Exam 3: Threat Factors Computers As Targets
Exam 1: Cyberspace, the Internet, and the World Wide Web40 Questions
Exam 2: What Is Cybersecurity40 Questions
Exam 3: Threat Factors Computers As Targets40 Questions
Exam 4: Threats to Cybersecurity by Criminals and Organized Crime40 Questions
Exam 5: Threats to Cybersecurity by Hacktivists and Nation States40 Questions
Exam 6: National Security: Cyberwarfare and Cyberespionage40 Questions
Exam 7: Cyberterrorism39 Questions
Exam 8: An Evolving Threat: the Deep Web40 Questions
Exam 9: Cybersecurity Operations40 Questions
Exam 10: Cyber Security Policies and Legal Issues40 Questions
Exam 11: What the Future Holds40 Questions
Select questions type
Profit, fame, and challenge are characteristics of the ______ in a traditional attack.
Free
(Multiple Choice)
4.8/5
(36)
Correct Answer:
C
According to the text, by the year 2020, the economic cost of cybercrime is expected to go above ______ trillion.
Free
(Multiple Choice)
4.7/5
(38)
Correct Answer:
C
______ viruses attach to the original code, changing the start-up information of the program.
Free
(Multiple Choice)
4.7/5
(40)
Correct Answer:
B
The technological cluster includes crimes where computers are used as a tool, such as phishing or identity theft.
(True/False)
4.9/5
(38)
Which of the following is NOT considered one of the main issues with cybersecurity?
(Multiple Choice)
4.8/5
(36)
______ are software programs or pieces of hardware that help screen out hackers, viruses, and worms that try to reach computers via the Internet.
(Multiple Choice)
4.9/5
(34)
A ______ is a small software program designed to spread from one computer to another and to interfere with computer operation.
(Multiple Choice)
4.9/5
(35)
Stealthy and evasive attack techniques that can stay undetected are characteristics of the ______ in an advanced persistent threat attack.
(Multiple Choice)
4.8/5
(33)
Cyberattacks are cheap and unconstrained by geography and distance to the target.
(True/False)
4.9/5
(34)
Which of the following was identified as a software attack in the text?
(Multiple Choice)
4.8/5
(36)
Malware fulfills two main functions: spread itself and cause damage.
(True/False)
4.9/5
(45)
Identify and explain the three phases of convergence in the evolution of cybercrime.
(Essay)
4.8/5
(34)
Phase 2 of convergence was also the beginning of the era of cyberspying.
(True/False)
4.7/5
(31)
An increase in smartphones has led to a significant drop in the prices users pay and a substantial increase in the number of smartphones people own.
(True/False)
4.8/5
(37)
What is an advanced persistent attack (APT)? What are the differences between traditional attacks from APT?
(Essay)
4.9/5
(42)
In the ______ cluster, computer infrastructure and vulnerabilities are the focus of attacks.
(Multiple Choice)
4.7/5
(39)
Identify and explain the three main threat clusters identified in the text.
(Essay)
4.9/5
(39)
Which of the following has NOT contributed to the increase in threats to mobile devices?
(Multiple Choice)
4.9/5
(40)
Cybersecurity specialists in the government and private industry face great difficulties when dealing with cybercrime.
(True/False)
4.9/5
(40)
Showing 1 - 20 of 40
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)