Exam 3: Computer and Internet Crime
Exam 1: An Overview of Ethics85 Questions
Exam 2: Ethics for It Workers and It Users75 Questions
Exam 3: Computer and Internet Crime89 Questions
Exam 4: Privacy90 Questions
Exam 5: Freedom of Expression90 Questions
Exam 6: Intellectual Property90 Questions
Exam 7: Software Development75 Questions
Exam 8: The Impact of Information Technology on Productivity and Quality of Life90 Questions
Exam 9: Social Networking90 Questions
Exam 10: Ethics of It Organizations90 Questions
Select questions type
Employees and contract workers must be educated about the importance of security so that they will be motivated to understand and follow the security policies.
(True/False)
4.8/5
(40)
The is a partnership between the Department of Homeland Security and the public and private sectors, established in 2003 to protect the nation's Internet infrastructure against cyberattacks.
(Multiple Choice)
4.7/5
(30)
State the purpose of an IT security audit and briefly discuss the key elements of such an audit.
(Essay)
4.9/5
(33)
pledged to deliver on a trustworthy computing initiative and defined four pillars of trustworthy computing.
(Multiple Choice)
4.8/5
(32)
In a security incident, the primary goal must be to regain control and limit damage, and not to attempt to monitor or catch an intruder.
(True/False)
4.8/5
(28)
The Act went into effect in 2004 and states that it is legal to spam, provided the messages meet a few basic requirements.
(Short Answer)
4.8/5
(37)
A completed risk assessment identifies the most dangerous threats to a company and helps focus security efforts on the areas of highest payoff.
(True/False)
4.9/5
(28)
Trojan horse has become an umbrella term for many types of malicious code.
(True/False)
4.7/5
(32)
Spammers can defeat the registration process of free email services by launching a coordinated attack that can sign up for thousands of untraceable email accounts.
(Multiple Choice)
4.9/5
(36)
differ from viruses in that they propagate without human intervention, sending copies of themselves to other computers by email.
(Short Answer)
4.7/5
(38)
The encourages private industry to share confidential information about the nation's critical infrastructure with the Department of Homeland Security under the assurance that the information will be protected from public disclosure.
(Essay)
4.8/5
(36)
Computer viruses differ from worms in that viruses can propagate without human intervention, often sending copies of themselves to other computers by email.
(True/False)
4.7/5
(36)
Computer forensics is such a new field that there is little training or certification processes available to practioners.
(True/False)
4.8/5
(29)
Fraud by malicious insiders often involves some form of collusion, or cooperation, between an employee and an outsider.
(True/False)
5.0/5
(26)
Using text messaging (SMS) fraudulently to try to get the recipient to reveal personal data is called .
(Short Answer)
4.9/5
(35)
The Act addresses the disclosure of stored wired and electronic communications and transaction records by Internet service providers.
(Essay)
4.8/5
(32)
Whenever possible, automated system rules should mirror an organization's written policies.
(True/False)
4.8/5
(43)
A large group of computers controlled from one or more remote locations by hackers without the knowledge or consent of their owners is called a(n) .
(Short Answer)
4.7/5
(35)
The fundamental problem with trying to detect a rootkit is that the operating system cannot be trusted to provide _____.
(Multiple Choice)
4.8/5
(38)
Showing 41 - 60 of 89
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)