Lesson 8 Exam
Question 1 points
describes covert activities, such as theft of trade secrets, bribery, blackmail, and
technological surveillance, to gain an advantage over rivals.
Question options:
a) Industrial espionage
b) Packet sniffing
c) Spyware
d) Unauthorized data modification
Question 2 points
The U.S. law that amended the Computer Fraud and Abuse Act allowing investigators to easily
access voice-related communications is the Act.
Question options:
a) Non-Detention
b) Espionage
c) Patriot
d) Video Privacy Protection
Question 3 points
When Shelly downloaded an arcade game from an unknown Internet website, an unauthorized
connection unknown to Shelly was established with her computer. The arcade game is most
likely to be:
Question options:
, a) spyware.
b) a worm.
c) adware.
d) a Trojan horse.
Question 4 points
Which of the following examples can be considered as a violation for a copyright?
Question options:
a) Apple's multitouch technology
b) Music by an existing band
c) Amazon's one-click buying
d) Mobile phones
Question 5 points
A(n) network is a network connection that is constructed dynamically within an
existing network in order to connect users or nodes.
Question options:
a) ambient
b) virtual private
c) cognitive
d) collaborative service
Question 1 points
describes covert activities, such as theft of trade secrets, bribery, blackmail, and
technological surveillance, to gain an advantage over rivals.
Question options:
a) Industrial espionage
b) Packet sniffing
c) Spyware
d) Unauthorized data modification
Question 2 points
The U.S. law that amended the Computer Fraud and Abuse Act allowing investigators to easily
access voice-related communications is the Act.
Question options:
a) Non-Detention
b) Espionage
c) Patriot
d) Video Privacy Protection
Question 3 points
When Shelly downloaded an arcade game from an unknown Internet website, an unauthorized
connection unknown to Shelly was established with her computer. The arcade game is most
likely to be:
Question options:
, a) spyware.
b) a worm.
c) adware.
d) a Trojan horse.
Question 4 points
Which of the following examples can be considered as a violation for a copyright?
Question options:
a) Apple's multitouch technology
b) Music by an existing band
c) Amazon's one-click buying
d) Mobile phones
Question 5 points
A(n) network is a network connection that is constructed dynamically within an
existing network in order to connect users or nodes.
Question options:
a) ambient
b) virtual private
c) cognitive
d) collaborative service