Deck 3: Computer and Internet Crime

ملء الشاشة (f)
exit full mode
سؤال
A zero-day attack is an attack on an information system that takes advantage of a particular system vulnerability before the security community or system developer knows about the vulnerability or has been able to repair it. Such attacks are quite common and occur nearly everyday.
استخدم زر المسافة أو
up arrow
down arrow
لقلب البطاقة.
سؤال
Although the necessity of security is obvious, it must often be balanced against other business needs and issues. As a result, most organizations spend 5 percent or less of their overall IT budget on information security.
سؤال
The Computer Fraud and Abuse Act addresses identity theft.
سؤال
A completed risk assessment identifies the most dangerous threats to a company and helps focus security efforts on the areas of highest payoff.
سؤال
Crackers break into other people's networks and systems to cause harm-defacing Web pages, crashing computers, and spreading harmful programs or hateful messages.
سؤال
The USA Patriot Act defines cyberterrorism as hacking attempts that cause $5,000 in aggregate damage in one year, damage to medical equipment, or injury to any person. Because the $5,000 threshold is easy to exceed, many young people who have been involved in what they consider to be "minor computer pranks" have found that they meet the criteria to be tried as cyberterrorists.
سؤال
Individuals committed to trustworthy computing take a pledge to not send viruses and worms and to refrain from spamming others.
سؤال
According to the 2008 CSI Computer Crime and Security Survey, virus related incidents were the most common security incident.
سؤال
Fraud often involves some form of collusion, or cooperation, between an employee and an outsider.
سؤال
Rootkit is a set of programs that enables its users to gain administrator level access to a computer without the end user's consent or knowledge. Fortunately, rootkits are fairly easy to discover and remove from infected computers.
سؤال
Societe Generale, France's second largest banking establishment, had long had a reputation for having poor internal controls. It is no wonder that a relatively inexperienced trader was able to take advantage of the bank's system of weak internal controls to exceed his trading limit and cause the bank to lose more than €4.9 billion.
سؤال
A distributed denial-of-service attack keeps the target so busy responding to a stream of automated requests that legitimate users cannot access the target.
سؤال
The cost of creating an e-mail campaign for a product or a service can easily exceed the cost of a direct-mail campaign. Such an e-mail campaign also typically takes longer to develop.
سؤال
A hacktivist is a person who wishes to destroy the infrastructure components of financial institutions, utilities, and emergency response units.
سؤال
The security of any system or network is a combination of technology, policy, and people and requires a surprisingly narrow range of activities to be effective.
سؤال
Phishing frequently leads consumers to counterfeit Web sites designed to trick them into initiating a denial-of-service attack.
سؤال
Unlike a computer worm, which requires users to spread infected files to other users, a virus is a harmful program that resides in the active memory of the computer and duplicates itself. A virus can propagate without human intervention.
سؤال
Industrial espionage and competitive intelligence are the same thing.
سؤال
The use of smart cards which contain a memory chip that is updated with encrypted data every time the card is used, is much more popular in the United States than Europe.
سؤال
The cost to repair the worldwide damage done by a computer worm has exceeded $1 billion on more than one occasion.
سؤال
The Societe Generale employee alleged to have committed fraud against the firm that resulted in a loss to the bank of some €4.9 billion was ____.

A) Robert Richardson
B) Jerome Kerviel
C) Daniel Boulton
D) Nicholas Sarkozy
سؤال
A security policy details exactly what needs to be done and how it must be accomplished.
سؤال
It is estimated that about one in ____ personal computers in the United States is part of a botnet.

A) two
B) four
C) six
D) eight
سؤال
Installation of a corporate firewall is the most common security precaution taken by business. Once a good firewall is in place, the organization is safe from future attacks.
سؤال
Whenever possible, automated system rules should mirror an organization's written policies.
سؤال
____ viruses have become a common and easily created form of virus. Attackers use an application macro language to create these programs that infect documents and templates.

A) Macro
B) Logic bomb
C) Trojan horse
D) Application
سؤال
Organizations must define employee roles so that a single employee can input as well as approve purchase orders. Such action is needed to provide adequate redundancy in the event of a pandemic or other form of disaster.
سؤال
A(n) ____ is a term for any sort of general attack on an information system that takes advantage of a particular system vulnerability.

A) exploit
B) zero-day attack
C) virus
D) worm
سؤال
____ is a form of Trojan horse which executes when it is triggered by a specific event such as a change in a particular files, by typing a specific series of keystrokes, or by a specific time or date.

A) Distributed denial-of-service attack
B) Logic bomb
C) Botnet
D) Worm
سؤال
Antivirus software works to prevent an attack by blocking viruses, malformed packets, and other threats from getting into the protected network.
سؤال
While it is important that employees should be well aware of an organization's security policies, this information should not be shared with part-time workers and contractors.
سؤال
____ was a worm that was released in 2007 and caused billions of dollars in damages.

A) Melissa
B) SirCam
C) Code Red
D) Storm
سؤال
An organization can never be prepared for the worst-a successful attack that defeats all or some of a system's defenses and damages data and information systems.
سؤال
____ is a form of security incident that first registered on the CSI Computer Crime and Security Survey in 2007.

A) Laptop theft
B) Denial of service
C) Instant messaging abuse
D) Insider abuse
سؤال
It is not unusual for a security audit to reveal that too many people have access to critical data and that many people have capabilities beyond those needed to perform their jobs.
سؤال
Some IT security experts warn that is will not be long before we see ____ aimed at smartphones to steal user's data or turn them into remote-controlled bots.

A) denial-of-service attacks
B) zero-day attacks
C) zombies
D) exploits
سؤال
A ____ attack keeps the target so busy responding to a stream of automated requests that legitimate users cannot get in.

A) botnet
B) rootkit
C) logic bomb
D) distributed denial-of-service
سؤال
Often a successful attack on an information system is due to poor system design or implementation. Once such a vulnerability is discovered, software developers quickly create and issue a ____ to eliminate the problem.

A) patch
B) bot
C) logic bomb
D) Trojan horse
سؤال
An intrusion prevention system is software and/or hardware that monitors system and network resources and activities, and notifies network security personnel when it identifies possible intrusions from outside the organization or misuse from within the organization.
سؤال
Discussing security attacks through public trials and the associated publicity has not only enormous potential costs in public relations but real monetary costs as well.
سؤال
A strong security program begins by ____.

A) assessing the threats to an organization's computers and network
B) authorizing a large budget to pay for the necessary hardware and software
C) hiring a chief security officer
D) monitoring the network for potential intrusions
سؤال
The ____ is a partnership between the Department of Homeland Security and the public and private sectors, established in 2003 to protect the nation's Internet infrastructure against cyberattacks.

A) Carnegie Mellon's Computer Response Team
B) U.S. Computer Emergency Readiness Team
C) The National Institute of Standards and Technology
D) The Science and Technology Directorate of Homeland Security
سؤال
The ____ code portion of a rootkit gets the rootkit installation started and can be easily activated by clicking on a link to a malicious Website in an e-mail or opening an infected .pdf file.

A) logic bomb
B) zombie
C) dropper
D) loader
سؤال
Part of a thorough security risk assessment is to determine how each threat can be ____ so that it becomes much less likely to occur or, if it does occur, has less of an impact on the organizations.

A) detected
B) mitigated
C) eliminated
D) overcome
سؤال
The concept of ____ recognizes that managers must use their judgment to ensure that the cost of control does not exceed the system's benefits or the risks involved.

A) internal control
B) reasonable assurance
C) separation of duties
D) risk assessment
سؤال
____ have become the primary means for distributing spam, malware, and phishing scams.

A) Spear-phishers
B) Hackers
C) Botnets
D) Logic bombs
سؤال
The ____ is a Federal law that primarily addresses unlawful access to stored electronic communications.

A) USA Patriot Act
B) Computer Fraud and Abuse Act
C) US Code Title 18, Part I, Chapter 121
D) Identity Theft and Assumption Deterrence Act
سؤال
A security policy outlines what needs to be done but not ____ to do it.

A) when
B) where
C) how
D) who
سؤال
Rootkits are designed so cleverly that it is difficult to even discover if they are installed on a computer. The fundamental problem with trying to detect a rootkit is that the operating system cannot be trusted to provide ____.

A) valid test results
B) correct system logon ids
C) the correct date and time
D) sufficent memory for operations
سؤال
____ is an annual gathering in Las Vegas of computer hackers.

A) Woodstock
B) DEFCON
C) Computer Security Institute convention
D) CAPTCHA
سؤال
A software and/or hardware device that monitors system and network resources and activities, and notifies network security personnel when it identifies possible intrusions from outside the organization or misuse from within the organization is a(n) ____.

A) anti-virus device
B) intrusion prevention system
C) intrusion detection system
D) network monitor
سؤال
A(n) ____ works to prevent an attack by blocking viruses, malformed packets, and other threats from getting into the protected network.

A) anti-virus software
B) intrusion prevention system
C) intrusion detection system
D) network monitor
سؤال
____ is (are) the abuse of e-mail systems to send unsolicited e-mail to large numbers of people.

A) Botnets
B) E-mail spam
C) Logic bombs
D) Worms
سؤال
Installation of a(n) ____ is the most common computer security precaution taken by businesses.

A) emergency response team
B) intrusion detection device
C) intrusion prevention device
D) firewall
سؤال
The ____ is a nonregulatory federal agency within the U.S. Department of Commerce whose Computer Security Division develops security standards and technology against threats to the confidentiality, integrity, and availability of information and services.

A) The Science and Technology Directorate of the Department of Homeland Security
B) The U.S. Computer Emergency Response Team
C) Carnegie Mellon Computer Emergency Response Team
D) National Institute of Standards and Technology
سؤال
Edward Davidson ran a spamming operation out of his home that sent hundreds of thousands of spam e-mails. The header information of these e-mails concealed the actual sender from the recipient of the e-mail, a violation of the ____ Act.

A) Patriot
B) CAPTCHA
C) CAN-SPAM
D) Do Not Call
سؤال
Chinese hackers have repeatedly hacked into systems to intercept e-mails between U.S. and UK officials. This is an example of ____.

A) hacktivism
B) industrial spying
C) cyberterrorism
D) cracking
سؤال
The ____ is a type of computer crime perpetrator whose primary motive is to achieve a financial gain.

A) industrial spy
B) cracker
C) cracker
D) cybercriminal
سؤال
Spammers can defeat the registration process of free e-mail services by launching a coordinated ____ attack that can sign up for thousands of untraceable e-mail accounts.

A) distributed denial-of-service attack
B) bot
C) CAPTCHA
D) logic bomb
سؤال
____ has made a strong commitment to support trustworthy computing and defined four pillars of trustworthy computing.

A) IBM
B) Microsoft
C) Oracle
D) Hewlett Packard
سؤال
The use of legal techniques to gather information that is publicly available in order to learn about a competitor is called ____________________.
سؤال
A(n) ____________________ is a program in which malicious code is hidden inside a seemingly harmless program.
سؤال
The ____________________ Act went into effect in 2004 and states that it is legal to spam provided messages meet a few basic requirements.
سؤال
Using e-mail fraudulently to try to get the recipient to reveal personal data is called ____________________.
سؤال
An employee who seeks to disrupt his firm's information systems or to use them to seek financial gain is called a(n) ____________________.
سؤال
People, motivated by the potential for monetary gain, who hack into corporate computers to steal are called ____________________.
سؤال
According to a 2008 CSI Computer Crime and Security Survey, 53 percent of the responding organizations spend 5 percent or less of their overall ____________________ on information security.
سؤال
To initiate a denial-of-service attack, a tiny program is downloaded surreptitiously from the attacker's computer to dozens, hundreds, or even thousands of computers all over the world. Based on a command by the attacker or at a preset time, these computers called ____________________ go into action, each sending a simple request for access to the target site again and again.
سؤال
Estimates of the rate at which software vulnerabilities are discovered around the world ____________________.
سؤال
Spammers can defeat the registration process of free e-mail services by launching a coordinated bot attack that can sign up for thousands of e-mail accounts. A partial solution to this problem is the use of ____________________ to ensure that only humans obtain free accounts.
سؤال
A(n) ____________________ is a type of Trojan horse which executes when it is triggered by a specific event.
سؤال
A card, similar to a debit or credit card which contains a memory chip that is updated with encrypted data every time the card is used is called a ____________________.
سؤال
The sending of fraudulent e-mails to the employees in a specific organization in an attempt to gain personal information is called ____________________.
سؤال
The cooperation between an employee and company outsider to steal money from a firm is called ____________________.
سؤال
People who test the limitations of information systems out of intellectual curiosity to see whether they can gain access and how far they can go are called ____________________.
سؤال
A large group of computers controlled from one or more remote locations by hackers without the knowledge or consent of their owners is called a ____________________.
سؤال
____________________ differ from viruses in that they propagate without human intervention, sending copies of themselves to other computers by e-mail or Internet Relay Chat.
سؤال
Most viruses deliver a "payload" or ____________________ software that causes the computer to behave in an unexpected way.
سؤال
People who use illegal means to obtain trade secrets from a competitor are called ____________________.
سؤال
Spam is a form of low-cost commercial advertising. It may also be used to deliver harmful worms or other ____________________.
فتح الحزمة
قم بالتسجيل لفتح البطاقات في هذه المجموعة!
Unlock Deck
Unlock Deck
1/90
auto play flashcards
العب
simple tutorial
ملء الشاشة (f)
exit full mode
Deck 3: Computer and Internet Crime
1
A zero-day attack is an attack on an information system that takes advantage of a particular system vulnerability before the security community or system developer knows about the vulnerability or has been able to repair it. Such attacks are quite common and occur nearly everyday.
False
2
Although the necessity of security is obvious, it must often be balanced against other business needs and issues. As a result, most organizations spend 5 percent or less of their overall IT budget on information security.
True
3
The Computer Fraud and Abuse Act addresses identity theft.
False
4
A completed risk assessment identifies the most dangerous threats to a company and helps focus security efforts on the areas of highest payoff.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 90 في هذه المجموعة.
فتح الحزمة
k this deck
5
Crackers break into other people's networks and systems to cause harm-defacing Web pages, crashing computers, and spreading harmful programs or hateful messages.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 90 في هذه المجموعة.
فتح الحزمة
k this deck
6
The USA Patriot Act defines cyberterrorism as hacking attempts that cause $5,000 in aggregate damage in one year, damage to medical equipment, or injury to any person. Because the $5,000 threshold is easy to exceed, many young people who have been involved in what they consider to be "minor computer pranks" have found that they meet the criteria to be tried as cyberterrorists.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 90 في هذه المجموعة.
فتح الحزمة
k this deck
7
Individuals committed to trustworthy computing take a pledge to not send viruses and worms and to refrain from spamming others.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 90 في هذه المجموعة.
فتح الحزمة
k this deck
8
According to the 2008 CSI Computer Crime and Security Survey, virus related incidents were the most common security incident.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 90 في هذه المجموعة.
فتح الحزمة
k this deck
9
Fraud often involves some form of collusion, or cooperation, between an employee and an outsider.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 90 في هذه المجموعة.
فتح الحزمة
k this deck
10
Rootkit is a set of programs that enables its users to gain administrator level access to a computer without the end user's consent or knowledge. Fortunately, rootkits are fairly easy to discover and remove from infected computers.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 90 في هذه المجموعة.
فتح الحزمة
k this deck
11
Societe Generale, France's second largest banking establishment, had long had a reputation for having poor internal controls. It is no wonder that a relatively inexperienced trader was able to take advantage of the bank's system of weak internal controls to exceed his trading limit and cause the bank to lose more than €4.9 billion.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 90 في هذه المجموعة.
فتح الحزمة
k this deck
12
A distributed denial-of-service attack keeps the target so busy responding to a stream of automated requests that legitimate users cannot access the target.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 90 في هذه المجموعة.
فتح الحزمة
k this deck
13
The cost of creating an e-mail campaign for a product or a service can easily exceed the cost of a direct-mail campaign. Such an e-mail campaign also typically takes longer to develop.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 90 في هذه المجموعة.
فتح الحزمة
k this deck
14
A hacktivist is a person who wishes to destroy the infrastructure components of financial institutions, utilities, and emergency response units.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 90 في هذه المجموعة.
فتح الحزمة
k this deck
15
The security of any system or network is a combination of technology, policy, and people and requires a surprisingly narrow range of activities to be effective.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 90 في هذه المجموعة.
فتح الحزمة
k this deck
16
Phishing frequently leads consumers to counterfeit Web sites designed to trick them into initiating a denial-of-service attack.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 90 في هذه المجموعة.
فتح الحزمة
k this deck
17
Unlike a computer worm, which requires users to spread infected files to other users, a virus is a harmful program that resides in the active memory of the computer and duplicates itself. A virus can propagate without human intervention.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 90 في هذه المجموعة.
فتح الحزمة
k this deck
18
Industrial espionage and competitive intelligence are the same thing.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 90 في هذه المجموعة.
فتح الحزمة
k this deck
19
The use of smart cards which contain a memory chip that is updated with encrypted data every time the card is used, is much more popular in the United States than Europe.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 90 في هذه المجموعة.
فتح الحزمة
k this deck
20
The cost to repair the worldwide damage done by a computer worm has exceeded $1 billion on more than one occasion.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 90 في هذه المجموعة.
فتح الحزمة
k this deck
21
The Societe Generale employee alleged to have committed fraud against the firm that resulted in a loss to the bank of some €4.9 billion was ____.

A) Robert Richardson
B) Jerome Kerviel
C) Daniel Boulton
D) Nicholas Sarkozy
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 90 في هذه المجموعة.
فتح الحزمة
k this deck
22
A security policy details exactly what needs to be done and how it must be accomplished.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 90 في هذه المجموعة.
فتح الحزمة
k this deck
23
It is estimated that about one in ____ personal computers in the United States is part of a botnet.

A) two
B) four
C) six
D) eight
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 90 في هذه المجموعة.
فتح الحزمة
k this deck
24
Installation of a corporate firewall is the most common security precaution taken by business. Once a good firewall is in place, the organization is safe from future attacks.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 90 في هذه المجموعة.
فتح الحزمة
k this deck
25
Whenever possible, automated system rules should mirror an organization's written policies.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 90 في هذه المجموعة.
فتح الحزمة
k this deck
26
____ viruses have become a common and easily created form of virus. Attackers use an application macro language to create these programs that infect documents and templates.

A) Macro
B) Logic bomb
C) Trojan horse
D) Application
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 90 في هذه المجموعة.
فتح الحزمة
k this deck
27
Organizations must define employee roles so that a single employee can input as well as approve purchase orders. Such action is needed to provide adequate redundancy in the event of a pandemic or other form of disaster.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 90 في هذه المجموعة.
فتح الحزمة
k this deck
28
A(n) ____ is a term for any sort of general attack on an information system that takes advantage of a particular system vulnerability.

A) exploit
B) zero-day attack
C) virus
D) worm
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 90 في هذه المجموعة.
فتح الحزمة
k this deck
29
____ is a form of Trojan horse which executes when it is triggered by a specific event such as a change in a particular files, by typing a specific series of keystrokes, or by a specific time or date.

A) Distributed denial-of-service attack
B) Logic bomb
C) Botnet
D) Worm
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 90 في هذه المجموعة.
فتح الحزمة
k this deck
30
Antivirus software works to prevent an attack by blocking viruses, malformed packets, and other threats from getting into the protected network.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 90 في هذه المجموعة.
فتح الحزمة
k this deck
31
While it is important that employees should be well aware of an organization's security policies, this information should not be shared with part-time workers and contractors.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 90 في هذه المجموعة.
فتح الحزمة
k this deck
32
____ was a worm that was released in 2007 and caused billions of dollars in damages.

A) Melissa
B) SirCam
C) Code Red
D) Storm
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 90 في هذه المجموعة.
فتح الحزمة
k this deck
33
An organization can never be prepared for the worst-a successful attack that defeats all or some of a system's defenses and damages data and information systems.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 90 في هذه المجموعة.
فتح الحزمة
k this deck
34
____ is a form of security incident that first registered on the CSI Computer Crime and Security Survey in 2007.

A) Laptop theft
B) Denial of service
C) Instant messaging abuse
D) Insider abuse
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 90 في هذه المجموعة.
فتح الحزمة
k this deck
35
It is not unusual for a security audit to reveal that too many people have access to critical data and that many people have capabilities beyond those needed to perform their jobs.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 90 في هذه المجموعة.
فتح الحزمة
k this deck
36
Some IT security experts warn that is will not be long before we see ____ aimed at smartphones to steal user's data or turn them into remote-controlled bots.

A) denial-of-service attacks
B) zero-day attacks
C) zombies
D) exploits
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 90 في هذه المجموعة.
فتح الحزمة
k this deck
37
A ____ attack keeps the target so busy responding to a stream of automated requests that legitimate users cannot get in.

A) botnet
B) rootkit
C) logic bomb
D) distributed denial-of-service
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 90 في هذه المجموعة.
فتح الحزمة
k this deck
38
Often a successful attack on an information system is due to poor system design or implementation. Once such a vulnerability is discovered, software developers quickly create and issue a ____ to eliminate the problem.

A) patch
B) bot
C) logic bomb
D) Trojan horse
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 90 في هذه المجموعة.
فتح الحزمة
k this deck
39
An intrusion prevention system is software and/or hardware that monitors system and network resources and activities, and notifies network security personnel when it identifies possible intrusions from outside the organization or misuse from within the organization.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 90 في هذه المجموعة.
فتح الحزمة
k this deck
40
Discussing security attacks through public trials and the associated publicity has not only enormous potential costs in public relations but real monetary costs as well.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 90 في هذه المجموعة.
فتح الحزمة
k this deck
41
A strong security program begins by ____.

A) assessing the threats to an organization's computers and network
B) authorizing a large budget to pay for the necessary hardware and software
C) hiring a chief security officer
D) monitoring the network for potential intrusions
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 90 في هذه المجموعة.
فتح الحزمة
k this deck
42
The ____ is a partnership between the Department of Homeland Security and the public and private sectors, established in 2003 to protect the nation's Internet infrastructure against cyberattacks.

A) Carnegie Mellon's Computer Response Team
B) U.S. Computer Emergency Readiness Team
C) The National Institute of Standards and Technology
D) The Science and Technology Directorate of Homeland Security
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 90 في هذه المجموعة.
فتح الحزمة
k this deck
43
The ____ code portion of a rootkit gets the rootkit installation started and can be easily activated by clicking on a link to a malicious Website in an e-mail or opening an infected .pdf file.

A) logic bomb
B) zombie
C) dropper
D) loader
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 90 في هذه المجموعة.
فتح الحزمة
k this deck
44
Part of a thorough security risk assessment is to determine how each threat can be ____ so that it becomes much less likely to occur or, if it does occur, has less of an impact on the organizations.

A) detected
B) mitigated
C) eliminated
D) overcome
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 90 في هذه المجموعة.
فتح الحزمة
k this deck
45
The concept of ____ recognizes that managers must use their judgment to ensure that the cost of control does not exceed the system's benefits or the risks involved.

A) internal control
B) reasonable assurance
C) separation of duties
D) risk assessment
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 90 في هذه المجموعة.
فتح الحزمة
k this deck
46
____ have become the primary means for distributing spam, malware, and phishing scams.

A) Spear-phishers
B) Hackers
C) Botnets
D) Logic bombs
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 90 في هذه المجموعة.
فتح الحزمة
k this deck
47
The ____ is a Federal law that primarily addresses unlawful access to stored electronic communications.

A) USA Patriot Act
B) Computer Fraud and Abuse Act
C) US Code Title 18, Part I, Chapter 121
D) Identity Theft and Assumption Deterrence Act
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 90 في هذه المجموعة.
فتح الحزمة
k this deck
48
A security policy outlines what needs to be done but not ____ to do it.

A) when
B) where
C) how
D) who
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 90 في هذه المجموعة.
فتح الحزمة
k this deck
49
Rootkits are designed so cleverly that it is difficult to even discover if they are installed on a computer. The fundamental problem with trying to detect a rootkit is that the operating system cannot be trusted to provide ____.

A) valid test results
B) correct system logon ids
C) the correct date and time
D) sufficent memory for operations
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 90 في هذه المجموعة.
فتح الحزمة
k this deck
50
____ is an annual gathering in Las Vegas of computer hackers.

A) Woodstock
B) DEFCON
C) Computer Security Institute convention
D) CAPTCHA
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 90 في هذه المجموعة.
فتح الحزمة
k this deck
51
A software and/or hardware device that monitors system and network resources and activities, and notifies network security personnel when it identifies possible intrusions from outside the organization or misuse from within the organization is a(n) ____.

A) anti-virus device
B) intrusion prevention system
C) intrusion detection system
D) network monitor
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 90 في هذه المجموعة.
فتح الحزمة
k this deck
52
A(n) ____ works to prevent an attack by blocking viruses, malformed packets, and other threats from getting into the protected network.

A) anti-virus software
B) intrusion prevention system
C) intrusion detection system
D) network monitor
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 90 في هذه المجموعة.
فتح الحزمة
k this deck
53
____ is (are) the abuse of e-mail systems to send unsolicited e-mail to large numbers of people.

A) Botnets
B) E-mail spam
C) Logic bombs
D) Worms
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 90 في هذه المجموعة.
فتح الحزمة
k this deck
54
Installation of a(n) ____ is the most common computer security precaution taken by businesses.

A) emergency response team
B) intrusion detection device
C) intrusion prevention device
D) firewall
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 90 في هذه المجموعة.
فتح الحزمة
k this deck
55
The ____ is a nonregulatory federal agency within the U.S. Department of Commerce whose Computer Security Division develops security standards and technology against threats to the confidentiality, integrity, and availability of information and services.

A) The Science and Technology Directorate of the Department of Homeland Security
B) The U.S. Computer Emergency Response Team
C) Carnegie Mellon Computer Emergency Response Team
D) National Institute of Standards and Technology
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 90 في هذه المجموعة.
فتح الحزمة
k this deck
56
Edward Davidson ran a spamming operation out of his home that sent hundreds of thousands of spam e-mails. The header information of these e-mails concealed the actual sender from the recipient of the e-mail, a violation of the ____ Act.

A) Patriot
B) CAPTCHA
C) CAN-SPAM
D) Do Not Call
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 90 في هذه المجموعة.
فتح الحزمة
k this deck
57
Chinese hackers have repeatedly hacked into systems to intercept e-mails between U.S. and UK officials. This is an example of ____.

A) hacktivism
B) industrial spying
C) cyberterrorism
D) cracking
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 90 في هذه المجموعة.
فتح الحزمة
k this deck
58
The ____ is a type of computer crime perpetrator whose primary motive is to achieve a financial gain.

A) industrial spy
B) cracker
C) cracker
D) cybercriminal
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 90 في هذه المجموعة.
فتح الحزمة
k this deck
59
Spammers can defeat the registration process of free e-mail services by launching a coordinated ____ attack that can sign up for thousands of untraceable e-mail accounts.

A) distributed denial-of-service attack
B) bot
C) CAPTCHA
D) logic bomb
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 90 في هذه المجموعة.
فتح الحزمة
k this deck
60
____ has made a strong commitment to support trustworthy computing and defined four pillars of trustworthy computing.

A) IBM
B) Microsoft
C) Oracle
D) Hewlett Packard
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 90 في هذه المجموعة.
فتح الحزمة
k this deck
61
The use of legal techniques to gather information that is publicly available in order to learn about a competitor is called ____________________.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 90 في هذه المجموعة.
فتح الحزمة
k this deck
62
A(n) ____________________ is a program in which malicious code is hidden inside a seemingly harmless program.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 90 في هذه المجموعة.
فتح الحزمة
k this deck
63
The ____________________ Act went into effect in 2004 and states that it is legal to spam provided messages meet a few basic requirements.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 90 في هذه المجموعة.
فتح الحزمة
k this deck
64
Using e-mail fraudulently to try to get the recipient to reveal personal data is called ____________________.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 90 في هذه المجموعة.
فتح الحزمة
k this deck
65
An employee who seeks to disrupt his firm's information systems or to use them to seek financial gain is called a(n) ____________________.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 90 في هذه المجموعة.
فتح الحزمة
k this deck
66
People, motivated by the potential for monetary gain, who hack into corporate computers to steal are called ____________________.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 90 في هذه المجموعة.
فتح الحزمة
k this deck
67
According to a 2008 CSI Computer Crime and Security Survey, 53 percent of the responding organizations spend 5 percent or less of their overall ____________________ on information security.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 90 في هذه المجموعة.
فتح الحزمة
k this deck
68
To initiate a denial-of-service attack, a tiny program is downloaded surreptitiously from the attacker's computer to dozens, hundreds, or even thousands of computers all over the world. Based on a command by the attacker or at a preset time, these computers called ____________________ go into action, each sending a simple request for access to the target site again and again.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 90 في هذه المجموعة.
فتح الحزمة
k this deck
69
Estimates of the rate at which software vulnerabilities are discovered around the world ____________________.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 90 في هذه المجموعة.
فتح الحزمة
k this deck
70
Spammers can defeat the registration process of free e-mail services by launching a coordinated bot attack that can sign up for thousands of e-mail accounts. A partial solution to this problem is the use of ____________________ to ensure that only humans obtain free accounts.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 90 في هذه المجموعة.
فتح الحزمة
k this deck
71
A(n) ____________________ is a type of Trojan horse which executes when it is triggered by a specific event.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 90 في هذه المجموعة.
فتح الحزمة
k this deck
72
A card, similar to a debit or credit card which contains a memory chip that is updated with encrypted data every time the card is used is called a ____________________.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 90 في هذه المجموعة.
فتح الحزمة
k this deck
73
The sending of fraudulent e-mails to the employees in a specific organization in an attempt to gain personal information is called ____________________.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 90 في هذه المجموعة.
فتح الحزمة
k this deck
74
The cooperation between an employee and company outsider to steal money from a firm is called ____________________.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 90 في هذه المجموعة.
فتح الحزمة
k this deck
75
People who test the limitations of information systems out of intellectual curiosity to see whether they can gain access and how far they can go are called ____________________.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 90 في هذه المجموعة.
فتح الحزمة
k this deck
76
A large group of computers controlled from one or more remote locations by hackers without the knowledge or consent of their owners is called a ____________________.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 90 في هذه المجموعة.
فتح الحزمة
k this deck
77
____________________ differ from viruses in that they propagate without human intervention, sending copies of themselves to other computers by e-mail or Internet Relay Chat.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 90 في هذه المجموعة.
فتح الحزمة
k this deck
78
Most viruses deliver a "payload" or ____________________ software that causes the computer to behave in an unexpected way.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 90 في هذه المجموعة.
فتح الحزمة
k this deck
79
People who use illegal means to obtain trade secrets from a competitor are called ____________________.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 90 في هذه المجموعة.
فتح الحزمة
k this deck
80
Spam is a form of low-cost commercial advertising. It may also be used to deliver harmful worms or other ____________________.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 90 في هذه المجموعة.
فتح الحزمة
k this deck
locked card icon
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 90 في هذه المجموعة.