Exam 3: Computer and Internet Crime
Exam 1: An Overview of Ethics85 Questions
Exam 2: Ethics for It Workers and It Users85 Questions
Exam 3: Computer and Internet Crime90 Questions
Exam 4: Privacy95 Questions
Exam 5: Freedom of Expression90 Questions
Exam 6: Intellectual Property90 Questions
Exam 7: Software Development90 Questions
Exam 8: The Impact of Information Technology on Productivity and the Quality of Life90 Questions
Exam 9: Social Networking85 Questions
Exam 10: Ethics of It Organizations85 Questions
Select questions type
Industrial espionage and competitive intelligence are the same thing.
(True/False)
4.7/5
(32)
Whenever possible, automated system rules should mirror an organization's written policies.
(True/False)
4.9/5
(37)
An intrusion prevention system is software and/or hardware that monitors system and network resources and activities, and notifies network security personnel when it identifies possible intrusions from outside the organization or misuse from within the organization.
(True/False)
4.7/5
(45)
Edward Davidson ran a spamming operation out of his home that sent hundreds of thousands of spam e-mails. The header information of these e-mails concealed the actual sender from the recipient of the e-mail, a violation of the ____ Act.
(Multiple Choice)
4.9/5
(37)
The use of smart cards which contain a memory chip that is updated with encrypted data every time the card is used, is much more popular in the United States than Europe.
(True/False)
4.8/5
(40)
The ____ is a type of computer crime perpetrator whose primary motive is to achieve a financial gain.
(Multiple Choice)
4.9/5
(29)
The cost of creating an e-mail campaign for a product or a service can easily exceed the cost of a direct-mail campaign. Such an e-mail campaign also typically takes longer to develop.
(True/False)
4.8/5
(30)
____ have become the primary means for distributing spam, malware, and phishing scams.
(Multiple Choice)
4.8/5
(29)
Part of a thorough security risk assessment is to determine how each threat can be ____ so that it becomes much less likely to occur or, if it does occur, has less of an impact on the organizations.
(Multiple Choice)
4.8/5
(35)
To initiate a denial-of-service attack, a tiny program is downloaded surreptitiously from the attacker's computer to dozens, hundreds, or even thousands of computers all over the world. Based on a command by the attacker or at a preset time, these computers called ____________________ go into action, each sending a simple request for access to the target site again and again.
(Short Answer)
4.8/5
(36)
The process of assessing security-related risks from both internal and external threats to an organization's computers and networks is call a(n) ____________________.
(Short Answer)
4.7/5
(31)
According to the 2008 CSI Computer Crime and Security Survey, virus related incidents were the most common security incident.
(True/False)
4.9/5
(31)
The ____ code portion of a rootkit gets the rootkit installation started and can be easily activated by clicking on a link to a malicious Website in an e-mail or opening an infected .pdf file.
(Multiple Choice)
4.8/5
(40)
Societe Generale, France's second largest banking establishment, had long had a reputation for having poor internal controls. It is no wonder that a relatively inexperienced trader was able to take advantage of the bank's system of weak internal controls to exceed his trading limit and cause the bank to lose more than €4.9 billion.
(True/False)
4.7/5
(37)
Briefly describe the security training appropriate for all employees, contractors, and part-time workers.
(Short Answer)
4.8/5
(29)
Installation of a corporate firewall is the most common security precaution taken by business. Once a good firewall is in place, the organization is safe from future attacks.
(True/False)
4.8/5
(31)
Estimates of the rate at which software vulnerabilities are discovered around the world ____________________.
(Short Answer)
4.9/5
(34)
Some IT security experts warn that is will not be long before we see ____ aimed at smartphones to steal user's data or turn them into remote-controlled bots.
(Multiple Choice)
4.8/5
(37)
Phishing frequently leads consumers to counterfeit Web sites designed to trick them into initiating a denial-of-service attack.
(True/False)
4.8/5
(29)
____ is (are) the abuse of e-mail systems to send unsolicited e-mail to large numbers of people.
(Multiple Choice)
4.8/5
(36)
Showing 61 - 80 of 90
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)