Services
Discover
Homeschooling
Ask a Question
Log in
Sign up
Filters
Done
Question type:
Essay
Multiple Choice
Short Answer
True False
Matching
Topic
Philosophy
Study Set
Ethics in Information Technology Study Set 2
Quiz 3: Cyberattacks and Cybersecurity
Path 4
Access For Free
Share
All types
Filters
Study Flashcards
Practice Exam
Learn
Question 1
True/False
The Controlling the Assault of Non-Solicited Pornography and Marketing (CAN-SPAM) Act states that it is legal to spam, provided the messages meet a few basic requirements.
Question 2
True/False
After virus eradication, you can use a previous backup to restore an infected computer.
Question 3
True/False
Ransomware is malware that stops you from using your computer or accessing your data until you meet certain demands, such as paying a ransom or sending photos to the attacker.
Question 4
True/False
Vishing frequently leads consumers to counterfeit Web sites designed to trick them into initiating a denial-of-service attack.
Question 5
True/False
Employees and contract workers must be educated about the importance of security so that they will be motivated to understand and follow the security policies.
Question 6
True/False
The cost to repair the worldwide damage done by a computer worm has exceeded $1 billion on more than one occasion.
Question 7
True/False
Computer forensics is such a new field that there is little training or certification processes available.
Question 8
True/False
Whenever possible, automated system rules should mirror an organization's written policies.
Question 9
True/False
Trojan horse has become an umbrella term for many types of malicious code.
Question 10
True/False
Computer viruses differ from worms in that viruses can propagate without human intervention, often sending copies of themselves to other computers by email.
Question 11
True/False
Bring your own device (BYOD) is a business policy that permits, and in some cases encourages, employees to use their own mobile devices (smartphones, tablets, or laptops) to access company computing resources and applications.