Exam 3: Computer and Internet Crime

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

The use of voice mail to tell someone to call a phone number, or access a Web site, in an attempt to gain personal information about that person is called .

(Short Answer)
4.9/5
(44)

is an annual gathering in Las Vegas of computer hackers.

(Multiple Choice)
4.9/5
(37)

The Fifth Amendment regulates the collection of the content of wire and electronic communications.

(True/False)
4.8/5
(33)

The leads the federal government's efforts in "securing civilian government computer systems, and works with industry and state, local, tribal, and territorial governments to secure critical infrastructure and information systems."

(Short Answer)
4.8/5
(34)

Rootkit is a set of programs that enables its users to gain administrator-level access to a computer without the end user's consent or knowledge.

(True/False)
4.9/5
(36)

In computing, a(n) is a term for any sort of general attack on an information system that takes advantage of a particular system vulnerability.

(Multiple Choice)
4.8/5
(36)

A spear-phishing attack typically employs a group of zombies to keep the target so busy responding to a stream of automated requests that legitimate users cannot access the target.

(True/False)
4.9/5
(38)

The USA Patriot Act defines cyberterrorism as hacking attempts that cause $5,000 in aggregate damage in one year to medical equipment, or that cause injury to any person.

(True/False)
4.9/5
(36)

The security of any system or network is a combination of technology, policy, and people and requires a wide range of activities to be effective.

(True/False)
4.8/5
(32)

A software and/or hardware that monitors system and network resources and activities, and notifies network security personnel when it identifies network traffic that attempts to circumvent the security measures of a networked computer environment is a(n) .

(Multiple Choice)
4.8/5
(38)

is the abuse of email systems to send unsolicited email to large numbers of people.

(Multiple Choice)
4.8/5
(31)

To initiate a denial­of­service attack, a tiny program is downloaded surreptitiously from the attacker's computer to dozens, hundreds, or even thousands of computers all over the world. Based on a command by the attacker or at a preset time, the botnet computers, called , go into action, each sending a simple request for access to the target site again and again.

(Short Answer)
4.9/5
(37)

A attack keeps the target so busy responding to a stream of automated requests that legitimate users cannot get in.

(Multiple Choice)
4.8/5
(36)

A strong security program begins by .

(Multiple Choice)
4.7/5
(30)

Often a successful attack on an information system is due to poor system design or implementation. Once such a vulnerability is discovered, software developers quickly create and issue a to eliminate the problem.

(Multiple Choice)
4.9/5
(40)

A security policy outlines exactly what needs to be done to safeguard computers and their data, but not how it must be accomplished.

(True/False)
4.7/5
(40)

The cost of creating an email campaign for a product or a service is typically more expensive and takes longer to conduct than a direct-mail campaign.

(True/False)
4.7/5
(30)

Discussing security attacks through public trials and the associated publicity has not only enormous potential costs in public relations but real monetary costs as well.

(True/False)
4.8/5
(32)

Even when preventive measures are implemented, no organization is completely secure from a determined computer attack.

(True/False)
4.8/5
(38)

As a safeguard against attacks by malicious insiders, organizations must define employee roles so that a single employee can input as well as approve purchase orders.

(True/False)
4.8/5
(38)
Showing 21 - 40 of 89
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)