Exam 3: Computer and Internet Crime

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

____ is an annual gathering in Las Vegas of computer hackers.

(Multiple Choice)
4.9/5
(33)

Individuals committed to trustworthy computing take a pledge to not send viruses and worms and to refrain from spamming others.

(True/False)
4.7/5
(31)

Often a successful attack on an information system is due to poor system design or implementation. Once such a vulnerability is discovered, software developers quickly create and issue a ____ to eliminate the problem.

(Multiple Choice)
4.8/5
(30)

Spammers can defeat the registration process of free e-mail services by launching a coordinated ____ attack that can sign up for thousands of untraceable e-mail accounts.

(Multiple Choice)
4.9/5
(47)

The security of any system or network is a combination of technology, policy, and people and requires a surprisingly narrow range of activities to be effective.

(True/False)
4.9/5
(34)

Identify and briefly discuss four reasons that the number, variety, and impact of security incidents is increasing.

(Essay)
5.0/5
(41)

A distributed denial-of-service attack keeps the target so busy responding to a stream of automated requests that legitimate users cannot access the target.

(True/False)
4.9/5
(37)

The cost to repair the worldwide damage done by a computer worm has exceeded $1 billion on more than one occasion.

(True/False)
4.9/5
(39)

A card, similar to a debit or credit card which contains a memory chip that is updated with encrypted data every time the card is used is called a ____________________.

(Short Answer)
4.8/5
(35)

Discussing security attacks through public trials and the associated publicity has not only enormous potential costs in public relations but real monetary costs as well.

(True/False)
4.8/5
(36)

Due to time and resource limitations, most organizations choose to focus on those computer threats that have a ____________________ frequency (relative to all other threats) and a high impact (relative to all other threats).

(Short Answer)
4.9/5
(32)

Crackers break into other people's networks and systems to cause harm-defacing Web pages, crashing computers, and spreading harmful programs or hateful messages.

(True/False)
4.8/5
(33)

A strong security program begins by ____.

(Multiple Choice)
4.8/5
(24)

According to a 2008 CSI Computer Crime and Security Survey, 53 percent of the responding organizations spend 5 percent or less of their overall ____________________ on information security.

(Short Answer)
4.8/5
(42)

The impact of a worm attack on an organization's computers and personnel can be considerable and results in losses of many thousands of dollars. Identify and briefly discuss the kinds of losses an organization can suffer.

(Essay)
4.7/5
(35)

The sending of fraudulent e-mails to the employees in a specific organization in an attempt to gain personal information is called ____________________.

(Short Answer)
4.9/5
(36)

The use of legal techniques to gather information that is publicly available in order to learn about a competitor is called ____________________.

(Short Answer)
4.9/5
(40)

The Computer Fraud and Abuse Act addresses identity theft.

(True/False)
4.9/5
(34)

State the purpose of an IT security audit and briefly discuss the key elements of such an audit.

(Essay)
4.7/5
(32)

Unlike a computer worm, which requires users to spread infected files to other users, a virus is a harmful program that resides in the active memory of the computer and duplicates itself. A virus can propagate without human intervention.

(True/False)
4.9/5
(36)
Showing 21 - 40 of 90
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)