Exam 3: Computer and Internet Crime
Exam 1: An Overview of Ethics85 Questions
Exam 2: Ethics for It Workers and It Users85 Questions
Exam 3: Computer and Internet Crime90 Questions
Exam 4: Privacy95 Questions
Exam 5: Freedom of Expression90 Questions
Exam 6: Intellectual Property90 Questions
Exam 7: Software Development90 Questions
Exam 8: The Impact of Information Technology on Productivity and the Quality of Life90 Questions
Exam 9: Social Networking85 Questions
Exam 10: Ethics of It Organizations85 Questions
Select questions type
The USA Patriot Act defines cyberterrorism as hacking attempts that cause $5,000 in aggregate damage in one year, damage to medical equipment, or injury to any person. Because the $5,000 threshold is easy to exceed, many young people who have been involved in what they consider to be "minor computer pranks" have found that they meet the criteria to be tried as cyberterrorists.
(True/False)
4.9/5
(33)
A large group of computers controlled from one or more remote locations by hackers without the knowledge or consent of their owners is called a ____________________.
(Short Answer)
4.8/5
(31)
A zero-day attack is an attack on an information system that takes advantage of a particular system vulnerability before the security community or system developer knows about the vulnerability or has been able to repair it. Such attacks are quite common and occur nearly everyday.
(True/False)
4.8/5
(36)
____________________ differ from viruses in that they propagate without human intervention, sending copies of themselves to other computers by e-mail or Internet Relay Chat.
(Short Answer)
4.9/5
(32)
While it is important that employees should be well aware of an organization's security policies, this information should not be shared with part-time workers and contractors.
(True/False)
4.7/5
(32)
____ viruses have become a common and easily created form of virus. Attackers use an application macro language to create these programs that infect documents and templates.
(Multiple Choice)
4.9/5
(34)
Organizations must define employee roles so that a single employee can input as well as approve purchase orders. Such action is needed to provide adequate redundancy in the event of a pandemic or other form of disaster.
(True/False)
4.9/5
(34)
It is not unusual for a security audit to reveal that too many people have access to critical data and that many people have capabilities beyond those needed to perform their jobs.
(True/False)
4.7/5
(33)
Identify safeguards that should be implemented to protect against attacks by malicious insiders.
(Essay)
4.8/5
(41)
The cooperation between an employee and company outsider to steal money from a firm is called ____________________.
(Short Answer)
4.7/5
(34)
Showing 81 - 90 of 90
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)