Final Exam Flashcards

1
Q

Sometimes the word cracker is used to denote those who break into someone else’s computer.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

When a user attempts to log on to the machine, the security system reads the user ID and checks that the password matches the password for that user in the password file.

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

The operating system encrypts the password for a given user by encoding the information, using a process that is difficult to apply but easy to undo

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Knowledge of the hashing algorithm gives you and the system administrator certain knowledge of the original password.

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

In an asymmetric encryption algorithm, also called a public key encryption algorithm, the key for encryption and the key for decryption are quite different, although related.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

A block cipher encodes one character at a time.

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

The main difficulty with a symmetric algorithm is how to securely transmit the secret key.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

The success of RSA encryption depends on the fact that it is extremely difficult to find the prime factors for n if n is a small number.

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Opening an online store requires less planning than building another physical store location.

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Each record in a file contains information about an item in the “universe of discourse” that the file describes

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

To manage a relational table, you need only be able to add new tuples to the table and delete tuples from a table.

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Making critical decisions about computing technology is unavoidable

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

The digital representation of audio information can produce massive and unwieldy data files, which can be reduced by using a compression algorithm such as FTP

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

The MP3 protocol allows one level of compression.

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

By most accounts, the majority of MP3 music that Napster users “shared” was copyrighted, and most of the copyright holders objected to the copying of their music without royalty payments.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Napster lost the case accusing it of copyright infringement but won subsequent appeals.

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Most ethicists agree that since there are many more music publishers than listeners, MP3 copying is okay.

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

MP3 file copying has encouraged CD buying as a long term effect.

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

All music artists are naturally opposed to MP3 copying

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

An ethical dialectic usually has a clean stopping point.

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Some people view hackers as social gadflies, people who raise important, but irritating, questions about society.

A

True

22
Q

____ means keeping information secure—that is, protected from those who should not have access to it.

a. Network security c. Information assurance
b. Network assurance d. Information security

A

Information security

23
Q

The first line of defense against illicit use of, or threats to, computer resources and sensitive information is a strong ____ and authorization process.

a. authentication c. access
b. encryption d. interference

A

authentication

24
Q

A ____ attack automatically directs browsers on many machines to a single URL at roughly the same time, causing so much network traffic to that site that it is effectively shut down to legitimate users.

a. denial-of-use c. trial-of-use
b. trial-of-service d. denial-of-service

A

denial-of-service

25
Q

____ is a practice used to illegally obtain sensitive information such as credit card numbers, account numbers, and passwords.

a. Phishing c. Blasting
b. Pharming d. Fishing

A

Phishing

26
Q

A ____ cipher, also called a shift cipher, involves shifting each character in the message to another character some fixed distance farther along in the alphabet.

a. block c. Caesar
b. Trojan d. Brutus

A

Caesar

27
Q

A row of the table containing data about one instance of an entity is called a ___?

a. tuple c. connection
b. triple d. unit

A

tuple

28
Q

Each category of information in a database is called a(n) ____.

a. element c. attribute
b. tuple d. entity

A

attribute

29
Q

A ____ is an attribute or combination of attributes that uniquely identifies a tuple.

a. secondary key c. foreign key
b. primary key d. preferred key

A

primary key

30
Q

____ answer the question “Good for whom?” with a hearty, “Good for everyone!”.

a. Deontologists c. Utilitarians
b. Consequentialists d. Intelligent agents

A

Utilitarians

31
Q

Ethicists depend on what is called a(n) ____ to try to make better and better ethical decisions.

a. PGP c. MP3
b. dialectic d. deontology

A

dialectic

32
Q

In a(n) ____, we move back and forth between different viewpoints, criticizing each and trying to learn from each.

a. encryption scheme c. utilitarian scheme
b. dialectic d. PGP

A

dialectic

33
Q

The new way of thinking about making and sharing music will deemphasize the need for large ____ companies.

a. record c. software
b. music d. publishing

A

publishing

34
Q

Social ____ are people who raise important, but irritating, questions about society.

a. gadflies c. hackers
b. gadabouts d. dialectics

A

gadflies

35
Q

A(n) ____ is someone who breaks into computer systems, launches Internet worms and viruses, or perpetrates other dubious computer-related vandalism.

a. encryption c. utilitarian
b. PGP d. hacker

A

hacker

36
Q

A ____ focus more on the duties of the person acting and the way the act impinges on the rights of others

a. utilitarian c. hacker
b. consequentialist d. deontologist

A

deontologist

37
Q

Kant came up with ____ that characterized the duties we humans have to each other.

a. ten laws c. categorical imperatives
b. a mathematical formulation d. an algorithm

A

categorical imperatives

38
Q

The “hacker ethic” makes the claim that ____.

a. all hacking is positive hacking
b. information sharing is a powerful positive good
c. hackers are ethically ok as long as they have fun
d. hacking is acceptable as long as it is a solitary activity

A

information sharing is a powerful positive good

39
Q

The first step in the paramedic method is to ____

a. ask what is at stake c. identify duties and responsibilities
b. identify stakeholders d. think of analogies

A

identify stakeholders

40
Q

What is typosquatting?

A

A variant of cybersquatting, called typosquatting, takes advantage of typographical errors a user might make when typing a URL directly into the browser, as opposed to following a link, estimated to be about 15% of all Web traffic.

41
Q

What are two challenges associated with using a utilitarian argument in a dialectic about hacking?

A

It is sometimes hard to predict consequences with any accuracy. There seems to be a distinction between “good hackers” (who are trying to act in the public interest) and “bad hackers” (who want to do damage or steal things for self-interested or pathological reasons).

42
Q

What is Kant’s second categorical imperative?

A

Never treat a fellow human merely as a means to an end.

43
Q

Define cyberbullying.

A

Cyberbullying is humiliating, taunting, threatening, or invading someone’s privacy using the Internet, Web, or other type of electronic technology. Cyberbullying can take many forms, from posting hurtful and insulting messages, to leaking sensitive and embarrassing personal data, to online threats of violence and physical assault.

44
Q

What is impersonation, in the context of cyberbullying?

A

One popular form of cyberbullying is impersonation. A bully, masquerading as the intended victim, posts provocative images or knowingly false messages on a social network, chat room, or blog. The intent is to destroy the victim’s reputation and invite retaliation from offended individuals and groups. The post will often include a home address and cell phone number to make it easy for others to find and harass the targeted victim.

45
Q

Explain in detail the definition of the terms hacker and cracker and the evolution of these terms

A

Originally, the word hacker did not have a negative connotation. It was a mildly complimentary term for people who knew how to get things done on a computer—those somewhat strange and quirky individuals who seemed to know all the incomprehensible details about how computers worked, in essence, computer enthusiasts. They were the “tinkerers” and “fixers” who could enter some weird sequence of commands that miraculously cured whatever was wrong with your system.
As computers became more and more important to the functioning of society, and as computer networks increased the number of machines that could be accessed by individuals, the term hacker began to take on a different meaning. Some hackers turned their talents to figuring out how to override security measures to gain unauthorized access to other computers.
The results at first were relatively harmless. But soon these explorations turned to exploitations—ways to attack computer systems and cause destruction. Sometimes the word cracker is used to denote those who break in to someone else’s computer (like “cracking” a safe) as opposed to the more innocent “hacker” of the original use of the word. The general usage, however, is “hacker” for both types of intent.

46
Q

Explain what a denial-of-service attack is, including the terms DDOS and zombie army in your response.

A

A denial-of-service (DOS) attack is typically directed at a business or government Web site. The attack automatically directs browsers, usually on many machines, to a single URL at roughly the same time. The result causes so much network traffic to the targeted site that it is effectively shut down to legitimate users. (Spam e-mail can accomplish a similar, but less targeted effect, by flooding the Internet with e-mail messages that consume available bandwidth and clog mail servers.) If many machines are perpetrating this mischief, it’s called a distributed denial-of service attack, or DDOS. A DDOS may use thousands of machines, enabling much heavier attack traffic and at the same time making it harder to track down and disable all of the attacking machines. Many times, these machines are personal computers that were infected at some point by a Trojan horse. Then at a later time, the Trojan horse is activated in all these machines, putting them under the command of a single controller. This collection of machines is sometimes called a zombie army or botnet (short for “robot network” because the machines act like robots under someone else’s control).

47
Q

Discuss the ability of cloud computing to expand and contract with the needs of your business.

A

Cloud computing allows computing resources to exist anywhere with an Internet connection and still be easily accessible to the user. And these resources can expand and contract upon demand. Your business might start small and have minimal computer requirements. As your business grows, your cloud provider puts more computer assets at your disposal in a completely transparent way, that is, you need know nothing about this (at least not until you have to pay the bill). Similarly, if your business is seasonal, then after your busy season, your computing requirements go down and the pool of resources allocated for your use shrinks accordingly. This flexibility is much more efficient than buying computing resources that are underutilized much of the time or are insufficient to meet your
growing needs.

48
Q

What, in detail, is cybersquatting?

A

Cybersquatting is the practice of registering a domain name that uses the name or trademark of an existing business, with the intent to sell the name to that business at a profit or to capitalize on that name for some other purpose. A 1999 federal law called the Anti-Cybersquatting Consumer Protection Act (ACPA) makes cybersquatting illegal. A trademark owner claiming to be a victim of cybersquatting can file a suit under the ACPA. To have its claim upheld, a trademark owner must prove that it was the first to use the name or trademark for commercial purposes, that the name or trademark was distinctive at the time the domain name was first registered, that the domain name is the same as or sufficiently similar to the trademark as to cause confusion, and that the domain name registrant had a bad faith intent to profit from the trademark. A trademark owner who wins a suit can obtain the rights to the domain name and perhaps be awarded monetary damages up to $100,000. ICANN also arbitrates cybersquatting disputes, with essentially the same criteria, but does not award any monetary damages. International disputes may be brought before the World Intellectual Property Organization (WIPO), a United Nations agency. Since beginning this practice in 1999, the WIPO has received over 20,000 cases concerning about 35,000 domain names. Over 90% of these cases were decided in favor of those who charged they were the victims of cybersquatting.

49
Q

Explain what WikiLeaks is, how it operates, and what its goal is.

A

WikiLeaks, which was launched in December 2006, is a site that specializes in protecting government and corporate whistle-blowers. Imagine that you discovered a document at your work that proved the company’s leadership was engaged in significant unethical behavior. Furthermore, imagine that you decide you need to blow the whistle on this behavior. How would you go about it? In the past, one common route was to share the incriminating documents with an investigative journalist. The journalist acts as a firewall between you and the authorities; most journalists hold to a code of ethics that says that they will not identify their sources, even if it is clear that the source has committed a crime. Journalists sometimes go to prison rather than reveal their sources. The problem with this approach today is that it is very hard to share an electronic document with a journalist without leaving traces that law enforcement (or corporate security) officers can follow. Most journalists don’t have the necessary computer security and hacking skills to actually safeguard the anonymity of their sources. WikiLeaks’ goal is to provide exactly this kind of technical expertise. It provides a secure electronic drop box, and tips on how to submit documents that will prevent the leaker from being traced. WikiLeaks then provides the submitted documents to journalists. In the past, it has partnered with the New York Times, the Guardian (in the U.K.), and Der Spiegel (in Germany), among others.

50
Q

What are the components of the “hacker ethic” described in the text?

A
  1. “All Information Should Be Free”—Information sharing is a powerful positive good because it is not possible to make good decisions if important information is hidden. It is the ethical duty of hackers to facilitate access to information wherever possible.
  2. “Mistrust Authority—Promote Decentralization”—The rules and hierarchical management structures that characterize government and corporate bureaucracies mostly serve to prevent people from getting things done, rather than solving problems. Each hacker should act individually (or in very small groups) to do what he or she thinks is best, and ignore the rules.