter? How does such a program work?
What is the issue with image-based spam?
7. What is phishing? What actions can you take to reduce the
likelihood that you will be a victim of this crime?
8. Outline measures you should take to protect yourself
against viruses and worms.
9. What does intrusion detection software do? What are some
of the issues with the use of this software?
10. Identify at least five tips to follow to avoid becoming a
victim of a computer scam.
2.
How can antivirus software reduce computer waste?
3.
Outline a four-step process to prevent computer waste and
mistakes.
4.
Why are all computer crimes not reported to law enforce-
ment agencies?
5.
What is a virus? What is a worm? How are they different?
6.
What is a variant? What dangers are associated with such
malware?
 
Search WWH ::




Custom Search