Exam 3: Computer and Internet Crime

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Spammers can defeat the registration process of free e-mail services by launching a coordinated bot attack that can sign up for thousands of email accounts. A partial solution to this problem is the use of to ensure that only humans obtain free accounts.

Free
(Short Answer)
4.8/5
(34)
Correct Answer:
Verified

CAPTCHA

A(n) is a form of malware in which malicious code is hidden inside a seemingly harmless program.

Free
(Short Answer)
4.8/5
(36)
Correct Answer:
Verified

Trojan horse

is a method of computing that delivers secure, private, and reliable computing experiences based on sound business practices.

Free
(Short Answer)
4.9/5
(28)
Correct Answer:
Verified

Trustworthy computing

Workers in many organizations operate in a(n) environment in which software and data storage are services provided via the Internet.

(Short Answer)
4.8/5
(30)

Identify and briefly discuss four reasons why the number, variety, and impact of security incidents is increasing.

(Essay)
4.8/5
(37)

The code gets a rootkit installation started and can be easily activated by clicking on a link to a malicious Web site in an email or opening an infected PDF file.

(Multiple Choice)
4.9/5
(26)

It is not unusual for a security audit to reveal that too many people have access to critical data and that many people have capabilities beyond those needed to perform their jobs.

(True/False)
4.8/5
(29)

An employee who seeks to disrupt his firm's information systems or to use them to seek financial gain is called a(n) _____.

(Short Answer)
4.8/5
(35)

A is a form of Trojan horse which executes when it is triggered by a specific event such as a change in a particular file, by typing a specific series of keystrokes, or by a specific time or date.

(Multiple Choice)
4.7/5
(34)

The concept of recognizes that managers must use their judgment to ensure that the cost of control does not exceed the system's benefits or the risks involved.

(Multiple Choice)
4.8/5
(40)

Briefly describe how educating employees and contract workers is a critical part of implementing trustworthy computing.

(Essay)
4.8/5
(38)

Before the IT security group can begin an eradication effort, it must .

(Multiple Choice)
4.9/5
(30)

The is a federal law that provides a definition of the term cyberterrorism and under which young people primarily involved in what they consider to be minor computer pranks have been tried as cyberterrorists.

(Multiple Choice)
4.9/5
(36)

A(n) is a harmful program that resides in the active memory of the computer and duplicates itself.

(Short Answer)
4.9/5
(25)

A(n) is a type of computer crime perpetrator whose primary motive is to achieve financial gain.

(Multiple Choice)
4.9/5
(31)

Identify safeguards that should be implemented to protect against attacks by malicious insiders.

(Essay)
4.9/5
(29)

An intrusion detection system monitors system and network resources and activities, and notifies the network security when it detects attempts to circumvent the security measures of a networked computer environment.

(True/False)
4.8/5
(38)

Technically, a(n) is a piece of programming code, usually disguised as something else, that causes a computer to behave in an unexpected and usually undesirable manner.

(Multiple Choice)
4.9/5
(34)

Define computer forensics and briefly describe how one may prepare for a role as a computer forensics investigator.

(Short Answer)
4.9/5
(37)

Malicious insiders mean well but have the potential to cause considerable damage through their actions.

(True/False)
4.7/5
(25)
Showing 1 - 20 of 89
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)