Exam 11: Cybercrime and It Security

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

A Trojan horse abuses email systems to send unsolicited email to large numbers of people.

Free
(True/False)
4.9/5
(31)
Correct Answer:
Verified

False

Which of the following is true of a virus signature?

Free
(Multiple Choice)
4.9/5
(39)
Correct Answer:
Verified

B

Which of the following statements best describes the export phase of an advanced persistent threat?

Free
(Multiple Choice)
4.7/5
(38)
Correct Answer:
Verified

A

A _____ is used by attackers to execute files,access logs,monitor user activity,and change a computer's configuration.

(Multiple Choice)
4.9/5
(32)

Which of the following is true of spam?

(Multiple Choice)
4.9/5
(32)

Which of the following defines computer forensics?

(Multiple Choice)
4.8/5
(38)

_____ is the unintended access of sensitive data by unauthorized individuals.

(Multiple Choice)
4.9/5
(33)

Identify a true statement about the bring your own device (BYOD)business policy.

(Multiple Choice)
4.9/5
(35)

Identify the attack in which a malicious hacker floods a target site with demands for data and other small tasks.

(Multiple Choice)
4.9/5
(46)

The additional security option,used for credit card transactions,that keeps track of a customer's historical shopping patterns and notes deviations from the norm is _____.

(Multiple Choice)
4.8/5
(31)

_____ is the abuse of email systems to send unsolicited email to large numbers of people.

(Multiple Choice)
4.8/5
(36)

What are the characteristics of a good antivirus software?

(Essay)
4.9/5
(31)

Explain the different phases of an advanced persistent threat (APT).

(Essay)
4.9/5
(33)

Which of the following statements is true of the discovery phase of an advanced persistent threat?

(Multiple Choice)
4.8/5
(33)

Those who capture trade secrets and attempt to gain an unfair competitive advantage are known as _____.

(Multiple Choice)
5.0/5
(34)

Which of the following statements defines an intrusion detection system (IDS)?

(Multiple Choice)
4.8/5
(32)

Explain the need for a security audit in an organization.

(Essay)
4.9/5
(28)

A rootkit can be disinfected without formatting the hard disk or reinstalling the operating system.

(True/False)
4.8/5
(31)

Which of the following statements is true about worms?

(Multiple Choice)
4.9/5
(34)

_____ serves as a clearinghouse for information on new viruses,worms,and other computer security topics.

(Multiple Choice)
4.8/5
(43)
Showing 1 - 20 of 80
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)