Exam 10: Investigative Security

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Computer hacking is the willful and malicious penetration of a computer system to achieve some purpose.

Free
(True/False)
4.9/5
(29)
Correct Answer:
Verified

True

The target of identity thieves is an often a consumer with poor credit because they will not notice a problem with their credit history.

Free
(True/False)
4.9/5
(35)
Correct Answer:
Verified

False

Any illegal behavior directed by means of electronic operations that targets the security of computer systems and the data processed by them is generally referred to as:

Free
(Multiple Choice)
5.0/5
(39)
Correct Answer:
Verified

A

Worms copy themselves across systems and networks without attaching to a host program and use the Internet to spread themselves.

(True/False)
4.8/5
(35)

Using algorithms to scramble the information on a computer so that the information is not usable unless the changes are reversed, is referred to as:

(Multiple Choice)
4.8/5
(32)

The most useful information is who __________ for various aspects of the spam operation.

(Essay)
4.8/5
(41)

What allows an internet user an opportunity to contact virtually anyone with internet access with little fear of being identified or arrested?

(Multiple Choice)
4.7/5
(27)

Discuss the concepts of CERT and CIRT teams.Why are these teams important to computer security?

(Essay)
4.8/5
(31)

_______________ use unique physical characteristics to identify an individual and give them access to a secure area.

(Essay)
4.9/5
(40)

This virus, like the earlier 1999 Melissa virus, was activated when a user clicked on an e-mail attachment, and it was propagated automatically to all the e-mail addresses found on the user's computer.

(Multiple Choice)
4.9/5
(25)

In 2000, the FBI teamed with the U.S.Department of Justice and the National White Collar Center to establish the:

(Multiple Choice)
4.8/5
(35)

One of the best methods to stop a virus by a file that arrives from the Internet is to:

(Multiple Choice)
4.8/5
(36)

This interesting and very subliminal type of virus includes virus hoaxes and other types of chain letters, erroneous security alerts.It can be used to sway, influence or deter your actions.Even the military is researching its potential.

(Multiple Choice)
4.8/5
(39)

Digital information electronically delivered from one computer system to another, known as "soft goods," has eliminated the temporal and geographic limitations of:

(Multiple Choice)
4.8/5
(45)

The IC3 2004 Internet Fraud Crime Report indicated that _____________ is by far the most reported computer offense.

(Multiple Choice)
4.8/5
(36)

What law made identity theft a federal crime and enabled law enforcement agencies to investigate identity theft crimes?

(Multiple Choice)
4.7/5
(27)

One major new problem for security personnel and public policing is the use of the computer for cyberstalking.

(True/False)
4.9/5
(33)

Which of the following is not a security tip given to protect computer users from becoming victims of crime?

(Multiple Choice)
4.8/5
(41)

_______________ are the basic building blocks of restricting network traffic and providing audit trails.

(Essay)
4.8/5
(33)

The unlawful misappropriation of money or other things of value by the person to whom it was entrusted (typically an employee) for his or her own use or purpose is called:

(Multiple Choice)
4.9/5
(26)
Showing 1 - 20 of 49
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)