Services
Discover
Homeschooling
Ask a Question
Log in
Sign up
Filters
Done
Question type:
Essay
Multiple Choice
Short Answer
True False
Matching
Topic
Philosophy
Study Set
Ethics in Information Technology Study Set 2
Quiz 3: Cyberattacks and Cybersecurity
Path 4
Access For Free
Share
All types
Filters
Study Flashcards
Practice Exam
Learn
Question 21
Multiple Choice
A network attack in which an intruder gains access to a network and stays there, undetected, with the intention of stealing data over a long period of time is known as which of the following?
Question 22
True/False
Installation of a corporate firewall is the least common security precaution taken by businesses as it does not provide sufficient security.
Question 23
Multiple Choice
In computing, a term for any sort of general attack on an information system that takes advantage of a particular system vulnerability is known as which of the following?
Question 24
Multiple Choice
Which of the following is a form of Trojan horse which executes when it is triggered by a specific event such as a change in a particular file, by typing a specific series of keystrokes, or by a specific time or date?
Question 25
Multiple Choice
Which of the following is a federal law that provides a definition of the term cyberterrorism and under which young people primarily involved in what they consider to be minor computer pranks have been tried as cyberterrorist?
Question 26
Multiple Choice
Which of the following is a partnership between the Department of Homeland Security and the public and private sectors, established in 2003 to protect the nation's Internet infrastructure against cyberattacks?