Exam 3: Cyberattacks and Cybersecurity
Exam 1: An Overview of Ethics60 Questions
Exam 2: Ethics for IT Workers and IT Users60 Questions
Exam 3: Cyberattacks and Cybersecurity60 Questions
Exam 4: Privacy60 Questions
Exam 5: Freedom of Expression60 Questions
Exam 6: Intellectual Property60 Questions
Exam 7: Ethical Decisions in Software Development60 Questions
Exam 8: The Impact of Information Technology on Society60 Questions
Exam 9: Social Media60 Questions
Exam 10: Ethics of IT Organizations60 Questions
Select questions type
Even when preventive measures are implemented, no organization is completely secure from a determined computer attack.
Free
(True/False)
4.9/5
(30)
Correct Answer:
True
After virus eradication, you can use a previous backup to restore an infected computer.
Free
(True/False)
4.8/5
(41)
Correct Answer:
False
Vishing frequently leads consumers to counterfeit Web sites designed to trick them into initiating a denial-of-service attack.
Free
(True/False)
4.9/5
(44)
Correct Answer:
False
Often a successful attack on an information system is due to poor system design or implementation. Once such a vulnerability is discovered, software developers quickly create and issue which of the following, in order to eliminate the problem?
(Multiple Choice)
4.8/5
(44)
The intimidation of government or civilian population by using information technology to disable critical national infrastructure in order to achieve political, religious, or ideological goals is known as which of the following?
(Multiple Choice)
4.9/5
(36)
Define computer forensics and briefly describe how one may prepare for a role as a computer forensics investigator.
(Essay)
4.8/5
(37)
Malware that stops you from using your computer or accessing your data until you meet certain demands is known as which of the following?
(Multiple Choice)
4.9/5
(34)
A type of computer crime perpetrator whose primary motive is to achieve financial gain is known as which of the following?
(Multiple Choice)
4.9/5
(38)
Briefly explain why many organizations are choosing to outsource their network security operations to a managed security service provider (MSSP).
(Essay)
4.9/5
(43)
A business policy that permits employees to use their own mobile devices to access company computing resources and applications is known as which of the following?
(Multiple Choice)
5.0/5
(39)
Which of the following is a form of Trojan horse which executes when it is triggered by a specific event such as a change in a particular file, by typing a specific series of keystrokes, or by a specific time or date?
(Multiple Choice)
4.8/5
(42)
Many organizations use software to provide a comprehensive display of all key performance indicators related to an organization's security defenses, including threats, exposures, policy compliance, and incident alerts. What is this type of software known as?
(Multiple Choice)
4.7/5
(41)
The Controlling the Assault of Non-Solicited Pornography and Marketing (CAN-SPAM) Act states that it is legal to spam, provided the messages meet a few basic requirements.
(True/False)
4.9/5
(46)
Installation of a corporate firewall is the least common security precaution taken by businesses as it does not provide sufficient security.
(True/False)
5.0/5
(40)
Trojan horse has become an umbrella term for many types of malicious code.
(True/False)
4.8/5
(37)
The cost of creating an email campaign for a product or a service is typically more expensive and takes longer to conduct than a direct-mail campaign.
(True/False)
4.9/5
(45)
Bring your own device (BYOD) is a business policy that permits, and in some cases encourages, employees to use their own mobile devices (smartphones, tablets, or laptops) to access company computing resources and applications.
(True/False)
4.8/5
(39)
Which of the following concepts recognizes that managers must use their judgment to ensure that the cost of control does not exceed the system's benefits or the risks involved?
(Multiple Choice)
4.7/5
(42)
Whenever possible, automated system rules should mirror an organization's written policies.
(True/False)
4.8/5
(39)
Identify and briefly discuss five reasons why the number, variety, and impact of security incidents is increasing.
(Essay)
4.8/5
(43)
Showing 1 - 20 of 60
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)