Filters
Question type

Study Flashcards

Carding is more serious than identity theft.

A) True
B) False

Correct Answer

verifed

verified

The dominant type of attacker today is the ________.


A) wizard hacker
B) IT or security employer
C) national government
D) career criminal

E) A) and B)
F) C) and D)

Correct Answer

verifed

verified

Cybercriminals avoid black market forums.

A) True
B) False

Correct Answer

verifed

verified

Someone sends you a "game." When you run it, it logs you into an IRS server. This is hacking.

A) True
B) False

Correct Answer

verifed

verified

In ________, the perpetrator tries to obtain money or other goods by threatening to take actions that would be against the victim's interest.


A) fraud
B) extortion
C) hacking
D) abuse

E) A) and D)
F) B) and D)

Correct Answer

verifed

verified

Most traditional external attackers were heavily motivated by ________.


A) the thrill of breaking in
B) making money through crime
C) Both A and B
D) Neither A nor B

E) A) and B)
F) None of the above

Correct Answer

verifed

verified

Downloading pornography can lead to sexual harassment lawsuits.

A) True
B) False

Correct Answer

verifed

verified

Why did hackers attack Sony Corp?


A) To test their technical skills
B) Because Sony was suing a fellow hacker
C) As part of a larger cyberwar exercise
D) Because Sony put a malicious rootkit on certain music disks

E) A) and D)
F) A) and C)

Correct Answer

verifed

verified

Terrorists can use IT to ________.


A) destroy utilities
B) finance their terrorism
C) Both A and B
D) Neither A nor B

E) A) and D)
F) A) and C)

Correct Answer

verifed

verified

Traditional hackers are motivated by ________.


A) thrill
B) validation of power
C) doing damage as a by-product
D) All of the above

E) None of the above
F) All of the above

Correct Answer

verifed

verified

What were the approximate dollar losses for the series of data breaches against Sony Corp?


A) $54 million
B) $171 million
C) $254 million
D) $1.6 billion

E) A) and B)
F) All of the above

Correct Answer

verifed

verified

When a company visits a website to collect public information about a competitor, this is a form of trade secret espionage.

A) True
B) False

Correct Answer

verifed

verified

A(n) ________ attack requires a victim host to prepare for many connections, using up resources until the computer can no longer serve legitimate users. (Choose the most specific choice.)


A) DoS
B) directly-propagating worm
C) distributed malware
D) SYN Flooding

E) B) and C)
F) All of the above

Correct Answer

verifed

verified

A Trojan horse is a program that hides itself by deleting a system file and taking on the system file's name.

A) True
B) False

Correct Answer

verifed

verified

________ consists of activities that violate a company's IT use policies or ethics policies.


A) Fraud
B) Extortion
C) Hacking
D) Abuse

E) B) and C)
F) None of the above

Correct Answer

verifed

verified

Which of the following are ways that trade secret espionage occur?


A) Theft through interception
B) By bribing an employee
C) None of the above
D) All of the above

E) C) and D)
F) A) and C)

Correct Answer

verifed

verified

Mobile code usually is delivered through ________.


A) webpages
B) e-mail
C) directly propagating worms
D) All of the above

E) None of the above
F) C) and D)

Correct Answer

verifed

verified

Attackers cannot use IP address spoofing in port scanning attack packets.

A) True
B) False

Correct Answer

verifed

verified

Sending packets with false IP source addresses is called ________.


A) a IP address scanning attack
B) IP address spoofing
C) a port scanning attack
D) None of the above.

E) A) and B)
F) A) and C)

Correct Answer

verifed

verified

You receive an e-mail that seems to come from a frequent customer. It contains specific information about your relationship with the customer. Clicking on a link in the message takes you to a website that seems to be your customer's website. However, the website is fake. This is ________. (Pick the most precise answer.)


A) social engineering
B) a hoax
C) phishing
D) spear fishing

E) A) and B)
F) A) and C)

Correct Answer

verifed

verified

Showing 21 - 40 of 103

Related Exams

Show Answer