Name: 
 

Rev 33



True/False
Indicate whether the statement is true or false.
 

 1. 

Businesses cannot gather information about people from public record because the government keeps such records confidential.
 

 2. 

If a company gathers information about you, it may sell that information to another organization, such as a marketing company.
 

 3. 

Companies that place GUIDs in their products generally say so openly.
 

 4. 

If you wish, you can set your browser to reject cookies or warn you about them.
 

 5. 

A computer crime is any act that violates a law and involves a computer.
 

 6. 

Companies sometimes refuse to announce that they have been the victim of a computer crime because the bad publicity might cause them to lose customers.
 

 7. 

Spoofing is the same as phishing.
 

 8. 

More than half of all software in use today is pirated software.
 

 9. 

When you add someone as a "friend" in Facebook, they don't see everything you post.
 

 10. 

Once you find a good password, you should never change it.
 

 11. 

One way to avoid spam is to have two e-mail addresses.
 

 12. 

No reputable bank or company will every ask you to send them your username, password, account information or social security number.
 

Multiple Choice
Identify the choice that best completes the statement or answers the question.
 

 1. 

Which of the following is not a way of volunteering information about yourself?
a.
Web site registration
b.
Web browsing
c.
warranty registration
d.
sweepstakes entries
 

 2. 

Some companies may do this with personal information they collect about you.
a.
sell it
b.
copy it
c.
delete it
d.
none of the above
 

 3. 

Many Americans would like their _____ to be guaranteed by law.
a.
copyright
b.
privacy
c.
fair use
d.
warranty
 

 4. 

This is a type of crime that is carried out over the Internet.
a.
computer crime
b.
cybercrime
c.
plagiarism
d.
theft
 

 5. 

These give Web sites a way of storing information about you so it is available when you return.
a.
cookies
b.
GUID
c.
viruses
d.
scams
 

 6. 

This allows authorized uses to access a network in an emergency situation by skipping security measures.
a.
scanning
b.
spoofing
c.
superzapping
d.
phishing
 

 7. 

This is a destructive program that is disguised as a friendly or useful program such as a game.
a.
worm
b.
macro virus
c.
scam
d.
Trojan horse
 

 8. 

The illegal copying of computer programs is called _____.
a.
software program-ming
b.
software plagiarism
c.
software piracy
d.
software documentation
 

 9. 

Which of the following, if used as a computer password, would be easy for someone to guess?
a.
birthdate
b.
pet’s name
c.
sister’s name
d.
any of the above
 

 10. 

With this kind of access, an intruder can do anything he or she wants on a network.
a.
password
b.
superuser
c.
anonymous
d.
personal
 

 11. 

Which of the following law enforcement groups use technology to catch cybercriminals?
a.
CCIPS
b.
CHIP
c.
NIPC
d.
all of the above
 

Matching
 
 
Match each word or phrase with the correct definition.
a.
privacy
b.
Web site registration
c.
cookies
d.
GUID
e.
infringe
 

 1. 

give Web sites a way of storing information about you
 

 2. 

can be used by hackers to access personal data
 

 3. 

to interfere with the privacy of others
 

 4. 

a unique ID number generated by a piece of hardware or a program
 

 5. 

is not guaranteed in the United States
 
 
Match each word or phrase with the correct definition.
a.
computer crime
b.
cybercrime
c.
identity theft
d.
software piracy
e.
memory shaving
 

 6. 

using a computer to break the law
 

 7. 

the stealing of some of a computer's memory chip
 

 8. 

the illegal copying of computer programs
 

 9. 

when someone makes purchases in your name
 

 10. 

using the Internet to break the law
 
 
Match each word or phrase with the correct definition.
a.
John8Smith
b.
packet sniffer
c.
J*Ar8ZB&
d.
site registration
e.
Anonymizer
 

 11. 

should be avoided if data will be shared
 

 12. 

examines data streams looking for information
 

 13. 

a strong password
 

 14. 

a weak password
 

 15. 

a program that lets you browse anonymously
 



 
Check Your Work     Start Over