Deck 11: Cybercrime and It Security

ملء الشاشة (f)
exit full mode
سؤال
Which of the following statements is true about worms?

A)They abuse email systems to send unsolicited email to large numbers of people.
B)They allow hackers to destroy hard drives,corrupt files,and steal passwords by recording keystrokes and transmitting them to a server operated by a third party.
C)They insert unwanted words,numbers,or phrases into documents or alter command functions in an infected document.
D)They propagate without human intervention,often sending copies of themselves to other computers by email.
استخدم زر المسافة أو
up arrow
down arrow
لقلب البطاقة.
سؤال
Identify a true statement about the bring your own device (BYOD)business policy.

A)It can improve employee productivity.
B)It can provide data security.
C)It creates a bug-free environment.
D)It enhances employee interaction.
سؤال
Which of the following best describes a cybercriminal?

A)An individual who attacks a computer system or network for financial gain
B)An individual who hacks computers or Web sites in an attempt to promote a political ideology
C)An individual who attempts to destroy the infrastructure components of governments and financial institutions
D)An individual who is hired by an organization to test the security of its information systems
سؤال
Which of the following is a drawback of the bring your own device (BYOD)business policy?

A)It affects the productivity of the employees of a company.
B)It inhibits the privacy of the employees of a company.
C)It exposes a company's data to malware.
D)It creates the image of a company as not being flexible.
سؤال
Which of the following is true of a macro virus?

A)It propagates without human intervention,often sending copies of itself to other computers by email.
B)It allows hackers to destroy hard drives,corrupt files,and steal passwords by recording keystrokes and transmitting them to a server operated by a third party.
C)It inserts unwanted words,numbers,or phrases into documents or alters command functions in an infected document.
D)It abuses email systems to send unsolicited email to large numbers of people.
سؤال
In the context of computer crimes,those who attempt to destroy the infrastructure components of governments and financial institutions are known as _____.

A)hacktivists
B)white hat hackers
C)black hat hackers
D)cyberterrorists
سؤال
A _____ is a harmful program that resides in the active memory of a computer and duplicates itself.

A)scareware
B)worm
C)virus
D)logic bomb
سؤال
_____ is a program in which malicious code is hidden inside a seemingly harmless program.

A)A Trojan horse
B)A distributed denial-of-service attack
C)A spam
D)A smish
سؤال
How does a worm negatively impact an organization?

A)It steals passwords and Social Security numbers.
B)It generates and grades tests that humans can pass but all but the most sophisticated computer programs cannot.
C)It causes productivity losses due to workers being unable to use their computers.
D)It fraudulently uses third-party emails to try to get the recipient to reveal personal data.
سؤال
Which of the following is a technical description of a virus?

A)It is a harmful program that involves the use of Short Message Service to get personal details from victims.
B)It is the act of fraudulently using email to try to get the recipient to reveal personal data.
C)It is a piece of code that causes a computer to behave in an unexpected and usually undesirable manner.
D)It is the abuse of email systems to send unsolicited email to large numbers of people.
سؤال
The attack that takes place before a software developer knows about the vulnerability is known as a(n)_____.

A)unidentified attack
B)zero-day attack
C)exploit
D)threat
سؤال
In computing,a(n)_____ is an attack on an information system that takes advantage of a particular system vulnerability.

A)exit door
B)glitch
C)bot
D)exploit
سؤال
Which perpetrator violates computer or Internet security maliciously for illegal personal gain?

A)A red hat hacker
B)A gray hat hacker
C)A white hat hacker
D)A black hat hacker
سؤال
Which of the following best describes a hacktivist?

A)An individual who attempts to destroy the infrastructure components of governments,financial institutions,utilities,and emergency response units
B)An individual who hacks computers or Web sites in an attempt to promote a political ideology
C)An employee or contractor who attempts to gain financially and/or disrupt a company's information systems and business operations
D)An individual who captures trade secrets and attempts to gain an unfair competitive advantage
سؤال
Which of the following best describes malicious insiders?

A)They hack computers in an attempt to promote a political ideology.
B)They disrupt a company's information systems and business operations.
C)They are hired by an organization to test the security of its information systems.
D)They are hired by an organization to test the security of another organization's information systems.
سؤال
In the context of computer crimes,those who cause problems,steal data,and corrupt systems are known as _____.

A)black hat hackers
B)white hat hackers
C)hacktivists
D)crackers
سؤال
Which of the following exploits when downloaded onto a smartphone takes control of the device and its data until the owner agrees to pay a sum of money to the attacker?

A)Camware
B)Spyware
C)Scareware
D)Ransomware
سؤال
Which of the following is true of white hat hackers?

A)They are hired by an organization to test the security of its information systems.
B)They disrupt a company's information systems and business operations.
C)They capture trade secrets and attempt to gain an unfair competitive advantage in a company.
D)They destroy the infrastructure components of governments,financial institutions,and emergency response units.
سؤال
Which of the following is created and issued by software engineers to remove a system vulnerability?

A)A patch
B)A key
C)A license
D)A constraint
سؤال
Those who capture trade secrets and attempt to gain an unfair competitive advantage are known as _____.

A)white hat hackers
B)hacktivists
C)industrial spies
D)black hat hackers
سؤال
Which of the following is used to ensure that only humans obtain free email accounts?

A)Atomicity,consistency,isolation,and durability (ACID)
B)Microprocessor without Interlocked Pipeline Stages (MIPS)
C)Completely Automated Public Turing Test to Tell Computers and Humans Apart (CAPTCHA)
D)Document Style Semantics and Specification Language (DSSSL)
سؤال
Which of the following best describes spear-phishing?

A)The phisher sends a survey to the employees of several organizations to obtain details of the configuration of their computing devices.
B)The phisher sends a voice mail message to a number of people to call a phone number or access a Web site.
C)The phisher sends legitimate-looking text messages through his or her phone to advertise a certain organization.
D)The phisher sends fraudulent emails to a certain organization's employees disguising them as mails from high-level executives from within the organization.
سؤال
Botnet computers are also called _____.

A)zombies
B)daemons
C)narutus
D)konohas
سؤال
_____ is the abuse of email systems to send unsolicited email to large numbers of people.

A)Cyberespionage
B)Spam
C)Phishing
D)Smishing
سؤال
Identify a true statement about smishing.

A)The phisher sends legitimate-looking messages through phone to acquire personal information.
B)The phisher sends a survey email to obtain the configuration of an unsuspecting user's computing device.
C)The phisher sends a voice mail message to an unsuspecting user to call a phone number or access a Web site.
D)The phisher sends fraudulent emails to a certain organization's employees.
سؤال
Identify the attack in which a malicious hacker floods a target site with demands for data and other small tasks.

A)Distributed denial-of-service
B)Smishing
C)Logic bomb
D)Phishing
سؤال
Identify the mode of message transmission used in vishing.

A)Multimedia Messaging Service
B)Short Message Service
C)Email
D)Voice mail
سؤال
Identify a true statement about Trojan horses.

A)They lead consumers to counterfeit Web sites designed to trick them into divulging personal data.
B)They are used by organizations to test the security of information systems.
C)They involve the use of Short Message Service (SMS)texting for phishing.
D)They spy on users by recording keystrokes and transmitting them to a server operated by a third party.
سؤال
Identify the mode of message transmission used in smishing.

A)Multimedia Messaging Service
B)Short Message Service
C)Email
D)Voice mail
سؤال
Which of the following defines a rootkit?

A)It is the act of fraudulently using email to try to get the recipient to reveal personal data by sending legitimate-looking emails urging the recipient to take action to avoid a negative consequence or to receive a reward.
B)It is the unintended release of sensitive data by unauthorized individuals.
C)It is the abuse of email systems to send unsolicited email to large numbers of people.
D)It is a set of programs that enables its user to gain administrator-level access to a computer without the end user's consent or knowledge.
سؤال
The _____ code of a rootkit gets the rootkit installation started and can be activated by clicking on a link to a malicious Web site in an email or opening an infected PDF file.

A)dropper
B)loader
C)linker
D)adapter
سؤال
Jack was shocked to witness the sudden drop in performance of his laptop.He also found that the screen saver constant changed and that the taskbar had disappeared.The given problems are symptoms of _____ infections.

A)rootkit
B)smishing
C)phishing
D)bootkit
سؤال
Andrew,a writer,noticed that his blog was filled with repetitive advertisements and surveys that prevented him from accessing his blog and editing an article.Which of the following has caused this problem?

A)A rootkit
B)A distributed denial-of-service attack
C)A logic bomb attack
D)A cyberespionage incident
سؤال
David,a software engineer,was creating a report using Microsoft Word.After completing 15 pages in the file,he noticed that whenever he copied something using the keyboard,the contents were modified with unwanted numbers and phrases.Which of the following could have caused this problem?

A)A worm
B)Smishing
C)A logic bomb
D)Phishing
سؤال
Which of the following is true of spam?

A)Spam is a type of attack with which a hacker takes over computers via the Internet and causes them to flood a target site with demands for data and other small tasks.
B)Spam is a program in which malicious code is hidden inside a seemingly harmless program.
C)Spam is a set of programs that enables its user to gain administrator-level access to a computer without the end user's consent or knowledge.
D)Spam is an extremely inexpensive method of marketing used by many legitimate organizations.
سؤال
Which of the following statements is true of the Controlling the Assault of Non-Solicited Pornography and Marketing (CAN-SPAM)Act?

A)It legalizes spamming with certain restrictions.
B)It provides a solution to tackle a Trojan horse.
C)It identifies distributed denial-of-service attacks.
D)It prevents worms by eliminating their ability to replicate.
سؤال
Which of the following terms is used to describe a large group of computers controlled from one or more remote locations by hackers without the knowledge of their owners?

A)Spear-phishing
B)Botnet
C)Cyberespionage
D)Smishing
سؤال
_____ is the act of fraudulently using email to try to get the recipient to reveal personal data.

A)Spoofing
B)Vishing
C)Phishing
D)Smishing
سؤال
A(n)_____ is a network attack in which an intruder gains access to a network and stays undetected with the intention of stealing data.

A)advanced persistent threat
B)vishing scam
C)identity threat
D)data breach
سؤال
A _____ is used by attackers to execute files,access logs,monitor user activity,and change a computer's configuration.

A)scareware
B)patch
C)rootkit
D)worm
سؤال
In the context of general security risk assessment,which of the following is true of the concept of reasonable assurance?

A)It decides whether or not to implement a particular countermeasure against attacks.
B)It recognizes that managers must use their judgment to ensure that the cost of control does not exceed a system's benefits.
C)It recognizes the loss events or the risks or threats that could occur,such as a distributed denial-of-service attack or insider fraud.
D)It determines the impact of each threat occurrence.
سؤال
To reduce the potential for online credit card fraud,most e-commerce Web sites use some form of _____ technology to protect information as it comes in from the consumer.

A)encryption
B)authentication
C)authorization
D)indexing
سؤال
Which of the following statements best describes the export phase of an advanced persistent threat?

A)The data captured by an attacker is sent to the attacker's home base for analysis.
B)An attacker establishes a computer program that bypasses security mechanisms.
C)An attacker is ready to access compromised systems and capture information.
D)The valid user credentials gathered by an attacker is used to install backdoors for distributing malware.
سؤال
Which of the following statements is true of the discovery phase of an advanced persistent threat?

A)An intruder gains useful information about the target.
B)An intruder establishes a computer program that bypasses security mechanisms.
C)An intruder is ready to access compromised systems and capture information.
D)An intruder gathers valid user credentials and installs backdoors for distributing malware.
سؤال
Identify the primary security threat for mobile devices.

A)Distributed denial-of-service attack
B)Cyberterrorism
C)Cyberespionage
D)Theft of device
سؤال
_____ involves the deployment of malware that secretly steals data in the computer systems of organizations.

A)Cyberterrorism
B)Smishing
C)Cyberespionage
D)Vishing
سؤال
The additional security option,used for credit card transactions,that keeps track of a customer's historical shopping patterns and notes deviations from the norm is _____.

A)transaction incognito mode
B)transaction identification code
C)transaction-spam control software
D)transaction-risk scoring software
سؤال
Which of the following uses encryption to provide secure access to a remote computer over the Internet?

A)Virtual private network (VPN)
B)File transfer protocol (FTP)
C)Indexing
D)Data warehousing
سؤال
Which of the following limits network access based on an organization's access policy?

A)An antivirus software
B)The concept of Reasonable assurance
C)A firewall
D)A browser
سؤال
Which phase of an advanced persistent threat enables an intruder to gain useful information about the target?

A)The discovery phase
B)The capture phase
C)The reconnaissance phase
D)The incursion phase
سؤال
_____ serves as a clearinghouse for information on new viruses,worms,and other computer security topics.

A)United States Computer Emergency Readiness Team (US-CERT)
B)United States Computer Query Emergency Team (US-CQET)
C)United States Computer Emergency Encryption Team (US-CEET)
D)United States Computer Emergency Authority Team (US-CEAT)
سؤال
_____ is a three-digit number above the signature panel on the back of a credit card.

A)Personal identification number
B)Card verification value
C)Automated teller machine
D)Know your customer digits
سؤال
In the context of an advanced persistent threat,identify the phase during which an intruder is ready to access unprotected or compromised systems.

A)The reconnaissance phase
B)The discovery phase
C)The capture phase
D)The export phase
سؤال
Which of the following statements best defines cyberterrorism?

A)It involves the deployment of malware that secretly steals data in the computer systems of organizations.
B)It is the unintended release of sensitive data or the access of sensitive data by unauthorized individuals.
C)It is a network attack in which an intruder gains access to a network and stays undetected with the intention of stealing data over a long period of time.
D)It is the intimidation of a government by using information technology to disable critical national infrastructure to achieve ideological goals.
سؤال
Ricky,an employee of Gycl Inc.,has unknowingly shared his company's tender details and appraisal structure with the market competitor.This is an example of _____.

A)smishing
B)phishing
C)data breach
D)identity theft
سؤال
Identify the industry that is considered as a high-value target for cyberterrorists.

A)Automobile industry
B)Logistics industry
C)Gas industry
D)Health industry
سؤال
_____ occurs when the personal information of an individual is stolen and used.

A)Trustworthy computing
B)Cyberespionage
C)Cyberterrorism
D)Identity theft
سؤال
Identify a true statement about the incursion phase in an advanced persistent threat.

A)An intruder gains useful information about the target.
B)An intruder establishes a means of accessing a computer program that bypasses security mechanisms.
C)An intruder gathers valid user credentials and installs backdoors for distributing malware.
D)An intruder is ready to access compromised systems and capture information.
سؤال
_____ is the unintended access of sensitive data by unauthorized individuals.

A)A risk exportation
B)A data breach
C)Cyberterrorism
D)Rifting
سؤال
_____ is a method of computing that delivers secure,private,and reliable computing experiences based on sound business practices.

A)Cloud computing
B)Trustworthy computing
C)Mobile computing
D)Cluster computing
سؤال
Macros can insert unwanted words,numbers,or phrases into documents or alter command functions.
سؤال
Which intrusion detection system (IDS)contains information about specific attacks and system vulnerabilities?

A)Knowledge-based IDS
B)Behavior-based IDS
C)Threat-based IDS
D)Risk-based IDS
سؤال
An industrial spy hacks computers or Web sites in an attempt to promote a political ideology.
سؤال
Which of the following statements defines an intrusion detection system (IDS)?

A)An IDS is a discipline that combines elements of law and computer science to identify,collect,examine,and preserve data from computer systems,networks,and storage devices.
B)An IDS evaluates an organization's security policy.
C)An IDS indicates the presence of a specific virus.
D)An IDS is software and/or hardware that monitors system and network resources for breaches.
سؤال
Worms propagate without human intervention and send copies of themselves to other computers via email.
سؤال
Explain the different phases of an advanced persistent threat (APT).
سؤال
A Trojan horse abuses email systems to send unsolicited email to large numbers of people.
سؤال
What are the characteristics of a good antivirus software?
سؤال
In an advanced persistent threat,the intruder gains useful information about the target in the incursion stage.
سؤال
What are the steps that can be taken by organizations to safeguard people from phishing,smishing,and vishing scams?
سؤال
Which of the following defines computer forensics?

A)It is a discipline that combines elements of law and computer science to identify,collect,examine,and preserve data from computer systems,networks,and storage devices.
B)It evaluates an organization's security policy.
C)It detects viruses in a computer system and quarantines them.
D)It is the software and/or hardware that monitors system and network resources and notifies network security personnel when it detects network traffic that attempts to circumvent the security measures of a networked computer environment.
سؤال
Which of the following is true of a virus signature?

A)It quarantines the virus present in a system.
B)It indicates the presence of a specific virus in a system.
C)It temporarily stops the activities of a detected virus.
D)It deletes a detected virus completely.
سؤال
A rootkit can be disinfected without formatting the hard disk or reinstalling the operating system.
سؤال
Firewalls are used to block access to certain Web sites.
سؤال
In the context of an information technology risk assessment,assets refer to hardware components only.
سؤال
Explain the need for a security audit in an organization.
سؤال
In a smishing scam,people receive a legitimate-looking text message on their phone telling them to call a specific phone number or to log on to a Web site.
سؤال
What are the steps involved in a general security risk assessment process?
سؤال
A distributed denial-of-service attack involves infiltration of target systems.
سؤال
A thorough _____ should test system safeguards to ensure that they are operating as intended.

A)internet audit
B)cost audit
C)software audit
D)security audit
فتح الحزمة
قم بالتسجيل لفتح البطاقات في هذه المجموعة!
Unlock Deck
Unlock Deck
1/80
auto play flashcards
العب
simple tutorial
ملء الشاشة (f)
exit full mode
Deck 11: Cybercrime and It Security
1
Which of the following statements is true about worms?

A)They abuse email systems to send unsolicited email to large numbers of people.
B)They allow hackers to destroy hard drives,corrupt files,and steal passwords by recording keystrokes and transmitting them to a server operated by a third party.
C)They insert unwanted words,numbers,or phrases into documents or alter command functions in an infected document.
D)They propagate without human intervention,often sending copies of themselves to other computers by email.
D
2
Identify a true statement about the bring your own device (BYOD)business policy.

A)It can improve employee productivity.
B)It can provide data security.
C)It creates a bug-free environment.
D)It enhances employee interaction.
A
3
Which of the following best describes a cybercriminal?

A)An individual who attacks a computer system or network for financial gain
B)An individual who hacks computers or Web sites in an attempt to promote a political ideology
C)An individual who attempts to destroy the infrastructure components of governments and financial institutions
D)An individual who is hired by an organization to test the security of its information systems
A
4
Which of the following is a drawback of the bring your own device (BYOD)business policy?

A)It affects the productivity of the employees of a company.
B)It inhibits the privacy of the employees of a company.
C)It exposes a company's data to malware.
D)It creates the image of a company as not being flexible.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
5
Which of the following is true of a macro virus?

A)It propagates without human intervention,often sending copies of itself to other computers by email.
B)It allows hackers to destroy hard drives,corrupt files,and steal passwords by recording keystrokes and transmitting them to a server operated by a third party.
C)It inserts unwanted words,numbers,or phrases into documents or alters command functions in an infected document.
D)It abuses email systems to send unsolicited email to large numbers of people.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
6
In the context of computer crimes,those who attempt to destroy the infrastructure components of governments and financial institutions are known as _____.

A)hacktivists
B)white hat hackers
C)black hat hackers
D)cyberterrorists
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
7
A _____ is a harmful program that resides in the active memory of a computer and duplicates itself.

A)scareware
B)worm
C)virus
D)logic bomb
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
8
_____ is a program in which malicious code is hidden inside a seemingly harmless program.

A)A Trojan horse
B)A distributed denial-of-service attack
C)A spam
D)A smish
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
9
How does a worm negatively impact an organization?

A)It steals passwords and Social Security numbers.
B)It generates and grades tests that humans can pass but all but the most sophisticated computer programs cannot.
C)It causes productivity losses due to workers being unable to use their computers.
D)It fraudulently uses third-party emails to try to get the recipient to reveal personal data.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
10
Which of the following is a technical description of a virus?

A)It is a harmful program that involves the use of Short Message Service to get personal details from victims.
B)It is the act of fraudulently using email to try to get the recipient to reveal personal data.
C)It is a piece of code that causes a computer to behave in an unexpected and usually undesirable manner.
D)It is the abuse of email systems to send unsolicited email to large numbers of people.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
11
The attack that takes place before a software developer knows about the vulnerability is known as a(n)_____.

A)unidentified attack
B)zero-day attack
C)exploit
D)threat
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
12
In computing,a(n)_____ is an attack on an information system that takes advantage of a particular system vulnerability.

A)exit door
B)glitch
C)bot
D)exploit
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
13
Which perpetrator violates computer or Internet security maliciously for illegal personal gain?

A)A red hat hacker
B)A gray hat hacker
C)A white hat hacker
D)A black hat hacker
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
14
Which of the following best describes a hacktivist?

A)An individual who attempts to destroy the infrastructure components of governments,financial institutions,utilities,and emergency response units
B)An individual who hacks computers or Web sites in an attempt to promote a political ideology
C)An employee or contractor who attempts to gain financially and/or disrupt a company's information systems and business operations
D)An individual who captures trade secrets and attempts to gain an unfair competitive advantage
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
15
Which of the following best describes malicious insiders?

A)They hack computers in an attempt to promote a political ideology.
B)They disrupt a company's information systems and business operations.
C)They are hired by an organization to test the security of its information systems.
D)They are hired by an organization to test the security of another organization's information systems.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
16
In the context of computer crimes,those who cause problems,steal data,and corrupt systems are known as _____.

A)black hat hackers
B)white hat hackers
C)hacktivists
D)crackers
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
17
Which of the following exploits when downloaded onto a smartphone takes control of the device and its data until the owner agrees to pay a sum of money to the attacker?

A)Camware
B)Spyware
C)Scareware
D)Ransomware
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
18
Which of the following is true of white hat hackers?

A)They are hired by an organization to test the security of its information systems.
B)They disrupt a company's information systems and business operations.
C)They capture trade secrets and attempt to gain an unfair competitive advantage in a company.
D)They destroy the infrastructure components of governments,financial institutions,and emergency response units.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
19
Which of the following is created and issued by software engineers to remove a system vulnerability?

A)A patch
B)A key
C)A license
D)A constraint
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
20
Those who capture trade secrets and attempt to gain an unfair competitive advantage are known as _____.

A)white hat hackers
B)hacktivists
C)industrial spies
D)black hat hackers
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
21
Which of the following is used to ensure that only humans obtain free email accounts?

A)Atomicity,consistency,isolation,and durability (ACID)
B)Microprocessor without Interlocked Pipeline Stages (MIPS)
C)Completely Automated Public Turing Test to Tell Computers and Humans Apart (CAPTCHA)
D)Document Style Semantics and Specification Language (DSSSL)
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
22
Which of the following best describes spear-phishing?

A)The phisher sends a survey to the employees of several organizations to obtain details of the configuration of their computing devices.
B)The phisher sends a voice mail message to a number of people to call a phone number or access a Web site.
C)The phisher sends legitimate-looking text messages through his or her phone to advertise a certain organization.
D)The phisher sends fraudulent emails to a certain organization's employees disguising them as mails from high-level executives from within the organization.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
23
Botnet computers are also called _____.

A)zombies
B)daemons
C)narutus
D)konohas
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
24
_____ is the abuse of email systems to send unsolicited email to large numbers of people.

A)Cyberespionage
B)Spam
C)Phishing
D)Smishing
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
25
Identify a true statement about smishing.

A)The phisher sends legitimate-looking messages through phone to acquire personal information.
B)The phisher sends a survey email to obtain the configuration of an unsuspecting user's computing device.
C)The phisher sends a voice mail message to an unsuspecting user to call a phone number or access a Web site.
D)The phisher sends fraudulent emails to a certain organization's employees.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
26
Identify the attack in which a malicious hacker floods a target site with demands for data and other small tasks.

A)Distributed denial-of-service
B)Smishing
C)Logic bomb
D)Phishing
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
27
Identify the mode of message transmission used in vishing.

A)Multimedia Messaging Service
B)Short Message Service
C)Email
D)Voice mail
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
28
Identify a true statement about Trojan horses.

A)They lead consumers to counterfeit Web sites designed to trick them into divulging personal data.
B)They are used by organizations to test the security of information systems.
C)They involve the use of Short Message Service (SMS)texting for phishing.
D)They spy on users by recording keystrokes and transmitting them to a server operated by a third party.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
29
Identify the mode of message transmission used in smishing.

A)Multimedia Messaging Service
B)Short Message Service
C)Email
D)Voice mail
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
30
Which of the following defines a rootkit?

A)It is the act of fraudulently using email to try to get the recipient to reveal personal data by sending legitimate-looking emails urging the recipient to take action to avoid a negative consequence or to receive a reward.
B)It is the unintended release of sensitive data by unauthorized individuals.
C)It is the abuse of email systems to send unsolicited email to large numbers of people.
D)It is a set of programs that enables its user to gain administrator-level access to a computer without the end user's consent or knowledge.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
31
The _____ code of a rootkit gets the rootkit installation started and can be activated by clicking on a link to a malicious Web site in an email or opening an infected PDF file.

A)dropper
B)loader
C)linker
D)adapter
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
32
Jack was shocked to witness the sudden drop in performance of his laptop.He also found that the screen saver constant changed and that the taskbar had disappeared.The given problems are symptoms of _____ infections.

A)rootkit
B)smishing
C)phishing
D)bootkit
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
33
Andrew,a writer,noticed that his blog was filled with repetitive advertisements and surveys that prevented him from accessing his blog and editing an article.Which of the following has caused this problem?

A)A rootkit
B)A distributed denial-of-service attack
C)A logic bomb attack
D)A cyberespionage incident
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
34
David,a software engineer,was creating a report using Microsoft Word.After completing 15 pages in the file,he noticed that whenever he copied something using the keyboard,the contents were modified with unwanted numbers and phrases.Which of the following could have caused this problem?

A)A worm
B)Smishing
C)A logic bomb
D)Phishing
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
35
Which of the following is true of spam?

A)Spam is a type of attack with which a hacker takes over computers via the Internet and causes them to flood a target site with demands for data and other small tasks.
B)Spam is a program in which malicious code is hidden inside a seemingly harmless program.
C)Spam is a set of programs that enables its user to gain administrator-level access to a computer without the end user's consent or knowledge.
D)Spam is an extremely inexpensive method of marketing used by many legitimate organizations.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
36
Which of the following statements is true of the Controlling the Assault of Non-Solicited Pornography and Marketing (CAN-SPAM)Act?

A)It legalizes spamming with certain restrictions.
B)It provides a solution to tackle a Trojan horse.
C)It identifies distributed denial-of-service attacks.
D)It prevents worms by eliminating their ability to replicate.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
37
Which of the following terms is used to describe a large group of computers controlled from one or more remote locations by hackers without the knowledge of their owners?

A)Spear-phishing
B)Botnet
C)Cyberespionage
D)Smishing
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
38
_____ is the act of fraudulently using email to try to get the recipient to reveal personal data.

A)Spoofing
B)Vishing
C)Phishing
D)Smishing
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
39
A(n)_____ is a network attack in which an intruder gains access to a network and stays undetected with the intention of stealing data.

A)advanced persistent threat
B)vishing scam
C)identity threat
D)data breach
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
40
A _____ is used by attackers to execute files,access logs,monitor user activity,and change a computer's configuration.

A)scareware
B)patch
C)rootkit
D)worm
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
41
In the context of general security risk assessment,which of the following is true of the concept of reasonable assurance?

A)It decides whether or not to implement a particular countermeasure against attacks.
B)It recognizes that managers must use their judgment to ensure that the cost of control does not exceed a system's benefits.
C)It recognizes the loss events or the risks or threats that could occur,such as a distributed denial-of-service attack or insider fraud.
D)It determines the impact of each threat occurrence.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
42
To reduce the potential for online credit card fraud,most e-commerce Web sites use some form of _____ technology to protect information as it comes in from the consumer.

A)encryption
B)authentication
C)authorization
D)indexing
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
43
Which of the following statements best describes the export phase of an advanced persistent threat?

A)The data captured by an attacker is sent to the attacker's home base for analysis.
B)An attacker establishes a computer program that bypasses security mechanisms.
C)An attacker is ready to access compromised systems and capture information.
D)The valid user credentials gathered by an attacker is used to install backdoors for distributing malware.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
44
Which of the following statements is true of the discovery phase of an advanced persistent threat?

A)An intruder gains useful information about the target.
B)An intruder establishes a computer program that bypasses security mechanisms.
C)An intruder is ready to access compromised systems and capture information.
D)An intruder gathers valid user credentials and installs backdoors for distributing malware.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
45
Identify the primary security threat for mobile devices.

A)Distributed denial-of-service attack
B)Cyberterrorism
C)Cyberespionage
D)Theft of device
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
46
_____ involves the deployment of malware that secretly steals data in the computer systems of organizations.

A)Cyberterrorism
B)Smishing
C)Cyberespionage
D)Vishing
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
47
The additional security option,used for credit card transactions,that keeps track of a customer's historical shopping patterns and notes deviations from the norm is _____.

A)transaction incognito mode
B)transaction identification code
C)transaction-spam control software
D)transaction-risk scoring software
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
48
Which of the following uses encryption to provide secure access to a remote computer over the Internet?

A)Virtual private network (VPN)
B)File transfer protocol (FTP)
C)Indexing
D)Data warehousing
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
49
Which of the following limits network access based on an organization's access policy?

A)An antivirus software
B)The concept of Reasonable assurance
C)A firewall
D)A browser
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
50
Which phase of an advanced persistent threat enables an intruder to gain useful information about the target?

A)The discovery phase
B)The capture phase
C)The reconnaissance phase
D)The incursion phase
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
51
_____ serves as a clearinghouse for information on new viruses,worms,and other computer security topics.

A)United States Computer Emergency Readiness Team (US-CERT)
B)United States Computer Query Emergency Team (US-CQET)
C)United States Computer Emergency Encryption Team (US-CEET)
D)United States Computer Emergency Authority Team (US-CEAT)
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
52
_____ is a three-digit number above the signature panel on the back of a credit card.

A)Personal identification number
B)Card verification value
C)Automated teller machine
D)Know your customer digits
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
53
In the context of an advanced persistent threat,identify the phase during which an intruder is ready to access unprotected or compromised systems.

A)The reconnaissance phase
B)The discovery phase
C)The capture phase
D)The export phase
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
54
Which of the following statements best defines cyberterrorism?

A)It involves the deployment of malware that secretly steals data in the computer systems of organizations.
B)It is the unintended release of sensitive data or the access of sensitive data by unauthorized individuals.
C)It is a network attack in which an intruder gains access to a network and stays undetected with the intention of stealing data over a long period of time.
D)It is the intimidation of a government by using information technology to disable critical national infrastructure to achieve ideological goals.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
55
Ricky,an employee of Gycl Inc.,has unknowingly shared his company's tender details and appraisal structure with the market competitor.This is an example of _____.

A)smishing
B)phishing
C)data breach
D)identity theft
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
56
Identify the industry that is considered as a high-value target for cyberterrorists.

A)Automobile industry
B)Logistics industry
C)Gas industry
D)Health industry
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
57
_____ occurs when the personal information of an individual is stolen and used.

A)Trustworthy computing
B)Cyberespionage
C)Cyberterrorism
D)Identity theft
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
58
Identify a true statement about the incursion phase in an advanced persistent threat.

A)An intruder gains useful information about the target.
B)An intruder establishes a means of accessing a computer program that bypasses security mechanisms.
C)An intruder gathers valid user credentials and installs backdoors for distributing malware.
D)An intruder is ready to access compromised systems and capture information.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
59
_____ is the unintended access of sensitive data by unauthorized individuals.

A)A risk exportation
B)A data breach
C)Cyberterrorism
D)Rifting
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
60
_____ is a method of computing that delivers secure,private,and reliable computing experiences based on sound business practices.

A)Cloud computing
B)Trustworthy computing
C)Mobile computing
D)Cluster computing
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
61
Macros can insert unwanted words,numbers,or phrases into documents or alter command functions.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
62
Which intrusion detection system (IDS)contains information about specific attacks and system vulnerabilities?

A)Knowledge-based IDS
B)Behavior-based IDS
C)Threat-based IDS
D)Risk-based IDS
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
63
An industrial spy hacks computers or Web sites in an attempt to promote a political ideology.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
64
Which of the following statements defines an intrusion detection system (IDS)?

A)An IDS is a discipline that combines elements of law and computer science to identify,collect,examine,and preserve data from computer systems,networks,and storage devices.
B)An IDS evaluates an organization's security policy.
C)An IDS indicates the presence of a specific virus.
D)An IDS is software and/or hardware that monitors system and network resources for breaches.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
65
Worms propagate without human intervention and send copies of themselves to other computers via email.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
66
Explain the different phases of an advanced persistent threat (APT).
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
67
A Trojan horse abuses email systems to send unsolicited email to large numbers of people.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
68
What are the characteristics of a good antivirus software?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
69
In an advanced persistent threat,the intruder gains useful information about the target in the incursion stage.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
70
What are the steps that can be taken by organizations to safeguard people from phishing,smishing,and vishing scams?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
71
Which of the following defines computer forensics?

A)It is a discipline that combines elements of law and computer science to identify,collect,examine,and preserve data from computer systems,networks,and storage devices.
B)It evaluates an organization's security policy.
C)It detects viruses in a computer system and quarantines them.
D)It is the software and/or hardware that monitors system and network resources and notifies network security personnel when it detects network traffic that attempts to circumvent the security measures of a networked computer environment.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
72
Which of the following is true of a virus signature?

A)It quarantines the virus present in a system.
B)It indicates the presence of a specific virus in a system.
C)It temporarily stops the activities of a detected virus.
D)It deletes a detected virus completely.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
73
A rootkit can be disinfected without formatting the hard disk or reinstalling the operating system.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
74
Firewalls are used to block access to certain Web sites.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
75
In the context of an information technology risk assessment,assets refer to hardware components only.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
76
Explain the need for a security audit in an organization.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
77
In a smishing scam,people receive a legitimate-looking text message on their phone telling them to call a specific phone number or to log on to a Web site.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
78
What are the steps involved in a general security risk assessment process?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
79
A distributed denial-of-service attack involves infiltration of target systems.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
80
A thorough _____ should test system safeguards to ensure that they are operating as intended.

A)internet audit
B)cost audit
C)software audit
D)security audit
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
locked card icon
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.