2. QUESTION 1
The act of sending an e-mail that falsely claims to be a legitimate business in
an attempt to obtain the user’s personal information is called:
A.
B.
C.
D.
Hacking
Cracking
Copyright infringement
phishing
3. QUESTION 2
What is the purpose of the Fair Credit Reporting Act of 1970?
A. To give individuals the right to see information collected about them for
use by credit, insurance, and employment agencies
B. It restricts the way in which personal data can be used by federal agencies
C. It requires that a government authority have a supoena, summons or
search warrant to access an individual’s financial records.
D. It is protection of digial information from illegal use or reproduction
4. QUESTION 3
What law protects against copyright infringement?
A.
B.
C.
D.
The NET Act of 1997
The Financial Privacy Act of 1978
The Privacy Act of 1974
The Fair Crediting Reporting Act of 1970
5. QUESTION 4
This act restricts the way in which personal data can be used by federal
agencies.
A.
B.
C.
D.
The Privacy Act of 1974
The Financial Privacy Act of 1978
The NET Act of 1997
The Fair Credit Reporting Act of 1970
6. QUESTION 5
“This code, consisting of 24 imperatives formulated as statements of personal
responsibility, identifies the elements of such a commitment.”
A.
B.
C.
D.
ACM Code of Ethics and Professional Conduct
Computing Professional Conduct Guidelines
American Computing Act
American Computing Professional Ethics Act
7. QUESTION 6
Marketing technique where data is collected about customers visiting a website
A.
B.
C.
D.
Online Profiling
Phishing
Cookies
Web Beacons
8. QUESTION 7
Text file created by the server computer when a user enters information into a
website.
A.
B.
C.
D.
Cookie
Phishing
Online Profiling
Web Beacon
9. QUESTION 8
Tine, transparent graphics located on web pages or in e-mail messages that are
used in combination with cookies to collect data about web page users or
email senders
A.
B.
C.
D.
Web Beacons
Online Profiling
Phishing
Cookies
10. QUESTION 9
Requires federal agencies to develop, document and implement an agencywide program to provide information security
A.
B.
C.
D.
Federal Information Security Management Act of 2002
Identity Theft Penalty Enhancement Act of 2004
Consumer Credit Reporting Reform Act of 1996
Electronic Communications Privacy Act of 1986
11. QUESTION 10
Requires commercial website that collect personal information from children
under the age of 13 to obtain parental consent.
A.
B.
C.
D.
Children’s Online Privacy Act of 1988
Electronic Freedom of Information Act of 1996
Electronic Communications Privacy Act of 1986
Safety and Freedom through the Encryption Act of 1999
12. QUESTION 11
Gives law enforcement the ability to monitor individual's email and web
activity
A. Provide appropriate tools required to intercept and obstruct terrorism
(PATRIOT) Act of 2001
B. Safety and freedom through Encryption
C. Electronic freedom of Information Act of 1966
D. Right to financial privacy act of 1978
13. QUESTION 12
Which of the following would not be in an acceptable use policy?
A.
B.
C.
D.
You may access, upload, download, or distribute materials
Do not reveal personal information
Use of network for private business if prohibited
Do not access another’s account
14. QUESTION 13
Which of the following does not deal with ergonomics?
A.
B.
C.
D.
Power and paper waste
Repetitive stress injuries
Eye strain
Safe work environments
15. QUESTION 14
Which of the following does deals with computers in the workplace?
A.
B.
C.
D.
Copyright
Invasion of privacy
Employee monitoring
Identity theft
16. QUESTION 15
A program that is able to reproduce itself over a network
A.
B.
C.
D.
Worm
Cracker
Hacker
Trojan horse