Exam 17: Computer Crime and Digital Forensics
Exam 1: The Information Age in Which You Live: Changing the Face of Business140 Questions
Exam 2: Major Business Initiatives: Gaining Competitive Advantage With It121 Questions
Exam 3: Databases and Data Warehouses: Supporting the Analytics-Driven Organization120 Questions
Exam 4: Analytics, Decision Support, and Artificial Intelligence: Brain-Power for Your Business124 Questions
Exam 5: Electronic Commerce: Strategies for the New Economy128 Questions
Exam 6: Systems Development: Phases, Tools, and Techniques138 Questions
Exam 7: Infrastructure, Cloud Computing, Metrics, and Business Continuity Planning: Building and Sustaining the Dynamic Enterprise125 Questions
Exam 8: Protecting People and Information: Threats and Safeguards126 Questions
Exam 9: Emerging Trends and Technologies: Business, People, and Technology Tomorrow120 Questions
Exam 10: Computer Hardware and Software125 Questions
Exam 11: The World Wide Web and the Internet125 Questions
Exam 12: Designing Databases and Entity-Relationship Diagramming100 Questions
Exam 13: Decision Analysis With Spreadsheet Software117 Questions
Exam 14: Network Basics125 Questions
Exam 15: Building a Web Page With Html110 Questions
Exam 16: Object-Oriented Technologies112 Questions
Exam 17: Computer Crime and Digital Forensics125 Questions
Exam 18: Building an E-Portfolio137 Questions
Exam 19: Implementing a Database With Microsoft Access129 Questions
Exam 20: Careers in Business132 Questions
Exam 21: Building Web Sites With Front-page125 Questions
Exam 22: Programming in Excel With VBA125 Questions
Select questions type
A _____ refers to software that was written with malicious intent to cause annoyance or damage.
(Multiple Choice)
4.8/5
(37)
_____ comprise a level of the bot underground society where they assemble battalions of bot-infected computers and sell this network of bots or botnet to fraudsters.
(Short Answer)
4.8/5
(34)
Gina recently downloaded some online music on her system.Without her knowledge,a type of computer virus downloaded itself along with the music.In the next few days,the virus slowed down her system and reproduced itself onto her roommate's system and others' in the network.In such a scenario,Gina's system is most likely to be affected by a ____.
(Multiple Choice)
4.8/5
(29)
If a user's phone has GPS capabilities,one's exact location can be pinpointed in real time.
(True/False)
4.8/5
(35)
Which of the following refers to software designed to harm computers or computer security,engage in criminal activity,or compromise resources in some way?
(Multiple Choice)
4.7/5
(37)
Which of the following worms infected the monitoring system of a nuclear power plant and was introduced to the system via the corporate network using a USB stick?
(Multiple Choice)
4.8/5
(39)
_____ is the collection,authentication,preservation,and examination of electronic information,often for presentation in court.
(Multiple Choice)
4.7/5
(37)
_____ are a group of hackers,similar to the hacktivists,who are politically motivated,but whose agenda is more sinister.
(Short Answer)
4.9/5
(33)
The analysis phase of a digital forensics investigation consists of:
(Multiple Choice)
4.8/5
(29)
Which of the following is a step undertaken in the collection phase of a digital forensics investigation?
(Multiple Choice)
4.9/5
(40)
_____ refers to the forging of a return address on an e-mail so that the e-mail message appears to come from someone other than the actual sender.
(Multiple Choice)
4.7/5
(36)
Which of the following is a family of worms that introduced spoofing?
(Multiple Choice)
4.7/5
(39)
Which of the following viruses hides inside software that one needs?
(Multiple Choice)
4.9/5
(26)
Which of the following is the second stage of the collection phase of a digital forensics investigation?
(Multiple Choice)
4.8/5
(32)
Registry files contain a wealth of information including preferences for users of the system,settings for the hardware,and installed programs.
(True/False)
4.9/5
(41)
The _____ worm was transported from computer to computer using a USB stick and represented a new level in the development of worms because it was a finely honed target seeker.
(Multiple Choice)
4.8/5
(25)
Ingrid,Inc. ,a software company,recently had a security lapse when a large number of files on their systems were wiped out due to a hidden virus in the office systems.The company has now decided to hire security professionals whose task will be to regularly check loopholes in computer systems and rectify them.Which of the following type of hackers would Ingrid,Inc. ,need to hire?
(Multiple Choice)
4.9/5
(34)
Showing 101 - 120 of 125
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)