Copyright

CSET Business - Ethics, Security & Data Integrity Chapter Exam

Exam Instructions:

Choose your answers to the questions and click 'Next' to see the next set of questions. You can skip questions if you would like and come back to them later with the yellow "Go To First Skipped Question" button. When you have completed the practice exam, a green submit button will appear. Click it to see your results. Good luck!

Page 1

Question 1 1. A small computer program gets stored on a user's hard drive. The program then collects the user's habits and transmits that information to a third party, all without the user's consent. From this description, the small program is _____.

Question 2 2. Which of the following is a method for securing data by using special mathematical algorithms to convert the data into a scrambled code before transmission?

Question 3 3. Which of the following refers to the right to determine when, and to what extent, information about oneself can be communicated to others?

Question 4 4. Bill is the new Chief Technology Officer at Z Corp. He plans to use _____ to prevent theft and protect the integrity of Z Corps. data.

Question 5 5. Which of the following is an unintentional threat to the security of computer networks?

Page 2

Question 6 6. Which of the following BEST describes the monitoring of people with technology, often without their knowledge?

Question 7 7. Which of the following is not an open source program?

Question 8 8. Which of the following is NOT a program used by employers to monitor employees' computer usage?

Question 9 9. Copyright law gives authors the exclusive rights to their work, including the right to make copies for the author's lifetime plus how many years after death?

Question 10 10. When Angela buys a new smartphone that uses retina scanning instead of a password, the phone is using _____ security.

Page 3

Question 11 11. Which term refers to software that is distributed for free with accessible source code that can be modified and improved by anyone?

Question 12 12. When Elliot plants malicious code on a corporate computer that will destroy files he is considered a _____.

Question 13 13. Which is true about closed source software?

Question 14 14. Which of the following is an example of an intellectual property?

Question 15 15. _____ is a small data file stored on a computer hard drive by a website when the user visits the site.

CSET Business - Ethics, Security & Data Integrity Chapter Exam Instructions

Choose your answers to the questions and click 'Next' to see the next set of questions. You can skip questions if you would like and come back to them later with the yellow "Go To First Skipped Question" button. When you have completed the practice exam, a green submit button will appear. Click it to see your results. Good luck!

CSET Business Subtest III (177): Practice & Study Guide  /  Business Courses
Support