Exam 3: Computer and Internet Crime
Exam 1: An Overview of Ethics85 Questions
Exam 2: Ethics for It Workers and It Users75 Questions
Exam 3: Computer and Internet Crime89 Questions
Exam 4: Privacy90 Questions
Exam 5: Freedom of Expression90 Questions
Exam 6: Intellectual Property90 Questions
Exam 7: Software Development75 Questions
Exam 8: The Impact of Information Technology on Productivity and Quality of Life90 Questions
Exam 9: Social Networking90 Questions
Exam 10: Ethics of It Organizations90 Questions
Select questions type
The use of voice mail to tell someone to call a phone number, or access a Web site, in an attempt to gain personal information about that person is called .
(Short Answer)
4.9/5
(44)
The Fifth Amendment regulates the collection of the content of wire and electronic communications.
(True/False)
4.8/5
(33)
The leads the federal government's efforts in "securing civilian government computer systems, and works with industry and state, local, tribal, and territorial governments to secure critical infrastructure and information systems."
(Short Answer)
4.8/5
(34)
Rootkit is a set of programs that enables its users to gain administrator-level access to a computer without the end
user's consent or knowledge.
(True/False)
4.9/5
(36)
In computing, a(n) is a term for any sort of general attack on an information system that takes advantage of a particular system vulnerability.
(Multiple Choice)
4.8/5
(36)
A spear-phishing attack typically employs a group of zombies to keep the target so busy responding to a stream of automated requests that legitimate users cannot access the target.
(True/False)
4.9/5
(38)
The USA Patriot Act defines cyberterrorism as hacking attempts that cause $5,000 in aggregate damage in one year to medical equipment, or that cause injury to any person.
(True/False)
4.9/5
(36)
The security of any system or network is a combination of technology, policy, and people and requires a wide range of activities to be effective.
(True/False)
4.8/5
(32)
A software and/or hardware that monitors system and network resources and activities, and notifies network security personnel when it identifies network traffic that attempts to circumvent the security measures of a networked computer environment is a(n) .
(Multiple Choice)
4.8/5
(38)
is the abuse of email systems to send unsolicited email to large numbers of people.
(Multiple Choice)
4.8/5
(31)
To initiate a denialofservice attack, a tiny program is downloaded surreptitiously from the attacker's computer to dozens, hundreds, or even thousands of computers all over the world. Based on a command by the attacker or at a preset time, the botnet computers, called , go into action, each sending a simple request for access to the target site again and again.
(Short Answer)
4.9/5
(37)
A attack keeps the target so busy responding to a stream of automated requests that legitimate users cannot get in.
(Multiple Choice)
4.8/5
(36)
Often a successful attack on an information system is due to poor system design or implementation. Once such a vulnerability is discovered, software developers quickly create and issue a to eliminate the problem.
(Multiple Choice)
4.9/5
(40)
A security policy outlines exactly what needs to be done to safeguard computers and their data, but not how it must be accomplished.
(True/False)
4.7/5
(40)
The cost of creating an email campaign for a product or a service is typically more expensive and takes longer to conduct than a direct-mail campaign.
(True/False)
4.7/5
(30)
Discussing security attacks through public trials and the associated publicity has not only enormous potential costs in public relations but real monetary costs as well.
(True/False)
4.8/5
(32)
Even when preventive measures are implemented, no organization is completely secure from a determined computer attack.
(True/False)
4.8/5
(38)
As a safeguard against attacks by malicious insiders, organizations must define employee roles so that a single employee can input as well as approve purchase orders.
(True/False)
4.8/5
(38)
Showing 21 - 40 of 89
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)