0% found this document useful (0 votes)
15 views41 pages

New Perspectives On The Internet Comprehensive 9th Edition Schneider Test Bank

The document provides links to various test banks and solutions manuals for different editions of textbooks across multiple subjects. It includes a tutorial section on internet security with true/false, modified true/false, and multiple-choice questions related to computer security concepts. Additionally, it covers various security threats, encryption methods, and the importance of digital signatures.

Uploaded by

dodatjhonis
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
15 views41 pages

New Perspectives On The Internet Comprehensive 9th Edition Schneider Test Bank

The document provides links to various test banks and solutions manuals for different editions of textbooks across multiple subjects. It includes a tutorial section on internet security with true/false, modified true/false, and multiple-choice questions related to computer security concepts. Additionally, it covers various security threats, encryption methods, and the importance of digital signatures.

Uploaded by

dodatjhonis
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 41

Full Download Test Bank Get the Latest Study Materials at testbankfan.

com

New Perspectives on the Internet Comprehensive 9th


Edition Schneider Test Bank

https://testbankfan.com/product/new-perspectives-on-the-
internet-comprehensive-9th-edition-schneider-test-bank/

OR CLICK HERE

DOWLOAD NOW

Download More Test Banks for All Subjects at https://testbankfan.com


Recommended digital products (PDF, EPUB, MOBI) that
you can download immediately if you are interested.

New Perspectives on XML Comprehensive 3rd Edition Carey


Test Bank

https://testbankfan.com/product/new-perspectives-on-xml-
comprehensive-3rd-edition-carey-test-bank/

testbankfan.com

New Perspectives on XML Comprehensive 3rd Edition Carey


Solutions Manual

https://testbankfan.com/product/new-perspectives-on-xml-
comprehensive-3rd-edition-carey-solutions-manual/

testbankfan.com

New Perspectives on Microsoft Excel 2013 Comprehensive 1st


Edition Parsons Test Bank

https://testbankfan.com/product/new-perspectives-on-microsoft-
excel-2013-comprehensive-1st-edition-parsons-test-bank/

testbankfan.com

Zoology 9th Edition Miller Solutions Manual

https://testbankfan.com/product/zoology-9th-edition-miller-solutions-
manual/

testbankfan.com
Managing Human Resources 8th Edition Gomez-Mejia Test Bank

https://testbankfan.com/product/managing-human-resources-8th-edition-
gomez-mejia-test-bank/

testbankfan.com

Illustrated Course Guide Microsoft Office 365 and Excel


2016 Intermediate Spiral bound Version 1st Edition Wermers
Solutions Manual
https://testbankfan.com/product/illustrated-course-guide-microsoft-
office-365-and-excel-2016-intermediate-spiral-bound-version-1st-
edition-wermers-solutions-manual/
testbankfan.com

Business Law in Canada Canadian Edition Canadian 10th


Edition Yates Test Bank

https://testbankfan.com/product/business-law-in-canada-canadian-
edition-canadian-10th-edition-yates-test-bank/

testbankfan.com

Materials Science and Engineering An Introduction 9th


Edition Callister Solutions Manual

https://testbankfan.com/product/materials-science-and-engineering-an-
introduction-9th-edition-callister-solutions-manual/

testbankfan.com

Materials for Civil and Construction Engineers 4th Edition


Mamlouk Solutions Manual

https://testbankfan.com/product/materials-for-civil-and-construction-
engineers-4th-edition-mamlouk-solutions-manual/

testbankfan.com
Managing Operations Across the Supply Chain 3rd Edition
Swink Test Bank

https://testbankfan.com/product/managing-operations-across-the-supply-
chain-3rd-edition-swink-test-bank/

testbankfan.com
Tutorial 6: Internet Security

TRUE/FALSE

1. Physical security includes protecting assets using physical means.

ANS: T PTS: 1 REF: WEB 298

2. A counterstrike is a procedure that recognizes, reduces, or eliminates a threat.

ANS: F PTS: 1 REF: WEB 300

3. Computer security experts generally classify computer security threats into three categories: secrecy,
integrity, and necessity.

ANS: T PTS: 1 REF: WEB 300

4. The process of using a key to reverse encrypted text is called cryptography.

ANS: F PTS: 1 REF: WEB 301

5. Public-key encryption is also called symmetric encryption.

ANS: F PTS: 1 REF: WEB 301

6. A Trojan horse is a potentially harmful program hidden inside another program.

ANS: T PTS: 1 REF: WEB 327

7. DoS attacks can happen on mobile networks.

ANS: T PTS: 1 REF: WEB 309

8. Computers hijacked without the owner’s knowledge are often called spammers.

ANS: F PTS: 1 REF: WEB 310

9. A DoS filter can help defend against DoS attacks.

ANS: T PTS: 1 REF: WEB 311

10. The text recommends having your Social Security number printed on your checks.

ANS: F PTS: 1 REF: WEB 313

11. ActiveX technology was developed by Microsoft.

ANS: T PTS: 1 REF: WEB 322

12. You can purchase a digital signature from a certificate authority site.

ANS: T PTS: 1 REF: WEB 322


13. Malware is short for malfunctioning freeware.

ANS: F PTS: 1 REF: WEB 327

14. Software that gathers personal information about the user’s behavior or the user’s computer without
their knowledge is called infoware.

ANS: F PTS: 1 REF: WEB 328

15. A bulkhead is a software program or hardware device that controls access between two networks.

ANS: F PTS: 1 REF: WEB 334

16. A port scan tests whether a computer’s various ports are open, closed, or stealth.

ANS: T PTS: 1 REF: WEB 335

17. A digital ID is most often used by people using social networks, such as Facebook, to verify their
posts.

ANS: F PTS: 1 REF: WEB 337

18. A client certificate authenticates a Web site so site visitors can be confident in the identity of the Web
server.

ANS: F PTS: 1 REF: WEB 337

19. In a brute force attack, a cracker uses a program to enter character combinations until the system
accepts a user name and password.

ANS: T PTS: 1 REF: WEB 336

20. The latest, most secure form of SSL certificate is known as SSL-EV.

ANS: T PTS: 1 REF: WEB 342

MODIFIED TRUE/FALSE

1. The use of nonphysical security techniques to protect data stored on computers is sometimes called
computer security. _________________________

ANS: F, logical

PTS: 1 REF: WEB 298

2. Encrypted information is called cipher text. _________________________

ANS: T PTS: 1 REF: WEB 301

3. Asymmetric encryption uses a public and a private key to exchange encrypted messages.
_________________________
ANS: T PTS: 1 REF: WEB 302

4. Many viruses can send you an email that includes the name of someone you know in the message’s
From line, a tactic called phishing. _________________________

ANS: F, spoofing

PTS: 1 REF: WEB 303

5. A(n) packet sniffer examines the structure of the data elements that flow through a network.
_________________________

ANS: T PTS: 1 REF: WEB 311

6. A talented computer programmer who uses his skills to commit illegal acts is sometimes known as
a(n) snacker. _________________________

ANS: F
hacker
cracker

PTS: 1 REF: WEB 301

7. When an “@” symbol appears in a URL, all characters that precede the symbol are ignored.
_________________________

ANS: T PTS: 1 REF: WEB 305

8. A digital logo is a digital pattern containing copyright information that is inserted into a digital image,
animation, or audio or video file. _________________________

ANS: F, watermark

PTS: 1 REF: WEB 307

9. Java, JavaScript, and ActiveX programs are all considered proactive content.
_________________________

ANS: F, active content

PTS: 1 REF: WEB 322

10. A Web phish is a small, hidden graphic on a Web page or email message that works with a cookie to
obtain information about the person viewing the page or email message.
_________________________

ANS: F, bug

PTS: 1 REF: WEB 333

11. The use of spyware is always illegal. _________________________

ANS: F
not always
not

PTS: 1 REF: WEB 334

12. Most firewalls are installed to prevent traffic from entering the network.
_________________________

ANS: T PTS: 1 REF: WEB 335

13. A(n) certificate authority authenticates the certificate holder’s identity and issues digital certificates.
_________________________

ANS: T PTS: 1 REF: WEB 337

14. A(n) identity manager stores user name and password information in encrypted form on a computer.
_________________________

ANS: F, password manager

PTS: 1 REF: WEB 335

15. The combination of user login plus password is called multifactor authentication.
_________________________

ANS: F, single-factor authentication

PTS: 1 REF: WEB 336

MULTIPLE CHOICE

1. There are two types of security: ____ and ____.


a. physical, logical c. active, passive
b. client, server d. internal, external
ANS: A PTS: 1 REF: WEB 298

2. Computer security is the use of ____ security techniques to protect data stored on computers.
a. physical c. logical
b. port d. encrypted
ANS: C PTS: 1 REF: WEB 298

3. The figure above shows a(n) ____ page that contains a Web bug.
a. HTTPS page c. HTML page
b. User History page d. FTP page
ANS: C PTS: 1 REF: WEB 333

4. The location of the clear GIF shown in the figure above is a URL for DoubleClick, a division of ____
that develops tools for Internet marketing and advertising.
a. Yahoo! c. Microsoft
b. Google d. Apple
ANS: B PTS: 1 REF: WEB 333

5. When the user loads the Web page that contains the code shown in the figure above, the browser
downloads the ____ file from the DoubleClick server.
a. clear GIF c. clear widget
b. clear JPG d. clear screensaver
ANS: A PTS: 1 REF: WEB 333

6. Referring to the figure above, the process of downloading a Web bug can identify ____.
a. your IP address c. information about your use of the site
b. the Web site you last visited d. all of the above
ANS: D PTS: 1 REF: WEB 333

7. All of the following are categories of computer security threat EXCEPT ____.
a. secrecy c. integrity
b. subterfuge d. necessity
ANS: B PTS: 1 REF: WEB 300

8. According to the text, any act or object that endangers an asset is known as a(n) ____.
a. challenge c. opportunity
b. threat d. virus
ANS: B PTS: 1 REF: WEB 300

9. A(n) ____ threat permits unauthorized data disclosure.


a. secrecy c. necessity
b. integrity d. none of the above
ANS: A PTS: 1 REF: WEB 300

10. Unencrypted information is called ____.


a. plain text c. cipher text
b. a private key d. cryptography
ANS: A PTS: 1 REF: WEB 301

11. A(n) ____ is a formula or set of steps to solve a particular problem.


a. thought process c. key
b. steganograph d. algorithm
ANS: D PTS: 1 REF: WEB 301

12. ____ encryption uses a single key that both the sender and receiver know.
a. Private-key c. Asymmetric
b. Public-key d. Man-in-the-Middle
ANS: A PTS: 1 REF: WEB 301
13. A ____ is a technologically skilled person who uses his or her skills to obtain unauthorized entry into
computers.
a. zombie c. script kiddie
b. cracker d. whacker
ANS: B PTS: 1 REF: WEB 301

14. A ____-bit key is considered a(n) ____ key.


a. 256, impervious c. 128, strong
b. 128, weak d. 64, strong
ANS: C PTS: 1 REF: WEB 302

15. Email ____ involves a virus sending you an email that includes the name of someone you know in the
message’s From line.
a. scamming c. spoofing
b. spamming d. goofing
ANS: C PTS: 1 REF: WEB 303

16. A(n) ____ attack involves phony email messages that include links to spoofed Web sites.
a. DoS c. man-in-the-middle
b. DDoS d. phishing
ANS: D PTS: 1 REF: WEB 303

17. If you click a link in a phishing email, you will likely be taken to ____.
a. a legitimate Web site, in which you can do business safely
b. a competitor’s Web site (say, going to BarnesandNoble.com when you thought you were
going to Amazon.com)
c. the phishing perpetrator’s Web site
d. A Web site that is being targeted by a denial-of-service attack
ANS: C PTS: 1 REF: WEB 305

18. All characters that precede a(n) “____” symbol in a URL are ignored by a Web server.
a. @ c. _
b. / d. %
ANS: A PTS: 1 REF: WEB 305

19. APWG stands for ____ Working Group.


a. All-Protocol c. Autoplay
b. Anti-Phishing d. Auxiliary Port
ANS: B PTS: 1 REF: WEB 305

20. Email programs alert users when a link in an email message opens a Web page that is coded to a
different ____ than the one displayed in the message.
a. sender name c. category of Web site
b. URL d. date
ANS: B PTS: 1 REF: WEB 305
21. A digital ____ is a pattern containing copyright information that is inserted into a digital image,
animation, or audio or video file.
a. Web bug c. watermark
b. worm d. stenograph
ANS: C PTS: 1 REF: WEB 307

22. ____ is a process that hides encrypted messages within different types of files.
a. Stegography c. Steganography
b. Stenography d. Stenagography
ANS: C PTS: 1 REF: WEB 309

23. A(n) ____ attack occurs when an attacker disrupts normal computer processing or denies processing
entirely.
a. necessity c. secrecy
b. integrity d. man-in-the-middle
ANS: A PTS: 1 REF: WEB 309

24. Computers that have been “hijacked” and used to help a DDoS attack are known as ____.
a. droids c. phish
b. reluctants d. zombies
ANS: D PTS: 1 REF: WEB 310

25. Another term for a zombie is a(n) ____.


a. drone c. vampire
b. bot d. droid
ANS: B PTS: 1 REF: WEB 310

26. If you believe that your computer is involved in a DoS attack, you should contact your ____
immediately.
a. network administrator c. either a. or b.
b. ISP d. neither a. nor b.
ANS: C PTS: 1 REF: WEB 310

27. All of the following are listed in the text as ways to avoid identity theft EXCEPT ____.
a. matching credit card receipts to monthly statements
b. keeping credit card, bank account, and investment account information together in a safe
place
c. canceling and reopening credit card accounts once every three months
d. shredding all mail that contains any personal information
ANS: C PTS: 1 REF: WEB 313

28. The text recommended purchasing identity theft ____, which can help pay the expenses required to
clear and restore your identity in case of a theft.
a. insurance c. tracking
b. security d. vaults
ANS: A PTS: 1 REF: WEB 313
29. If you believe you are a victim of identity theft, you must act quickly to contact the ____ credit
reporting agencies, every financial institution at which you have an account, and the issuer of every
credit card you hold.
a. two c. four
b. three d. five
ANS: B PTS: 1 REF: WEB 313

30. If you are the victim of identity theft, file a police report with ____ law enforcement to document the
theft, and keep a copy of the report.
a. local c. Internet
b. UN d. national
ANS: A PTS: 1 REF: WEB 315

31. ____ components can make a Web page more useful by providing interactive elements like shipping
calculators or mortgage payment tables.
a. Active content c. Clickstream
b. Static d. Graphic
ANS: A PTS: 1 REF: WEB 322

32. When a digital signature authenticates an ActiveX control’s developer or source, it is called a(n) ____
ActiveX control.
a. safe c. signed
b. logical d. encrypted
ANS: C PTS: 1 REF: WEB 322

33. A Java ____ is a program written in the Java programming language, could execute and consume a
computer’s resources.
a. apple c. cookie
b. applet d. widget
ANS: B PTS: 1 REF: WEB 322

34. In the text, the term “applet” is associated with ____.


a. ActiveX c. the Java programming language
b. JavaScript d. none of the above
ANS: C PTS: 1 REF: WEB 322

35. A(n) ____ is a self-replicating program usually hidden within another file and sent as an email
attachment.
a. virus c. phish
b. Trojan horse d. worm
ANS: D PTS: 1 REF: WEB 327

36. ____ is a general category of software that includes advertisements to pay for the product for which it
appears.
a. Adware c. Web bug-ware
b. Spyware d. Abandonware
ANS: A PTS: 1 REF: WEB 328
37. The term “Web bug” is most associated with the term “____.”
a. phishing c. active content
b. cookie d. adware
ANS: B PTS: 1 REF: WEB 333

38. The Ad-Aware ad blocker was created by ____.


a. Java c. Microsoft
b. McAfee d. Lavasoft
ANS: D PTS: 1 REF: WEB 331

39. A(n) ____ is a small, hidden graphic on a Web page, designed to work in conjunction with a cookie to
obtain information about the person viewing the page.
a. biscuit c. applet
b. Web bug d. no-see-um
ANS: B PTS: 1 REF: WEB 333

40. DoubleClick is a division of ____.


a. Microsoft c. Java
b. Mozilla d. Google
ANS: D PTS: 1 REF: WEB 333

41. A Web bug can ____.


a. identify your IP address
b. identify the last Web site you visited
c. both a. and b.
d. neither a. nor b.
ANS: C PTS: 1 REF: WEB 333

42. By setting your Internet security program or other program, such as ____, to remove cookies on a
regular basis, you can eliminate cookies that store user data from your computer.
a. Spy-Kids c. Bug-Aware
b. Ad-Aware d. Cookie-Kids
ANS: B PTS: 1 REF: WEB 334

43. Firewalls can be used on Web ____.


a. servers c. either a. or b.
b. clients d. neither a. nor b.
ANS: C PTS: 1 REF: WEB 334

44. A Web bug is an example of spyware because ____.


a. it is small and unobtrusive
b. it involves the use and manipulation of cookies
c. the clear GIF and its actions are hidden from the user
d. the user is made explicitly aware of its presence and function
ANS: C PTS: 1 REF: WEB 334

45. Virtual ports use numbers to isolate traffic by type; a computer has more than ____ virtual ports for
different processes.
a. 650 c. 65,000
b. 6,500 d. 650,000
ANS: B PTS: 1 REF: WEB 334

46. A computer ____ permits traffic to leave and enter a computer.


a. packet sniffer c. gatehouse
b. terminus d. port
ANS: D PTS: 1 REF: WEB 334

47. Most ____ are installed to prevent traffic from entering the network, though they can also prevent data
from leaving the network.
a. firewalls c. gatehouses
b. ports d. certificates
ANS: A PTS: 1 REF: WEB 335

48. ____ is a general term for the process of verifying the identity of a person or a Web site.
a. Spoofing c. Inspection
b. Authentication d. Firewalling
ANS: B PTS: 1 REF: WEB 335

49. A port may be ____.


a. open c. stealth
b. closed d. any of the above
ANS: D PTS: 1 REF: WEB 335

50. The combination of ____ and ____ is sometimes called a login.


a. retinal scan, password c. user name, password
b. password, passkey d. user name, retinal scan
ANS: C PTS: 1 REF: WEB 335

51. The ____ firewall software program offers a free version.


a. ZoneAlarm c. Defend & Protect
b. WalledOff d. DMZ
ANS: A PTS: 1 REF: WEB 335

52. A ____ stores login information in an encrypted form on a computer.


a. rolodex c. private key
b. login shuffler d. password manager
ANS: D PTS: 1 REF: WEB 335

53. The countermeasure that protects individuals from becoming victims of ____ attacks is to use unique
user names and passwords at each Web site that requires a login.
a. DDoS c. phishing
b. brute force d. none of the above
ANS: B PTS: 1 REF: WEB 336

54. A ____ attack occurs when a cracker uses a program to enter character combinations until the system
accepts a user name and password.
a. phishing c. brute force
b. man-in-the-middle d. none of the above
ANS: C PTS: 1 REF: WEB 336

55. ____ is the process of associating a person and his identification with a very high level of assurance.
a. User authentication c. Cross-checking
b. Digitally ID’ing d. E-Clearance
ANS: A PTS: 1 REF: WEB 336

56. The combination of user login plus password is called ____ authentication.
a. multifactor c. unbreakable
b. single-factor d. strong
ANS: B PTS: 1 REF: WEB 336

57. ____ means employing more than one authentication method.


a. Overkill c. Multiple layers of control
b. Airlocking d. Hoop-jumping
ANS: C PTS: 1 REF: WEB 336

58. A digital certificate usually contains all of the following EXCEPT ____.
a. the certificate holder’s name, address, and email address
b. the certificate’s expiration date or validity period
c. a keycode that destroys all evidence of the certificate upon use
d. verification from a trusted third party
ANS: C PTS: 1 REF: WEB 337

59. A digital ID is usually used by ____.


a. individuals c. authorized dealers
b. companies d. ISPs
ANS: A PTS: 1 REF: WEB 337

60. A digital ID is purchased from ____.


a. the government c. a certificate authority
b. your employer d. eBay
ANS: C PTS: 1 REF: WEB 337

61. A server certificate authenticates ____.


a. individual users c. governmental authorities
b. a Web browser d. a Web site
ANS: D PTS: 1 REF: WEB 337

62. ____ was one of the first certificate authorities to issue server certificates.
a. VeriTab c. Google CA
b. Thawte d. Mozilla
ANS: B PTS: 1 REF: WEB 337

63. SSL stands for ____.


a. Safe Surfing Linkage c. Standard Security Label
b. Security Sweep Layer d. Secure Sockets Layer
ANS: D PTS: 1 REF: WEB 341

64. TLS was released in ____.


a. 1999 c. 2003
b. 1994 d. 2008
ANS: A PTS: 1 REF: WEB 341

65. Web pages secured by SSL have URLs that begin with ____.
a. S-http:// c. SSL://
b. https:// d. IETF://
ANS: B PTS: 1 REF: WEB 341

66. ____ keys exist only during a single connection between a browser and a server.
a. Public c. Session
b. Private d. none of the above
ANS: C PTS: 1 REF: WEB 342

67. ____ emerged in 2008 from concerns that fraudulent Web sites had started obtaining certificates.
a. SSL-II c. Super-SSL
b. SSL-EV d. SSL 2.0
ANS: B PTS: 1 REF: WEB 342

68. If a Web site is using the Extended Validation version of SSL in Internet Explorer, the background of
the address window turns ____.
a. green c. opaque
b. blue d. transparent
ANS: A PTS: 1 REF: WEB 342

69. When using SSL-EV with Chrome, the site’s verified organization name appears in the Address bar to
the left of the URL with a green background and the ____ site information icon.
a. Close c. Confirm
b. Open d. View
ANS: D PTS: 1 REF: WEB 343

70. When using SSL-EV with Firefox, the site’s verified organization name appears in the Location bar
____ the URL with a green background.
a. to the right of c. underneath
b. to the left of d. above
ANS: B PTS: 1 REF: WEB 343

Case-Based Critical Thinking Questions

Case 6-1
Ian is beginning his studies toward a degree in computer security. He knows that he has a lot to learn
and wants as solid a footing in the basics as he can get. He has asked you to come over and help him
make sure he’s got a good grasp of the fundamentals.
71. You start with a simple question for Ian. You ask him which category of threat a computer virus falls
under. He replies: ____.
a. necessity c. secrecy
b. integrity d. ephemeral
ANS: B PTS: 1 REF: WEB 327 TOP: Critical Thinking

72. Next, you ask Ian what category of threat encryption is meant to tackle, and which encryption method
works best on the Internet. He replies: ____ and ____.
a. necessity; symmetrical c. secrecy; symmetrical
b. integrity; asymmetrical d. necessity; symmetrical
ANS: C PTS: 1 REF: WEB 301 TOP: Critical Thinking

73. Impressed with Ian’s knowledge, you decide to test him further. You ask him what kind of software
tool or program is most helpful in defending against necessity attacks. He replies: ____.
a. packet sniffer c. ad blocker
b. script kiddie d. secret key
ANS: A PTS: 1 REF: WEB 311 TOP: Critical Thinking

74. Moving on, you ask Ian what type of computers commonly participate in a DDoS attacks. He answers
____.
a. zombies c. both a. and b.
b. bots d. neither a. nor b.
ANS: C PTS: 1 REF: WEB 310 TOP: Critical Thinking

75. Lastly, you ask Ian what it is about a digital sound or video file that permits steganography. Again, he
correctly responds that ____.
a. an individual sound or video file is usually broken up into many pieces on a hard drive
b. the steganographic mark can be seen or heard by other users as a means of free and fast
advertising
c. sound and video files contain portions of unused data where secret messages can be
hidden
d. none of the above
ANS: C PTS: 1 REF: WEB 309 TOP: Critical Thinking

Case-Based Critical Thinking Questions

Case 6-2
Heather’s friend recently had her identity stolen after accidentally responding to a phishing email.
Worried that it might happen to her, Heather has read up on how phishing attacks work. You come
over to help make sure she understands it.

76. You tell Heather, hypothetically, that an email was sent to her asking her to click the following URL
link: https://www.chase.com/customer/[email protected]/index.html. You ask her where this link
will take her. She replies: ____.
a. to the www.chase.com Web site, in the customer/private folder
b. to the www.chase.com main page
c. to the home page of a Web site with the URL 218.36.41.188
d. none of the above
ANS: C PTS: 1 REF: WEB 305 TOP: Critical Thinking
77. Next, you ask Heather whether it is safe to click a URL link in an email if there is no @ symbol
anywhere in it. She replies: ____.
a. yes, because the URL link will be legitimate
b. yes, because all email client software will alert users if a link points to a Web page with an
address other than that listed on the email
c. no, it is never OK ever to click a URL link in any email
d. that it is considered unsafe to click a URL link in an email unless you have previously
verified that the sender is who they say they are, and whom you trust
ANS: D PTS: 1 REF: WEB 303-305
TOP: Critical Thinking

78. You next hypothesize to Heather that she has clicked a URL link in an email, and a Web site has come
up that looks legitimate. Even the browser’s address bar has the correct URL in it. Should she consider
the site safe?
a. She should click the Reload or Refresh button once, and then consider the site safe.
b. She should immediately turn the computer off and reboot it. Again, she should never click
a URL link in any email ever.
c. She should still use extreme caution. Modern phishing programs are able to place a popup
with phony address information directly over a browser’s address bar.
d. none of the above
ANS: C PTS: 1 REF: WEB 303-305
TOP: Critical Thinking

79. Offhand, Heather asks you why this kind of attack was named “phishing” in the first place. You reply
that ____.
a. the first such attack was perpetrated against the band Phish in the 1990s, and the personal
information of several thousand fans was compromised
b. the attack “fishes” for information by masquerading as an email from someone known and
trustworthy
c. for the first few years, all such attacks seemed “fishy” to all but the most gullible
d. none of the above
ANS: B PTS: 1 REF: WEB 303 TOP: Critical Thinking

80. You feel that Heather knows her stuff. Before you leave, you remind her to visit the Web site that has
the most current, detailed information about phishing attacks, ____.
a. Phish Phinders c. the Anti-Phishing Working Group
b. Bephuddler Web-Safe d. Phishbait
ANS: C PTS: 1 REF: WEB 305 TOP: Critical Thinking

COMPLETION

1. The use of logical security techniques to protect data stored on computers is sometimes called
____________________.

ANS: computer security

PTS: 1 REF: WEB 298

2. An integrity threat permits unauthorized data ____________________.


ANS: modification

PTS: 1 REF: WEB 300

3. The process of using a key to reverse encrypted text is called ____________________.

ANS: decryption

PTS: 1 REF: WEB 301

4. A(n) ____________________ is a pattern containing copyright information that is inserted into a


digital image, animation, audio, or video file.

ANS: digital watermark

PTS: 1 REF: WEB 307

5. An attack that consumes a network’s bandwidth is called a(n) ____________________ attack.

ANS:
denial of service
DoS

PTS: 1 REF: WEB 309

6. Figure 6-2 shows a(n) ____ denial of service attack.

ANS: distributed

PTS: 1 REF: WEB 310

7. A company can defend its Web server from DoS attacks by adding a DoS ____________________ to
monitor communication between the Web server and the router that connects it to the Internet.

ANS: filter

PTS: 1 REF: WEB 311

8. A(n) ____________________ examines the structure of the data elements that flow through a network

ANS: packet sniffer

PTS: 1 REF: WEB 311


9. In a(n) ____________________ crime, a thief can use the victim’s personal information to open bank
accounts, obtain new credit cards, and purchase items using credit cards.

ANS: identity theft

PTS: 1 REF: WEB 312

10. Facebook is a type of social ____________________.

ANS: network

PTS: 1 REF: WEB 315-316

11. Users with Facebook accounts can “____________________” the Facebook Security page to make it
easy to view security updates when viewing their own pages.

ANS: like

PTS: 1 REF: WEB 317

12. With the popularity of sites that allow users to send very short updates of approximately
____________________ characters or less to their friends, the ability to abbreviate links to Web sites
has become a necessity.

ANS: 160

PTS: 1 REF: WEB 317

13. ____________________ components are Microsoft’s technology for writing small applications that
perform some action in Web pages.

ANS: ActiveX

PTS: 1 REF: WEB 322

14. A(n) ____________________ is a small, hidden graphic on a Web page.

ANS: Web bug

PTS: 1 REF: WEB 333

15. A(n) ____________________ vendor does not inform the customer that the software he is providing
will track your use of the programs and of the Internet.

ANS: spyware

PTS: 1 REF: WEB 334

16. A Web client firewall might be a dedicated ____________________, or a program running on the
Web client computer.

ANS: hardware device

PTS: 1 REF: WEB 334


17. A(n) ____________________ port is one in which traffic is not filtered and the port permits entry
through it.

ANS: open

PTS: 1 REF: WEB 334

18. A login generally consists of a user name and ____________________.

ANS: password

PTS: 1 REF: WEB 335

19. A digital certificate contains verification from a trusted third party, called a(n)
____________________.

ANS:
certificate authority
CA

PTS: 1 REF: WEB 337

20. A server certificate ensures that transfer of data between a user’s computer and the server is
____________________ so that it is tamperproof and free from being intercepted.

ANS: encrypted

PTS: 1 REF: WEB 337

MATCHING

a. spoofing g. hacker
b. adware h. necessity
c. steganography i. authentication
d. spyware j. secrecy
e. port scan k. secret key
f. port l. password manager
1. people who write programs or manipulate technologies to obtain unauthorized access to computers
2. type of threat that permits data delays or denial
3. verifying the identity of a person
4. it permits traffic to leave and enter a computer
5. a component of asymmetric encryption
6. occurs when data is disclosed to an unauthorized party
7. hides encrypted messages within different types of files
8. many freeware and shareware programs are sold as this
9. user has no control over or knowledge of the ads
10. sending a message with the name of someone known in the From line
11. tests whether network traffic is filtered or not on a computer
12. stores login information in an encrypted form
1. ANS: G PTS: 1 REF: WEB 301
2. ANS: H PTS: 1 REF: WEB 300
3. ANS: I PTS: 1 REF: WEB 335
4. ANS: F PTS: 1 REF: WEB 334
5. ANS: K PTS: 1 REF: WEB 302
6. ANS: J PTS: 1 REF: WEB 300
7. ANS: C PTS: 1 REF: WEB 309
8. ANS: B PTS: 1 REF: WEB 328
9. ANS: D PTS: 1 REF: WEB 328
10. ANS: A PTS: 1 REF: WEB 303
11. ANS: E PTS: 1 REF: WEB 335
12. ANS: L PTS: 1 REF: WEB 335

ESSAY

1. Name and describe the three basic types of computer security threats.

ANS:
A secrecy threat permits unauthorized data disclosure and ensures the authenticity of the data’s source.
An integrity threat permits unauthorized data modification.
A necessity threat permits data delays (slowing down the transmission of data) or denials (preventing
data from getting to its destination).

PTS: 1 REF: WEB 300 TOP: Critical Thinking

2. Describe the terms cryptography, encryption, algorithm, and key and how they interact together to
secure information.

ANS:
The study of ways to secure information is called cryptography. Encryption is the most common
cryptographic process and the most widely used form of protection for data transmitted on any
network, including the Internet. Encryption is the process of coding information using an algorithm to
produce a string of characters that is unreadable. An algorithm is a formula or set of steps that solves a
particular problem; some algorithms also use a key, which is a fact that the encryption algorithm uses
as part of its formula.

PTS: 1 REF: WEB 301 TOP: Critical Thinking

3. What do DoS and DDoS stand for? Please describe each type of security attack?

ANS:
The most common necessity attack, called a denial-of-service (DoS) attack, occurs when an attacker
floods a computer, server, or network with messages with the goal of consuming the network’s
bandwidth resources and disabling its services and communications.

In a distributed denial-of-service (DDoS) attack, the attacker takes control of one or more computers
without the owner’s permission and uses those computers to launch a DoS attack on other computers,
servers, or networks. Most DDoS attacks are launched after the attacking computers are infected with
Trojan horse programs.

PTS: 1 REF: WEB 309 TOP: Critical Thinking


Other documents randomly have
different content
Tyttömaailmasta ilmestyi näyttämölle yksi, nelilehtinen apila
kolmoisten tuhantisessa parvessa. Ensin ei häntä huomannut, mutta
sitten sattumalta … ja sitten ei voinut enää silmistänsä laskea: täytyi
saada se poimituksi, ottaa säilyyn… Niitä harvoin tapaa, nelilehtisiä.
Köyhässä, varattomassa kaupunkilaisperheessä tyttö kasvoi. Sieltä
hän sen poimi ja toi kotiinsa. Kaikki oli näin löydetty. Hän kaiveli ja
penkoili elämän aarteella mielin määrin, nauttien siitä täyteläisin
siemauksin.

Se oli elämää, noina muutamina vuosina. Ei mikään toive


näyttänyt toteuttamattomalta eikä mikään vastus voittamattomalta.

Tämän eteen laskeusi himmeä esirippu, alussa tosin


läpikuultavana, mutta yhä paksumpana ja peittävämpänä, kunnes se
vihdoin kääräisi hänet kuin tiukkaan kapaloon, josta ei nähnyt
eteenpäin tuumaakaan. Tuossa kääreessä hän riuhtoi aikansa, koetti
vapautua ja kiinnittää mielikuvituksen herkän silmän tulevaisuutta
kohti. Mutta kapalot kääriytyivät yhä tiukemmalle… Ajatus voi
askarrella ainoastaan olevaisissa oloissa, jotka olivat kasvaneet
omaan olemukseen kiinni ja jäivät vaipan sisään…

Keuhkotaudin hirveä kummitus liihotteli torjumattomana ympärillä.


Sillä tuntui olevan ikäänkuin siivet, joita se räpytteli raivoisasti,
toisinaan niin rohkeasti, että tuntui ja pakotti, milloin selkäpiitä,
milloin rintaluita. Sen ohelle ilmestyi velkojia ja takausmiehiä, jotka
kukin tavallaan määräilivät hänen maailmassansa. Vaikka ne eivät
olisi mitään puhuneetkaan, niin tuntui kuitenkin siltä, kuin ne olisivat
ajatelleet. Ja sehän oli samaa, kuin jos olisivat puhuneet… Ei, se oli
pahempaa. Jos olisivat aina puhuneet mitä ajattelivat, niin olisi siinä
ollut jotain varmuutta. "Meitä sinun pitää ajatteleman, yhä
muistaman!" tuntuivat ne ajatuksissaan kiljuvan.
"Minä se olen!" kähisi keuhkotaudin basilli ilkeästi irvistellen…

Nuoriso, jossa hän näki kylvönsä orastavan, hymyili parvittaan


perällä, kuten omat lapset silloin, kun on suuria vieraita, joita
ainoastaan velvollisuudesta kestitään.

Mutta tälläkin ajalla oli jotain, joka veti mieltä pois kiusallisista
painajaisista: mieli kiintyi katkeamattoman halukkaasti tutkimaan
salatuita asioita. Siinä teki sen merkillisen huomion, että se, mikä oli
ennen ollut selvää, tuli nyt epäselväksi; mutta kun asetti rinnakkain
oman entisyyden ja nykyisyyden, huomasi sentään itsensä nyt
kehittyneemmäksi. Sitä suuremmalta näytti vajanaisuus, epäselvyys,
jonka perille ei voinut tunkeutua.

Välähti vielä pienoinen valopilkku, tuo syksyinen aika, jolloin


koulukin avattiin ja jolloin elämänovi taas näytti olevan raollaan,
jolloin ihanteet näkyivät tahtovan uudelleen palata ja palasivatkin,
mutta arkoina kuin västäräkki keväisellä jäätiköllä asettuivat entisille
sijoilleen…

Nyt on nykyisyys käsissä. Päätä pudistelevina ja salaperäisinä


lääkäreitä… Koulussa sijainen opettajana… Omaisuus tuskin velkoihin
riittävänä ja lapset, nuo omat pienet lintuset, joista mielikuvituksissa
niin usein loi suuria ihmisiä, isänmaallisen viinamäen työmiehiä… Jos
itsekin kaadun, kaatuvat nekin, nuorina taimina, orpoina… Eläke
tuskin riittää ruumiin ravinnoksi. Mikä on heidän kohtalonsa, heidän,
jotka Jumala meille antoi?… Voisiko toivoa heille minun kohtaloani,
että sallimus heitä johdattaisi henkisille aarreaitoille? Vai tulevatko he
tavallisina ikävöimättöminä, kaipaamattomina ihmisinä elämään
ainoastaan syödäkseen?… Silloin he eivät ymmärtäisi isänsäkään
tarkoituksia, tuskin kunnioittaisivat muistoani… Kenties vihaisivat
isäänsä, joka ei ole kokoillut rahoja heille perinnöksi…
Suun ympärillä väreili katkera, hymyn tapainen ilme, kun ajatus
tähän ehti. Mutta ehkä ei niinkään, ajatteli hän jälleen lohdutellen
itseänsä.

… Niin, tietämättöminä ja kaipaamattomina tavallisina ihmisinä


heidän olisikin ehkä parempi … eivät osaisi kaivatakaan elämältä
muuta kuin sitä, mitä saavat, ja sehän se on pääasia, onnellisuuden
ehto, ettei ikävöi, ettei osaa kaivata mitään muuta kuin minkä
saavuttaa askel askeleelta…

"Täällä on nimismies", tuli muori ovesta ilmoittamaan.

"Mitä?"

"Nimismies on täällä. Käskenkö minä tänne vai?"

"Käskekää."

*****

He olivat jo vähän aikaa keskustelleet niitä näitä, kun Bendell veti


taskustaan lompakon ja otti sieltä kokoontaitetun paperin. Hän
tarjosi sen sitten Laivuriselle mitään virkkamatta ja hiukan
punastuen.

Laivurinen katsoi Bendelliä uteliaasti.

"Mitä se on?" kysyi hän. Kamala aavistus lensi päähän: olisikohan


se jokin velkahakemus?!

"Ole hyvä ja katso."

Bendell oli mennyt toiselle puolelle huonetta ja piirteli sormellaan


kuvioita ikkunaruutuun hiljaa viheltäen. Laivurinen avasi paperin
vapisevin käsin ja luki:

"Allekirjoittaneet sitoutuvat yhteisesti, lainana,


toimittamaan viisisataa markkaa kansakoulunopettaja Eero
Laivuriselle sairausapua, jos hän lähtee esimerkiksi Helsinkiin
saamaan apua nykyisessä taudissaan."

Alla oli kymmenen nimeä.

Bendell kääntyi Laivuriseen. Tämä nousi soututuolista, missä oli


istunut siitä saakka kuin Bendell tuli, astui hiljaa Bendellin luo, otti
kädestä, pudisti sitä. Hän ei näyttänyt jaksavan oikein puhua, mutta
sai vihdoin sanotuksi:

"Kiitos, veikko… Mutta kyllä se on jo liian myöhäistä minulle."

Sitten ei hän enää voinut pidättää, vaan alkoi nyyhkyttää niin


rajusti, että Bendellin täytyi häntä estää kaatumasta ja johdattaa
vuoteelle.

"Kiitos … myötätuntoisuudestanne", kuiskasi hän sieltä vielä


kesken liikutustansa.

Bendell kääntyi taas ikkunaan, minkä hikeen äsken kuvia piirteli, ja


poisti nenäliinallaan tunkeilevia kyyneleitä toisen toisensa perään…

*****

Rouva tuli kotiin ja meni suoraan Laivurisen huoneeseen. Jo


silmistä luki sairas, ettei varsin hyviä uutisia kuulunut.

"Mitä sanoi lääkäri?"

"Noo … ei juuri mitään erittäin, lääkkeitä antoi."


"Lääkäri oli kummastellut jalkain paisumista ensin. Mutta kun oli
kuullut, että äänikin kähisi ja että vatsa oli huono, niin oli sanonut,
että kyllä ne menevät itsestänsä takaisin ja että ne johtuvat kaikki
samasta."

Sitten otettiin lääkkeitä.

"Vai niin, näitäkö vaan annettiin?"

"Niitä. Miten niin?"

"Eikä mitenkään."

Laivurinen tunsi jo kyllä lääkkeet. Nämä olivat ainoastaan


satunnaisia tuskia helpottavia ja unettavia. —

Illalla nousi sairas soututuoliin lepäilemään. Ovi oli raollaan toiseen


huoneeseen. Sieltä hän kuuli vaimonsa ja muorin hiljaisen
keskustelun. Huomio kiintyi sitä seuraamaan. Hän kuuli:

"Lääkäri sanoi, ettei hän voi enää elää kuin korkeintaan kaksi
viikkoa."

Muorilta pääsi pidätetty huudahdus.

Laivurinen jäi liikahtamatta paikalleen, sillä veri tuntui yhtäkkiä


lakkaavan juoksemasta. Vähän ajan kuluttua nousi hän hitaasti, hiipi
sängyn luo, laskeusi siihen alassuin ja tuhersi kasvonsa tyynyihin.

"Kahden viikon kuluttua?" äännähti hän vihdoin itsekseen


kähisevällä äänellä ja huomasi samassa, ettei hän sen jälkeen, kuin
vaimonsa ilmoituksen kuuli, ollut ajatellut juuri ensinkään mitään.
"Kahden viikon kuluttua", matki hän uudestaan, melkein
itsetiedottomasti ja kenties ollenkaan sitä ajattelematta.

Taas alkoi kuulua kuiskuttava ääni raollaan olevasta ovesta. Hän


teroitti kuuloansa. Ei erottanut tarkkaan, ainoastaan muutamia
sanoja: siellä muori rukoili, varmaankin polvillaan ja pää laskettuna
ristissä oleviin käsiin. Sairas kuvitteli, että hänen vaimonsa tällä
kertaa oli mukana koko hengellään ja sydämellään… Kovemmin! teki
hänen mielensä huutaa, sillä hän olisi halunnut niin mielellään kuulla
joka ainoan sanan. Mutta hän peräytti jälleen aikeensa. Ei tahtonut
häiritä. Hän seurasi sydämellään sitä ajatusta, jonka hajanaiset sanat
hänessä synnyttivät, vajosi siihen niin kokonaan, että vasta kotvasen
kuluttua, kun ei enää muorinkaan ääni kuulunut, taas muisti
äskeisen:

"Niin … niin … ettäkö kahden viikon kuluttua olen mennyt…"


*** END OF THE PROJECT GUTENBERG EBOOK MENNYT ***

Updated editions will replace the previous one—the old editions will
be renamed.

Creating the works from print editions not protected by U.S.


copyright law means that no one owns a United States copyright in
these works, so the Foundation (and you!) can copy and distribute it
in the United States without permission and without paying
copyright royalties. Special rules, set forth in the General Terms of
Use part of this license, apply to copying and distributing Project
Gutenberg™ electronic works to protect the PROJECT GUTENBERG™
concept and trademark. Project Gutenberg is a registered trademark,
and may not be used if you charge for an eBook, except by following
the terms of the trademark license, including paying royalties for use
of the Project Gutenberg trademark. If you do not charge anything
for copies of this eBook, complying with the trademark license is
very easy. You may use this eBook for nearly any purpose such as
creation of derivative works, reports, performances and research.
Project Gutenberg eBooks may be modified and printed and given
away—you may do practically ANYTHING in the United States with
eBooks not protected by U.S. copyright law. Redistribution is subject
to the trademark license, especially commercial redistribution.

START: FULL LICENSE


THE FULL PROJECT GUTENBERG LICENSE
PLEASE READ THIS BEFORE YOU DISTRIBUTE OR USE THIS WORK

To protect the Project Gutenberg™ mission of promoting the free


distribution of electronic works, by using or distributing this work (or
any other work associated in any way with the phrase “Project
Gutenberg”), you agree to comply with all the terms of the Full
Project Gutenberg™ License available with this file or online at
www.gutenberg.org/license.

Section 1. General Terms of Use and


Redistributing Project Gutenberg™
electronic works
1.A. By reading or using any part of this Project Gutenberg™
electronic work, you indicate that you have read, understand, agree
to and accept all the terms of this license and intellectual property
(trademark/copyright) agreement. If you do not agree to abide by all
the terms of this agreement, you must cease using and return or
destroy all copies of Project Gutenberg™ electronic works in your
possession. If you paid a fee for obtaining a copy of or access to a
Project Gutenberg™ electronic work and you do not agree to be
bound by the terms of this agreement, you may obtain a refund
from the person or entity to whom you paid the fee as set forth in
paragraph 1.E.8.

1.B. “Project Gutenberg” is a registered trademark. It may only be


used on or associated in any way with an electronic work by people
who agree to be bound by the terms of this agreement. There are a
few things that you can do with most Project Gutenberg™ electronic
works even without complying with the full terms of this agreement.
See paragraph 1.C below. There are a lot of things you can do with
Project Gutenberg™ electronic works if you follow the terms of this
agreement and help preserve free future access to Project
Gutenberg™ electronic works. See paragraph 1.E below.
1.C. The Project Gutenberg Literary Archive Foundation (“the
Foundation” or PGLAF), owns a compilation copyright in the
collection of Project Gutenberg™ electronic works. Nearly all the
individual works in the collection are in the public domain in the
United States. If an individual work is unprotected by copyright law
in the United States and you are located in the United States, we do
not claim a right to prevent you from copying, distributing,
performing, displaying or creating derivative works based on the
work as long as all references to Project Gutenberg are removed. Of
course, we hope that you will support the Project Gutenberg™
mission of promoting free access to electronic works by freely
sharing Project Gutenberg™ works in compliance with the terms of
this agreement for keeping the Project Gutenberg™ name associated
with the work. You can easily comply with the terms of this
agreement by keeping this work in the same format with its attached
full Project Gutenberg™ License when you share it without charge
with others.

1.D. The copyright laws of the place where you are located also
govern what you can do with this work. Copyright laws in most
countries are in a constant state of change. If you are outside the
United States, check the laws of your country in addition to the
terms of this agreement before downloading, copying, displaying,
performing, distributing or creating derivative works based on this
work or any other Project Gutenberg™ work. The Foundation makes
no representations concerning the copyright status of any work in
any country other than the United States.

1.E. Unless you have removed all references to Project Gutenberg:

1.E.1. The following sentence, with active links to, or other


immediate access to, the full Project Gutenberg™ License must
appear prominently whenever any copy of a Project Gutenberg™
work (any work on which the phrase “Project Gutenberg” appears,
or with which the phrase “Project Gutenberg” is associated) is
accessed, displayed, performed, viewed, copied or distributed:
This eBook is for the use of anyone anywhere in the United
States and most other parts of the world at no cost and with
almost no restrictions whatsoever. You may copy it, give it away
or re-use it under the terms of the Project Gutenberg License
included with this eBook or online at www.gutenberg.org. If you
are not located in the United States, you will have to check the
laws of the country where you are located before using this
eBook.

1.E.2. If an individual Project Gutenberg™ electronic work is derived


from texts not protected by U.S. copyright law (does not contain a
notice indicating that it is posted with permission of the copyright
holder), the work can be copied and distributed to anyone in the
United States without paying any fees or charges. If you are
redistributing or providing access to a work with the phrase “Project
Gutenberg” associated with or appearing on the work, you must
comply either with the requirements of paragraphs 1.E.1 through
1.E.7 or obtain permission for the use of the work and the Project
Gutenberg™ trademark as set forth in paragraphs 1.E.8 or 1.E.9.

1.E.3. If an individual Project Gutenberg™ electronic work is posted


with the permission of the copyright holder, your use and distribution
must comply with both paragraphs 1.E.1 through 1.E.7 and any
additional terms imposed by the copyright holder. Additional terms
will be linked to the Project Gutenberg™ License for all works posted
with the permission of the copyright holder found at the beginning
of this work.

1.E.4. Do not unlink or detach or remove the full Project


Gutenberg™ License terms from this work, or any files containing a
part of this work or any other work associated with Project
Gutenberg™.

1.E.5. Do not copy, display, perform, distribute or redistribute this


electronic work, or any part of this electronic work, without
prominently displaying the sentence set forth in paragraph 1.E.1
with active links or immediate access to the full terms of the Project
Gutenberg™ License.

1.E.6. You may convert to and distribute this work in any binary,
compressed, marked up, nonproprietary or proprietary form,
including any word processing or hypertext form. However, if you
provide access to or distribute copies of a Project Gutenberg™ work
in a format other than “Plain Vanilla ASCII” or other format used in
the official version posted on the official Project Gutenberg™ website
(www.gutenberg.org), you must, at no additional cost, fee or
expense to the user, provide a copy, a means of exporting a copy, or
a means of obtaining a copy upon request, of the work in its original
“Plain Vanilla ASCII” or other form. Any alternate format must
include the full Project Gutenberg™ License as specified in
paragraph 1.E.1.

1.E.7. Do not charge a fee for access to, viewing, displaying,


performing, copying or distributing any Project Gutenberg™ works
unless you comply with paragraph 1.E.8 or 1.E.9.

1.E.8. You may charge a reasonable fee for copies of or providing


access to or distributing Project Gutenberg™ electronic works
provided that:

• You pay a royalty fee of 20% of the gross profits you derive
from the use of Project Gutenberg™ works calculated using the
method you already use to calculate your applicable taxes. The
fee is owed to the owner of the Project Gutenberg™ trademark,
but he has agreed to donate royalties under this paragraph to
the Project Gutenberg Literary Archive Foundation. Royalty
payments must be paid within 60 days following each date on
which you prepare (or are legally required to prepare) your
periodic tax returns. Royalty payments should be clearly marked
as such and sent to the Project Gutenberg Literary Archive
Foundation at the address specified in Section 4, “Information
about donations to the Project Gutenberg Literary Archive
Foundation.”

• You provide a full refund of any money paid by a user who


notifies you in writing (or by e-mail) within 30 days of receipt
that s/he does not agree to the terms of the full Project
Gutenberg™ License. You must require such a user to return or
destroy all copies of the works possessed in a physical medium
and discontinue all use of and all access to other copies of
Project Gutenberg™ works.

• You provide, in accordance with paragraph 1.F.3, a full refund of


any money paid for a work or a replacement copy, if a defect in
the electronic work is discovered and reported to you within 90
days of receipt of the work.

• You comply with all other terms of this agreement for free
distribution of Project Gutenberg™ works.

1.E.9. If you wish to charge a fee or distribute a Project Gutenberg™


electronic work or group of works on different terms than are set
forth in this agreement, you must obtain permission in writing from
the Project Gutenberg Literary Archive Foundation, the manager of
the Project Gutenberg™ trademark. Contact the Foundation as set
forth in Section 3 below.

1.F.

1.F.1. Project Gutenberg volunteers and employees expend


considerable effort to identify, do copyright research on, transcribe
and proofread works not protected by U.S. copyright law in creating
the Project Gutenberg™ collection. Despite these efforts, Project
Gutenberg™ electronic works, and the medium on which they may
be stored, may contain “Defects,” such as, but not limited to,
incomplete, inaccurate or corrupt data, transcription errors, a
copyright or other intellectual property infringement, a defective or
damaged disk or other medium, a computer virus, or computer
codes that damage or cannot be read by your equipment.

1.F.2. LIMITED WARRANTY, DISCLAIMER OF DAMAGES - Except for


the “Right of Replacement or Refund” described in paragraph 1.F.3,
the Project Gutenberg Literary Archive Foundation, the owner of the
Project Gutenberg™ trademark, and any other party distributing a
Project Gutenberg™ electronic work under this agreement, disclaim
all liability to you for damages, costs and expenses, including legal
fees. YOU AGREE THAT YOU HAVE NO REMEDIES FOR
NEGLIGENCE, STRICT LIABILITY, BREACH OF WARRANTY OR
BREACH OF CONTRACT EXCEPT THOSE PROVIDED IN PARAGRAPH
1.F.3. YOU AGREE THAT THE FOUNDATION, THE TRADEMARK
OWNER, AND ANY DISTRIBUTOR UNDER THIS AGREEMENT WILL
NOT BE LIABLE TO YOU FOR ACTUAL, DIRECT, INDIRECT,
CONSEQUENTIAL, PUNITIVE OR INCIDENTAL DAMAGES EVEN IF
YOU GIVE NOTICE OF THE POSSIBILITY OF SUCH DAMAGE.

1.F.3. LIMITED RIGHT OF REPLACEMENT OR REFUND - If you


discover a defect in this electronic work within 90 days of receiving
it, you can receive a refund of the money (if any) you paid for it by
sending a written explanation to the person you received the work
from. If you received the work on a physical medium, you must
return the medium with your written explanation. The person or
entity that provided you with the defective work may elect to provide
a replacement copy in lieu of a refund. If you received the work
electronically, the person or entity providing it to you may choose to
give you a second opportunity to receive the work electronically in
lieu of a refund. If the second copy is also defective, you may
demand a refund in writing without further opportunities to fix the
problem.

1.F.4. Except for the limited right of replacement or refund set forth
in paragraph 1.F.3, this work is provided to you ‘AS-IS’, WITH NO
OTHER WARRANTIES OF ANY KIND, EXPRESS OR IMPLIED,
INCLUDING BUT NOT LIMITED TO WARRANTIES OF
MERCHANTABILITY OR FITNESS FOR ANY PURPOSE.

1.F.5. Some states do not allow disclaimers of certain implied


warranties or the exclusion or limitation of certain types of damages.
If any disclaimer or limitation set forth in this agreement violates the
law of the state applicable to this agreement, the agreement shall be
interpreted to make the maximum disclaimer or limitation permitted
by the applicable state law. The invalidity or unenforceability of any
provision of this agreement shall not void the remaining provisions.

1.F.6. INDEMNITY - You agree to indemnify and hold the Foundation,


the trademark owner, any agent or employee of the Foundation,
anyone providing copies of Project Gutenberg™ electronic works in
accordance with this agreement, and any volunteers associated with
the production, promotion and distribution of Project Gutenberg™
electronic works, harmless from all liability, costs and expenses,
including legal fees, that arise directly or indirectly from any of the
following which you do or cause to occur: (a) distribution of this or
any Project Gutenberg™ work, (b) alteration, modification, or
additions or deletions to any Project Gutenberg™ work, and (c) any
Defect you cause.

Section 2. Information about the Mission


of Project Gutenberg™
Project Gutenberg™ is synonymous with the free distribution of
electronic works in formats readable by the widest variety of
computers including obsolete, old, middle-aged and new computers.
It exists because of the efforts of hundreds of volunteers and
donations from people in all walks of life.

Volunteers and financial support to provide volunteers with the


assistance they need are critical to reaching Project Gutenberg™’s
goals and ensuring that the Project Gutenberg™ collection will
remain freely available for generations to come. In 2001, the Project
Gutenberg Literary Archive Foundation was created to provide a
secure and permanent future for Project Gutenberg™ and future
generations. To learn more about the Project Gutenberg Literary
Archive Foundation and how your efforts and donations can help,
see Sections 3 and 4 and the Foundation information page at
www.gutenberg.org.

Section 3. Information about the Project


Gutenberg Literary Archive Foundation
The Project Gutenberg Literary Archive Foundation is a non-profit
501(c)(3) educational corporation organized under the laws of the
state of Mississippi and granted tax exempt status by the Internal
Revenue Service. The Foundation’s EIN or federal tax identification
number is 64-6221541. Contributions to the Project Gutenberg
Literary Archive Foundation are tax deductible to the full extent
permitted by U.S. federal laws and your state’s laws.

The Foundation’s business office is located at 809 North 1500 West,


Salt Lake City, UT 84116, (801) 596-1887. Email contact links and up
to date contact information can be found at the Foundation’s website
and official page at www.gutenberg.org/contact

Section 4. Information about Donations to


the Project Gutenberg Literary Archive
Foundation
Project Gutenberg™ depends upon and cannot survive without
widespread public support and donations to carry out its mission of
increasing the number of public domain and licensed works that can
be freely distributed in machine-readable form accessible by the
widest array of equipment including outdated equipment. Many
small donations ($1 to $5,000) are particularly important to
maintaining tax exempt status with the IRS.

The Foundation is committed to complying with the laws regulating


charities and charitable donations in all 50 states of the United
States. Compliance requirements are not uniform and it takes a
considerable effort, much paperwork and many fees to meet and
keep up with these requirements. We do not solicit donations in
locations where we have not received written confirmation of
compliance. To SEND DONATIONS or determine the status of
compliance for any particular state visit www.gutenberg.org/donate.

While we cannot and do not solicit contributions from states where


we have not met the solicitation requirements, we know of no
prohibition against accepting unsolicited donations from donors in
such states who approach us with offers to donate.

International donations are gratefully accepted, but we cannot make


any statements concerning tax treatment of donations received from
outside the United States. U.S. laws alone swamp our small staff.

Please check the Project Gutenberg web pages for current donation
methods and addresses. Donations are accepted in a number of
other ways including checks, online payments and credit card
donations. To donate, please visit: www.gutenberg.org/donate.

Section 5. General Information About


Project Gutenberg™ electronic works
Professor Michael S. Hart was the originator of the Project
Gutenberg™ concept of a library of electronic works that could be
freely shared with anyone. For forty years, he produced and
distributed Project Gutenberg™ eBooks with only a loose network of
volunteer support.
Project Gutenberg™ eBooks are often created from several printed
editions, all of which are confirmed as not protected by copyright in
the U.S. unless a copyright notice is included. Thus, we do not
necessarily keep eBooks in compliance with any particular paper
edition.

Most people start at our website which has the main PG search
facility: www.gutenberg.org.

This website includes information about Project Gutenberg™,


including how to make donations to the Project Gutenberg Literary
Archive Foundation, how to help produce our new eBooks, and how
to subscribe to our email newsletter to hear about new eBooks.

You might also like