Exam 10: Tracking Down Those Who Intend to Do Harm on a Large Scale

arrow
  • Select Tags
search iconSearch Question
  • Select Tags

Match the Web site with the alleged uses. -Thj.7hj.com

(Multiple Choice)
4.9/5
(44)

________ logs help track down criminals because they hold evidence that a crime has been committed and where the intrusion occurred.

(Short Answer)
4.8/5
(39)

________ refers to the digital coordination of an integrated plan stretching across geographical boundaries that may or may not result in bloodshed.

(Short Answer)
5.0/5
(34)

What is considered to be the first step in cyber investigations?

(Multiple Choice)
4.9/5
(35)

Cybercriminals are using hijacked computers to perform which of the following feats?

(Multiple Choice)
4.8/5
(44)

Match the Web site with the alleged uses. -mwhoob.net

(Multiple Choice)
4.8/5
(39)

What is one way to track criminals who use IRC?

(Multiple Choice)
4.9/5
(29)

Match the virus with its estimated cost damages. -Nachi and friends

(Multiple Choice)
5.0/5
(28)

What bank was found to be hosting an attack unknowingly against another?

(Multiple Choice)
4.9/5
(36)

Match the Web site with the alleged uses. -alneda.com

(Multiple Choice)
4.7/5
(30)

Studying examples of attacks and malicious applications will NOT help forensics investigators

(Multiple Choice)
4.9/5
(48)

________ are large groupings of hacked,remote-controlled computers used to distribute and install software.

(Short Answer)
4.7/5
(41)

Based on verified e-evidence,it was concluded that Aaron Caffrey

(Multiple Choice)
4.8/5
(39)

David Smith and VicodinES both signed off using the word ________.

(Short Answer)
4.8/5
(38)

A(n)________ program reads from one port and writes to another.

(Short Answer)
4.8/5
(31)

Anonymity,control resources,and many other features make the ________ the criminals' conduit for coordinating and carrying out an agenda.

(Short Answer)
4.9/5
(43)

Instrumental in tracing the Melissa virus's origins were unique hardware numbers,known as ________,that were stored in Office 97 document files.

(Short Answer)
4.9/5
(45)
Match the virus with its estimated cost damages.
Premises:
Sircam
Responses:
$635 \$ 635 million
$1.15 \$ 1.15 billion
$2.62 \$ 2.62 billion
Correct Answer:
Verified
Premises:
Responses:
Sircam
$635 \$ 635 million
(Matching)
4.8/5
(38)

________ kits were used by identity thieves to convince Chase Bank customers to supply financial information.

(Short Answer)
4.7/5
(38)

Match the virus with its estimated cost damages. -Nimda

(Multiple Choice)
4.8/5
(44)
Showing 21 - 40 of 40
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)