Question 1 Sniffing is a security challenge that is most likely to occur in which of the following points of a corporate network? 1 points Question 2 Redirecting a web link to a different address is a form of: 1 points Question 3 A digital certificate system: 1 points Question 4 Hackers create a botnet by: 1 points Question 5 The HIPAA Act: 1 points Question 6 In 2004, ICQ users were enticed by a sales message from a supposed anti-virus vendor. On the vendor’s site, a small program called Mitglieder was downloaded to the user’s machine. The program enabled outsiders to infiltrate the user’s machine. What type of malware is this an example of? 1 points Question 7 The most common type of electronic evidence is: 1 points Question 8 The development and use of methods to make computer systems resume their activities more quickly after mishaps is called: 1 points Question 9 ________ refers to policies, procedures, and technical measures used to prevent unauthorized access, alternation, theft, or physical damage to information systems. 1 points Question 10 In which technique are network communications analyzed to see whether packets are part of an ongoing dialogue between a sender and a receiver? 1 points Question 11 The Federal Trade Commission FIP principle of Notice/Awareness states that: 1 points Question 12 A classic ethical dilemma is the hypothetical case of a man stealing from a grocery store in order to feed his starving family. If you used the utilitarian principle to evaluate this situation, you might argue that stealing the food is: 1 points Question 13 The strength of patent protection is that it: 1 points Question 14 The U.S. Department of Commerce developed a ________ framework in order to enable U.S. businesses to legally use personal data from EU countries. 1 points Question 15 Which of the following U.S. laws gives patients access to personal medical records and the right to authorize how this information can be used or disclosed? 1 points Question 16 According to the ________, you should take the action that produces the least harm. 1 points Question 17 Which of the five moral dimensions of the information age do the central business activities of ChoicePoint raise? 1 points Question 18 When a cookie is created during a website visit, it is stored: 1 points Question 19 The “do anything anywhere” computing environment can: 1 points Question 20 One of the difficulties of patent protection is: 1 points