You are on page 1of 4

MIS6A41 Sample Quiz - This is a Sample Quiz of Chapter 10

Name___________________________________
MULTIPLE CHOICE. Choose the one alternative that best completes the statement or answers the
question. Each question is worth 5 points.
1) Which of the following terms refers to a computer, data, or network site that is designed to be enticing
to crackers so as to detect, deflect, or counteract illegal activity?
A) honeypot
B) firewall
C) zombie computer
D) bot herder
E) botnet
2) Which of the following laws makes it mandatory for organizations to demonstrate that there are
controls in place to prevent misuse and detect any potential problems?
A) Trade Expansion Act of 1962
B) Electronic Communications Privacy Act of 1986
C) Sarbanes-Oxley Act
D) U.S.A. Patriot Act
E) Central Intelligence Agency Act
3) Glassico Publishing is a leading media company in France. The company handles sensitive information
and often finds it susceptible to information threats. As a countermeasure, the company installs strong
firewalls and protective software. These steps are a part of ________.
A) risk transference
B) risk rescheduling
C) risk reduction
D) risk acceptance
E) risk mitigation
4) Fyroff consultants, a leading software consulting firm in the United States, decides to launch an
Enterprise Resource Planning (ERP) solution. The company chooses the brand name Fyroff Enterprise for
the new solution. However, when the company attempts to register the domain name, it finds that a small
unknown firm is already registered under the same domain name. The small firm is now attempting to sell
the domain name to Fyroff. Which of the following terms refers to this practice of buying a domain name
only to sell it for big bucks?
A) cybersquatting
B) cyberstalking

1
C) logic bombing
D) bot herding
E) cyberbullying
5) Which of the following U.S. laws amended the Computer Fraud and Abuse Act to allow investigators
to easily access voice-related communications?
A) the Video Privacy Protection Act
B) the Clery Act
C) the Non-Detention Act
D) the Patriot Act
E) the Espionage Act 1
6) Information systems ________ is done to obtain an understanding of the threats to the confidentiality,
integrity, and availability of data and systems.
A) security modeling
B) data processing
C) risk assessment
D) quality testing
E) requirements analysis
7) Some data centers rent server space to multiple customers and provide necessary infrastructure in terms
of power, backups, connectivity, and security. Such data centers are called ________.
A) collocation facilities
B) offshore networks
C) control centers
D) virtual private networks
E) hot backup sites
8) Violating data belonging to banks or other financial institutions is a crime in the United States. Which
of the following legislations prohibits such violations?
A) the Computer Fraud and Abuse Act
B) the Foreign Intelligence Surveillance Act
C) the Glass-Steagall Act
D) the Electronic Communications Privacy Act
E) the Patriot Act

2
9) Implementing encryption on a large scale, such as on a busy Web site, requires a third party, called a(n)
________.
A) arbitrative authority
B) certificate authority
C) buying center
D) virtual private network
E) artificial network
10) ________ is the use of formal investigative techniques to evaluate digital information for judicial
review.
A) Hacktivism
B) Computer forensics
C) Certificate authority
D) Encryption
E) Flaming
MULTIPLE ANSWER QUESTION. Choose all correct answers of the question (hint: at least two
answers are correct). Each question is worth 5 points.
11) Which of the followings are NOT information systems controls?
A) prevent outside intruders from accessing a facility
B) assess unauthorized access attempts.
C) timely update system data
D) delete unnecessary statistics in the system
E) restoring compromised data.
12) Which one of the followings could be considered Computer Crime?
A) using a computer to commit an offense
B) using computers to support a criminal activity despite the fact that computers are not actually targeted
C) targeting a computer while committing an offense
D) using only internet to commit crime
E) using computer to hide paperwork of crime materials

3
Answer Key
Test Name: MIS6A41 SAMPLE QUIZ
MULTIPLE CHOICE.
1) A
2) C
3) C
4) A
5) D
6) C
7) A
8) A
9) B
10) B
MULTIPLE ANSWER QUESTION.
11) ABE
12) ABC

You might also like