22 August, 2011

Chapter 13 : Security and Ethical Challenges (MCQ)




Chapter 13
1.       Which of the following would be considered as a way that a computer virus can enter a computer system?
                     A) E-mail and file attachments.                                 B) Downloaded copies of games
                     C) Downloaded copies of shareware.                              D) All of the above.

2.       The unauthorized use of private and confidential personal information has seriously damaged the privacy of individuals. Accessing individuals' private e-mail conversations and computer records, and collecting and sharing information about individuals gained from their visits to Internet websites and newsgroups is an example of which type of privacy violation?
                        A) Personal piracy                                                 B) Computer monitoring
                        C) Computer matching                                                          D) none of the above

3.       In business ethics, the theory that states companies have ethical responsibilities to all members of society, which allow corporations to exist based on a social contract is known as:
                        A) Stockholder theory                                                           B) Stakeholder theory    
                         C) Social Disparity theory                                              D) None of the above.

4.       There are four major principles of technology ethics: proportionality, _____________________, justice, and minimized risk.
A    Informed constant   B.   Informed consent    C.  Reformed consent                  
  D.  None of the above
5.       The statement "Those affected by the technology should understand and accept the risks" describes which of those principles?
  A) Proportionality          B) Royalty                            C) Justice                             D) None of the above
6.       Many computer crimes involve the theft of money. In the majority of cases, they are:
A)  "Inside jobs" that involve authorized network entry and fraudulent alteration of computer databases to cover the tracks of the employees involved.
  B) "Inside jobs" that involve unauthorized network entry and fraudulent alteration of computer databases to cover the tracks of the employees involved.
  C) "Outside jobs" that involve authorized network entry and fraudulent alteration of computer databases to cover the tracks of the employees involved.
D) "Outside jobs" that involve unauthorized network entry and fraudulent alteration of computer databases to cover the tracks of the employees involved.
7.       The concern for security has increased dramatically with the growth of E-business and E-commerce. Encryption is described as _____________________, prior to transmission, to a secret code that masks the meaning of the data to unauthorized recipients.
A.      the process of distributing data or converting it
B.      the process of scrambling data or deleting  it
C.      the process of scrambling data or converting it
D.      the process

8.       Your text defines ergonomics as the science and technology emphasizing the safety, comfort, and ease of use of human-operated machines such as computers. The goal is to produce systems that are user-friendly, safe, comfortable, and easy to use. It is also is also called  _____________ engineering.
A.  humar factors             B.  human factors             C.  human tractor             D.  Human

9.       The goal to ensure the accuracy, integrity, and safety of all information system processes and resources is goal of:
  A) Security management           B)  Accuracy        C) Encryption                     D) None  of the above.
10.   The use of information technology in business operations presents no security challenges and risks such as computer crime or unethical behavior to society.             A) True                 B) False

11.   Computer monitoring has been praised as robbing workers of the dignity of their work because workers are forced to work at a hectic pace under poor working conditions.              
A) True                                 B) False
12.   Firewall computer are computers, communications processors, and software that protect computer networks from intrusion by bypassing all network traffic and serving as a safe transfer point for access to and from other networks.                                          A.  True                                                B.  False

13.   Your text discusses the importance of auditing E-business systems. The presence of documentation that allows a transaction to be traced through all stages of information processing is called an account trail.                                                                                  A.  True                                                B.  False

14.   In business ethics, the stockholder theory of business ethics maintains that managers have an ethical responsibility to manage a firm for the benefit of all its stockholders, which are all individuals and groups that have a stake in or claim on a company.            A) True                         B) False

15.   Hacking is defined as the authorized access and use of networked computer systems.                                                                                                                                 A) True                                 B) False

16.   One of the reasons hackers are a not a threat to the Internet is that they are not able to use remote services to allow one computer on the network to execute programs on another computer to gain privileged access within a network.                                                            A) True                                 B) False

17.   To attack the problem of "time and resource theft" in the use of business systems, snickers can be used to monitor network traffic to evaluate network capacity, and to reveal evidence of improper use.                                                                                                               A) True                                 B) False

18.   Biometric control devices being used as a method of computer security. They include special purpose sensors to measure biometric traits that make each individual unique–fingerprints, voice, keystroke analysis, genetic pattern analyses, etc.    A.  True                                                B.  False

19.   Fault tolerant systems are computers that have a single central processor, peripheral, and system software and that are able to continue operations even if there is a major hardware or software failure.                                                                         A.  True                                                B.  False

20.   A disaster recovery plan is a method for ensuring that an organization recovers from natural and human-caused disasters that affect its computer-based operations. These plans specify items such as hardware, software, employee duties, and facilities to be used.         A.  True                   B.  False

0 comments:

Post a Comment