Exam 3: Computer and Internet Crime

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Rootkits are designed so cleverly that it is difficult to even discover if they are installed on a computer. The fundamental problem with trying to detect a rootkit is that the operating system cannot be trusted to provide ____.

(Multiple Choice)
4.7/5
(27)

____ has made a strong commitment to support trustworthy computing and defined four pillars of trustworthy computing.

(Multiple Choice)
4.7/5
(43)

Using e-mail fraudulently to try to get the recipient to reveal personal data is called ____________________.

(Short Answer)
4.9/5
(34)

People who use illegal means to obtain trade secrets from a competitor are called ____________________.

(Short Answer)
4.9/5
(39)

A(n) ____________________ is a program in which malicious code is hidden inside a seemingly harmless program.

(Short Answer)
4.8/5
(38)

A security policy details exactly what needs to be done and how it must be accomplished.

(True/False)
4.9/5
(29)

A ____ attack keeps the target so busy responding to a stream of automated requests that legitimate users cannot get in.

(Multiple Choice)
4.9/5
(29)

Rootkit is a set of programs that enables its users to gain administrator level access to a computer without the end user's consent or knowledge. Fortunately, rootkits are fairly easy to discover and remove from infected computers.

(True/False)
4.9/5
(46)

____________________ is a method of computing that delivers secure, private, and reliable computing experiences based on sound business practices.

(Short Answer)
4.8/5
(37)

____ was a worm that was released in 2007 and caused billions of dollars in damages.

(Multiple Choice)
5.0/5
(35)

An organization can never be prepared for the worst-a successful attack that defeats all or some of a system's defenses and damages data and information systems.

(True/False)
4.9/5
(35)

Installation of a(n) ____ is the most common computer security precaution taken by businesses.

(Multiple Choice)
4.8/5
(24)

The ____ is a partnership between the Department of Homeland Security and the public and private sectors, established in 2003 to protect the nation's Internet infrastructure against cyberattacks.

(Multiple Choice)
4.8/5
(25)

A hacktivist is a person who wishes to destroy the infrastructure components of financial institutions, utilities, and emergency response units.

(True/False)
4.7/5
(27)

The ____ is a Federal law that primarily addresses unlawful access to stored electronic communications.

(Multiple Choice)
4.9/5
(31)

____ is a form of Trojan horse which executes when it is triggered by a specific event such as a change in a particular files, by typing a specific series of keystrokes, or by a specific time or date.

(Multiple Choice)
4.9/5
(37)

Spam is a form of low-cost commercial advertising. It may also be used to deliver harmful worms or other ____________________.

(Short Answer)
4.9/5
(42)

Most viruses deliver a "payload" or ____________________ software that causes the computer to behave in an unexpected way.

(Short Answer)
4.7/5
(29)

Antivirus software works to prevent an attack by blocking viruses, malformed packets, and other threats from getting into the protected network.

(True/False)
4.8/5
(26)

Fraud often involves some form of collusion, or cooperation, between an employee and an outsider.

(True/False)
4.8/5
(35)
Showing 41 - 60 of 90
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)