Exam 3: Cyberattacks and Cybersecurity

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Cyberterrorism involves the deployment of malware that secretly steals data in the computer systems of organizations, such as government agencies, military contractors, political organizations, and manufacturing firms.

(True/False)
4.8/5
(35)

Computer forensics is such a new field that there is little training or certification processes available.

(True/False)
4.9/5
(34)

Which of the following enables remote users to securely access an organization's collection of computing and storage devices and share data remotely?

(Multiple Choice)
4.9/5
(39)

Cyberterrorism is the intimidation of government or civilian population by using information technology to disable critical national infrastructure to achieve political, religious, or ideological goals.

(True/False)
4.8/5
(39)

Which of the following gets a rootkit installation started and can be easily activated by clicking on a link to a malicious Web site in an email or opening an infected PDF file?

(Multiple Choice)
4.9/5
(44)

What type of attack keeps the target so busy responding to a stream of automated requests that legitimate users cannot get in?

(Multiple Choice)
4.8/5
(34)

Computer viruses differ from worms in that viruses can propagate without human intervention, often sending copies of themselves to other computers by email.

(True/False)
4.8/5
(28)

Which of the following is a federal law that provides a definition of the term cyberterrorism and under which young people primarily involved in what they consider to be minor computer pranks have been tried as cyberterrorist?

(Multiple Choice)
4.8/5
(26)

The fundamental problem with trying to detect a rootkit is that the operating system cannot be trusted to provide which of the following?

(Multiple Choice)
4.9/5
(26)

Which term is defined as an exploit that takes place before the security community or software developer knows about the vulnerability or has been able to repair it?

(Multiple Choice)
4.9/5
(36)

The most common computer security precaution taken by businesses is the installation of which of the following?

(Multiple Choice)
4.8/5
(29)

The cost to repair the worldwide damage done by a computer worm has exceeded $1 billion on more than one occasion.

(True/False)
4.7/5
(39)

It is not unusual for a security audit to reveal that too many people have access to critical data and that many people have capabilities beyond those needed to perform their jobs.

(True/False)
4.8/5
(34)

What type of viruses have become a common and easily created form of malware that are created using applications such as Visual Basic or VBScript?

(Multiple Choice)
4.8/5
(32)

Employees and contract workers must be educated about the importance of security so that they will be motivated to understand and follow the security policies.

(True/False)
4.7/5
(29)

Many organizations outsource their network security operations to a company that monitors, manages, and maintains computer and network security for them. This type of company is known as which of the following?

(Multiple Choice)
4.7/5
(45)

A piece of programming code, usually disguised as something else, that causes a computer to behave in an unexpected and usually undesirable manner is known as which of the following?

(Multiple Choice)
4.8/5
(39)

In computing, a term for any sort of general attack on an information system that takes advantage of a particular system vulnerability is known as which of the following?

(Multiple Choice)
4.9/5
(37)

The act of fraudulently using email to try to get the recipient to reveal personal data is known as which of the following?

(Multiple Choice)
4.9/5
(49)

Which organization offers a number of security-related policy templates that can help an organization quickly develop effective security policies?

(Multiple Choice)
4.7/5
(31)
Showing 41 - 60 of 60
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)