Exam 3: Cyberattacks and Cybersecurity
Exam 1: An Overview of Ethics60 Questions
Exam 2: Ethics for IT Workers and IT Users60 Questions
Exam 3: Cyberattacks and Cybersecurity60 Questions
Exam 4: Privacy60 Questions
Exam 5: Freedom of Expression60 Questions
Exam 6: Intellectual Property60 Questions
Exam 7: Ethical Decisions in Software Development60 Questions
Exam 8: The Impact of Information Technology on Society60 Questions
Exam 9: Social Media60 Questions
Exam 10: Ethics of IT Organizations60 Questions
Select questions type
Which type of exploit is defined as the sending of fraudulent emails to an organization's employees designed to look like they came from high-level executives from within the organization?
(Multiple Choice)
4.9/5
(44)
A completed risk assessment identifies the most dangerous threats to a company and helps focus security efforts on the areas of highest payoff.
(True/False)
4.7/5
(37)
A spear phishing attack typically employs a group of zombies to keep the target so busy responding to a stream of automated requests that legitimate users cannot access the target.
(True/False)
4.9/5
(37)
An antivirus software scans for a specific sequence of bytes that indicates the presence of specific malware. This sequence of bytes is known as which of the following?
(Multiple Choice)
4.8/5
(39)
Ransomware is malware that stops you from using your computer or accessing your data until you meet certain demands, such as paying a ransom or sending photos to the attacker.
(True/False)
4.9/5
(43)
Discussing security attacks through public trials and the associated publicity has not only enormous potential costs in public relations but real monetary costs as well.
(True/False)
4.8/5
(39)
A network attack in which an intruder gains access to a network and stays there, undetected, with the intention of stealing data over a long period of time is known as which of the following?
(Multiple Choice)
4.8/5
(36)
The Fifth Amendment regulates the collection of the content of wire and electronic communications.
(True/False)
4.9/5
(33)
Rootkit is a set of programs that enables its users to gain administrator-level access to a computer without the end user's consent or knowledge.
(True/False)
4.9/5
(40)
Today's computer menace is much better organized and may be part of an organized group.
(True/False)
4.8/5
(41)
Before the IT security group can begin an eradication effort, it must:
(Multiple Choice)
4.9/5
(38)
Which of the following is a partnership between the Department of Homeland Security and the public and private sectors, established in 2003 to protect the nation's Internet infrastructure against cyberattacks?
(Multiple Choice)
4.7/5
(37)
Spammers can defeat the registration process of free email services by launching a coordinated attack that can sign up for thousands of untraceable email accounts. What is this type of attack known as?
(Multiple Choice)
5.0/5
(43)
Briefly describe ransomware and how a computer typically becomes infected with this type of malware.
(Essay)
4.9/5
(34)
A router is a hardware- or software-based network security system that is able to detect and block sophisticated attacks by filtering network traffic dependent on the packet contents.
(True/False)
4.9/5
(41)
State the purpose of an IT security audit and briefly discuss the key elements of such an audit.
(Essay)
4.7/5
(33)
Which type of attacker hacks computers or websites in an attempt to promote a political ideology?
(Multiple Choice)
4.9/5
(48)
What exploit is characterized as the abuse of email systems to send unsolicited email to large numbers of people?
(Multiple Choice)
4.9/5
(36)
Software and/or hardware that monitors system and network resources and activities, and notifies network security personnel when it identifies network traffic that attempts to circumvent the security measures of a networked computer environment is known as which of the following?
(Multiple Choice)
4.8/5
(38)
A security policy outlines exactly what needs to be done to safeguard computers and their data, but not how it must be accomplished.
(True/False)
4.9/5
(46)
Showing 21 - 40 of 60
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)