Exam 3: Threat Factors Computers As Targets

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Profit, fame, and challenge are characteristics of the ______ in a traditional attack.

Free
(Multiple Choice)
4.8/5
(36)
Correct Answer:
Verified

C

According to the text, by the year 2020, the economic cost of cybercrime is expected to go above ______ trillion.

Free
(Multiple Choice)
4.7/5
(38)
Correct Answer:
Verified

C

______ viruses attach to the original code, changing the start-up information of the program.

Free
(Multiple Choice)
4.7/5
(40)
Correct Answer:
Verified

B

The technological cluster includes crimes where computers are used as a tool, such as phishing or identity theft.

(True/False)
4.9/5
(38)

Which of the following is NOT considered one of the main issues with cybersecurity?

(Multiple Choice)
4.8/5
(36)

______ are software programs or pieces of hardware that help screen out hackers, viruses, and worms that try to reach computers via the Internet.

(Multiple Choice)
4.9/5
(34)

A ______ is a small software program designed to spread from one computer to another and to interfere with computer operation.

(Multiple Choice)
4.9/5
(35)

Stealthy and evasive attack techniques that can stay undetected are characteristics of the ______ in an advanced persistent threat attack.

(Multiple Choice)
4.8/5
(33)

Cyberattacks are cheap and unconstrained by geography and distance to the target.

(True/False)
4.9/5
(34)

Which of the following was identified as a software attack in the text?

(Multiple Choice)
4.8/5
(36)

Malware fulfills two main functions: spread itself and cause damage.

(True/False)
4.9/5
(45)

______ viruses infect data files.

(Multiple Choice)
4.8/5
(40)

Identify and explain the three phases of convergence in the evolution of cybercrime.

(Essay)
4.8/5
(34)

Phase 2 of convergence was also the beginning of the era of cyberspying.

(True/False)
4.7/5
(31)

An increase in smartphones has led to a significant drop in the prices users pay and a substantial increase in the number of smartphones people own.

(True/False)
4.8/5
(37)

What is an advanced persistent attack (APT)? What are the differences between traditional attacks from APT?

(Essay)
4.9/5
(42)

In the ______ cluster, computer infrastructure and vulnerabilities are the focus of attacks.

(Multiple Choice)
4.7/5
(39)

Identify and explain the three main threat clusters identified in the text.

(Essay)
4.9/5
(39)

Which of the following has NOT contributed to the increase in threats to mobile devices?

(Multiple Choice)
4.9/5
(40)

Cybersecurity specialists in the government and private industry face great difficulties when dealing with cybercrime.

(True/False)
4.9/5
(40)
Showing 1 - 20 of 40
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)