Services
Discover
Ask a Question
Log in
Sign up
Filters
Done
Question type:
Essay
Multiple Choice
Short Answer
True False
Matching
Topic
Philosophy
Study Set
Ethics in Information Technology Study Set 1
Exam 3: Computer and Internet Crime
Path 4
Access For Free
Share
All types
Filters
Study Flashcards
Practice Exam
Learn
Question 41
True/False
Employees and contract workers must be educated about the importance of security so that they will be motivated to understand and follow the security policies.
Question 42
Multiple Choice
The is a partnership between the Department of Homeland Security and the public and private sectors, established in 2003 to protect the nation's Internet infrastructure against cyberattacks.
Question 43
Essay
State the purpose of an IT security audit and briefly discuss the key elements of such an audit.
Question 44
Multiple Choice
pledged to deliver on a trustworthy computing initiative and defined four pillars of trustworthy computing.
Question 45
True/False
In a security incident, the primary goal must be to regain control and limit damage, and not to attempt to monitor or catch an intruder.
Question 46
Short Answer
The Act went into effect in 2004 and states that it is legal to spam, provided the messages meet a few basic requirements.
Question 47
True/False
A completed risk assessment identifies the most dangerous threats to a company and helps focus security efforts on the areas of highest payoff.
Question 48
True/False
Trojan horse has become an umbrella term for many types of malicious code.
Question 49
Multiple Choice
Spammers can defeat the registration process of free email services by launching a coordinated attack that can sign up for thousands of untraceable email accounts.
Question 50
Short Answer
differ from viruses in that they propagate without human intervention, sending copies of themselves to other computers by email.
Question 51
Essay
The encourages private industry to share confidential information about the nation's critical infrastructure with the Department of Homeland Security under the assurance that the information will be protected from public disclosure.