Exam 17: Computer Crime and Digital Forensics
Exam 1: The Information Age in Which You Live: Changing the Face of Business140 Questions
Exam 2: Major Business Initiatives: Gaining Competitive Advantage With It121 Questions
Exam 3: Databases and Data Warehouses: Supporting the Analytics-Driven Organization120 Questions
Exam 4: Analytics, Decision Support, and Artificial Intelligence: Brain-Power for Your Business124 Questions
Exam 5: Electronic Commerce: Strategies for the New Economy128 Questions
Exam 6: Systems Development: Phases, Tools, and Techniques138 Questions
Exam 7: Infrastructure, Cloud Computing, Metrics, and Business Continuity Planning: Building and Sustaining the Dynamic Enterprise125 Questions
Exam 8: Protecting People and Information: Threats and Safeguards126 Questions
Exam 9: Emerging Trends and Technologies: Business, People, and Technology Tomorrow120 Questions
Exam 10: Computer Hardware and Software125 Questions
Exam 11: The World Wide Web and the Internet125 Questions
Exam 12: Designing Databases and Entity-Relationship Diagramming100 Questions
Exam 13: Decision Analysis With Spreadsheet Software117 Questions
Exam 14: Network Basics125 Questions
Exam 15: Building a Web Page With Html110 Questions
Exam 16: Object-Oriented Technologies112 Questions
Exam 17: Computer Crime and Digital Forensics125 Questions
Exam 18: Building an E-Portfolio137 Questions
Exam 19: Implementing a Database With Microsoft Access129 Questions
Exam 20: Careers in Business132 Questions
Exam 21: Building Web Sites With Front-page125 Questions
Exam 22: Programming in Excel With VBA125 Questions
Select questions type
Operating systems control _____ memory,which refers to hard disk space that is used when RAM is full.
(Short Answer)
4.8/5
(32)
To get a forensic image copy of a hard disk,investigators first turn on the suspected computer before copying every fragment of information in the files.
(True/False)
4.8/5
(34)
Which of the following kind of hackers exploit or destroy the information they find,steal passwords,create viruses,and bring down computer systems just for amusement?
(Multiple Choice)
4.9/5
(45)
A rootkit is easy to detect because it runs while the operating system is starting up.
(True/False)
4.8/5
(33)
Script bunnies are hackers who have a lot of technical expertise.
(True/False)
4.8/5
(37)
_____ refers to replacing a Web site with a substitute that is neither attractive nor complimentary or converting the site to a mostly blank screen with an abusive or obscene message.
(Short Answer)
4.7/5
(34)
_____ refers to the hiding of information inside other information.
(Multiple Choice)
4.9/5
(43)
Zombies which are bot-infected computers are also known as ____.
(Multiple Choice)
4.9/5
(36)
Which of the following worms was designed to attack Iran's nuclear fuel enrichment centrifuges?
(Multiple Choice)
4.8/5
(39)
Which of the following botnets started in early 2007 and wreaked havoc with massive amounts of spam?
(Multiple Choice)
4.8/5
(31)
The SMX Atomic Research Center,which works and conducts research on nuclear reactors,recently received an anti-nuclear message on the center's Web site.A month later,the center's systems crashed with a certain kind of worm,which was planted in their systems.Which of the following kind of hackers is MOST likely to be responsible for such an action?
(Multiple Choice)
4.8/5
(32)
Richard A.Clarke,a government security expert,has defined cyber war as "actions by a nation-state to penetrate another nation's computers or networks for the purposes of causing damage or disruption."A.Clarke,government security expert,defines _____ as "actions by a nation-state to penetrate another nation's computers or networks for the purposes of causing damage or disruption."
Richard
(Short Answer)
4.8/5
(33)
In a _____ role,digital forensic experts educate people on what to do and not to do with computer resources and the reasons behind them.
(Short Answer)
5.0/5
(35)
Showing 21 - 40 of 125
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)