Filters
Question type

Study Flashcards

Give arguments for and against hiring former hackers to enhance security.

Correct Answer

Answered by ExamLex AI

Answered by ExamLex AI

Arguments for hiring former hackers to e...

View Answer

MATCHING -phishing


A) an attack in which hackers overload a target site with requests for information.
B) hacking to promote a political cause
C) Web sites that are specifically designed to be attractive to hackers
D) sending millions of emails fishing for information to use to impersonate someone and steal money or goods
E) planting false Internet addresses in the tables on a Domain Name Server (DNS) so that when someone types a URL, they are re-directed to a bogus site
F) biological characteristics that are unique to an individual
G) written defamation
H) verbal defamation
I) a law which covers unauthorized access to computers over which the federal government has jurisdiction, such as government computers, financial systems, medical
J) systems, and activities that involve computers in more than one state

Correct Answer

verifed

verified

MATCHING -biometrics


A) an attack in which hackers overload a target site with requests for information.
B) hacking to promote a political cause
C) Web sites that are specifically designed to be attractive to hackers
D) sending millions of emails fishing for information to use to impersonate someone and steal money or goods
E) planting false Internet addresses in the tables on a Domain Name Server (DNS) so that when someone types a URL, they are re-directed to a bogus site
F) biological characteristics that are unique to an individual
G) written defamation
H) verbal defamation
I) a law which covers unauthorized access to computers over which the federal government has jurisdiction, such as government computers, financial systems, medical
J) systems, and activities that involve computers in more than one state

Correct Answer

verifed

verified

F

Which of the following is NOT a program used by hackers to gain access to your computer:


A) Keyloggers
B) Trojans
C) Rootkits
D) Honey pots

Correct Answer

verifed

verified

MATCHING -pharming


A) an attack in which hackers overload a target site with requests for information.
B) hacking to promote a political cause
C) Web sites that are specifically designed to be attractive to hackers
D) sending millions of emails fishing for information to use to impersonate someone and steal money or goods
E) planting false Internet addresses in the tables on a Domain Name Server (DNS) so that when someone types a URL, they are re-directed to a bogus site
F) biological characteristics that are unique to an individual
G) written defamation
H) verbal defamation
I) a law which covers unauthorized access to computers over which the federal government has jurisdiction, such as government computers, financial systems, medical
J) systems, and activities that involve computers in more than one state

Correct Answer

verifed

verified

The government cannot monitor online activity of suspected hackers without a court order.

Correct Answer

verifed

verified

Computer forensics specialists cannot recover deleted files from an erased disk.

Correct Answer

verifed

verified

MATCHING -slander


A) an attack in which hackers overload a target site with requests for information.
B) hacking to promote a political cause
C) Web sites that are specifically designed to be attractive to hackers
D) sending millions of emails fishing for information to use to impersonate someone and steal money or goods
E) planting false Internet addresses in the tables on a Domain Name Server (DNS) so that when someone types a URL, they are re-directed to a bogus site
F) biological characteristics that are unique to an individual
G) written defamation
H) verbal defamation
I) a law which covers unauthorized access to computers over which the federal government has jurisdiction, such as government computers, financial systems, medical
J) systems, and activities that involve computers in more than one state

Correct Answer

verifed

verified

In 2000, a French court ordered Yahoo! to block access by French people to


A) Web sites containing pornography
B) an Al Qaeda training manual
C) online auction sites containing Nazi materials
D) a Web site containing instructions for making bombs

Correct Answer

verifed

verified

C

Web sites that look attractive to hackers, but are closely monitored so that everything the hacker does at the site is recorded and studied are known as:


A) Honey pots
B) Digital surveillance
C) Computer entrapment
D) Hacker crackdown

Correct Answer

verifed

verified

Give two ways to identify an email as a phishing attempt

Correct Answer

Answered by ExamLex AI

Answered by ExamLex AI

There are several ways to identify an em...

View Answer

Why is "harmless hacking" not harmless?

Correct Answer

Answered by ExamLex AI

Answered by ExamLex AI

The term "harmless hacking" might sugges...

View Answer

a. Briefly define identity theft. b. Describe two techniques criminals can use to gather the information they need to steal an identity. c. Describe two ways a person can protect their identity. d. Describe two ways a business can protect its customers from identity thieves.

Correct Answer

Answered by ExamLex AI

Answered by ExamLex AI

a. Identity theft is the fraudulent acqu...

View Answer

MATCHING -honey pots


A) an attack in which hackers overload a target site with requests for information.
B) hacking to promote a political cause
C) Web sites that are specifically designed to be attractive to hackers
D) sending millions of emails fishing for information to use to impersonate someone and steal money or goods
E) planting false Internet addresses in the tables on a Domain Name Server (DNS) so that when someone types a URL, they are re-directed to a bogus site
F) biological characteristics that are unique to an individual
G) written defamation
H) verbal defamation
I) a law which covers unauthorized access to computers over which the federal government has jurisdiction, such as government computers, financial systems, medical
J) systems, and activities that involve computers in more than one state

Correct Answer

verifed

verified

C

In the context of Internet content that some countries prohibit, discuss how the "responsibility to prevent access" differs from the "authority to prevent entry". Include examples.

Correct Answer

Answered by ExamLex AI

Answered by ExamLex AI

The "responsibility to prevent access" a...

View Answer

MATCHING -hactivism


A) an attack in which hackers overload a target site with requests for information.
B) hacking to promote a political cause
C) Web sites that are specifically designed to be attractive to hackers
D) sending millions of emails fishing for information to use to impersonate someone and steal money or goods
E) planting false Internet addresses in the tables on a Domain Name Server (DNS) so that when someone types a URL, they are re-directed to a bogus site
F) biological characteristics that are unique to an individual
G) written defamation
H) verbal defamation
I) a law which covers unauthorized access to computers over which the federal government has jurisdiction, such as government computers, financial systems, medical
J) systems, and activities that involve computers in more than one state

Correct Answer

verifed

verified

MATCHING -libel


A) an attack in which hackers overload a target site with requests for information.
B) hacking to promote a political cause
C) Web sites that are specifically designed to be attractive to hackers
D) sending millions of emails fishing for information to use to impersonate someone and steal money or goods
E) planting false Internet addresses in the tables on a Domain Name Server (DNS) so that when someone types a URL, they are re-directed to a bogus site
F) biological characteristics that are unique to an individual
G) written defamation
H) verbal defamation
I) a law which covers unauthorized access to computers over which the federal government has jurisdiction, such as government computers, financial systems, medical
J) systems, and activities that involve computers in more than one state

Correct Answer

verifed

verified

What are two significant issues raised by the Stuxnet worm, which damaged equipment in a uranium enrichment plant in Iran?

Correct Answer

Answered by ExamLex AI

Answered by ExamLex AI

The Stuxnet worm raised two significant ...

View Answer

In the early days of computing (1960's to the early 1970's) , a "hacker" was:


A) An incompetent programmer who wrote programs that did not work properly
B) A busy programmer who reused code to save time
C) A creative programmer who wrote very elegant or clever programs
D) A new programmer who wrote simple programs

Correct Answer

verifed

verified

How did the USA PATRIOT Act expand the Computer Fraud and Abuse Act?

Correct Answer

Answered by ExamLex AI

Answered by ExamLex AI

The USA PATRIOT Act, which stands for Un...

View Answer

Showing 1 - 20 of 24

Related Exams

Show Answer