Question 1Â Sniffing is a security challenge that is most likely to occur in which of the following points of a corporate network?AnswerÂ client computer Â internal corporate back-end systemÂ corporate servers Â communications linesÂ 1 points Â Question 2Â Redirecting a web link to a different address is a form of:AnswerÂ war drivingÂ sniffingÂ spoofingÂ snoopingÂ 1 points Â Question 3Â A digital certificate system:AnswerÂ uses tokens to validate a user’s identityÂ uses third-party CAs to validate a user’s identityÂ uses digital signatures to validate a user’s identityÂ is used primarily by individuals for personal correspondenceÂ 1 points Â Question 4Â Hackers create a botnet by:AnswerÂ infecting web search bots with malwareÂ infecting corporate servers with “zombie” Trojan horses that allow undetected access through a back doorÂ using web search bots to infect other computersÂ causing other people’s computers to become “zombie” PCs following a master computerÂ 1 points Â Question 5Â The HIPAA Act:AnswerÂ imposes responsibility on companies and management to safeguard the accuracy of financial informationÂ specifies best practices in information systems security and controlÂ outlines medical security and privacy rulesÂ requires financial institutions to ensure the security of customer dataÂ 1 points Â Question 6Â In 2004, ICQ users were enticed by a sales message from a supposed anti-virus vendor. On the vendor’s site, a small program called Mitglieder was downloaded to the user’s machine. The program enabled outsiders to infiltrate the user’s machine. What type of malware is this an example of?AnswerÂ Trojan horseÂ spywareÂ virusÂ wormÂ 1 points Â Question 7Â The most common type of electronic evidence is:AnswerÂ emailÂ voice-mailÂ spreadsheetsÂ instant messagesÂ 1 points Â Question 8Â The development and use of methods to make computer systems resume their activities more quickly after mishaps is called:AnswerÂ recovery-oriented computingÂ fault tolerant computingÂ high availability computingÂ disaster recovery planningÂ 1 points Â Question 9Â ________ refers to policies, procedures, and technical measures used to prevent unauthorized access, alternation, theft, or physical damage to information systems.AnswerÂ “Controls”Â “Benchmarking”Â “Security”Â “Algorithms”Â 1 points Â Question 10Â In which technique are network communications analyzed to see whether packets are part of an ongoing dialogue between a sender and a receiver?AnswerÂ application proxy filteringÂ intrusion detection systemÂ stateful inspectionÂ packet filteringÂ 1 points Â Question 11Â The Federal Trade Commission FIP principle of Notice/Awareness states that:AnswerÂ customers must be allowed to choose how their information will be used for secondary purposes other than the supporting transactionÂ Websites must disclose their information practices before collecting dataÂ data collectors must take responsible steps to assure that consumer information is accurate and secure from unauthorized useÂ there is a mechanism in place to enforce FIP principlesÂ 1 points Â Question 12Â A classic ethical dilemma is the hypothetical case of a man stealing from a grocery store in order to feed his starving family. If you used the utilitarian principle to evaluate this situation, you might argue that stealing the food is:AnswerÂ wrong, because if everyone were to do this, the concept of personal property is defeated. Â acceptable, because the higher value is the survival of the familyÂ wrong, because the man would not want the grocer to steal from himÂ acceptable, because the grocer suffers the least harmÂ 1 points Â Question 13Â The strength of patent protection is that it:AnswerÂ allows protection from internet theft of ideas put forth publiclyÂ puts the strength of law behind copyrightÂ is easy to defineÂ grants a monopoly on underlying concepts and ideasÂ 1 points Â Question 14Â The U.S. Department of Commerce developed a ________ framework in order to enable U.S. businesses to legally use personal data from EU countries.AnswerÂ PGP Â COPPA Â P3P Â safe-harbor Â 1 points Â Question 15Â Which of the following U.S. laws gives patients access to personal medical records and the right to authorize how this information can be used or disclosed?AnswerÂ Freedom of Information ActÂ Gramm-Leach-Bliley ActÂ Privacy Protection ActÂ HIPAAÂ 1 points Â Question 16Â According to the ________, you should take the action that produces the least harm.AnswerÂ categorical imperative Â utilitarian principle Â risk aversion principle Â golden rule Â 1 points Â Question 17Â Which of the five moral dimensions of the information age do the central business activities of ChoicePoint raise?AnswerÂ information rights and obligationsÂ system qualityÂ property rights and obligationsÂ accountability and controlÂ 1 points Â Question 18Â When a cookie is created during a website visit, it is stored:AnswerÂ in a web directoryÂ on the website computerÂ on the visitor’s computerÂ on the ISP’s computerÂ 1 points Â Question 19Â The “do anything anywhere” computing environment can:AnswerÂ make work environments much more pleasantÂ blur the traditional boundaries between work and family timeÂ create economies of efficiencyÂ centralize power at corporate headquartersÂ 1 points Â Question 20Â One of the difficulties of patent protection is:AnswerÂ the years of waiting to receive itÂ that only the underlying ideas are protectedÂ preventing the ideas from falling into public domainÂ digital media cannot be patentedÂ 1 points Â Â Save
Delivering a high-quality product at a reasonable price is not enough anymore.
That’s why we have developed 5 beneficial guarantees that will make your experience with our service enjoyable, easy, and safe.
You have to be 100% sure of the quality of your product to give a money-back guarantee. This describes us perfectly. Make sure that this guarantee is totally transparent.Read more
Each paper is composed from scratch, according to your instructions. It is then checked by our plagiarism-detection software. There is no gap where plagiarism could squeeze in.Read more
Thanks to our free revisions, there is no way for you to be unsatisfied. We will work on your paper until you are completely happy with the result.Read more
Your email is safe, as we store it according to international data protection rules. Your bank details are secure, as we use only reliable payment systems.Read more
By sending us your money, you buy the service we provide. Check out our terms and conditions if you prefer business talks to be laid out in official language.Read more