Exam 17: Computer Crime and Digital Forensics

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Which of the following refers to an e-mail sent out intending to frighten people about a virus threat that,in fact,does not exist?

(Multiple Choice)
4.8/5
(31)

Thrill-seeker hackers break into computer systems for entertainment.

(True/False)
4.9/5
(39)

A dollar bill has a watermark image which is hidden inside the other markings on the bill.This process of hiding information is known as ____.

(Short Answer)
4.8/5
(27)

_____ is a hardware/software combination tool which is a USB flash drive that stores,launches,and runs software on any computer.

(Short Answer)
4.8/5
(31)

One of the new problems facing digital forensics experts is the problem of access to cloud computing data.

(True/False)
4.9/5
(33)

_____ denial-of-service attacks are from multiple computers that flood a server or network with so many requests for service that it slows down or crashes.

(Short Answer)
4.7/5
(27)

The process of scrambling the contents of a file so that one cannot read it without the right decryption key is known as ____.

(Multiple Choice)
4.8/5
(26)

Which of the following viruses does not replicate itself?

(Multiple Choice)
4.9/5
(34)

_____ are people who would like to be hackers,but because of very little technical expertise,they download click-and-point software that automatically does the hacking for them.

(Short Answer)
4.9/5
(39)

Which of the following was the most the most common type of computer worm during 2007 and 2008?

(Multiple Choice)
4.8/5
(41)

An interesting feature of the _____ worm was that it downloaded the latest version of itself when it entered a computer connected to the Internet and secretly recorded the normal readings and played those back while it did its other work.

(Multiple Choice)
4.8/5
(31)

Which of the following refers to politically motivated hackers who use the Internet to send a political message of some kind?

(Multiple Choice)
4.7/5
(35)

Key logger software is a program that,when installed on a computer,records every _____ and ____.

(Short Answer)
4.8/5
(40)

_____ software is a program used to snoop on people to find out what they are doing on a particular computer by recording every mouse click and keystroke.

(Multiple Choice)
4.7/5
(40)

Solid-state hard drives (SSDs)are based on _____ memory and do not function in the same way as magnetic hard drives.

(Short Answer)
4.9/5
(26)

The process of blacking out portions of a document,usually to protect confidential information,so that it cannot be recovered later is known as ____.

(Multiple Choice)
4.8/5
(42)

The _____ option helps a person rearrange data on one's hard disk and overwrite deleted files.

(Short Answer)
4.9/5
(34)

What was the main objective of the Storm botnet?

(Multiple Choice)
4.9/5
(39)

_____ are politically motivated and seek to cause harm to people or destroy critical systems or information.

(Multiple Choice)
4.7/5
(44)

A difference between the Slammer and Stuxnet worm was that the Slammer:

(Multiple Choice)
4.8/5
(34)
Showing 61 - 80 of 125
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)