Exam 3: Cyberattacks and Cybersecurity

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Which type of exploit is defined as the sending of fraudulent emails to an organization's employees designed to look like they came from high-level executives from within the organization?

(Multiple Choice)
4.9/5
(44)

A completed risk assessment identifies the most dangerous threats to a company and helps focus security efforts on the areas of highest payoff.

(True/False)
4.7/5
(37)

A spear phishing attack typically employs a group of zombies to keep the target so busy responding to a stream of automated requests that legitimate users cannot access the target.

(True/False)
4.9/5
(37)

An antivirus software scans for a specific sequence of bytes that indicates the presence of specific malware. This sequence of bytes is known as which of the following?

(Multiple Choice)
4.8/5
(39)

Ransomware is malware that stops you from using your computer or accessing your data until you meet certain demands, such as paying a ransom or sending photos to the attacker.

(True/False)
4.9/5
(43)

Discussing security attacks through public trials and the associated publicity has not only enormous potential costs in public relations but real monetary costs as well.

(True/False)
4.8/5
(39)

A network attack in which an intruder gains access to a network and stays there, undetected, with the intention of stealing data over a long period of time is known as which of the following?

(Multiple Choice)
4.8/5
(36)

The Fifth Amendment regulates the collection of the content of wire and electronic communications.

(True/False)
4.9/5
(33)

Rootkit is a set of programs that enables its users to gain administrator-level access to a computer without the end user's consent or knowledge.

(True/False)
4.9/5
(40)

Today's computer menace is much better organized and may be part of an organized group.

(True/False)
4.8/5
(41)

Before the IT security group can begin an eradication effort, it must:

(Multiple Choice)
4.9/5
(38)

Which of the following is a partnership between the Department of Homeland Security and the public and private sectors, established in 2003 to protect the nation's Internet infrastructure against cyberattacks?

(Multiple Choice)
4.7/5
(37)

Spammers can defeat the registration process of free email services by launching a coordinated attack that can sign up for thousands of untraceable email accounts. What is this type of attack known as?

(Multiple Choice)
5.0/5
(43)

Briefly describe ransomware and how a computer typically becomes infected with this type of malware.

(Essay)
4.9/5
(34)

A router is a hardware- or software-based network security system that is able to detect and block sophisticated attacks by filtering network traffic dependent on the packet contents.

(True/False)
4.9/5
(41)

State the purpose of an IT security audit and briefly discuss the key elements of such an audit.

(Essay)
4.7/5
(33)

Which type of attacker hacks computers or websites in an attempt to promote a political ideology?

(Multiple Choice)
4.9/5
(48)

What exploit is characterized as the abuse of email systems to send unsolicited email to large numbers of people?

(Multiple Choice)
4.9/5
(36)

Software and/or hardware that monitors system and network resources and activities, and notifies network security personnel when it identifies network traffic that attempts to circumvent the security measures of a networked computer environment is known as which of the following?

(Multiple Choice)
4.8/5
(38)

A security policy outlines exactly what needs to be done to safeguard computers and their data, but not how it must be accomplished.

(True/False)
4.9/5
(46)
Showing 21 - 40 of 60
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)