Exam 3: Computer and Internet Crime

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

The USA Patriot Act defines cyberterrorism as hacking attempts that cause $5,000 in aggregate damage in one year, damage to medical equipment, or injury to any person. Because the $5,000 threshold is easy to exceed, many young people who have been involved in what they consider to be "minor computer pranks" have found that they meet the criteria to be tried as cyberterrorists.

(True/False)
4.9/5
(33)

A large group of computers controlled from one or more remote locations by hackers without the knowledge or consent of their owners is called a ____________________.

(Short Answer)
4.8/5
(31)

A zero-day attack is an attack on an information system that takes advantage of a particular system vulnerability before the security community or system developer knows about the vulnerability or has been able to repair it. Such attacks are quite common and occur nearly everyday.

(True/False)
4.8/5
(36)

____________________ differ from viruses in that they propagate without human intervention, sending copies of themselves to other computers by e-mail or Internet Relay Chat.

(Short Answer)
4.9/5
(32)

While it is important that employees should be well aware of an organization's security policies, this information should not be shared with part-time workers and contractors.

(True/False)
4.7/5
(32)

____ viruses have become a common and easily created form of virus. Attackers use an application macro language to create these programs that infect documents and templates.

(Multiple Choice)
4.9/5
(34)

Organizations must define employee roles so that a single employee can input as well as approve purchase orders. Such action is needed to provide adequate redundancy in the event of a pandemic or other form of disaster.

(True/False)
4.9/5
(34)

It is not unusual for a security audit to reveal that too many people have access to critical data and that many people have capabilities beyond those needed to perform their jobs.

(True/False)
4.7/5
(33)

Identify safeguards that should be implemented to protect against attacks by malicious insiders.

(Essay)
4.8/5
(41)

The cooperation between an employee and company outsider to steal money from a firm is called ____________________.

(Short Answer)
4.7/5
(34)
Showing 81 - 90 of 90
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)