Services
Discover
Homeschooling
Ask a Question
Log in
Sign up
Filters
Done
Question type:
Essay
Multiple Choice
Short Answer
True False
Matching
Topic
Philosophy
Study Set
Ethics in Information Technology
Quiz 3: Computer and Internet Crime
Path 4
Access For Free
Share
All types
Filters
Study Flashcards
Practice Exam
Learn
Question 21
Multiple Choice
The Societe Generale employee alleged to have committed fraud against the firm that resulted in a loss to the bank of some β¬4.9 billion was ____.
Question 22
True/False
A security policy details exactly what needs to be done and how it must be accomplished.
Question 23
Multiple Choice
It is estimated that about one in ____ personal computers in the United States is part of a botnet.
Question 24
True/False
Installation of a corporate firewall is the most common security precaution taken by business. Once a good firewall is in place, the organization is safe from future attacks.
Question 25
True/False
Whenever possible, automated system rules should mirror an organization's written policies.
Question 26
Multiple Choice
____ viruses have become a common and easily created form of virus. Attackers use an application macro language to create these programs that infect documents and templates.
Question 27
True/False
Organizations must define employee roles so that a single employee can input as well as approve purchase orders. Such action is needed to provide adequate redundancy in the event of a pandemic or other form of disaster.
Question 28
Multiple Choice
A(n) ____ is a term for any sort of general attack on an information system that takes advantage of a particular system vulnerability.
Question 29
Multiple Choice
____ is a form of Trojan horse which executes when it is triggered by a specific event such as a change in a particular files, by typing a specific series of keystrokes, or by a specific time or date.
Question 30
True/False
Antivirus software works to prevent an attack by blocking viruses, malformed packets, and other threats from getting into the protected network.
Question 31
True/False
While it is important that employees should be well aware of an organization's security policies, this information should not be shared with part-time workers and contractors.
Question 32
Multiple Choice
____ was a worm that was released in 2007 and caused billions of dollars in damages.
Question 33
True/False
An organization can never be prepared for the worst-a successful attack that defeats all or some of a system's defenses and damages data and information systems.
Question 34
Multiple Choice
____ is a form of security incident that first registered on the CSI Computer Crime and Security Survey in 2007.
Question 35
True/False
It is not unusual for a security audit to reveal that too many people have access to critical data and that many people have capabilities beyond those needed to perform their jobs.
Question 36
Multiple Choice
Some IT security experts warn that is will not be long before we see ____ aimed at smartphones to steal user's data or turn them into remote-controlled bots.
Question 37
Multiple Choice
A ____ attack keeps the target so busy responding to a stream of automated requests that legitimate users cannot get in.
Question 38
Multiple Choice
Often a successful attack on an information system is due to poor system design or implementation. Once such a vulnerability is discovered, software developers quickly create and issue a ____ to eliminate the problem.