Deck 3: Computer and Internet Crime

Full screen (f)
exit full mode
Question
The security of any system or network is a combination of technology, policy, and people and requires a wide range of activities to be effective.
Use Space or
up arrow
down arrow
to flip the card.
Question
A security policy outlines exactly what needs to be done to safeguard computers and their data, but not how it must be accomplished.
Question
Smart and talented hackers who are technically inept are referred to as lamers or script kiddies by more skilled hackers.
Question
The cost of creating an email campaign for a product or a service is typically more expensive and takes longer to conduct than a direct-mail campaign.
Question
A spear-phishing attack typically employs a group of zombies to keep the target so busy responding to a stream of automated requests that legitimate users cannot access the target.
Question
Competitive intelligence is conducted by industrial spies.
Question
Malicious insiders mean well but have the potential to cause considerable damage through their actions.
Question
According to the 2010/11 CSI Computer Crime and Security Survey, malware infection incidents were the most common security incident.
Question
Vishing frequently leads consumers to counterfeit Web sites designed to trick them into initiating a denial-of-service attack.
Question
The cost to repair the worldwide damage done by a computer worm has exceeded $1 billion on more than one occasion.
Question
Whenever possible, automated system rules should mirror an organization's written policies.
Question
The Fifth Amendment regulates the collection of the content of wire and electronic communications.
Question
The USA Patriot Act defines cyberterrorism as hacking attempts that cause $5,000 in aggregate damage in one year to medical equipment, or that cause injury to any person.
Question
Computer forensics is such a new field that there is little training or certification processes available to practioners.
Question
A completed risk assessment identifies the most dangerous threats to a company and helps focus security efforts on the areas of highest payoff.
Question
Trojan horse has become an umbrella term for many types of malicious code.
Question
Employees and contract workers must be educated about the importance of security so that they will be motivated to understand and follow the security policies.
Question
Rootkit is a set of programs that enables its users to gain administrator-level access to a computer without the end
user's consent or knowledge.
Question
Computer viruses differ from worms in that viruses can propagate without human intervention, often sending copies of themselves to other computers by email.
Question
Fraud by malicious insiders often involves some form of collusion, or cooperation, between an employee and an outsider.
Question
Often a successful attack on an information system is due to poor system design or implementation. Once such a vulnerability is discovered, software developers quickly create and issue a to eliminate the problem.

A) patch
B) bot
C) rootkit
D) Trojan horse
Question
Hacktivism involves using illegal means to obtain trade secrets from competitors.
Question
Installation of a corporate firewall is the least common security precaution taken by businesses as it does not provide sufficient security.
Question
Spammers can defeat the registration process of free email services by launching a coordinated attack that can sign up for thousands of untraceable email accounts.

A) distributed denial-of-service
B) bot
C) CAPTCHA
D) logic bomb
Question
The protects against unreasonable search and seizure.

A) Fourth Amendment
B) Fifth Amendment
C) Wiretap Act
D) Pen Registers and Trap and Trace Devices Statute
Question
Discussing security attacks through public trials and the associated publicity has not only enormous potential costs in public relations but real monetary costs as well.
Question
In a security incident, the primary goal must be to regain control and limit damage, and not to attempt to monitor or catch an intruder.
Question
The code gets a rootkit installation started and can be easily activated by clicking on a link to a malicious Web site in an email or opening an infected PDF file.

A) logic bomb
B) zombie
C) dropper
D) loader
Question
is the abuse of email systems to send unsolicited email to large numbers of people.

A) A botnet
B) Spam
C) Logic bombing
D) A worm
Question
As a safeguard against attacks by malicious insiders, organizations must define employee roles so that a single employee can input as well as approve purchase orders.
Question
The is a federal law that provides a definition of the term cyberterrorism and under which young people primarily involved in what they consider to be minor computer pranks have been tried as cyberterrorists.
A) Stored Wire and Electronic Communications and Transactional Records Access Statutes

A) USA Patriot Act
B) ?Identity Theft and Assumption Deterrence Act
B) Computer Fraud and Abuse Act
Question
The use of cloud computing and virtualization software has significantly reduced computer security concerns.
Question
The concept of recognizes that managers must use their judgment to ensure that the cost of control does not exceed the system's benefits or the risks involved.

A) competitive intelligence
B) reasonable assurance
C) separation of duties
D) risk assessment
Question
Competitive intelligence combines elements of law and computer science to identify, collect, examine, and preserve data so that it is admissible in a court of law.
Question
test the limitations of information systems out of intellectual curiosity to see whether they can gain access and how far they can go.

A) Industrial spies
B) Hackers
C) Cyberterrorists
D) Hacktivists
Question
An intrusion detection system monitors system and network resources and activities, and notifies the network security when it detects attempts to circumvent the security measures of a networked computer environment.
Question
It is not unusual for a security audit to reveal that too many people have access to critical data and that many people have capabilities beyond those needed to perform their jobs.
Question
The fundamental problem with trying to detect a rootkit is that the operating system cannot be trusted to provide _____.

A) valid test results
B) correct system login ids
C) the correct date and time
D) sufficient memory for operations
Question
Even when preventive measures are implemented, no organization is completely secure from a determined computer attack.
Question
The is a partnership between the Department of Homeland Security and the public and private sectors, established in 2003 to protect the nation's Internet infrastructure against cyberattacks.

A) Carnegie Mellon's Computer Response Team
B) U.S. Computer Emergency Readiness Team
C) The National Institute of Standards and Technology
D) The Science and Technology Directorate of Homeland Security
Question
In computing, a(n) is a term for any sort of general attack on an information system that takes advantage of a particular system vulnerability.

A) exploit
B) patch
C) firewall
D) security audit
Question
An antivirus software scans for a specific sequence of bytes, known as a , that indicates the presence of specific malware.

A) script kiddie
B) virus signature
C) CAPTCHA
D) Trojan horse
Question
operates in a software layer that runs on top of the operating system.
Question
pledged to deliver on a trustworthy computing initiative and defined four pillars of trustworthy computing.

A) IBM
B) Microsoft
C) Oracle
D) Hewlett Packard
Question
A is a form of Trojan horse which executes when it is triggered by a specific event such as a change in a particular file, by typing a specific series of keystrokes, or by a specific time or date.

A) denial-of-service attack
B) logic bomb
C) botnet
D) rootkit
Question
is an annual gathering in Las Vegas of computer hackers.

A) Woodstock
B) DEFCON
C) Computer Security Institute convention
D) CAPTCHA
Question
are poorly trained and inadequately managed employees who mean well but have the potential to cause much damage.

A) Whistleblowers
B) Negligent insiders
C) Malicious insiders
D) Industrial spies
Question
The regulates the collection of the content of wire and electronic communications.

A) Fourth Amendment
B) Fifth Amendment
C) Wiretap Act
D) Pen Registers and Trap and Trace Devices Statute
Question
A software and/or hardware that monitors system and network resources and activities, and notifies network security personnel when it identifies network traffic that attempts to circumvent the security measures of a networked computer environment is a(n) .

A) anti-virus device
B) intrusion prevention system
C) intrusion detection system
D) virtual private network
Question
is the sending of fraudulent emails to an organization's employees designed to look like they came from high­ level executives from within the organization.

A) Spamdexing
B) Vishing
C) Smishing
D) Spear-phishing
Question
Installation of a corporate is the most common computer security precaution taken by businesses.

A) emergency response team
B) rootkit
C) virtual private network
D) firewall
Question
A strong security program begins by .

A) assessing the threats to an organization's computers and network
B) authorizing a large budget to pay for the necessary hardware and software
C) hiring a chief security officer
D) monitoring the network for potential intrusions
Question
A attack keeps the target so busy responding to a stream of automated requests that legitimate users cannot get in.

A) spam
B) rootkit
C) logic bomb
D) distributed denial-of-service
Question
The policy is a template available from the SANS Institute that defines the means to establish a culture of openness, trust, and integrity in business practices.

A) information sensitivity
B) risk assessment
C) ethics
D) voice-mail policy
Question
A(n) works by using the Internet to relay communications; it maintains privacy through security procedures and tunneling protocols, which encrypt data at the sending end and decrypt it at the receiving end.

A) firewall
B) social network
C) intrusion detection device
D) virtual private network
Question
Before the IT security group can begin an eradication effort, it must .

A) seek permission of the firm's legal counsel
B) collect and log all possible criminal evidence from the system
C) consider the potential for negative publicity
D) develop an estimate for the monetary damage caused
Question
A is defined as an exploit that takes place before the security community or software developer knows about the vulnerability or has been able to repair it.

A) logic bomb
B) DDoS attack
C) zero-day attack
D) rootkit
Question
A(n) is a type of computer crime perpetrator whose primary motive is to achieve financial gain.

A) industrial spy
B) hacktivist
C) script kiddie
D) cybercriminal
Question
is the act of fraudulently using email to try to get the recipient to reveal personal data.

A) Pharming
B) Phishing
C) Spamdexing
D) Flyposting
Question
Technically, a(n) is a piece of programming code, usually disguised as something else, that causes a computer to behave in an unexpected and usually undesirable manner.

A) virus
B) operating system
C) zombie
D) CAPTCHA
Question
Using text messaging (SMS) fraudulently to try to get the recipient to reveal personal data is called .
Question
A large group of computers controlled from one or more remote locations by hackers without the knowledge or consent of their owners is called a(n) .
Question
detracts recipients from the ability of recipients to communicate effectively due to full mailboxes and relevant emails being hidden among many unsolicited messages.
Question
People who use illegal means to obtain trade secrets from a competitor are called .
Question
has become an umbrella term for many types of malicious code.
Question
A(n) is a security incident prevention tool that evaluates whether an organization has a well-considered security policy in place and if it is being followed.
Question
Spammers can defeat the registration process of free e-mail services by launching a coordinated bot attack that can sign up for thousands of email accounts. A partial solution to this problem is the use of to ensure that only humans obtain free accounts.
Question
A(n) is a harmful program that resides in the active memory of the computer and duplicates itself.
Question
differ from viruses in that they propagate without human intervention, sending copies of themselves to other computers by email.
Question
Hacking to achieve a political or social goal is known as .
Question
The cooperation between an employee of a company and an outsider to commit fraud against the company is called
_____.
Question
The Act went into effect in 2004 and states that it is legal to spam, provided the messages meet a few basic requirements.
Question
is legally obtained information gathered using sources available to the public.
Question
A(n) is a form of malware in which malicious code is hidden inside a seemingly harmless program.
Question
To initiate a denial­of­service attack, a tiny program is downloaded surreptitiously from the attacker's computer to dozens, hundreds, or even thousands of computers all over the world. Based on a command by the attacker or at a preset time, the botnet computers, called , go into action, each sending a simple request for access to the target site again and again.
Question
The encourages private industry to share confidential information about the nation's critical infrastructure with the Department of Homeland Security under the assurance that the information will be protected from public disclosure.
Question
The Act addresses the disclosure of stored wired and electronic communications and transaction records by Internet service providers.
Question
The use of voice mail to tell someone to call a phone number, or access a Web site, in an attempt to gain personal information about that person is called .
Question
An employee who seeks to disrupt his firm's information systems or to use them to seek financial gain is called a(n)
_____.
Question
Workers in many organizations operate in a(n) environment in which software and data storage are services provided via the Internet.
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/89
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 3: Computer and Internet Crime
1
The security of any system or network is a combination of technology, policy, and people and requires a wide range of activities to be effective.
True
2
A security policy outlines exactly what needs to be done to safeguard computers and their data, but not how it must be accomplished.
True
3
Smart and talented hackers who are technically inept are referred to as lamers or script kiddies by more skilled hackers.
True
4
The cost of creating an email campaign for a product or a service is typically more expensive and takes longer to conduct than a direct-mail campaign.
Unlock Deck
Unlock for access to all 89 flashcards in this deck.
Unlock Deck
k this deck
5
A spear-phishing attack typically employs a group of zombies to keep the target so busy responding to a stream of automated requests that legitimate users cannot access the target.
Unlock Deck
Unlock for access to all 89 flashcards in this deck.
Unlock Deck
k this deck
6
Competitive intelligence is conducted by industrial spies.
Unlock Deck
Unlock for access to all 89 flashcards in this deck.
Unlock Deck
k this deck
7
Malicious insiders mean well but have the potential to cause considerable damage through their actions.
Unlock Deck
Unlock for access to all 89 flashcards in this deck.
Unlock Deck
k this deck
8
According to the 2010/11 CSI Computer Crime and Security Survey, malware infection incidents were the most common security incident.
Unlock Deck
Unlock for access to all 89 flashcards in this deck.
Unlock Deck
k this deck
9
Vishing frequently leads consumers to counterfeit Web sites designed to trick them into initiating a denial-of-service attack.
Unlock Deck
Unlock for access to all 89 flashcards in this deck.
Unlock Deck
k this deck
10
The cost to repair the worldwide damage done by a computer worm has exceeded $1 billion on more than one occasion.
Unlock Deck
Unlock for access to all 89 flashcards in this deck.
Unlock Deck
k this deck
11
Whenever possible, automated system rules should mirror an organization's written policies.
Unlock Deck
Unlock for access to all 89 flashcards in this deck.
Unlock Deck
k this deck
12
The Fifth Amendment regulates the collection of the content of wire and electronic communications.
Unlock Deck
Unlock for access to all 89 flashcards in this deck.
Unlock Deck
k this deck
13
The USA Patriot Act defines cyberterrorism as hacking attempts that cause $5,000 in aggregate damage in one year to medical equipment, or that cause injury to any person.
Unlock Deck
Unlock for access to all 89 flashcards in this deck.
Unlock Deck
k this deck
14
Computer forensics is such a new field that there is little training or certification processes available to practioners.
Unlock Deck
Unlock for access to all 89 flashcards in this deck.
Unlock Deck
k this deck
15
A completed risk assessment identifies the most dangerous threats to a company and helps focus security efforts on the areas of highest payoff.
Unlock Deck
Unlock for access to all 89 flashcards in this deck.
Unlock Deck
k this deck
16
Trojan horse has become an umbrella term for many types of malicious code.
Unlock Deck
Unlock for access to all 89 flashcards in this deck.
Unlock Deck
k this deck
17
Employees and contract workers must be educated about the importance of security so that they will be motivated to understand and follow the security policies.
Unlock Deck
Unlock for access to all 89 flashcards in this deck.
Unlock Deck
k this deck
18
Rootkit is a set of programs that enables its users to gain administrator-level access to a computer without the end
user's consent or knowledge.
Unlock Deck
Unlock for access to all 89 flashcards in this deck.
Unlock Deck
k this deck
19
Computer viruses differ from worms in that viruses can propagate without human intervention, often sending copies of themselves to other computers by email.
Unlock Deck
Unlock for access to all 89 flashcards in this deck.
Unlock Deck
k this deck
20
Fraud by malicious insiders often involves some form of collusion, or cooperation, between an employee and an outsider.
Unlock Deck
Unlock for access to all 89 flashcards in this deck.
Unlock Deck
k this deck
21
Often a successful attack on an information system is due to poor system design or implementation. Once such a vulnerability is discovered, software developers quickly create and issue a to eliminate the problem.

A) patch
B) bot
C) rootkit
D) Trojan horse
Unlock Deck
Unlock for access to all 89 flashcards in this deck.
Unlock Deck
k this deck
22
Hacktivism involves using illegal means to obtain trade secrets from competitors.
Unlock Deck
Unlock for access to all 89 flashcards in this deck.
Unlock Deck
k this deck
23
Installation of a corporate firewall is the least common security precaution taken by businesses as it does not provide sufficient security.
Unlock Deck
Unlock for access to all 89 flashcards in this deck.
Unlock Deck
k this deck
24
Spammers can defeat the registration process of free email services by launching a coordinated attack that can sign up for thousands of untraceable email accounts.

A) distributed denial-of-service
B) bot
C) CAPTCHA
D) logic bomb
Unlock Deck
Unlock for access to all 89 flashcards in this deck.
Unlock Deck
k this deck
25
The protects against unreasonable search and seizure.

A) Fourth Amendment
B) Fifth Amendment
C) Wiretap Act
D) Pen Registers and Trap and Trace Devices Statute
Unlock Deck
Unlock for access to all 89 flashcards in this deck.
Unlock Deck
k this deck
26
Discussing security attacks through public trials and the associated publicity has not only enormous potential costs in public relations but real monetary costs as well.
Unlock Deck
Unlock for access to all 89 flashcards in this deck.
Unlock Deck
k this deck
27
In a security incident, the primary goal must be to regain control and limit damage, and not to attempt to monitor or catch an intruder.
Unlock Deck
Unlock for access to all 89 flashcards in this deck.
Unlock Deck
k this deck
28
The code gets a rootkit installation started and can be easily activated by clicking on a link to a malicious Web site in an email or opening an infected PDF file.

A) logic bomb
B) zombie
C) dropper
D) loader
Unlock Deck
Unlock for access to all 89 flashcards in this deck.
Unlock Deck
k this deck
29
is the abuse of email systems to send unsolicited email to large numbers of people.

A) A botnet
B) Spam
C) Logic bombing
D) A worm
Unlock Deck
Unlock for access to all 89 flashcards in this deck.
Unlock Deck
k this deck
30
As a safeguard against attacks by malicious insiders, organizations must define employee roles so that a single employee can input as well as approve purchase orders.
Unlock Deck
Unlock for access to all 89 flashcards in this deck.
Unlock Deck
k this deck
31
The is a federal law that provides a definition of the term cyberterrorism and under which young people primarily involved in what they consider to be minor computer pranks have been tried as cyberterrorists.
A) Stored Wire and Electronic Communications and Transactional Records Access Statutes

A) USA Patriot Act
B) ?Identity Theft and Assumption Deterrence Act
B) Computer Fraud and Abuse Act
Unlock Deck
Unlock for access to all 89 flashcards in this deck.
Unlock Deck
k this deck
32
The use of cloud computing and virtualization software has significantly reduced computer security concerns.
Unlock Deck
Unlock for access to all 89 flashcards in this deck.
Unlock Deck
k this deck
33
The concept of recognizes that managers must use their judgment to ensure that the cost of control does not exceed the system's benefits or the risks involved.

A) competitive intelligence
B) reasonable assurance
C) separation of duties
D) risk assessment
Unlock Deck
Unlock for access to all 89 flashcards in this deck.
Unlock Deck
k this deck
34
Competitive intelligence combines elements of law and computer science to identify, collect, examine, and preserve data so that it is admissible in a court of law.
Unlock Deck
Unlock for access to all 89 flashcards in this deck.
Unlock Deck
k this deck
35
test the limitations of information systems out of intellectual curiosity to see whether they can gain access and how far they can go.

A) Industrial spies
B) Hackers
C) Cyberterrorists
D) Hacktivists
Unlock Deck
Unlock for access to all 89 flashcards in this deck.
Unlock Deck
k this deck
36
An intrusion detection system monitors system and network resources and activities, and notifies the network security when it detects attempts to circumvent the security measures of a networked computer environment.
Unlock Deck
Unlock for access to all 89 flashcards in this deck.
Unlock Deck
k this deck
37
It is not unusual for a security audit to reveal that too many people have access to critical data and that many people have capabilities beyond those needed to perform their jobs.
Unlock Deck
Unlock for access to all 89 flashcards in this deck.
Unlock Deck
k this deck
38
The fundamental problem with trying to detect a rootkit is that the operating system cannot be trusted to provide _____.

A) valid test results
B) correct system login ids
C) the correct date and time
D) sufficient memory for operations
Unlock Deck
Unlock for access to all 89 flashcards in this deck.
Unlock Deck
k this deck
39
Even when preventive measures are implemented, no organization is completely secure from a determined computer attack.
Unlock Deck
Unlock for access to all 89 flashcards in this deck.
Unlock Deck
k this deck
40
The is a partnership between the Department of Homeland Security and the public and private sectors, established in 2003 to protect the nation's Internet infrastructure against cyberattacks.

A) Carnegie Mellon's Computer Response Team
B) U.S. Computer Emergency Readiness Team
C) The National Institute of Standards and Technology
D) The Science and Technology Directorate of Homeland Security
Unlock Deck
Unlock for access to all 89 flashcards in this deck.
Unlock Deck
k this deck
41
In computing, a(n) is a term for any sort of general attack on an information system that takes advantage of a particular system vulnerability.

A) exploit
B) patch
C) firewall
D) security audit
Unlock Deck
Unlock for access to all 89 flashcards in this deck.
Unlock Deck
k this deck
42
An antivirus software scans for a specific sequence of bytes, known as a , that indicates the presence of specific malware.

A) script kiddie
B) virus signature
C) CAPTCHA
D) Trojan horse
Unlock Deck
Unlock for access to all 89 flashcards in this deck.
Unlock Deck
k this deck
43
operates in a software layer that runs on top of the operating system.
Unlock Deck
Unlock for access to all 89 flashcards in this deck.
Unlock Deck
k this deck
44
pledged to deliver on a trustworthy computing initiative and defined four pillars of trustworthy computing.

A) IBM
B) Microsoft
C) Oracle
D) Hewlett Packard
Unlock Deck
Unlock for access to all 89 flashcards in this deck.
Unlock Deck
k this deck
45
A is a form of Trojan horse which executes when it is triggered by a specific event such as a change in a particular file, by typing a specific series of keystrokes, or by a specific time or date.

A) denial-of-service attack
B) logic bomb
C) botnet
D) rootkit
Unlock Deck
Unlock for access to all 89 flashcards in this deck.
Unlock Deck
k this deck
46
is an annual gathering in Las Vegas of computer hackers.

A) Woodstock
B) DEFCON
C) Computer Security Institute convention
D) CAPTCHA
Unlock Deck
Unlock for access to all 89 flashcards in this deck.
Unlock Deck
k this deck
47
are poorly trained and inadequately managed employees who mean well but have the potential to cause much damage.

A) Whistleblowers
B) Negligent insiders
C) Malicious insiders
D) Industrial spies
Unlock Deck
Unlock for access to all 89 flashcards in this deck.
Unlock Deck
k this deck
48
The regulates the collection of the content of wire and electronic communications.

A) Fourth Amendment
B) Fifth Amendment
C) Wiretap Act
D) Pen Registers and Trap and Trace Devices Statute
Unlock Deck
Unlock for access to all 89 flashcards in this deck.
Unlock Deck
k this deck
49
A software and/or hardware that monitors system and network resources and activities, and notifies network security personnel when it identifies network traffic that attempts to circumvent the security measures of a networked computer environment is a(n) .

A) anti-virus device
B) intrusion prevention system
C) intrusion detection system
D) virtual private network
Unlock Deck
Unlock for access to all 89 flashcards in this deck.
Unlock Deck
k this deck
50
is the sending of fraudulent emails to an organization's employees designed to look like they came from high­ level executives from within the organization.

A) Spamdexing
B) Vishing
C) Smishing
D) Spear-phishing
Unlock Deck
Unlock for access to all 89 flashcards in this deck.
Unlock Deck
k this deck
51
Installation of a corporate is the most common computer security precaution taken by businesses.

A) emergency response team
B) rootkit
C) virtual private network
D) firewall
Unlock Deck
Unlock for access to all 89 flashcards in this deck.
Unlock Deck
k this deck
52
A strong security program begins by .

A) assessing the threats to an organization's computers and network
B) authorizing a large budget to pay for the necessary hardware and software
C) hiring a chief security officer
D) monitoring the network for potential intrusions
Unlock Deck
Unlock for access to all 89 flashcards in this deck.
Unlock Deck
k this deck
53
A attack keeps the target so busy responding to a stream of automated requests that legitimate users cannot get in.

A) spam
B) rootkit
C) logic bomb
D) distributed denial-of-service
Unlock Deck
Unlock for access to all 89 flashcards in this deck.
Unlock Deck
k this deck
54
The policy is a template available from the SANS Institute that defines the means to establish a culture of openness, trust, and integrity in business practices.

A) information sensitivity
B) risk assessment
C) ethics
D) voice-mail policy
Unlock Deck
Unlock for access to all 89 flashcards in this deck.
Unlock Deck
k this deck
55
A(n) works by using the Internet to relay communications; it maintains privacy through security procedures and tunneling protocols, which encrypt data at the sending end and decrypt it at the receiving end.

A) firewall
B) social network
C) intrusion detection device
D) virtual private network
Unlock Deck
Unlock for access to all 89 flashcards in this deck.
Unlock Deck
k this deck
56
Before the IT security group can begin an eradication effort, it must .

A) seek permission of the firm's legal counsel
B) collect and log all possible criminal evidence from the system
C) consider the potential for negative publicity
D) develop an estimate for the monetary damage caused
Unlock Deck
Unlock for access to all 89 flashcards in this deck.
Unlock Deck
k this deck
57
A is defined as an exploit that takes place before the security community or software developer knows about the vulnerability or has been able to repair it.

A) logic bomb
B) DDoS attack
C) zero-day attack
D) rootkit
Unlock Deck
Unlock for access to all 89 flashcards in this deck.
Unlock Deck
k this deck
58
A(n) is a type of computer crime perpetrator whose primary motive is to achieve financial gain.

A) industrial spy
B) hacktivist
C) script kiddie
D) cybercriminal
Unlock Deck
Unlock for access to all 89 flashcards in this deck.
Unlock Deck
k this deck
59
is the act of fraudulently using email to try to get the recipient to reveal personal data.

A) Pharming
B) Phishing
C) Spamdexing
D) Flyposting
Unlock Deck
Unlock for access to all 89 flashcards in this deck.
Unlock Deck
k this deck
60
Technically, a(n) is a piece of programming code, usually disguised as something else, that causes a computer to behave in an unexpected and usually undesirable manner.

A) virus
B) operating system
C) zombie
D) CAPTCHA
Unlock Deck
Unlock for access to all 89 flashcards in this deck.
Unlock Deck
k this deck
61
Using text messaging (SMS) fraudulently to try to get the recipient to reveal personal data is called .
Unlock Deck
Unlock for access to all 89 flashcards in this deck.
Unlock Deck
k this deck
62
A large group of computers controlled from one or more remote locations by hackers without the knowledge or consent of their owners is called a(n) .
Unlock Deck
Unlock for access to all 89 flashcards in this deck.
Unlock Deck
k this deck
63
detracts recipients from the ability of recipients to communicate effectively due to full mailboxes and relevant emails being hidden among many unsolicited messages.
Unlock Deck
Unlock for access to all 89 flashcards in this deck.
Unlock Deck
k this deck
64
People who use illegal means to obtain trade secrets from a competitor are called .
Unlock Deck
Unlock for access to all 89 flashcards in this deck.
Unlock Deck
k this deck
65
has become an umbrella term for many types of malicious code.
Unlock Deck
Unlock for access to all 89 flashcards in this deck.
Unlock Deck
k this deck
66
A(n) is a security incident prevention tool that evaluates whether an organization has a well-considered security policy in place and if it is being followed.
Unlock Deck
Unlock for access to all 89 flashcards in this deck.
Unlock Deck
k this deck
67
Spammers can defeat the registration process of free e-mail services by launching a coordinated bot attack that can sign up for thousands of email accounts. A partial solution to this problem is the use of to ensure that only humans obtain free accounts.
Unlock Deck
Unlock for access to all 89 flashcards in this deck.
Unlock Deck
k this deck
68
A(n) is a harmful program that resides in the active memory of the computer and duplicates itself.
Unlock Deck
Unlock for access to all 89 flashcards in this deck.
Unlock Deck
k this deck
69
differ from viruses in that they propagate without human intervention, sending copies of themselves to other computers by email.
Unlock Deck
Unlock for access to all 89 flashcards in this deck.
Unlock Deck
k this deck
70
Hacking to achieve a political or social goal is known as .
Unlock Deck
Unlock for access to all 89 flashcards in this deck.
Unlock Deck
k this deck
71
The cooperation between an employee of a company and an outsider to commit fraud against the company is called
_____.
Unlock Deck
Unlock for access to all 89 flashcards in this deck.
Unlock Deck
k this deck
72
The Act went into effect in 2004 and states that it is legal to spam, provided the messages meet a few basic requirements.
Unlock Deck
Unlock for access to all 89 flashcards in this deck.
Unlock Deck
k this deck
73
is legally obtained information gathered using sources available to the public.
Unlock Deck
Unlock for access to all 89 flashcards in this deck.
Unlock Deck
k this deck
74
A(n) is a form of malware in which malicious code is hidden inside a seemingly harmless program.
Unlock Deck
Unlock for access to all 89 flashcards in this deck.
Unlock Deck
k this deck
75
To initiate a denial­of­service attack, a tiny program is downloaded surreptitiously from the attacker's computer to dozens, hundreds, or even thousands of computers all over the world. Based on a command by the attacker or at a preset time, the botnet computers, called , go into action, each sending a simple request for access to the target site again and again.
Unlock Deck
Unlock for access to all 89 flashcards in this deck.
Unlock Deck
k this deck
76
The encourages private industry to share confidential information about the nation's critical infrastructure with the Department of Homeland Security under the assurance that the information will be protected from public disclosure.
Unlock Deck
Unlock for access to all 89 flashcards in this deck.
Unlock Deck
k this deck
77
The Act addresses the disclosure of stored wired and electronic communications and transaction records by Internet service providers.
Unlock Deck
Unlock for access to all 89 flashcards in this deck.
Unlock Deck
k this deck
78
The use of voice mail to tell someone to call a phone number, or access a Web site, in an attempt to gain personal information about that person is called .
Unlock Deck
Unlock for access to all 89 flashcards in this deck.
Unlock Deck
k this deck
79
An employee who seeks to disrupt his firm's information systems or to use them to seek financial gain is called a(n)
_____.
Unlock Deck
Unlock for access to all 89 flashcards in this deck.
Unlock Deck
k this deck
80
Workers in many organizations operate in a(n) environment in which software and data storage are services provided via the Internet.
Unlock Deck
Unlock for access to all 89 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 89 flashcards in this deck.