Exam 10: Tracking Down Those Who Intend to Do Harm on a Large Scale

arrow
  • Select Tags
search iconSearch Question
  • Select Tags

Detecting and investigating criminal hacker cases require investigators to

Free
(Multiple Choice)
4.8/5
(34)
Correct Answer:
Verified

B

Match the virus with its estimated cost damages. -Code Red

Free
(Multiple Choice)
4.9/5
(39)
Correct Answer:
Verified

C

Some military experts suggest that our future defense will rely more on __________ officers than on tanks and artillery.

Free
(Short Answer)
4.7/5
(31)
Correct Answer:
Verified

intelligence

Which of the following is NOT considered a cyberplanning tool for coordinating and carrying out an agenda?

(Multiple Choice)
4.9/5
(40)

In 2005,authorities described an assault as the heaviest ever perpetrated on another nations computer systems from overseas.What country was being attacked?

(Multiple Choice)
4.8/5
(35)

Place the following steps of a botnet attack into correct order. -Second

(Multiple Choice)
5.0/5
(33)

Another way to track criminals is in IRC ________.

(Short Answer)
4.8/5
(45)

One of the original motives of many hackers was

(Multiple Choice)
4.9/5
(40)

From May through June of 2002,the al Qaeda Web site appeared at a Web location in

(Multiple Choice)
4.8/5
(36)

Which of the following is NOT considered a tactic used by hackers to hijack a computer?

(Multiple Choice)
4.8/5
(33)

________ control these computer networks that often are the source of DoS attacks.

(Short Answer)
4.8/5
(34)

Christopher Maxwell began the process of building his network by signing on as an affiliate with several ________ companies who paid him to install their programs on computers.

(Short Answer)
4.9/5
(41)

How many computers was the bot-herder 0x80 said to control?

(Multiple Choice)
4.8/5
(38)

Which of the following was NOT e-evidence used to track the creator of the Melissa virus?

(Multiple Choice)
4.8/5
(38)

Place the following steps of a botnet attack into correct order. -Fourth

(Multiple Choice)
4.8/5
(36)

Adversaries unable to counter the U.S.military on the battlefield instead exploit military ________.

(Short Answer)
4.7/5
(35)

Investigations into hackers can be difficult because even with a full audit trail showing that a user came from a particular account on a particular ISP,

(Multiple Choice)
4.8/5
(38)

Place the following steps of a botnet attack into correct order. -First

(Multiple Choice)
4.9/5
(38)

Match the Web site with the alleged uses. -assam.com

(Multiple Choice)
4.8/5
(37)

Place the following steps of a botnet attack into correct order. -Third

(Multiple Choice)
4.9/5
(36)
Showing 1 - 20 of 40
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)