Exam 17: Computer Crime and Digital Forensics

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Operating systems control _____ memory,which refers to hard disk space that is used when RAM is full.

(Short Answer)
4.8/5
(32)

To get a forensic image copy of a hard disk,investigators first turn on the suspected computer before copying every fragment of information in the files.

(True/False)
4.8/5
(34)

Which of the following kind of hackers exploit or destroy the information they find,steal passwords,create viruses,and bring down computer systems just for amusement?

(Multiple Choice)
4.9/5
(45)

A rootkit is easy to detect because it runs while the operating system is starting up.

(True/False)
4.8/5
(33)

Which of the following is true of the Conficker worm?

(Multiple Choice)
4.8/5
(34)

Script bunnies are hackers who have a lot of technical expertise.

(True/False)
4.8/5
(37)

Which of the following is true of flash memory?

(Multiple Choice)
4.9/5
(38)

_____ refers to replacing a Web site with a substitute that is neither attractive nor complimentary or converting the site to a mostly blank screen with an abusive or obscene message.

(Short Answer)
4.7/5
(34)

_____ refers to the hiding of information inside other information.

(Multiple Choice)
4.9/5
(43)

A virus hoax is a virus that is nonexistent.

(True/False)
4.9/5
(37)

Deleting a message from the SIM card deletes it permanently.

(True/False)
4.7/5
(42)

The Trojan-horse virus is designed to quickly replicate itself.

(True/False)
4.7/5
(33)

Zombies which are bot-infected computers are also known as ____.

(Multiple Choice)
4.9/5
(36)

Which of the following worms was designed to attack Iran's nuclear fuel enrichment centrifuges?

(Multiple Choice)
4.8/5
(39)

Which of the following botnets started in early 2007 and wreaked havoc with massive amounts of spam?

(Multiple Choice)
4.8/5
(31)

Which of the following was a feature of the Storm botnet?

(Multiple Choice)
4.8/5
(34)

The SMX Atomic Research Center,which works and conducts research on nuclear reactors,recently received an anti-nuclear message on the center's Web site.A month later,the center's systems crashed with a certain kind of worm,which was planted in their systems.Which of the following kind of hackers is MOST likely to be responsible for such an action?

(Multiple Choice)
4.8/5
(32)

Richard A.Clarke,a government security expert,has defined cyber war as "actions by a nation-state to penetrate another nation's computers or networks for the purposes of causing damage or disruption."A.Clarke,government security expert,defines _____ as "actions by a nation-state to penetrate another nation's computers or networks for the purposes of causing damage or disruption." Richard

(Short Answer)
4.8/5
(33)

A worm is a bot-infected computer.

(True/False)
4.8/5
(46)

In a _____ role,digital forensic experts educate people on what to do and not to do with computer resources and the reasons behind them.

(Short Answer)
5.0/5
(35)
Showing 21 - 40 of 125
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)