Description of this paper

Viruses that attach themselves to files with certain extensions, such as.doc or.exe




Question 1 of 20 5.0 Points;Viruses that attach themselves to files with certain extensions, such as.doc or.exe., are __________ viruses.;A. boot sector;B. file infector;C. file destroyer;D. file command;Question 2 of 20 5.0 Points;According to the CSI/FBI Cyber Crime Survey, __________ of organizations conduct routine and ongoing security audits.;A. 25 percent or less;B. 50 percent;C. 75 percent;D. nearly 90 percent;Question 3 of 20 5.0 Points;invented the movable-type printing press that accelerated the amount and kind of information that was available to populations.;A. Johann Gutenberg;B. Phil Zimmerman;C. William (Bill) Gates;D. Tim Burners-Lee;Question 4 of 20 5.0 Points;Which of the following is NOT an example of a computer crime as listed in the textbook?;A. Data diddling;B. Salami slicing;C. Piggybacking;D. Cold calling;Question 5 of 20 5.0 Points;One common way to gain access to a password-protected system is to use a __________ approach.;A. back-door;B. ?sneak peek?;C. brute-force;D. social engineering;Question 6 of 20 5.0 Points;Persons who plant viruses are called;A. computer hackers.;B. cyberterrorists.;C. vandals.;D. predators.;Question 7 of 20 5.0 Points;A mechanism using a digital signature to prove that a message did, in fact, originate from the claimed sender is called;A. authentication.;B. privacy/confidentiality.;C. nonrepudiation.;D. integrity.;Question 8 of 20 5.0 Points;The global reach of computer networks has raised concerns over;A. copyrights.;B. privacy.;C. security.;D. All of the above;Question 9 of 20 5.0 Points;is a type of software for securing information systems by allowing only specific users access to specific computers, applications, or data.;A. Access control software;B. Computer security software;C. Application restriction software;D. Data protection software;Question 10 of 20 5.0 Points;encryption software allows users to ensure;A. authentication.;B. privacy/confidentiality.;C. nonrepudiation.;D. All of the above;Question 11 of 20 5.0 Points;The slang term for stolen software is;A. hackerware.;B. warez.;C. vaporware.;D. discountware.;Question 12 of 20 5.0 Points;are the least used security technology.;A. Passwords;B. Biometrics;C. Encrypted files;D. Firewalls;Question 13 of 20 5.0 Points;The Computer Fraud and Abuse Act of 1986 prohibited;A. stealing or compromising data about national defense and foreign relations.;B. breaking into any electronic communications service.;C. monitoring voice communications.;D. stealing trade secrets.;Question 14 of 20 5.0 Points;A(n) __________ is an ongoing planning process involving risk assessment, risk reduction planning, and plan implementation as well as ongoing monitoring.;A. information systems security plan;B. disaster recovery plan;C. infrastructure management;D. risk assessment plan;Question 15 of 20 5.0 Points;Crimes committed against telephone company computers are an example of;A. phreaking.;B. spoofing.;C. social engineering.;D. data diddling.;Question 16 of 20 5.0 Points;ECPA is an acronym that refers to the;A. Electronic Controls Privacy Act.;B. Electronic Communications Privacy Act.;C. E-Commerce Customer Protection Association.;D. Electric Computer Protection Agency.;Question 17 of 20 5.0 Points;To execute denial of service attacks, intruders often use __________ computers.;A. zombie;B. monster;C. robot;D. android;Question 18 of 20 5.0 Points;Examples of the ethical conundrum include all EXCEPT;A. using computer time at work to read personal e-mail.;B. organizations compiling personal information about shopping habits.;C. the government regulating computer crimes.;D. using technology to rearrange photographs.;Question 19 of 20 5.0 Points;Futurist author Alvin Toffler describes three "waves of change." The third, and biggest, wave of change to occur is the;A. Information Age.;B. Industrial Revolution.;C. Agriculture and Handwork Age.;D. Modern Age.;Question 20 of 20 5.0 Points;Some spam e-mail includes __________, which are attempts to trick financial account and credit card holders into giving away their authorization information.;A. freaking;B. tricking;C. phishing;D. luring


Paper#29088 | Written in 18-Jul-2015

Price : $37