ANSWERS {GRADED A+}
A global positioning system (GPS) ____________. - ✔✔Provides extremely
accurate position, time, and speed, using a satellite-based navigation system.
A passive RFID tag is ___: - ✔✔A device that does not have a power source
According to the ethical computer use policy, users should be ______ of the rules
and, by agreeing to use the system on that basis, ________ to abide by the rules -
✔✔Informed; consent
An active RFID tag is - ✔✔a device that has its own transmitter and a power
source (typically a battery)
An employee of _______ was caught using internal systems to see online
opponents' cards and won $700,000. - ✔✔AbsolutePoker.com
An extranet is not available for use by a ______. - ✔✔Competitor
,An RFID tag is - ✔✔an electronic identification device that is made up of a chip
and antenna.
Bobby Knight works for an identity protection company that maintains large
amounts of sensitive customer information such as usernames, passwords, personal
information, and social security numbers. Bobby and a coworker decide to use the
sensitive information to open credit cards in a few of his customers' names. This is
a classic example of which of the following security breaches? - ✔✔an insider
Cell phones have morphed into ___ that offer more advanced computing ability
and connectivity than basic cell phones. - ✔✔Smart Phones
Determining what is ethical can sometimes be difficult because certain actions can
be justified or condemned depending on how you view the relationship between
_______ and ______. - ✔✔Legal and ethical
Domino's Pizza did not notice what their employees posted on YouTube until
significant brand damage was done. They really needed _______. -
✔✔Trackur.com
Employees need to understand that email is solely owned by ________: - ✔✔The
company
, First line of defense is? - ✔✔people
How do prevention and resistance technologies stop intruders from accessing and
reading sensitive information? - ✔✔Content filtering, encryption, and firewalls
If an organization implemented only one policy, which one would it want to
implement? - ✔✔Ethical computer use policy
If you want to encrypt phone calls you could use ____. - ✔✔Signal
If you want to encrypt text you could use ______. - ✔✔Whats APP and telgram
(A and B)
In the information technology world, which of the following are examples of
ethical issues that a company may have to manage? - ✔✔All of these are correct
Information does not have ethics but ______ do. - ✔✔People
Jensen is a senior developer for HackersRUs, a company that helps secure
management information systems. Jensen's new task is to break into the computer
system of one of HackersRUs's top clients to identify system vulnerabilities and
plug the holes. What type of hacker is Jensen? - ✔✔White-hat hacker