Exam 3: Cyberattacks and Cybersecurity
Exam 1: An Overview of Ethics60 Questions
Exam 2: Ethics for IT Workers and IT Users60 Questions
Exam 3: Cyberattacks and Cybersecurity60 Questions
Exam 4: Privacy60 Questions
Exam 5: Freedom of Expression60 Questions
Exam 6: Intellectual Property60 Questions
Exam 7: Ethical Decisions in Software Development60 Questions
Exam 8: The Impact of Information Technology on Society60 Questions
Exam 9: Social Media60 Questions
Exam 10: Ethics of IT Organizations60 Questions
Select questions type
Cyberterrorism involves the deployment of malware that secretly steals data in the computer systems of organizations, such as government agencies, military contractors, political organizations, and manufacturing firms.
(True/False)
4.8/5
(35)
Computer forensics is such a new field that there is little training or certification processes available.
(True/False)
4.9/5
(34)
Which of the following enables remote users to securely access an organization's collection of computing and storage devices and share data remotely?
(Multiple Choice)
4.9/5
(39)
Cyberterrorism is the intimidation of government or civilian population by using information technology to disable critical national infrastructure to achieve political, religious, or ideological goals.
(True/False)
4.8/5
(39)
Which of the following gets a rootkit installation started and can be easily activated by clicking on a link to a malicious Web site in an email or opening an infected PDF file?
(Multiple Choice)
4.9/5
(44)
What type of attack keeps the target so busy responding to a stream of automated requests that legitimate users cannot get in?
(Multiple Choice)
4.8/5
(34)
Computer viruses differ from worms in that viruses can propagate without human intervention, often sending copies of themselves to other computers by email.
(True/False)
4.8/5
(28)
Which of the following is a federal law that provides a definition of the term cyberterrorism and under which young people primarily involved in what they consider to be minor computer pranks have been tried as cyberterrorist?
(Multiple Choice)
4.8/5
(26)
The fundamental problem with trying to detect a rootkit is that the operating system cannot be trusted to provide which of the following?
(Multiple Choice)
4.9/5
(26)
Which term is defined as an exploit that takes place before the security community or software developer knows about the vulnerability or has been able to repair it?
(Multiple Choice)
4.9/5
(36)
The most common computer security precaution taken by businesses is the installation of which of the following?
(Multiple Choice)
4.8/5
(29)
The cost to repair the worldwide damage done by a computer worm has exceeded $1 billion on more than one occasion.
(True/False)
4.7/5
(39)
It is not unusual for a security audit to reveal that too many people have access to critical data and that many people have capabilities beyond those needed to perform their jobs.
(True/False)
4.8/5
(34)
What type of viruses have become a common and easily created form of malware that are created using applications such as Visual Basic or VBScript?
(Multiple Choice)
4.8/5
(32)
Employees and contract workers must be educated about the importance of security so that they will be motivated to understand and follow the security policies.
(True/False)
4.7/5
(29)
Many organizations outsource their network security operations to a company that monitors, manages, and maintains computer and network security for them. This type of company is known as which of the following?
(Multiple Choice)
4.7/5
(45)
A piece of programming code, usually disguised as something else, that causes a computer to behave in an unexpected and usually undesirable manner is known as which of the following?
(Multiple Choice)
4.8/5
(39)
In computing, a term for any sort of general attack on an information system that takes advantage of a particular system vulnerability is known as which of the following?
(Multiple Choice)
4.9/5
(37)
The act of fraudulently using email to try to get the recipient to reveal personal data is known as which of the following?
(Multiple Choice)
4.9/5
(49)
Which organization offers a number of security-related policy templates that can help an organization quickly develop effective security policies?
(Multiple Choice)
4.7/5
(31)
Showing 41 - 60 of 60
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)