Exam 3: Computer and Internet Crime
Exam 1: An Overview of Ethics85 Questions
Exam 2: Ethics for It Workers and It Users85 Questions
Exam 3: Computer and Internet Crime90 Questions
Exam 4: Privacy95 Questions
Exam 5: Freedom of Expression90 Questions
Exam 6: Intellectual Property90 Questions
Exam 7: Software Development90 Questions
Exam 8: The Impact of Information Technology on Productivity and the Quality of Life90 Questions
Exam 9: Social Networking85 Questions
Exam 10: Ethics of It Organizations85 Questions
Select questions type
Rootkits are designed so cleverly that it is difficult to even discover if they are installed on a computer. The fundamental problem with trying to detect a rootkit is that the operating system cannot be trusted to provide ____.
(Multiple Choice)
4.7/5
(27)
____ has made a strong commitment to support trustworthy computing and defined four pillars of trustworthy computing.
(Multiple Choice)
4.7/5
(43)
Using e-mail fraudulently to try to get the recipient to reveal personal data is called ____________________.
(Short Answer)
4.9/5
(34)
People who use illegal means to obtain trade secrets from a competitor are called ____________________.
(Short Answer)
4.9/5
(39)
A(n) ____________________ is a program in which malicious code is hidden inside a seemingly harmless program.
(Short Answer)
4.8/5
(38)
A security policy details exactly what needs to be done and how it must be accomplished.
(True/False)
4.9/5
(29)
A ____ attack keeps the target so busy responding to a stream of automated requests that legitimate users cannot get in.
(Multiple Choice)
4.9/5
(29)
Rootkit is a set of programs that enables its users to gain administrator level access to a computer without the end user's consent or knowledge. Fortunately, rootkits are fairly easy to discover and remove from infected computers.
(True/False)
4.9/5
(46)
____________________ is a method of computing that delivers secure, private, and reliable computing experiences based on sound business practices.
(Short Answer)
4.8/5
(37)
____ was a worm that was released in 2007 and caused billions of dollars in damages.
(Multiple Choice)
5.0/5
(35)
An organization can never be prepared for the worst-a successful attack that defeats all or some of a system's defenses and damages data and information systems.
(True/False)
4.9/5
(35)
Installation of a(n) ____ is the most common computer security precaution taken by businesses.
(Multiple Choice)
4.8/5
(24)
The ____ is a partnership between the Department of Homeland Security and the public and private sectors, established in 2003 to protect the nation's Internet infrastructure against cyberattacks.
(Multiple Choice)
4.8/5
(25)
A hacktivist is a person who wishes to destroy the infrastructure components of financial institutions, utilities, and emergency response units.
(True/False)
4.7/5
(27)
The ____ is a Federal law that primarily addresses unlawful access to stored electronic communications.
(Multiple Choice)
4.9/5
(31)
____ is a form of Trojan horse which executes when it is triggered by a specific event such as a change in a particular files, by typing a specific series of keystrokes, or by a specific time or date.
(Multiple Choice)
4.9/5
(37)
Spam is a form of low-cost commercial advertising. It may also be used to deliver harmful worms or other ____________________.
(Short Answer)
4.9/5
(42)
Most viruses deliver a "payload" or ____________________ software that causes the computer to behave in an unexpected way.
(Short Answer)
4.7/5
(29)
Antivirus software works to prevent an attack by blocking viruses, malformed packets, and other threats from getting into the protected network.
(True/False)
4.8/5
(26)
Fraud often involves some form of collusion, or cooperation, between an employee and an outsider.
(True/False)
4.8/5
(35)
Showing 41 - 60 of 90
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)