Deck 3: Threat Factors Computers As Targets

ملء الشاشة (f)
exit full mode
سؤال
E-mail-borne viruses took place in which of the following phases of convergence?

A) phase 1
B) phase 2
C) phase 3
D) all of these
استخدم زر المسافة أو
up arrow
down arrow
لقلب البطاقة.
سؤال
Which of the following is NOT considered one of the main issues with cybersecurity?

A) confidentiality of data
B) integrity of data
C) cost of data
D) availability of data
سؤال
In the ______ cluster, computers are the target of the cybercrimes.

A) human-machine
B) socio-economic
C) socio-political
D) technological
سؤال
Which of the following was not identified as a countermeasure for networks in text?

A) host-based mitigation
B) data backup
C) proactive measures
D) network-based mitigation
سؤال
______ viruses attach to the original code, changing the start-up information of the program.

A) Shell
B) Add-on
C) Intrusive
D) Boot sector
سؤال
Which of the following was not identified as a hardware device in the text?

A) modems
B) network appliances
C) surveillance systems
D) industrial control systems
سؤال
A ______ is a small software program designed to spread from one computer to another and to interfere with computer operation.

A) virus
B) worm
C) Trojan horse
D) bug
سؤال
Stealthy and evasive attack techniques that can stay undetected are characteristics of the ______ in an advanced persistent threat attack.

A) approach
B) purpose
C) target
D) attacker
سؤال
Multimedia message services viruses target ______.

A) computers
B) infrastructures
C) network
D) mobile devices
سؤال
In 2001, the original Code Red malware initiated a ______ attack on the White House.

A) denial of service
B) rogue access point
C) phishing
D) keylogging
سؤال
Profit, fame, and challenge are characteristics of the ______ in a traditional attack.

A) attacker
B) target
C) purpose
D) approach
سؤال
Which of the following has NOT contributed to the increase in threats to mobile devices?

A) increase in smartphones
B) Apple Inc. technology
C) storing information on devices
D) sophisticated smartphone technology
سؤال
In 2001, the first malware attack that fell into phase 3 of convergence was known as ______.

A) Code Red
B) Code Blue
C) Code Black
D) Code Green
سؤال
According to the text, virus files typically end in ______.

A) .exe
B) .doc
C) .mp4
D) . jpg
سؤال
Which of the following was identified as a software attack in the text?

A) counterfeiting products
B) brute force
C) drive-by-downloads
D) denial-of-service
سؤال
In the ______ cluster, computer infrastructure and vulnerabilities are the focus of attacks.

A) technological
B) socio-political
C) socio-economic
D) human-machine
سؤال
Which of the following is NOT considered one of the main targets in information technology?

A) people
B) software
C) hardware
D) network
سؤال
Cascade is an example of which of the following types of virus?

A) macro virus
B) multipartile virus
C) file infector virus
D) boot sector virus
سؤال
According to the text, by the year 2020, the economic cost of cybercrime is expected to go above ______ trillion.

A) 1
B) 2
C) 3
D) 4
سؤال
Which of the following was NOT identified as a phase of convergence in the evolution of cybercrime?

A) Technology is separate from people.
B) Man is using technology.
C) Technology replaces people.
D) Technology takes over the world.
سؤال
Cyberattacks are cheap and unconstrained by geography and distance to the target.
سؤال
Malware fulfills two main functions: spread itself and cause damage.
سؤال
Phase 2 of convergence was also the beginning of the era of cyberspying.
سؤال
The first Macintosh virus was known as Deer Cloner.
سؤال
MMS viruses can disrupt phone service, steal information, block data, and track the users' movement.
سؤال
An increase in smartphones has led to a significant drop in the prices users pay and a substantial increase in the number of smartphones people own.
سؤال
Cybersecurity specialists in the government and private industry face great difficulties when dealing with cybercrime.
سؤال
Identify and explain the three phases of convergence in the evolution of cybercrime.
سؤال
Software, hardware, and the network are considered the main targets in information technology.
سؤال
______ are software programs or pieces of hardware that help screen out hackers, viruses, and worms that try to reach computers via the Internet.

A) Firewalls
B) Routers
C) Modems
D) Ethernet cables
سؤال
Which of the following risks is not created by Trojan horses?

A) deleting files
B) watching users through the webcam
C) Internet slowdown
D) using the computer to infect other computers
سؤال
______ viruses infect data files.

A) Boot sector
B) File infector
C) Multipartile
D) Macro
سؤال
______ is an encryption component that refers to a digital signature providing proof of authorship.

A) Infinity
B) Non-repudiation
C) Scrambled text
D) Attribution
سؤال
A Trojan horse is a self-replicating virus that does not alter files but resides in active memory and duplicates itself.
سؤال
Identify and explain the three main threat clusters identified in the text.
سؤال
What are the five main reasons for the increase in threats to mobile devices? In your opinion, can anything be done to help reduce the threat to mobile devices?
سؤال
What is an advanced persistent attack (APT)? What are the differences between traditional attacks from APT?
سؤال
The technological cluster includes crimes where computers are used as a tool, such as phishing or identity theft.
سؤال
What are the three main targets in information technology? Provide some examples of the vulnerabilities that each of the targets face. What countermeasures are in place to prevent attacks?
سؤال
A ______ malware is disguised as, or embedded within, legitimate software.

A) virus
B) worm
C) Trojan horse
D) bug
فتح الحزمة
قم بالتسجيل لفتح البطاقات في هذه المجموعة!
Unlock Deck
Unlock Deck
1/40
auto play flashcards
العب
simple tutorial
ملء الشاشة (f)
exit full mode
Deck 3: Threat Factors Computers As Targets
1
E-mail-borne viruses took place in which of the following phases of convergence?

A) phase 1
B) phase 2
C) phase 3
D) all of these
B
2
Which of the following is NOT considered one of the main issues with cybersecurity?

A) confidentiality of data
B) integrity of data
C) cost of data
D) availability of data
C
3
In the ______ cluster, computers are the target of the cybercrimes.

A) human-machine
B) socio-economic
C) socio-political
D) technological
D
4
Which of the following was not identified as a countermeasure for networks in text?

A) host-based mitigation
B) data backup
C) proactive measures
D) network-based mitigation
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 40 في هذه المجموعة.
فتح الحزمة
k this deck
5
______ viruses attach to the original code, changing the start-up information of the program.

A) Shell
B) Add-on
C) Intrusive
D) Boot sector
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 40 في هذه المجموعة.
فتح الحزمة
k this deck
6
Which of the following was not identified as a hardware device in the text?

A) modems
B) network appliances
C) surveillance systems
D) industrial control systems
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 40 في هذه المجموعة.
فتح الحزمة
k this deck
7
A ______ is a small software program designed to spread from one computer to another and to interfere with computer operation.

A) virus
B) worm
C) Trojan horse
D) bug
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 40 في هذه المجموعة.
فتح الحزمة
k this deck
8
Stealthy and evasive attack techniques that can stay undetected are characteristics of the ______ in an advanced persistent threat attack.

A) approach
B) purpose
C) target
D) attacker
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 40 في هذه المجموعة.
فتح الحزمة
k this deck
9
Multimedia message services viruses target ______.

A) computers
B) infrastructures
C) network
D) mobile devices
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 40 في هذه المجموعة.
فتح الحزمة
k this deck
10
In 2001, the original Code Red malware initiated a ______ attack on the White House.

A) denial of service
B) rogue access point
C) phishing
D) keylogging
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 40 في هذه المجموعة.
فتح الحزمة
k this deck
11
Profit, fame, and challenge are characteristics of the ______ in a traditional attack.

A) attacker
B) target
C) purpose
D) approach
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 40 في هذه المجموعة.
فتح الحزمة
k this deck
12
Which of the following has NOT contributed to the increase in threats to mobile devices?

A) increase in smartphones
B) Apple Inc. technology
C) storing information on devices
D) sophisticated smartphone technology
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 40 في هذه المجموعة.
فتح الحزمة
k this deck
13
In 2001, the first malware attack that fell into phase 3 of convergence was known as ______.

A) Code Red
B) Code Blue
C) Code Black
D) Code Green
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 40 في هذه المجموعة.
فتح الحزمة
k this deck
14
According to the text, virus files typically end in ______.

A) .exe
B) .doc
C) .mp4
D) . jpg
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 40 في هذه المجموعة.
فتح الحزمة
k this deck
15
Which of the following was identified as a software attack in the text?

A) counterfeiting products
B) brute force
C) drive-by-downloads
D) denial-of-service
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 40 في هذه المجموعة.
فتح الحزمة
k this deck
16
In the ______ cluster, computer infrastructure and vulnerabilities are the focus of attacks.

A) technological
B) socio-political
C) socio-economic
D) human-machine
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 40 في هذه المجموعة.
فتح الحزمة
k this deck
17
Which of the following is NOT considered one of the main targets in information technology?

A) people
B) software
C) hardware
D) network
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 40 في هذه المجموعة.
فتح الحزمة
k this deck
18
Cascade is an example of which of the following types of virus?

A) macro virus
B) multipartile virus
C) file infector virus
D) boot sector virus
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 40 في هذه المجموعة.
فتح الحزمة
k this deck
19
According to the text, by the year 2020, the economic cost of cybercrime is expected to go above ______ trillion.

A) 1
B) 2
C) 3
D) 4
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 40 في هذه المجموعة.
فتح الحزمة
k this deck
20
Which of the following was NOT identified as a phase of convergence in the evolution of cybercrime?

A) Technology is separate from people.
B) Man is using technology.
C) Technology replaces people.
D) Technology takes over the world.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 40 في هذه المجموعة.
فتح الحزمة
k this deck
21
Cyberattacks are cheap and unconstrained by geography and distance to the target.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 40 في هذه المجموعة.
فتح الحزمة
k this deck
22
Malware fulfills two main functions: spread itself and cause damage.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 40 في هذه المجموعة.
فتح الحزمة
k this deck
23
Phase 2 of convergence was also the beginning of the era of cyberspying.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 40 في هذه المجموعة.
فتح الحزمة
k this deck
24
The first Macintosh virus was known as Deer Cloner.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 40 في هذه المجموعة.
فتح الحزمة
k this deck
25
MMS viruses can disrupt phone service, steal information, block data, and track the users' movement.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 40 في هذه المجموعة.
فتح الحزمة
k this deck
26
An increase in smartphones has led to a significant drop in the prices users pay and a substantial increase in the number of smartphones people own.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 40 في هذه المجموعة.
فتح الحزمة
k this deck
27
Cybersecurity specialists in the government and private industry face great difficulties when dealing with cybercrime.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 40 في هذه المجموعة.
فتح الحزمة
k this deck
28
Identify and explain the three phases of convergence in the evolution of cybercrime.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 40 في هذه المجموعة.
فتح الحزمة
k this deck
29
Software, hardware, and the network are considered the main targets in information technology.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 40 في هذه المجموعة.
فتح الحزمة
k this deck
30
______ are software programs or pieces of hardware that help screen out hackers, viruses, and worms that try to reach computers via the Internet.

A) Firewalls
B) Routers
C) Modems
D) Ethernet cables
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 40 في هذه المجموعة.
فتح الحزمة
k this deck
31
Which of the following risks is not created by Trojan horses?

A) deleting files
B) watching users through the webcam
C) Internet slowdown
D) using the computer to infect other computers
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 40 في هذه المجموعة.
فتح الحزمة
k this deck
32
______ viruses infect data files.

A) Boot sector
B) File infector
C) Multipartile
D) Macro
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 40 في هذه المجموعة.
فتح الحزمة
k this deck
33
______ is an encryption component that refers to a digital signature providing proof of authorship.

A) Infinity
B) Non-repudiation
C) Scrambled text
D) Attribution
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 40 في هذه المجموعة.
فتح الحزمة
k this deck
34
A Trojan horse is a self-replicating virus that does not alter files but resides in active memory and duplicates itself.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 40 في هذه المجموعة.
فتح الحزمة
k this deck
35
Identify and explain the three main threat clusters identified in the text.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 40 في هذه المجموعة.
فتح الحزمة
k this deck
36
What are the five main reasons for the increase in threats to mobile devices? In your opinion, can anything be done to help reduce the threat to mobile devices?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 40 في هذه المجموعة.
فتح الحزمة
k this deck
37
What is an advanced persistent attack (APT)? What are the differences between traditional attacks from APT?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 40 في هذه المجموعة.
فتح الحزمة
k this deck
38
The technological cluster includes crimes where computers are used as a tool, such as phishing or identity theft.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 40 في هذه المجموعة.
فتح الحزمة
k this deck
39
What are the three main targets in information technology? Provide some examples of the vulnerabilities that each of the targets face. What countermeasures are in place to prevent attacks?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 40 في هذه المجموعة.
فتح الحزمة
k this deck
40
A ______ malware is disguised as, or embedded within, legitimate software.

A) virus
B) worm
C) Trojan horse
D) bug
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 40 في هذه المجموعة.
فتح الحزمة
k this deck
locked card icon
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 40 في هذه المجموعة.