48. Which of the following is not a problem associated with bootleg (pirated) software?

a. It allows users to obtain software from unauthorized sources.

b. It introduces viruses that may exist within the software.

c. It can be downloaded from the Internet.

d. It was freeware software but the owner retains the copyright rights.

48. d. Freeware is software that is made available to the public at no cost. The author retains copyright rights and can place restrictions on how the program is used. The other three choices are examples of risks and actions involved in pirated software that can lead to legal problems. Control measures include (i) not allowing employees to bring software from home or outside, (ii) not permitting program downloads from the Internet, and (iii) testing the downloaded program on a stand-alone system first before it is allowed on the network.

49. Which of the following is a legal activity?

a. Competitive intelligence

b. Industrial espionage

c. Economic espionage

d. Corporate espionage

49. a. Competitive intelligence is common and legal. It involves gathering public information, going through waste, or even unobtrusive measures. Economic espionage is not legal because it involves unauthorized acquisition of proprietary or other information by a foreign government to advance its country’s economic position. Industrial and corporate espionage is illegal because they deal with stealing information about product formulas and other vital information. High technology and defense industries are potential targets of industrial espionage.

50. Which of the following is legally appropriate?

a. Computer welcome screens

b. Pre-logging questionnaires

c. Computer unwelcome screens

d. Post-logging questionnaires

50. b. Pre-logging questionnaires include ascertaining whether users are authorized to use the computer and making sure that they access only the data and systems to which they are entitled. Post-logging questionnaires are used after the fact and are not of much use. Both welcome and unwelcome screens make the computer installation and the organization name known to the public. Legal issues may arise from these screens.

51. Which of the following software licensing methods would put a user in a queue to await access?

a. Single licensing method

b. Concurrent licensing method

c. Site licensing method

d. Floating licensing method

51. d. A floating licensing method puts users on a queue until their turn is up. For example, if software is licensed for 10 users and all are using the software, the 11th user will be asked to wait until one user is logged off. In a single licensing method, only one user is allowed to use the system. For small size user groups, a concurrent licensing method may be useful because it allows multiple users to work simultaneously. A site licensing method is used when there is a large group of users due to volume discount for heavy usage. The other licensing method would not put a user on a queue as the floating method does.

52. What is an effective way to prevent software piracy?

a. Dongle device

b. Awareness

c. Education

d. Reminders

52. a. A dongle is a small hardware device that is shipped with some software packages. The dongle is hard-coded with a unique serial number that corresponds to the software. When the program runs, it checks for the presence of the device. If the device is not plugged in, the program will not run. Despite inconvenience, it is the most effective way to prevent software piracy. The other three choices are useful to prevent software piracy, but they are not that effective.

53. Computer crime is possible when controls are:

a. Predictable, unavoidable

b. Unpredictable, unavoidable

c. Predictable, avoidable

d. Unpredictable, avoidable

53. c. When controls are predictable and can be bypassed, computer crime is greatly increased. Predictable means the attacker knows how the system works, when, and how to beat it. When controls are unpredictable, it is difficult for criminal attacks to take place.

54. The major reason for the inability to calculate the risk resulting from computer crime is due to:

a. Known misbehavior of unknown perpetrators

b. Unknown misbehavior of unknown perpetrators

c. Unknown misbehavior of known perpetrators

d. Known misbehavior of known perpetrators

54. b. It is difficult to assess or predict the future of unknown misbehavior of unknown perpetrators.

55. The white-collar criminal tends to be:

Перейти на страницу:

Поиск

Похожие книги