Deck 11: Cybercrime and It Security

Full screen (f)
exit full mode
Question
Which of the following statements is true about worms?

A)They abuse email systems to send unsolicited email to large numbers of people.
B)They allow hackers to destroy hard drives,corrupt files,and steal passwords by recording keystrokes and transmitting them to a server operated by a third party.
C)They insert unwanted words,numbers,or phrases into documents or alter command functions in an infected document.
D)They propagate without human intervention,often sending copies of themselves to other computers by email.
Use Space or
up arrow
down arrow
to flip the card.
Question
Identify a true statement about the bring your own device (BYOD)business policy.

A)It can improve employee productivity.
B)It can provide data security.
C)It creates a bug-free environment.
D)It enhances employee interaction.
Question
Which of the following best describes a cybercriminal?

A)An individual who attacks a computer system or network for financial gain
B)An individual who hacks computers or Web sites in an attempt to promote a political ideology
C)An individual who attempts to destroy the infrastructure components of governments and financial institutions
D)An individual who is hired by an organization to test the security of its information systems
Question
Which of the following is a drawback of the bring your own device (BYOD)business policy?

A)It affects the productivity of the employees of a company.
B)It inhibits the privacy of the employees of a company.
C)It exposes a company's data to malware.
D)It creates the image of a company as not being flexible.
Question
Which of the following is true of a macro virus?

A)It propagates without human intervention,often sending copies of itself to other computers by email.
B)It allows hackers to destroy hard drives,corrupt files,and steal passwords by recording keystrokes and transmitting them to a server operated by a third party.
C)It inserts unwanted words,numbers,or phrases into documents or alters command functions in an infected document.
D)It abuses email systems to send unsolicited email to large numbers of people.
Question
In the context of computer crimes,those who attempt to destroy the infrastructure components of governments and financial institutions are known as _____.

A)hacktivists
B)white hat hackers
C)black hat hackers
D)cyberterrorists
Question
A _____ is a harmful program that resides in the active memory of a computer and duplicates itself.

A)scareware
B)worm
C)virus
D)logic bomb
Question
_____ is a program in which malicious code is hidden inside a seemingly harmless program.

A)A Trojan horse
B)A distributed denial-of-service attack
C)A spam
D)A smish
Question
How does a worm negatively impact an organization?

A)It steals passwords and Social Security numbers.
B)It generates and grades tests that humans can pass but all but the most sophisticated computer programs cannot.
C)It causes productivity losses due to workers being unable to use their computers.
D)It fraudulently uses third-party emails to try to get the recipient to reveal personal data.
Question
Which of the following is a technical description of a virus?

A)It is a harmful program that involves the use of Short Message Service to get personal details from victims.
B)It is the act of fraudulently using email to try to get the recipient to reveal personal data.
C)It is a piece of code that causes a computer to behave in an unexpected and usually undesirable manner.
D)It is the abuse of email systems to send unsolicited email to large numbers of people.
Question
The attack that takes place before a software developer knows about the vulnerability is known as a(n)_____.

A)unidentified attack
B)zero-day attack
C)exploit
D)threat
Question
In computing,a(n)_____ is an attack on an information system that takes advantage of a particular system vulnerability.

A)exit door
B)glitch
C)bot
D)exploit
Question
Which perpetrator violates computer or Internet security maliciously for illegal personal gain?

A)A red hat hacker
B)A gray hat hacker
C)A white hat hacker
D)A black hat hacker
Question
Which of the following best describes a hacktivist?

A)An individual who attempts to destroy the infrastructure components of governments,financial institutions,utilities,and emergency response units
B)An individual who hacks computers or Web sites in an attempt to promote a political ideology
C)An employee or contractor who attempts to gain financially and/or disrupt a company's information systems and business operations
D)An individual who captures trade secrets and attempts to gain an unfair competitive advantage
Question
Which of the following best describes malicious insiders?

A)They hack computers in an attempt to promote a political ideology.
B)They disrupt a company's information systems and business operations.
C)They are hired by an organization to test the security of its information systems.
D)They are hired by an organization to test the security of another organization's information systems.
Question
In the context of computer crimes,those who cause problems,steal data,and corrupt systems are known as _____.

A)black hat hackers
B)white hat hackers
C)hacktivists
D)crackers
Question
Which of the following exploits when downloaded onto a smartphone takes control of the device and its data until the owner agrees to pay a sum of money to the attacker?

A)Camware
B)Spyware
C)Scareware
D)Ransomware
Question
Which of the following is true of white hat hackers?

A)They are hired by an organization to test the security of its information systems.
B)They disrupt a company's information systems and business operations.
C)They capture trade secrets and attempt to gain an unfair competitive advantage in a company.
D)They destroy the infrastructure components of governments,financial institutions,and emergency response units.
Question
Which of the following is created and issued by software engineers to remove a system vulnerability?

A)A patch
B)A key
C)A license
D)A constraint
Question
Those who capture trade secrets and attempt to gain an unfair competitive advantage are known as _____.

A)white hat hackers
B)hacktivists
C)industrial spies
D)black hat hackers
Question
Which of the following is used to ensure that only humans obtain free email accounts?

A)Atomicity,consistency,isolation,and durability (ACID)
B)Microprocessor without Interlocked Pipeline Stages (MIPS)
C)Completely Automated Public Turing Test to Tell Computers and Humans Apart (CAPTCHA)
D)Document Style Semantics and Specification Language (DSSSL)
Question
Which of the following best describes spear-phishing?

A)The phisher sends a survey to the employees of several organizations to obtain details of the configuration of their computing devices.
B)The phisher sends a voice mail message to a number of people to call a phone number or access a Web site.
C)The phisher sends legitimate-looking text messages through his or her phone to advertise a certain organization.
D)The phisher sends fraudulent emails to a certain organization's employees disguising them as mails from high-level executives from within the organization.
Question
Botnet computers are also called _____.

A)zombies
B)daemons
C)narutus
D)konohas
Question
_____ is the abuse of email systems to send unsolicited email to large numbers of people.

A)Cyberespionage
B)Spam
C)Phishing
D)Smishing
Question
Identify a true statement about smishing.

A)The phisher sends legitimate-looking messages through phone to acquire personal information.
B)The phisher sends a survey email to obtain the configuration of an unsuspecting user's computing device.
C)The phisher sends a voice mail message to an unsuspecting user to call a phone number or access a Web site.
D)The phisher sends fraudulent emails to a certain organization's employees.
Question
Identify the attack in which a malicious hacker floods a target site with demands for data and other small tasks.

A)Distributed denial-of-service
B)Smishing
C)Logic bomb
D)Phishing
Question
Identify the mode of message transmission used in vishing.

A)Multimedia Messaging Service
B)Short Message Service
C)Email
D)Voice mail
Question
Identify a true statement about Trojan horses.

A)They lead consumers to counterfeit Web sites designed to trick them into divulging personal data.
B)They are used by organizations to test the security of information systems.
C)They involve the use of Short Message Service (SMS)texting for phishing.
D)They spy on users by recording keystrokes and transmitting them to a server operated by a third party.
Question
Identify the mode of message transmission used in smishing.

A)Multimedia Messaging Service
B)Short Message Service
C)Email
D)Voice mail
Question
Which of the following defines a rootkit?

A)It is the act of fraudulently using email to try to get the recipient to reveal personal data by sending legitimate-looking emails urging the recipient to take action to avoid a negative consequence or to receive a reward.
B)It is the unintended release of sensitive data by unauthorized individuals.
C)It is the abuse of email systems to send unsolicited email to large numbers of people.
D)It is a set of programs that enables its user to gain administrator-level access to a computer without the end user's consent or knowledge.
Question
The _____ code of a rootkit gets the rootkit installation started and can be activated by clicking on a link to a malicious Web site in an email or opening an infected PDF file.

A)dropper
B)loader
C)linker
D)adapter
Question
Jack was shocked to witness the sudden drop in performance of his laptop.He also found that the screen saver constant changed and that the taskbar had disappeared.The given problems are symptoms of _____ infections.

A)rootkit
B)smishing
C)phishing
D)bootkit
Question
Andrew,a writer,noticed that his blog was filled with repetitive advertisements and surveys that prevented him from accessing his blog and editing an article.Which of the following has caused this problem?

A)A rootkit
B)A distributed denial-of-service attack
C)A logic bomb attack
D)A cyberespionage incident
Question
David,a software engineer,was creating a report using Microsoft Word.After completing 15 pages in the file,he noticed that whenever he copied something using the keyboard,the contents were modified with unwanted numbers and phrases.Which of the following could have caused this problem?

A)A worm
B)Smishing
C)A logic bomb
D)Phishing
Question
Which of the following is true of spam?

A)Spam is a type of attack with which a hacker takes over computers via the Internet and causes them to flood a target site with demands for data and other small tasks.
B)Spam is a program in which malicious code is hidden inside a seemingly harmless program.
C)Spam is a set of programs that enables its user to gain administrator-level access to a computer without the end user's consent or knowledge.
D)Spam is an extremely inexpensive method of marketing used by many legitimate organizations.
Question
Which of the following statements is true of the Controlling the Assault of Non-Solicited Pornography and Marketing (CAN-SPAM)Act?

A)It legalizes spamming with certain restrictions.
B)It provides a solution to tackle a Trojan horse.
C)It identifies distributed denial-of-service attacks.
D)It prevents worms by eliminating their ability to replicate.
Question
Which of the following terms is used to describe a large group of computers controlled from one or more remote locations by hackers without the knowledge of their owners?

A)Spear-phishing
B)Botnet
C)Cyberespionage
D)Smishing
Question
_____ is the act of fraudulently using email to try to get the recipient to reveal personal data.

A)Spoofing
B)Vishing
C)Phishing
D)Smishing
Question
A(n)_____ is a network attack in which an intruder gains access to a network and stays undetected with the intention of stealing data.

A)advanced persistent threat
B)vishing scam
C)identity threat
D)data breach
Question
A _____ is used by attackers to execute files,access logs,monitor user activity,and change a computer's configuration.

A)scareware
B)patch
C)rootkit
D)worm
Question
In the context of general security risk assessment,which of the following is true of the concept of reasonable assurance?

A)It decides whether or not to implement a particular countermeasure against attacks.
B)It recognizes that managers must use their judgment to ensure that the cost of control does not exceed a system's benefits.
C)It recognizes the loss events or the risks or threats that could occur,such as a distributed denial-of-service attack or insider fraud.
D)It determines the impact of each threat occurrence.
Question
To reduce the potential for online credit card fraud,most e-commerce Web sites use some form of _____ technology to protect information as it comes in from the consumer.

A)encryption
B)authentication
C)authorization
D)indexing
Question
Which of the following statements best describes the export phase of an advanced persistent threat?

A)The data captured by an attacker is sent to the attacker's home base for analysis.
B)An attacker establishes a computer program that bypasses security mechanisms.
C)An attacker is ready to access compromised systems and capture information.
D)The valid user credentials gathered by an attacker is used to install backdoors for distributing malware.
Question
Which of the following statements is true of the discovery phase of an advanced persistent threat?

A)An intruder gains useful information about the target.
B)An intruder establishes a computer program that bypasses security mechanisms.
C)An intruder is ready to access compromised systems and capture information.
D)An intruder gathers valid user credentials and installs backdoors for distributing malware.
Question
Identify the primary security threat for mobile devices.

A)Distributed denial-of-service attack
B)Cyberterrorism
C)Cyberespionage
D)Theft of device
Question
_____ involves the deployment of malware that secretly steals data in the computer systems of organizations.

A)Cyberterrorism
B)Smishing
C)Cyberespionage
D)Vishing
Question
The additional security option,used for credit card transactions,that keeps track of a customer's historical shopping patterns and notes deviations from the norm is _____.

A)transaction incognito mode
B)transaction identification code
C)transaction-spam control software
D)transaction-risk scoring software
Question
Which of the following uses encryption to provide secure access to a remote computer over the Internet?

A)Virtual private network (VPN)
B)File transfer protocol (FTP)
C)Indexing
D)Data warehousing
Question
Which of the following limits network access based on an organization's access policy?

A)An antivirus software
B)The concept of Reasonable assurance
C)A firewall
D)A browser
Question
Which phase of an advanced persistent threat enables an intruder to gain useful information about the target?

A)The discovery phase
B)The capture phase
C)The reconnaissance phase
D)The incursion phase
Question
_____ serves as a clearinghouse for information on new viruses,worms,and other computer security topics.

A)United States Computer Emergency Readiness Team (US-CERT)
B)United States Computer Query Emergency Team (US-CQET)
C)United States Computer Emergency Encryption Team (US-CEET)
D)United States Computer Emergency Authority Team (US-CEAT)
Question
_____ is a three-digit number above the signature panel on the back of a credit card.

A)Personal identification number
B)Card verification value
C)Automated teller machine
D)Know your customer digits
Question
In the context of an advanced persistent threat,identify the phase during which an intruder is ready to access unprotected or compromised systems.

A)The reconnaissance phase
B)The discovery phase
C)The capture phase
D)The export phase
Question
Which of the following statements best defines cyberterrorism?

A)It involves the deployment of malware that secretly steals data in the computer systems of organizations.
B)It is the unintended release of sensitive data or the access of sensitive data by unauthorized individuals.
C)It is a network attack in which an intruder gains access to a network and stays undetected with the intention of stealing data over a long period of time.
D)It is the intimidation of a government by using information technology to disable critical national infrastructure to achieve ideological goals.
Question
Ricky,an employee of Gycl Inc.,has unknowingly shared his company's tender details and appraisal structure with the market competitor.This is an example of _____.

A)smishing
B)phishing
C)data breach
D)identity theft
Question
Identify the industry that is considered as a high-value target for cyberterrorists.

A)Automobile industry
B)Logistics industry
C)Gas industry
D)Health industry
Question
_____ occurs when the personal information of an individual is stolen and used.

A)Trustworthy computing
B)Cyberespionage
C)Cyberterrorism
D)Identity theft
Question
Identify a true statement about the incursion phase in an advanced persistent threat.

A)An intruder gains useful information about the target.
B)An intruder establishes a means of accessing a computer program that bypasses security mechanisms.
C)An intruder gathers valid user credentials and installs backdoors for distributing malware.
D)An intruder is ready to access compromised systems and capture information.
Question
_____ is the unintended access of sensitive data by unauthorized individuals.

A)A risk exportation
B)A data breach
C)Cyberterrorism
D)Rifting
Question
_____ is a method of computing that delivers secure,private,and reliable computing experiences based on sound business practices.

A)Cloud computing
B)Trustworthy computing
C)Mobile computing
D)Cluster computing
Question
Macros can insert unwanted words,numbers,or phrases into documents or alter command functions.
Question
Which intrusion detection system (IDS)contains information about specific attacks and system vulnerabilities?

A)Knowledge-based IDS
B)Behavior-based IDS
C)Threat-based IDS
D)Risk-based IDS
Question
An industrial spy hacks computers or Web sites in an attempt to promote a political ideology.
Question
Which of the following statements defines an intrusion detection system (IDS)?

A)An IDS is a discipline that combines elements of law and computer science to identify,collect,examine,and preserve data from computer systems,networks,and storage devices.
B)An IDS evaluates an organization's security policy.
C)An IDS indicates the presence of a specific virus.
D)An IDS is software and/or hardware that monitors system and network resources for breaches.
Question
Worms propagate without human intervention and send copies of themselves to other computers via email.
Question
Explain the different phases of an advanced persistent threat (APT).
Question
A Trojan horse abuses email systems to send unsolicited email to large numbers of people.
Question
What are the characteristics of a good antivirus software?
Question
In an advanced persistent threat,the intruder gains useful information about the target in the incursion stage.
Question
What are the steps that can be taken by organizations to safeguard people from phishing,smishing,and vishing scams?
Question
Which of the following defines computer forensics?

A)It is a discipline that combines elements of law and computer science to identify,collect,examine,and preserve data from computer systems,networks,and storage devices.
B)It evaluates an organization's security policy.
C)It detects viruses in a computer system and quarantines them.
D)It is the software and/or hardware that monitors system and network resources and notifies network security personnel when it detects network traffic that attempts to circumvent the security measures of a networked computer environment.
Question
Which of the following is true of a virus signature?

A)It quarantines the virus present in a system.
B)It indicates the presence of a specific virus in a system.
C)It temporarily stops the activities of a detected virus.
D)It deletes a detected virus completely.
Question
A rootkit can be disinfected without formatting the hard disk or reinstalling the operating system.
Question
Firewalls are used to block access to certain Web sites.
Question
In the context of an information technology risk assessment,assets refer to hardware components only.
Question
Explain the need for a security audit in an organization.
Question
In a smishing scam,people receive a legitimate-looking text message on their phone telling them to call a specific phone number or to log on to a Web site.
Question
What are the steps involved in a general security risk assessment process?
Question
A distributed denial-of-service attack involves infiltration of target systems.
Question
A thorough _____ should test system safeguards to ensure that they are operating as intended.

A)internet audit
B)cost audit
C)software audit
D)security audit
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/80
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 11: Cybercrime and It Security
1
Which of the following statements is true about worms?

A)They abuse email systems to send unsolicited email to large numbers of people.
B)They allow hackers to destroy hard drives,corrupt files,and steal passwords by recording keystrokes and transmitting them to a server operated by a third party.
C)They insert unwanted words,numbers,or phrases into documents or alter command functions in an infected document.
D)They propagate without human intervention,often sending copies of themselves to other computers by email.
D
2
Identify a true statement about the bring your own device (BYOD)business policy.

A)It can improve employee productivity.
B)It can provide data security.
C)It creates a bug-free environment.
D)It enhances employee interaction.
A
3
Which of the following best describes a cybercriminal?

A)An individual who attacks a computer system or network for financial gain
B)An individual who hacks computers or Web sites in an attempt to promote a political ideology
C)An individual who attempts to destroy the infrastructure components of governments and financial institutions
D)An individual who is hired by an organization to test the security of its information systems
A
4
Which of the following is a drawback of the bring your own device (BYOD)business policy?

A)It affects the productivity of the employees of a company.
B)It inhibits the privacy of the employees of a company.
C)It exposes a company's data to malware.
D)It creates the image of a company as not being flexible.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
5
Which of the following is true of a macro virus?

A)It propagates without human intervention,often sending copies of itself to other computers by email.
B)It allows hackers to destroy hard drives,corrupt files,and steal passwords by recording keystrokes and transmitting them to a server operated by a third party.
C)It inserts unwanted words,numbers,or phrases into documents or alters command functions in an infected document.
D)It abuses email systems to send unsolicited email to large numbers of people.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
6
In the context of computer crimes,those who attempt to destroy the infrastructure components of governments and financial institutions are known as _____.

A)hacktivists
B)white hat hackers
C)black hat hackers
D)cyberterrorists
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
7
A _____ is a harmful program that resides in the active memory of a computer and duplicates itself.

A)scareware
B)worm
C)virus
D)logic bomb
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
8
_____ is a program in which malicious code is hidden inside a seemingly harmless program.

A)A Trojan horse
B)A distributed denial-of-service attack
C)A spam
D)A smish
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
9
How does a worm negatively impact an organization?

A)It steals passwords and Social Security numbers.
B)It generates and grades tests that humans can pass but all but the most sophisticated computer programs cannot.
C)It causes productivity losses due to workers being unable to use their computers.
D)It fraudulently uses third-party emails to try to get the recipient to reveal personal data.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
10
Which of the following is a technical description of a virus?

A)It is a harmful program that involves the use of Short Message Service to get personal details from victims.
B)It is the act of fraudulently using email to try to get the recipient to reveal personal data.
C)It is a piece of code that causes a computer to behave in an unexpected and usually undesirable manner.
D)It is the abuse of email systems to send unsolicited email to large numbers of people.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
11
The attack that takes place before a software developer knows about the vulnerability is known as a(n)_____.

A)unidentified attack
B)zero-day attack
C)exploit
D)threat
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
12
In computing,a(n)_____ is an attack on an information system that takes advantage of a particular system vulnerability.

A)exit door
B)glitch
C)bot
D)exploit
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
13
Which perpetrator violates computer or Internet security maliciously for illegal personal gain?

A)A red hat hacker
B)A gray hat hacker
C)A white hat hacker
D)A black hat hacker
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
14
Which of the following best describes a hacktivist?

A)An individual who attempts to destroy the infrastructure components of governments,financial institutions,utilities,and emergency response units
B)An individual who hacks computers or Web sites in an attempt to promote a political ideology
C)An employee or contractor who attempts to gain financially and/or disrupt a company's information systems and business operations
D)An individual who captures trade secrets and attempts to gain an unfair competitive advantage
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
15
Which of the following best describes malicious insiders?

A)They hack computers in an attempt to promote a political ideology.
B)They disrupt a company's information systems and business operations.
C)They are hired by an organization to test the security of its information systems.
D)They are hired by an organization to test the security of another organization's information systems.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
16
In the context of computer crimes,those who cause problems,steal data,and corrupt systems are known as _____.

A)black hat hackers
B)white hat hackers
C)hacktivists
D)crackers
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
17
Which of the following exploits when downloaded onto a smartphone takes control of the device and its data until the owner agrees to pay a sum of money to the attacker?

A)Camware
B)Spyware
C)Scareware
D)Ransomware
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
18
Which of the following is true of white hat hackers?

A)They are hired by an organization to test the security of its information systems.
B)They disrupt a company's information systems and business operations.
C)They capture trade secrets and attempt to gain an unfair competitive advantage in a company.
D)They destroy the infrastructure components of governments,financial institutions,and emergency response units.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
19
Which of the following is created and issued by software engineers to remove a system vulnerability?

A)A patch
B)A key
C)A license
D)A constraint
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
20
Those who capture trade secrets and attempt to gain an unfair competitive advantage are known as _____.

A)white hat hackers
B)hacktivists
C)industrial spies
D)black hat hackers
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
21
Which of the following is used to ensure that only humans obtain free email accounts?

A)Atomicity,consistency,isolation,and durability (ACID)
B)Microprocessor without Interlocked Pipeline Stages (MIPS)
C)Completely Automated Public Turing Test to Tell Computers and Humans Apart (CAPTCHA)
D)Document Style Semantics and Specification Language (DSSSL)
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
22
Which of the following best describes spear-phishing?

A)The phisher sends a survey to the employees of several organizations to obtain details of the configuration of their computing devices.
B)The phisher sends a voice mail message to a number of people to call a phone number or access a Web site.
C)The phisher sends legitimate-looking text messages through his or her phone to advertise a certain organization.
D)The phisher sends fraudulent emails to a certain organization's employees disguising them as mails from high-level executives from within the organization.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
23
Botnet computers are also called _____.

A)zombies
B)daemons
C)narutus
D)konohas
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
24
_____ is the abuse of email systems to send unsolicited email to large numbers of people.

A)Cyberespionage
B)Spam
C)Phishing
D)Smishing
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
25
Identify a true statement about smishing.

A)The phisher sends legitimate-looking messages through phone to acquire personal information.
B)The phisher sends a survey email to obtain the configuration of an unsuspecting user's computing device.
C)The phisher sends a voice mail message to an unsuspecting user to call a phone number or access a Web site.
D)The phisher sends fraudulent emails to a certain organization's employees.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
26
Identify the attack in which a malicious hacker floods a target site with demands for data and other small tasks.

A)Distributed denial-of-service
B)Smishing
C)Logic bomb
D)Phishing
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
27
Identify the mode of message transmission used in vishing.

A)Multimedia Messaging Service
B)Short Message Service
C)Email
D)Voice mail
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
28
Identify a true statement about Trojan horses.

A)They lead consumers to counterfeit Web sites designed to trick them into divulging personal data.
B)They are used by organizations to test the security of information systems.
C)They involve the use of Short Message Service (SMS)texting for phishing.
D)They spy on users by recording keystrokes and transmitting them to a server operated by a third party.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
29
Identify the mode of message transmission used in smishing.

A)Multimedia Messaging Service
B)Short Message Service
C)Email
D)Voice mail
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
30
Which of the following defines a rootkit?

A)It is the act of fraudulently using email to try to get the recipient to reveal personal data by sending legitimate-looking emails urging the recipient to take action to avoid a negative consequence or to receive a reward.
B)It is the unintended release of sensitive data by unauthorized individuals.
C)It is the abuse of email systems to send unsolicited email to large numbers of people.
D)It is a set of programs that enables its user to gain administrator-level access to a computer without the end user's consent or knowledge.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
31
The _____ code of a rootkit gets the rootkit installation started and can be activated by clicking on a link to a malicious Web site in an email or opening an infected PDF file.

A)dropper
B)loader
C)linker
D)adapter
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
32
Jack was shocked to witness the sudden drop in performance of his laptop.He also found that the screen saver constant changed and that the taskbar had disappeared.The given problems are symptoms of _____ infections.

A)rootkit
B)smishing
C)phishing
D)bootkit
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
33
Andrew,a writer,noticed that his blog was filled with repetitive advertisements and surveys that prevented him from accessing his blog and editing an article.Which of the following has caused this problem?

A)A rootkit
B)A distributed denial-of-service attack
C)A logic bomb attack
D)A cyberespionage incident
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
34
David,a software engineer,was creating a report using Microsoft Word.After completing 15 pages in the file,he noticed that whenever he copied something using the keyboard,the contents were modified with unwanted numbers and phrases.Which of the following could have caused this problem?

A)A worm
B)Smishing
C)A logic bomb
D)Phishing
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
35
Which of the following is true of spam?

A)Spam is a type of attack with which a hacker takes over computers via the Internet and causes them to flood a target site with demands for data and other small tasks.
B)Spam is a program in which malicious code is hidden inside a seemingly harmless program.
C)Spam is a set of programs that enables its user to gain administrator-level access to a computer without the end user's consent or knowledge.
D)Spam is an extremely inexpensive method of marketing used by many legitimate organizations.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
36
Which of the following statements is true of the Controlling the Assault of Non-Solicited Pornography and Marketing (CAN-SPAM)Act?

A)It legalizes spamming with certain restrictions.
B)It provides a solution to tackle a Trojan horse.
C)It identifies distributed denial-of-service attacks.
D)It prevents worms by eliminating their ability to replicate.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
37
Which of the following terms is used to describe a large group of computers controlled from one or more remote locations by hackers without the knowledge of their owners?

A)Spear-phishing
B)Botnet
C)Cyberespionage
D)Smishing
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
38
_____ is the act of fraudulently using email to try to get the recipient to reveal personal data.

A)Spoofing
B)Vishing
C)Phishing
D)Smishing
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
39
A(n)_____ is a network attack in which an intruder gains access to a network and stays undetected with the intention of stealing data.

A)advanced persistent threat
B)vishing scam
C)identity threat
D)data breach
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
40
A _____ is used by attackers to execute files,access logs,monitor user activity,and change a computer's configuration.

A)scareware
B)patch
C)rootkit
D)worm
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
41
In the context of general security risk assessment,which of the following is true of the concept of reasonable assurance?

A)It decides whether or not to implement a particular countermeasure against attacks.
B)It recognizes that managers must use their judgment to ensure that the cost of control does not exceed a system's benefits.
C)It recognizes the loss events or the risks or threats that could occur,such as a distributed denial-of-service attack or insider fraud.
D)It determines the impact of each threat occurrence.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
42
To reduce the potential for online credit card fraud,most e-commerce Web sites use some form of _____ technology to protect information as it comes in from the consumer.

A)encryption
B)authentication
C)authorization
D)indexing
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
43
Which of the following statements best describes the export phase of an advanced persistent threat?

A)The data captured by an attacker is sent to the attacker's home base for analysis.
B)An attacker establishes a computer program that bypasses security mechanisms.
C)An attacker is ready to access compromised systems and capture information.
D)The valid user credentials gathered by an attacker is used to install backdoors for distributing malware.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
44
Which of the following statements is true of the discovery phase of an advanced persistent threat?

A)An intruder gains useful information about the target.
B)An intruder establishes a computer program that bypasses security mechanisms.
C)An intruder is ready to access compromised systems and capture information.
D)An intruder gathers valid user credentials and installs backdoors for distributing malware.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
45
Identify the primary security threat for mobile devices.

A)Distributed denial-of-service attack
B)Cyberterrorism
C)Cyberespionage
D)Theft of device
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
46
_____ involves the deployment of malware that secretly steals data in the computer systems of organizations.

A)Cyberterrorism
B)Smishing
C)Cyberespionage
D)Vishing
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
47
The additional security option,used for credit card transactions,that keeps track of a customer's historical shopping patterns and notes deviations from the norm is _____.

A)transaction incognito mode
B)transaction identification code
C)transaction-spam control software
D)transaction-risk scoring software
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
48
Which of the following uses encryption to provide secure access to a remote computer over the Internet?

A)Virtual private network (VPN)
B)File transfer protocol (FTP)
C)Indexing
D)Data warehousing
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
49
Which of the following limits network access based on an organization's access policy?

A)An antivirus software
B)The concept of Reasonable assurance
C)A firewall
D)A browser
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
50
Which phase of an advanced persistent threat enables an intruder to gain useful information about the target?

A)The discovery phase
B)The capture phase
C)The reconnaissance phase
D)The incursion phase
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
51
_____ serves as a clearinghouse for information on new viruses,worms,and other computer security topics.

A)United States Computer Emergency Readiness Team (US-CERT)
B)United States Computer Query Emergency Team (US-CQET)
C)United States Computer Emergency Encryption Team (US-CEET)
D)United States Computer Emergency Authority Team (US-CEAT)
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
52
_____ is a three-digit number above the signature panel on the back of a credit card.

A)Personal identification number
B)Card verification value
C)Automated teller machine
D)Know your customer digits
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
53
In the context of an advanced persistent threat,identify the phase during which an intruder is ready to access unprotected or compromised systems.

A)The reconnaissance phase
B)The discovery phase
C)The capture phase
D)The export phase
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
54
Which of the following statements best defines cyberterrorism?

A)It involves the deployment of malware that secretly steals data in the computer systems of organizations.
B)It is the unintended release of sensitive data or the access of sensitive data by unauthorized individuals.
C)It is a network attack in which an intruder gains access to a network and stays undetected with the intention of stealing data over a long period of time.
D)It is the intimidation of a government by using information technology to disable critical national infrastructure to achieve ideological goals.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
55
Ricky,an employee of Gycl Inc.,has unknowingly shared his company's tender details and appraisal structure with the market competitor.This is an example of _____.

A)smishing
B)phishing
C)data breach
D)identity theft
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
56
Identify the industry that is considered as a high-value target for cyberterrorists.

A)Automobile industry
B)Logistics industry
C)Gas industry
D)Health industry
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
57
_____ occurs when the personal information of an individual is stolen and used.

A)Trustworthy computing
B)Cyberespionage
C)Cyberterrorism
D)Identity theft
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
58
Identify a true statement about the incursion phase in an advanced persistent threat.

A)An intruder gains useful information about the target.
B)An intruder establishes a means of accessing a computer program that bypasses security mechanisms.
C)An intruder gathers valid user credentials and installs backdoors for distributing malware.
D)An intruder is ready to access compromised systems and capture information.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
59
_____ is the unintended access of sensitive data by unauthorized individuals.

A)A risk exportation
B)A data breach
C)Cyberterrorism
D)Rifting
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
60
_____ is a method of computing that delivers secure,private,and reliable computing experiences based on sound business practices.

A)Cloud computing
B)Trustworthy computing
C)Mobile computing
D)Cluster computing
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
61
Macros can insert unwanted words,numbers,or phrases into documents or alter command functions.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
62
Which intrusion detection system (IDS)contains information about specific attacks and system vulnerabilities?

A)Knowledge-based IDS
B)Behavior-based IDS
C)Threat-based IDS
D)Risk-based IDS
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
63
An industrial spy hacks computers or Web sites in an attempt to promote a political ideology.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
64
Which of the following statements defines an intrusion detection system (IDS)?

A)An IDS is a discipline that combines elements of law and computer science to identify,collect,examine,and preserve data from computer systems,networks,and storage devices.
B)An IDS evaluates an organization's security policy.
C)An IDS indicates the presence of a specific virus.
D)An IDS is software and/or hardware that monitors system and network resources for breaches.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
65
Worms propagate without human intervention and send copies of themselves to other computers via email.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
66
Explain the different phases of an advanced persistent threat (APT).
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
67
A Trojan horse abuses email systems to send unsolicited email to large numbers of people.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
68
What are the characteristics of a good antivirus software?
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
69
In an advanced persistent threat,the intruder gains useful information about the target in the incursion stage.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
70
What are the steps that can be taken by organizations to safeguard people from phishing,smishing,and vishing scams?
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
71
Which of the following defines computer forensics?

A)It is a discipline that combines elements of law and computer science to identify,collect,examine,and preserve data from computer systems,networks,and storage devices.
B)It evaluates an organization's security policy.
C)It detects viruses in a computer system and quarantines them.
D)It is the software and/or hardware that monitors system and network resources and notifies network security personnel when it detects network traffic that attempts to circumvent the security measures of a networked computer environment.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
72
Which of the following is true of a virus signature?

A)It quarantines the virus present in a system.
B)It indicates the presence of a specific virus in a system.
C)It temporarily stops the activities of a detected virus.
D)It deletes a detected virus completely.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
73
A rootkit can be disinfected without formatting the hard disk or reinstalling the operating system.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
74
Firewalls are used to block access to certain Web sites.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
75
In the context of an information technology risk assessment,assets refer to hardware components only.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
76
Explain the need for a security audit in an organization.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
77
In a smishing scam,people receive a legitimate-looking text message on their phone telling them to call a specific phone number or to log on to a Web site.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
78
What are the steps involved in a general security risk assessment process?
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
79
A distributed denial-of-service attack involves infiltration of target systems.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
80
A thorough _____ should test system safeguards to ensure that they are operating as intended.

A)internet audit
B)cost audit
C)software audit
D)security audit
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 80 flashcards in this deck.