Exam 10: Computer Security and Risks

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

A logic bomb that was created to erupt on Michelangelo's birthday is an example of a

(Multiple Choice)
4.9/5
(42)

A challenge with high-tech weapons is that they reduce the amount of time people have to make life-and-death decisions.

(True/False)
4.7/5
(34)

A program that masquerades as a useful program,but is really a destructive program,is a(n)

(Multiple Choice)
4.9/5
(33)

Criminal hacking is also known as

(Multiple Choice)
4.9/5
(34)

The most common form of computer crime is theft.

(True/False)
4.9/5
(41)

________ programs search for and eliminate viruses.

(Short Answer)
4.9/5
(37)

The majority of computer crimes are committed by

(Multiple Choice)
4.9/5
(38)

In 1999,the Melissa virus was a widely publicized

(Multiple Choice)
4.8/5
(46)

What was the name of the worm that demonstrated that a system could be infected by email even if the mail wasn't opened?

(Multiple Choice)
4.7/5
(42)

Hackers who hijack legitimate Web sites and redirect users to other sites are called

(Multiple Choice)
4.9/5
(36)

Match the Act on the left to the appropriate explanation on the right. -Digital Millennium Copyright Act

(Multiple Choice)
4.8/5
(41)

An intentionally disruptive program that spreads either from program-to-program or from disk-to-disk is known as a

(Multiple Choice)
4.8/5
(32)

Networks of zombie computers are also known as ________.

(Short Answer)
4.9/5
(46)

Computer crime often goes unreported because businesses fear negative publicity.

(True/False)
5.0/5
(32)

The Code Red worm attacked

(Multiple Choice)
4.9/5
(34)

A public key is only available to the user originating a message.

(True/False)
4.9/5
(35)

The scrambling of code in an email message can be done using

(Multiple Choice)
4.8/5
(31)

PGP uses the popular RSA public key cryptosystem.

(True/False)
4.9/5
(33)

________ refers to electronic trespassing or criminal hacking.

(Short Answer)
4.7/5
(40)

Software that allows different levels of security per user is known as access-control software.

(True/False)
4.8/5
(28)
Showing 61 - 80 of 84
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)