Deck 3: Threat Factors Computers As Targets

Full screen (f)
exit full mode
Question
E-mail-borne viruses took place in which of the following phases of convergence?

A) phase 1
B) phase 2
C) phase 3
D) all of these
Use Space or
up arrow
down arrow
to flip the card.
Question
Which of the following is NOT considered one of the main issues with cybersecurity?

A) confidentiality of data
B) integrity of data
C) cost of data
D) availability of data
Question
In the ______ cluster, computers are the target of the cybercrimes.

A) human-machine
B) socio-economic
C) socio-political
D) technological
Question
Which of the following was not identified as a countermeasure for networks in text?

A) host-based mitigation
B) data backup
C) proactive measures
D) network-based mitigation
Question
______ viruses attach to the original code, changing the start-up information of the program.

A) Shell
B) Add-on
C) Intrusive
D) Boot sector
Question
Which of the following was not identified as a hardware device in the text?

A) modems
B) network appliances
C) surveillance systems
D) industrial control systems
Question
A ______ is a small software program designed to spread from one computer to another and to interfere with computer operation.

A) virus
B) worm
C) Trojan horse
D) bug
Question
Stealthy and evasive attack techniques that can stay undetected are characteristics of the ______ in an advanced persistent threat attack.

A) approach
B) purpose
C) target
D) attacker
Question
Multimedia message services viruses target ______.

A) computers
B) infrastructures
C) network
D) mobile devices
Question
In 2001, the original Code Red malware initiated a ______ attack on the White House.

A) denial of service
B) rogue access point
C) phishing
D) keylogging
Question
Profit, fame, and challenge are characteristics of the ______ in a traditional attack.

A) attacker
B) target
C) purpose
D) approach
Question
Which of the following has NOT contributed to the increase in threats to mobile devices?

A) increase in smartphones
B) Apple Inc. technology
C) storing information on devices
D) sophisticated smartphone technology
Question
In 2001, the first malware attack that fell into phase 3 of convergence was known as ______.

A) Code Red
B) Code Blue
C) Code Black
D) Code Green
Question
According to the text, virus files typically end in ______.

A) .exe
B) .doc
C) .mp4
D) . jpg
Question
Which of the following was identified as a software attack in the text?

A) counterfeiting products
B) brute force
C) drive-by-downloads
D) denial-of-service
Question
In the ______ cluster, computer infrastructure and vulnerabilities are the focus of attacks.

A) technological
B) socio-political
C) socio-economic
D) human-machine
Question
Which of the following is NOT considered one of the main targets in information technology?

A) people
B) software
C) hardware
D) network
Question
Cascade is an example of which of the following types of virus?

A) macro virus
B) multipartile virus
C) file infector virus
D) boot sector virus
Question
According to the text, by the year 2020, the economic cost of cybercrime is expected to go above ______ trillion.

A) 1
B) 2
C) 3
D) 4
Question
Which of the following was NOT identified as a phase of convergence in the evolution of cybercrime?

A) Technology is separate from people.
B) Man is using technology.
C) Technology replaces people.
D) Technology takes over the world.
Question
Cyberattacks are cheap and unconstrained by geography and distance to the target.
Question
Malware fulfills two main functions: spread itself and cause damage.
Question
Phase 2 of convergence was also the beginning of the era of cyberspying.
Question
The first Macintosh virus was known as Deer Cloner.
Question
MMS viruses can disrupt phone service, steal information, block data, and track the users' movement.
Question
An increase in smartphones has led to a significant drop in the prices users pay and a substantial increase in the number of smartphones people own.
Question
Cybersecurity specialists in the government and private industry face great difficulties when dealing with cybercrime.
Question
Identify and explain the three phases of convergence in the evolution of cybercrime.
Question
Software, hardware, and the network are considered the main targets in information technology.
Question
______ are software programs or pieces of hardware that help screen out hackers, viruses, and worms that try to reach computers via the Internet.

A) Firewalls
B) Routers
C) Modems
D) Ethernet cables
Question
Which of the following risks is not created by Trojan horses?

A) deleting files
B) watching users through the webcam
C) Internet slowdown
D) using the computer to infect other computers
Question
______ viruses infect data files.

A) Boot sector
B) File infector
C) Multipartile
D) Macro
Question
______ is an encryption component that refers to a digital signature providing proof of authorship.

A) Infinity
B) Non-repudiation
C) Scrambled text
D) Attribution
Question
A Trojan horse is a self-replicating virus that does not alter files but resides in active memory and duplicates itself.
Question
Identify and explain the three main threat clusters identified in the text.
Question
What are the five main reasons for the increase in threats to mobile devices? In your opinion, can anything be done to help reduce the threat to mobile devices?
Question
What is an advanced persistent attack (APT)? What are the differences between traditional attacks from APT?
Question
The technological cluster includes crimes where computers are used as a tool, such as phishing or identity theft.
Question
What are the three main targets in information technology? Provide some examples of the vulnerabilities that each of the targets face. What countermeasures are in place to prevent attacks?
Question
A ______ malware is disguised as, or embedded within, legitimate software.

A) virus
B) worm
C) Trojan horse
D) bug
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/40
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 3: Threat Factors Computers As Targets
1
E-mail-borne viruses took place in which of the following phases of convergence?

A) phase 1
B) phase 2
C) phase 3
D) all of these
B
2
Which of the following is NOT considered one of the main issues with cybersecurity?

A) confidentiality of data
B) integrity of data
C) cost of data
D) availability of data
C
3
In the ______ cluster, computers are the target of the cybercrimes.

A) human-machine
B) socio-economic
C) socio-political
D) technological
D
4
Which of the following was not identified as a countermeasure for networks in text?

A) host-based mitigation
B) data backup
C) proactive measures
D) network-based mitigation
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
5
______ viruses attach to the original code, changing the start-up information of the program.

A) Shell
B) Add-on
C) Intrusive
D) Boot sector
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
6
Which of the following was not identified as a hardware device in the text?

A) modems
B) network appliances
C) surveillance systems
D) industrial control systems
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
7
A ______ is a small software program designed to spread from one computer to another and to interfere with computer operation.

A) virus
B) worm
C) Trojan horse
D) bug
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
8
Stealthy and evasive attack techniques that can stay undetected are characteristics of the ______ in an advanced persistent threat attack.

A) approach
B) purpose
C) target
D) attacker
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
9
Multimedia message services viruses target ______.

A) computers
B) infrastructures
C) network
D) mobile devices
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
10
In 2001, the original Code Red malware initiated a ______ attack on the White House.

A) denial of service
B) rogue access point
C) phishing
D) keylogging
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
11
Profit, fame, and challenge are characteristics of the ______ in a traditional attack.

A) attacker
B) target
C) purpose
D) approach
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
12
Which of the following has NOT contributed to the increase in threats to mobile devices?

A) increase in smartphones
B) Apple Inc. technology
C) storing information on devices
D) sophisticated smartphone technology
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
13
In 2001, the first malware attack that fell into phase 3 of convergence was known as ______.

A) Code Red
B) Code Blue
C) Code Black
D) Code Green
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
14
According to the text, virus files typically end in ______.

A) .exe
B) .doc
C) .mp4
D) . jpg
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
15
Which of the following was identified as a software attack in the text?

A) counterfeiting products
B) brute force
C) drive-by-downloads
D) denial-of-service
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
16
In the ______ cluster, computer infrastructure and vulnerabilities are the focus of attacks.

A) technological
B) socio-political
C) socio-economic
D) human-machine
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
17
Which of the following is NOT considered one of the main targets in information technology?

A) people
B) software
C) hardware
D) network
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
18
Cascade is an example of which of the following types of virus?

A) macro virus
B) multipartile virus
C) file infector virus
D) boot sector virus
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
19
According to the text, by the year 2020, the economic cost of cybercrime is expected to go above ______ trillion.

A) 1
B) 2
C) 3
D) 4
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
20
Which of the following was NOT identified as a phase of convergence in the evolution of cybercrime?

A) Technology is separate from people.
B) Man is using technology.
C) Technology replaces people.
D) Technology takes over the world.
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
21
Cyberattacks are cheap and unconstrained by geography and distance to the target.
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
22
Malware fulfills two main functions: spread itself and cause damage.
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
23
Phase 2 of convergence was also the beginning of the era of cyberspying.
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
24
The first Macintosh virus was known as Deer Cloner.
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
25
MMS viruses can disrupt phone service, steal information, block data, and track the users' movement.
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
26
An increase in smartphones has led to a significant drop in the prices users pay and a substantial increase in the number of smartphones people own.
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
27
Cybersecurity specialists in the government and private industry face great difficulties when dealing with cybercrime.
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
28
Identify and explain the three phases of convergence in the evolution of cybercrime.
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
29
Software, hardware, and the network are considered the main targets in information technology.
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
30
______ are software programs or pieces of hardware that help screen out hackers, viruses, and worms that try to reach computers via the Internet.

A) Firewalls
B) Routers
C) Modems
D) Ethernet cables
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
31
Which of the following risks is not created by Trojan horses?

A) deleting files
B) watching users through the webcam
C) Internet slowdown
D) using the computer to infect other computers
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
32
______ viruses infect data files.

A) Boot sector
B) File infector
C) Multipartile
D) Macro
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
33
______ is an encryption component that refers to a digital signature providing proof of authorship.

A) Infinity
B) Non-repudiation
C) Scrambled text
D) Attribution
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
34
A Trojan horse is a self-replicating virus that does not alter files but resides in active memory and duplicates itself.
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
35
Identify and explain the three main threat clusters identified in the text.
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
36
What are the five main reasons for the increase in threats to mobile devices? In your opinion, can anything be done to help reduce the threat to mobile devices?
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
37
What is an advanced persistent attack (APT)? What are the differences between traditional attacks from APT?
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
38
The technological cluster includes crimes where computers are used as a tool, such as phishing or identity theft.
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
39
What are the three main targets in information technology? Provide some examples of the vulnerabilities that each of the targets face. What countermeasures are in place to prevent attacks?
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
40
A ______ malware is disguised as, or embedded within, legitimate software.

A) virus
B) worm
C) Trojan horse
D) bug
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 40 flashcards in this deck.