Question: Which of the following terms refers to unsolicited bulk messages sent over the Internet?
Answer Choices: Spam
Phishing
Spoofing
Hacking
Answer: Spam
Question: The act of lying to obtain access to someone else’s data or information system is called:
Answer Choices: Spoofing
Phishing
Social engineering
Cyberbullying
Answer: Social engineering
Question: What type of system enables physicians to place orders electronically, with the order transmitted directly to the recipient?
Answer Choices: clinical decision support (CDS) system
health information exchange (HIE) system
computerized provider order entry (CPOE) system
telemedicine system
Answer: computerized provider order entry (CPOE) system
Question: Which of the following statements is true about phishing?
Answer Choices: Phishing is a form of cyberbullying.
Phishing involves tricking people into disclosing sensitive information by pretending to be a legitimate organization.
Phishing is the same as spamming.
Phishing refers to stealing trade secrets from competitors.
Answer: Phishing involves tricking people into disclosing sensitive information by pretending to be a legitimate organization.
Question: Which of the following is NOT a category of computer crimes?
Answer Choices: crimes associated with the dissemination of computer viruses
crimes associated with health information exchanges
crimes associated with the disruption of service
crimes associated with computer systems as the target
Answer: crimes associated with health information exchanges
Question: The more complex an information system is, the less likely it is that the system will have problems with data and program integrity.
Answer Choices: True
False
Answer: False
Question: Which of the following is the most common way for malware such as viruses, worms, and Trojan horses to spread?
Answer Choices: through spam emails and malicious attachments
through public service announcements
through direct phone calls from scammers
through printed advertising
Answer: through spam emails and malicious attachments
Question: Which of the following is an example of fraud in which an individual acquires personal information without authorization to impersonate someone else?
Answer Choices: cybersquatting
phishing
spamming
identity theft
Answer: identity theft
Question: Which of the following is the primary goal of information security?
Answer Choices: to ensure system convenience
to protect systems and data from unauthorized access, use, disclosure, disruption, modification, or destruction
to maximize data availability at all times
to provide marketing insights
Answer: to protect systems and data from unauthorized access, use, disclosure, disruption, modification, or destruction
Question: Which of the following is NOT considered a computer crime?
Answer Choices: creating and spreading computer viruses
breaking into computer systems
performing minor routine maintenance on your personal computer
stealing computer time
Answer: performing minor routine maintenance on your personal computer
Question: Which of the following is a form of theft of intellectual property?
Answer Choices: plagiarism
cybersquatting
cyberbullying
cyberstalking
Answer: plagiarism