Exam 7: Information Technology Crime

arrow
  • Select Tags
search iconSearch Question
  • Select Tags

IT crime costs the global economy an estimated $388 million in 2012.

Free
(True/False)
4.9/5
(34)
Correct Answer:
Verified

False

Due to the tradition of high skill in mathematics, physics, and computing, many IT attacks originate from what area of the world?

Free
(Multiple Choice)
4.8/5
(36)
Correct Answer:
Verified

C

Mobile device attacks are typically imported through applications.

Free
(True/False)
4.9/5
(34)
Correct Answer:
Verified

True

Trespassing on information networks without doing any damage or leaving any trace of the visit is the least serious IT crime.

(True/False)
4.9/5
(36)

Which activities are considered IT crime?

(Multiple Choice)
4.7/5
(40)

What was decided upon in the Budapest Convention?

(Essay)
4.8/5
(27)

Black-hat hackers seek to make systems unusable or to steal data or other resources.

(True/False)
4.8/5
(31)

In this attack a perpetrator attempts to prevent users from accessing a server's information or services such as e-mails.

(Multiple Choice)
4.9/5
(34)

Black-hat hackers may be contracted or employed to test security on a system.

(True/False)
4.8/5
(37)

These hackers break into computer networks not necessarily to do damage, but to seek out exploits.

(Multiple Choice)
4.8/5
(35)

What factor affects the availability of security products written for that market?

(Multiple Choice)
4.8/5
(30)

This is much like a virus in that it replicates itself but does not require a host file or human action.

(Multiple Choice)
4.8/5
(42)

This is an attempt to acquire personal information such as usernames and passwords.

(Multiple Choice)
4.8/5
(38)

IT crime are criminal offenses that are committed with devices that communicate information to one another via networks.

(True/False)
5.0/5
(37)

What is the definition of the following word: -Denial-of-service attack.

(Short Answer)
4.8/5
(31)

If a security technology company cannot make a profit in a developing market, then it will not produce software for that market.

(True/False)
4.7/5
(38)

What is the definition of the following word: -Trojan

(Short Answer)
4.8/5
(28)

Which of the following resources do developing countries lack to build against IT crime?

(Multiple Choice)
4.8/5
(25)

Perpetrators with these motives target information that may be used or sold in order to enrich themselves.

(Multiple Choice)
4.9/5
(31)

How can a Trojan be disguised?

(Essay)
4.7/5
(35)
Showing 1 - 20 of 49
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)