Exam 3: Threat Factors Computers As Targets
Exam 1: Cyberspace, the Internet, and the World Wide Web40 Questions
Exam 2: What Is Cybersecurity40 Questions
Exam 3: Threat Factors Computers As Targets40 Questions
Exam 4: Threats to Cybersecurity by Criminals and Organized Crime40 Questions
Exam 5: Threats to Cybersecurity by Hacktivists and Nation States40 Questions
Exam 6: National Security: Cyberwarfare and Cyberespionage40 Questions
Exam 7: Cyberterrorism39 Questions
Exam 8: An Evolving Threat: the Deep Web40 Questions
Exam 9: Cybersecurity Operations40 Questions
Exam 10: Cyber Security Policies and Legal Issues40 Questions
Exam 11: What the Future Holds40 Questions
Select questions type
What are the five main reasons for the increase in threats to mobile devices? In your opinion, can anything be done to help reduce the threat to mobile devices?
(Essay)
4.7/5
(39)
Which of the following risks is not created by Trojan horses?
(Multiple Choice)
4.8/5
(37)
MMS viruses can disrupt phone service, steal information, block data, and track the users' movement.
(True/False)
4.9/5
(39)
______ is an encryption component that refers to a digital signature providing proof of authorship.
(Multiple Choice)
4.8/5
(24)
E-mail-borne viruses took place in which of the following phases of convergence?
(Multiple Choice)
4.7/5
(35)
Software, hardware, and the network are considered the main targets in information technology.
(True/False)
4.8/5
(40)
In 2001, the first malware attack that fell into phase 3 of convergence was known as ______.
(Multiple Choice)
4.8/5
(36)
A ______ malware is disguised as, or embedded within, legitimate software.
(Multiple Choice)
4.8/5
(40)
A Trojan horse is a self-replicating virus that does not alter files but resides in active memory and duplicates itself.
(True/False)
4.9/5
(26)
What are the three main targets in information technology? Provide some examples of the vulnerabilities that each of the targets face. What countermeasures are in place to prevent attacks?
(Essay)
4.8/5
(31)
In the ______ cluster, computers are the target of the cybercrimes.
(Multiple Choice)
4.8/5
(46)
Which of the following was NOT identified as a phase of convergence in the evolution of cybercrime?
(Multiple Choice)
4.7/5
(32)
According to the text, virus files typically end in ______.
(Multiple Choice)
4.8/5
(29)
Which of the following was not identified as a hardware device in the text?
(Multiple Choice)
4.9/5
(35)
Which of the following was not identified as a countermeasure for networks in text?
(Multiple Choice)
4.8/5
(31)
Cascade is an example of which of the following types of virus?
(Multiple Choice)
4.9/5
(44)
Which of the following is NOT considered one of the main targets in information technology?
(Multiple Choice)
4.9/5
(28)
In 2001, the original Code Red malware initiated a ______ attack on the White House.
(Multiple Choice)
4.9/5
(35)
Showing 21 - 40 of 40
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)