Exam 3: Threat Factors Computers As Targets

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

What are the five main reasons for the increase in threats to mobile devices? In your opinion, can anything be done to help reduce the threat to mobile devices?

(Essay)
4.7/5
(39)

Which of the following risks is not created by Trojan horses?

(Multiple Choice)
4.8/5
(37)

MMS viruses can disrupt phone service, steal information, block data, and track the users' movement.

(True/False)
4.9/5
(39)

______ is an encryption component that refers to a digital signature providing proof of authorship.

(Multiple Choice)
4.8/5
(24)

E-mail-borne viruses took place in which of the following phases of convergence?

(Multiple Choice)
4.7/5
(35)

Software, hardware, and the network are considered the main targets in information technology.

(True/False)
4.8/5
(40)

In 2001, the first malware attack that fell into phase 3 of convergence was known as ______.

(Multiple Choice)
4.8/5
(36)

The first Macintosh virus was known as Deer Cloner.

(True/False)
4.8/5
(43)

A ______ malware is disguised as, or embedded within, legitimate software.

(Multiple Choice)
4.8/5
(40)

A Trojan horse is a self-replicating virus that does not alter files but resides in active memory and duplicates itself.

(True/False)
4.9/5
(26)

What are the three main targets in information technology? Provide some examples of the vulnerabilities that each of the targets face. What countermeasures are in place to prevent attacks?

(Essay)
4.8/5
(31)

In the ______ cluster, computers are the target of the cybercrimes.

(Multiple Choice)
4.8/5
(46)

Which of the following was NOT identified as a phase of convergence in the evolution of cybercrime?

(Multiple Choice)
4.7/5
(32)

According to the text, virus files typically end in ______.

(Multiple Choice)
4.8/5
(29)

Multimedia message services viruses target ______.

(Multiple Choice)
4.9/5
(41)

Which of the following was not identified as a hardware device in the text?

(Multiple Choice)
4.9/5
(35)

Which of the following was not identified as a countermeasure for networks in text?

(Multiple Choice)
4.8/5
(31)

Cascade is an example of which of the following types of virus?

(Multiple Choice)
4.9/5
(44)

Which of the following is NOT considered one of the main targets in information technology?

(Multiple Choice)
4.9/5
(28)

In 2001, the original Code Red malware initiated a ______ attack on the White House.

(Multiple Choice)
4.9/5
(35)
Showing 21 - 40 of 40
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)