Exam 3: Computer and Internet Crime
Exam 1: An Overview of Ethics85 Questions
Exam 2: Ethics for It Workers and It Users75 Questions
Exam 3: Computer and Internet Crime89 Questions
Exam 4: Privacy90 Questions
Exam 5: Freedom of Expression90 Questions
Exam 6: Intellectual Property90 Questions
Exam 7: Software Development75 Questions
Exam 8: The Impact of Information Technology on Productivity and Quality of Life90 Questions
Exam 9: Social Networking90 Questions
Exam 10: Ethics of It Organizations90 Questions
Select questions type
Spammers can defeat the registration process of free e-mail services by launching a coordinated bot attack that can sign up for thousands of email accounts. A partial solution to this problem is the use of to ensure that only humans obtain free accounts.
Free
(Short Answer)
4.8/5
(34)
Correct Answer:
CAPTCHA
A(n) is a form of malware in which malicious code is hidden inside a seemingly harmless program.
Free
(Short Answer)
4.8/5
(36)
Correct Answer:
Trojan horse
is a method of computing that delivers secure, private, and reliable computing experiences based on sound business practices.
Free
(Short Answer)
4.9/5
(28)
Correct Answer:
Trustworthy computing
Workers in many organizations operate in a(n) environment in which software and data storage are services provided via the Internet.
(Short Answer)
4.8/5
(30)
Identify and briefly discuss four reasons why the number, variety, and impact of security incidents is increasing.
(Essay)
4.8/5
(37)
The code gets a rootkit installation started and can be easily activated by clicking on a link to a malicious Web site in an email or opening an infected PDF file.
(Multiple Choice)
4.9/5
(26)
It is not unusual for a security audit to reveal that too many people have access to critical data and that many people have capabilities beyond those needed to perform their jobs.
(True/False)
4.8/5
(29)
An employee who seeks to disrupt his firm's information systems or to use them to seek financial gain is called a(n)
_____.
(Short Answer)
4.8/5
(35)
A is a form of Trojan horse which executes when it is triggered by a specific event such as a change in a particular file, by typing a specific series of keystrokes, or by a specific time or date.
(Multiple Choice)
4.7/5
(34)
The concept of recognizes that managers must use their judgment to ensure that the cost of control does not exceed the system's benefits or the risks involved.
(Multiple Choice)
4.8/5
(40)
Briefly describe how educating employees and contract workers is a critical part of implementing trustworthy computing.
(Essay)
4.8/5
(38)
Before the IT security group can begin an eradication effort, it must .
(Multiple Choice)
4.9/5
(30)
The is a federal law that provides a definition of the term cyberterrorism and under which young people primarily involved in what they consider to be minor computer pranks have been tried as cyberterrorists.
(Multiple Choice)
4.9/5
(36)
A(n) is a harmful program that resides in the active memory of the computer and duplicates itself.
(Short Answer)
4.9/5
(25)
A(n) is a type of computer crime perpetrator whose primary motive is to achieve financial gain.
(Multiple Choice)
4.9/5
(31)
Identify safeguards that should be implemented to protect against attacks by malicious insiders.
(Essay)
4.9/5
(29)
An intrusion detection system monitors system and network resources and activities, and notifies the network security when it detects attempts to circumvent the security measures of a networked computer environment.
(True/False)
4.8/5
(38)
Technically, a(n) is a piece of programming code, usually disguised as something else, that causes a computer to behave in an unexpected and usually undesirable manner.
(Multiple Choice)
4.9/5
(34)
Define computer forensics and briefly describe how one may prepare for a role as a computer forensics investigator.
(Short Answer)
4.9/5
(37)
Malicious insiders mean well but have the potential to cause considerable damage through their actions.
(True/False)
4.7/5
(25)
Showing 1 - 20 of 89
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)