Site MapHelpFeedbackChapter Quiz
Chapter Quiz
(See related pages)

1
The use of information technologies in business raises ethical issues in such areas as privacy, individuality, employment, and working conditions.
A)True
B)False
2
According to the text case, credibility can be gained quickly, as long as you conduct yourself with integrity or show exceptional leadership in exceptional circumstances.
A)True
B)False
3
A cracker is also called a black hat or a darkside hacker.
A)True
B)False
4
According to the text case, Xerox Corp. fired more than 40 workers for using their lunch hours to shop on the Web.
A)True
B)False
5
If you are caught creating a worm or virus and then spreading it around the Internet or other networks, you risk prosecution and jail time.
A)True
B)False
6
In an effort to comply with new privacy laws, the typical company will spend 3 to 4 percent of its IT budget on compliance applications and projects.
A)True
B)False
7
Many of the detrimental effects of information technology are caused by individuals or organizations that do not accept the ethical responsibility for their actions.
A)True
B)False
8
Firewalls can deter, but not completely prevent, unauthorized access (hacking) into computer networks.
A)True
B)False
9
Locking cards, which contain microprocessors that generate random numbers to add to an end user's password, are used in some secure systems.
A)True
B)False
10
According to the text, in the United States the default is opt-in, while in Europe the default is opt-out.
A)True
B)False
11
Which of the following is considered an exercise of corporate power?
A)Product pricing
B)Employee health screen
C)Advertising content
D)Plant closures or downsizing
12
The _____________ theory of ethical decision making states that companies have ethical responsibilities to all members of society. They should enhance the economic satisfaction of consumers and employees, without polluting the environment or depleting natural resources, misusing political power, or subjecting their employees to dehumanizing working conditions.
A)social contract
B)stakeholder
C)stockholder
D)equity
13
All of the following are basic categories of ethical business issues except:
A)Equity
B)Rights
C)Exercise of corporate power
D)Financial power
14
All of the following are AITP standards of professional conduct related to an employee's obligation to an employer except:
A)Protect the privacy and confidentiality of all information entrusted to me
B)Do not misrepresent or withhold information that is germane to the situation
C)Do not exploit the weakness of a computer system for personal gain or personal satisfaction
D)Support, respect, and abide by the appropriate local, state, provincial, and federal laws
15
Computer crime poses serious threats to the _______________ of most business systems.
A)integrity
B)safety
C)survival
D)All of the choices are correct.
16
All of the following are included in the top 5 virus families of all time except:
A)Sasser
B)SoBig
C)Netsky
D)Pilfer
17
Which of the following statements about cyber law is false?
A)The intersection of technology and the law is often controversial
B)Cyber law encompasses a wide variety of legal and political issues related to the Internet and other communications technologies
C)Cyber law is a term that has existed since the 1940's, when computers first emerged
D)All the choices are true statements about cyber law.
18
The goal of security management is to:
A)Design healthy work environments that are safe, comfortable, and pleasant for people to work in
B)Ensure the accuracy, integrity, and safety of all information system processes and resources
C)Ensure the access and effective use of all information system processes and resources
D)Design policies to ensure the privacy of personal information
19
Denial of service assaults via the Internet depend on three layers of networked computer systems. Which of the following is not one of those layers?
A)The victim's website
B)The victim's Internet service provider
C)The sites of "zombie" or slave computers that were commandeered by the cyber criminal
D)E-mail
20
Which of the following security techniques offers the highest accuracy, although higher in cost than other biometric techniques?
A)Dynamic signature verification
B)Finger scan
C)Passive iris scan
D)Voice print







O'BrienMIS, 10eOnline Learning Center

Home > Chapter 13 > Chapter Quiz