Question: Which of the following terms refers to unsolicited bulk messages sent over the Internet?

Answer Choices: Spam

Phishing

Spoofing

Hacking

Answer: Spam

Question: The act of lying to obtain access to someone else’s data or information system is called:

Answer Choices: Spoofing

Phishing

Social engineering

Cyberbullying

Answer: Social engineering

Question: What type of system enables physicians to place orders electronically, with the order transmitted directly to the recipient?

Answer Choices: clinical decision support (CDS) system

health information exchange (HIE) system

computerized provider order entry (CPOE) system

telemedicine system

Answer: computerized provider order entry (CPOE) system

Question: Which of the following statements is true about phishing?

Answer Choices: Phishing is a form of cyberbullying.

Phishing involves tricking people into disclosing sensitive information by pretending to be a legitimate organization.

Phishing is the same as spamming.

Phishing refers to stealing trade secrets from competitors.

Answer: Phishing involves tricking people into disclosing sensitive information by pretending to be a legitimate organization.

Question: Which of the following is NOT a category of computer crimes?

Answer Choices: crimes associated with the dissemination of computer viruses

crimes associated with health information exchanges

crimes associated with the disruption of service

crimes associated with computer systems as the target

Answer: crimes associated with health information exchanges

Question: The more complex an information system is, the less likely it is that the system will have problems with data and program integrity.

Answer Choices: True

False

Answer: False

Question: Which of the following is the most common way for malware such as viruses, worms, and Trojan horses to spread?

Answer Choices: through spam emails and malicious attachments

through public service announcements

through direct phone calls from scammers

through printed advertising

Answer: through spam emails and malicious attachments

Question: Which of the following is an example of fraud in which an individual acquires personal information without authorization to impersonate someone else?

Answer Choices: cybersquatting

phishing

spamming

identity theft

Answer: identity theft

Question: Which of the following is the primary goal of information security?

Answer Choices: to ensure system convenience

to protect systems and data from unauthorized access, use, disclosure, disruption, modification, or destruction

to maximize data availability at all times

to provide marketing insights

Answer: to protect systems and data from unauthorized access, use, disclosure, disruption, modification, or destruction

Question: Which of the following is NOT considered a computer crime?

Answer Choices: creating and spreading computer viruses

breaking into computer systems

performing minor routine maintenance on your personal computer

stealing computer time

Answer: performing minor routine maintenance on your personal computer

Question: Which of the following is a form of theft of intellectual property?

Answer Choices: plagiarism

cybersquatting

cyberbullying

cyberstalking

Answer: plagiarism