All of the following were top cybercrimes reported to the ic3 in 2013 except ________.
Answer
Correct Answer:
Theft of services
Note: This Question is unanswered, help us to find answer for this one
All of the following are true of virus protection software packages except ________.
Answer
Correct Answer:
You can only scan the entire computer each time you perform a scan
Note: This Question is unanswered, help us to find answer for this one
The popularity of social networking is increasing most rapidly _____.
Answer
Correct Answer:
Over all ages
Note: This Question is unanswered, help us to find answer for this one
Government impersonation scams involve ________.
Answer
Correct Answer:
People pretending to represent official organizations such as the Dept. of Homeland Security or IRS
Note: This Question is unanswered, help us to find answer for this one
Creating and distributing ________ is one of the most widespread types of cybercrimes
Answer
Correct Answer:
Computer viruses.
Note: This Question is unanswered, help us to find answer for this one
A packet analyzer is a program that can enable a hacker to do all of the following except ________.
Answer
Correct Answer:
Launch a denial of service (DoS) attack on your computer
Note: This Question is unanswered, help us to find answer for this one
Weber described bureaucracies as the ____________ of modern life.
Answer
Correct Answer:
Iron Cage
Note: This Question is unanswered, help us to find answer for this one
Representative democracy uses _____ of the voters to discuss the issues and make decisions.
Answer
Correct Answer:
Representatives
Note: This Question is unanswered, help us to find answer for this one
An encryption ______ is a set of steps that converts readable text into unreadable text.
Answer
Correct Answer:
Algorithm
Note: This Question is unanswered, help us to find answer for this one
A(n) _____ is a representation of a virtual world visitor.
Answer
Correct Answer:
Avatar
Note: This Question is unanswered, help us to find answer for this one
A botnet is a ____.
Answer
Correct Answer:
network of computers that send out access requests to servers repeatedly
Note: This Question is unanswered, help us to find answer for this one
A ____ is commonly packaged with a new computer system.
Answer
Correct Answer:
Rescue disk
Note: This Question is unanswered, help us to find answer for this one
A computer ____ is malicious computer code that reproduces itself on the same computer.
Answer
Correct Answer:
Virus
Note: This Question is unanswered, help us to find answer for this one
The sql injection statement ____ determines the names of different fields in a database.
Answer
Correct Answer:
Whatever' AND email IS NULL; --
Note: This Question is unanswered, help us to find answer for this one
A(n) ________ takes advantage of file transport methods to spread on its own.
Answer
Correct Answer:
Worm
Note: This Question is unanswered, help us to find answer for this one
_____ built a virtual world model of its salt lake refinery for training new operators.
Answer
Correct Answer:
Chevron
Note: This Question is unanswered, help us to find answer for this one
A replay attack _____.
Answer
Correct Answer:
Makes a copy of the transmission for use at a later time
Note: This Question is unanswered, help us to find answer for this one
Malware programs that masquerade as system files are called ________.
Answer
Correct Answer:
Trojan horses
Note: This Question is unanswered, help us to find answer for this one
In a denial-of-service (ddos) attack, the perpetrator ____.
Answer
Correct Answer:
Instructs the zombie computers to send simple access requests to target computers
Note: This Question is unanswered, help us to find answer for this one
The development of social media means that ________
Answer
Correct Answer:
In the computer age, typical social networks now link more people
Note: This Question is unanswered, help us to find answer for this one
The choice of a research method is also referred to as the ________.
Answer
Correct Answer:
Research design
Note: This Question is unanswered, help us to find answer for this one
The best defense against malware is _____________.
Answer
Correct Answer:
Antivirus software
Note: This Question is unanswered, help us to find answer for this one
The process of capturing and recording network traffic is referred to as _____.
Answer
Correct Answer:
Sniffing
Note: This Question is unanswered, help us to find answer for this one
Viruses differ from worms because worms ________.
Answer
Correct Answer:
Can operate on their own without attaching to other computer program files
Note: This Question is unanswered, help us to find answer for this one
With ________, the sender and receiver transmit a message using different keys.
Answer
Correct Answer:
Asymmetric encryption
Note: This Question is unanswered, help us to find answer for this one
Using your computer for non-work activities while you are being paid to work is known as ________.
Answer
Correct Answer:
Cyberloafing
Note: This Question is unanswered, help us to find answer for this one
Rules for creating passwords include all of the following, except ________.
Answer
Correct Answer:
Use a dictionary to find a lengthy word that is easy to remember
Note: This Question is unanswered, help us to find answer for this one
Most packets are part of the ________ state.
Answer
Correct Answer:
Neither connection opening nor connection closing
Note: This Question is unanswered, help us to find answer for this one
Level 1 security involves ____.
Answer
Correct Answer:
Front-end servers
Note: This Question is unanswered, help us to find answer for this one
Large amounts of data stored in electronic form are ________ than the same data in manual form.
Answer
Correct Answer:
Vulnerable to many more kinds of threats
Note: This Question is unanswered, help us to find answer for this one
In information security, an example of a threat agent can be ____.
Answer
Correct Answer:
A force of nature such as a tornado that could destroy computer equipment, A virus that attacks a computer network, A person attempting to break into a secure computer network
Note: This Question is unanswered, help us to find answer for this one
Establishing a risk level of malware threats to an organization is an example of _______________.
Answer
Correct Answer:
Risk assessment
Note: This Question is unanswered, help us to find answer for this one
Botnets are designed to steal _____ from the victim.
Answer
Correct Answer:
Computing resources
Note: This Question is unanswered, help us to find answer for this one
Antivirus software products require that you update _____ on a regular basis.
Answer
Correct Answer:
Virus definitions
Note: This Question is unanswered, help us to find answer for this one
Antivirus software looks for ____ to detect viruses in files.
Answer
Correct Answer:
Virus signatures
Note: This Question is unanswered, help us to find answer for this one
An information system’s _____ is the possibility that the system will be harmed by a threat.
Answer
Correct Answer:
Vuknerability
Note: This Question is unanswered, help us to find answer for this one
_____________ are the main source of distributed denial of service (ddos) attacks and spam.
Answer
Correct Answer:
Botnets
Note: This Question is unanswered, help us to find answer for this one
________ includes computer viruses, worms, and trojan horses.
Answer
Correct Answer:
Malware
Note: This Question is unanswered, help us to find answer for this one
_____ is a standalone, self-replicating, malicious program designed to spread to other computers
Answer
Correct Answer:
Computer worm
Note: This Question is unanswered, help us to find answer for this one
____ ensures that only authorized parties can view information.
Answer
Correct Answer:
Confidentiality
Note: This Question is unanswered, help us to find answer for this one
____ ensures data security and integrity over public networks, such as the internet.
Answer
Correct Answer:
Transport Layer Security
Note: This Question is unanswered, help us to find answer for this one