Exam 17: Computer Crime and Digital Forensics

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

In a live analysis,the examiner makes a forensic image of the disk.

(True/False)
4.9/5
(30)

_____ space refers to the space left over at the end of a file to the end of the cluster.

(Multiple Choice)
4.7/5
(38)

A Trojan horse is a type of _____ that does not replicate itself.

(Short Answer)
4.9/5
(42)

Which law requires companies to implement extensive and detailed policies to prevent illegal activity within the company and respond in a timely manner to investigate illegal activity?

(Multiple Choice)
4.8/5
(29)

The thrill-seeker hackers used to be called _____ hackers.

(Short Answer)
4.9/5
(30)

Microsoft Office lets a person protect files in a way that when someone tries to open a file,a pop-up window asks the person for a ____.

(Short Answer)
5.0/5
(39)

Sally does most of her bank transactions online.Recently,while trying to access her bank details online,she realized that her password was no longer valid.On inquiring with the bank authorities,she found that somebody had fraudulently transacted using her login details and had transferred all her money to an unknown account.Sally was a victim of _____ where cyber criminals were tracking her every mouse click to steal her bank details.

(Multiple Choice)
4.9/5
(38)

A _____ is software that gives a person administrator rights to a computer or network and its purpose is to allow the person to conceal processes,files,or system data from the operating system.

(Short Answer)
4.9/5
(35)

Which of the following is a difference between cyber war and hacktivism?

(Multiple Choice)
4.8/5
(33)

It takes a long time for password cracking programs to find passwords.

(True/False)
4.8/5
(29)

Which of the following options can make one delete a file so that the file is not listed in the Recycle Bin?

(Multiple Choice)
4.9/5
(36)

_____ space refers to the set of clusters that have been marked as available to store information,but have not yet received a file.

(Multiple Choice)
4.8/5
(30)

White-hat hackers are known as ____.

(Multiple Choice)
4.7/5
(33)

The term "bot" is sometimes used to mean a compromised machine.

(True/False)
4.8/5
(32)

Which of the following should be undertaken when one receives a viral hoax?

(Multiple Choice)
4.8/5
(31)

The early computer viruses depended on people exchanging infected storage media like disks.

(True/False)
4.9/5
(35)

Computers are involved in two ways in the commission of crime,i.e. ,as targets and as weapons or tools.

(True/False)
4.8/5
(41)

Flash memory is divided into the traditional blocks of bytes instead of in pages of 2 KB or 4 KB.

(True/False)
4.7/5
(37)

The difference between cyber war and hacktivism is that hacktivism is better-funded.

(True/False)
4.7/5
(32)

The Stuxnet worm was transported from computer to computer using a _____ and was designed to attack Iran's nuclear fuel enrichment centrifuges.

(Short Answer)
4.8/5
(38)
Showing 41 - 60 of 125
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)