Exam 17: Computer Crime and Digital Forensics

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

A _____ refers to software that was written with malicious intent to cause annoyance or damage.

(Multiple Choice)
4.8/5
(37)

_____ comprise a level of the bot underground society where they assemble battalions of bot-infected computers and sell this network of bots or botnet to fraudsters.

(Short Answer)
4.8/5
(34)

Gina recently downloaded some online music on her system.Without her knowledge,a type of computer virus downloaded itself along with the music.In the next few days,the virus slowed down her system and reproduced itself onto her roommate's system and others' in the network.In such a scenario,Gina's system is most likely to be affected by a ____.

(Multiple Choice)
4.8/5
(29)

If a user's phone has GPS capabilities,one's exact location can be pinpointed in real time.

(True/False)
4.8/5
(35)

Which of the following refers to software designed to harm computers or computer security,engage in criminal activity,or compromise resources in some way?

(Multiple Choice)
4.7/5
(37)

Which of the following worms infected the monitoring system of a nuclear power plant and was introduced to the system via the corporate network using a USB stick?

(Multiple Choice)
4.8/5
(39)

_____ is the collection,authentication,preservation,and examination of electronic information,often for presentation in court.

(Multiple Choice)
4.7/5
(37)

_____ are a group of hackers,similar to the hacktivists,who are politically motivated,but whose agenda is more sinister.

(Short Answer)
4.9/5
(33)

The analysis phase of a digital forensics investigation consists of:

(Multiple Choice)
4.8/5
(29)

Which of the following is a step undertaken in the collection phase of a digital forensics investigation?

(Multiple Choice)
4.9/5
(40)

Stuxnet was the first worm to attack a nuclear plant.

(True/False)
4.7/5
(28)

_____ refers to the forging of a return address on an e-mail so that the e-mail message appears to come from someone other than the actual sender.

(Multiple Choice)
4.7/5
(36)

Which of the following is a family of worms that introduced spoofing?

(Multiple Choice)
4.7/5
(39)

Which of the following viruses hides inside software that one needs?

(Multiple Choice)
4.9/5
(26)

Which of the following is the second stage of the collection phase of a digital forensics investigation?

(Multiple Choice)
4.8/5
(32)

Registry files contain a wealth of information including preferences for users of the system,settings for the hardware,and installed programs.

(True/False)
4.9/5
(41)

Semantic analysis is also known as ____.

(Multiple Choice)
4.9/5
(45)

Which of the following is a type of malware?

(Multiple Choice)
4.8/5
(35)

The _____ worm was transported from computer to computer using a USB stick and represented a new level in the development of worms because it was a finely honed target seeker.

(Multiple Choice)
4.8/5
(25)

Ingrid,Inc. ,a software company,recently had a security lapse when a large number of files on their systems were wiped out due to a hidden virus in the office systems.The company has now decided to hire security professionals whose task will be to regularly check loopholes in computer systems and rectify them.Which of the following type of hackers would Ingrid,Inc. ,need to hire?

(Multiple Choice)
4.9/5
(34)
Showing 101 - 120 of 125
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)