Exam 11: Cybercrime and It Security
Exam 1: Managers: Key to Information Technology Results79 Questions
Exam 2: Strategic Planning58 Questions
Exam 3: Project Management79 Questions
Exam 4: Business Process and It Outsourcing73 Questions
Exam 5: Corporate and It Governance78 Questions
Exam 6: Collaboration Tools79 Questions
Exam 7: E-Commerce79 Questions
Exam 8: Enterprise Systems80 Questions
Exam 9: Business Intelligence and Big Data80 Questions
Exam 10: Knowledge Management80 Questions
Exam 11: Cybercrime and It Security80 Questions
Exam 12: Ethical, legal, and Social Issues of Information Technology80 Questions
Select questions type
A Trojan horse abuses email systems to send unsolicited email to large numbers of people.
Free
(True/False)
4.9/5
(31)
Correct Answer:
False
Which of the following is true of a virus signature?
Free
(Multiple Choice)
4.9/5
(39)
Correct Answer:
B
Which of the following statements best describes the export phase of an advanced persistent threat?
Free
(Multiple Choice)
4.7/5
(38)
Correct Answer:
A
A _____ is used by attackers to execute files,access logs,monitor user activity,and change a computer's configuration.
(Multiple Choice)
4.9/5
(32)
_____ is the unintended access of sensitive data by unauthorized individuals.
(Multiple Choice)
4.9/5
(33)
Identify a true statement about the bring your own device (BYOD)business policy.
(Multiple Choice)
4.9/5
(35)
Identify the attack in which a malicious hacker floods a target site with demands for data and other small tasks.
(Multiple Choice)
4.9/5
(46)
The additional security option,used for credit card transactions,that keeps track of a customer's historical shopping patterns and notes deviations from the norm is _____.
(Multiple Choice)
4.8/5
(31)
_____ is the abuse of email systems to send unsolicited email to large numbers of people.
(Multiple Choice)
4.8/5
(36)
Which of the following statements is true of the discovery phase of an advanced persistent threat?
(Multiple Choice)
4.8/5
(33)
Those who capture trade secrets and attempt to gain an unfair competitive advantage are known as _____.
(Multiple Choice)
5.0/5
(34)
Which of the following statements defines an intrusion detection system (IDS)?
(Multiple Choice)
4.8/5
(32)
A rootkit can be disinfected without formatting the hard disk or reinstalling the operating system.
(True/False)
4.8/5
(31)
_____ serves as a clearinghouse for information on new viruses,worms,and other computer security topics.
(Multiple Choice)
4.8/5
(43)
Showing 1 - 20 of 80
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)