A hacktivist is someone who _______. |
b. hacks computers or Web sites in an attempt to promote a political ideology |
Someone who violates computer or Internet security maliciously or for illegal personal gain is known as a(n) _______. |
a. black hat hacker |
This harmful malware is triggered by a specific event, such as Friday the 13th. |
c. logic bomb |
A botnet is a ____. |
d. network of computers that send out access requests to servers repeatedly |
Your business has a web server that has suddenly become unresponsive. When you study the server’s logs there are a huge number of requests from what appear to be legitimate computers. The problem is likely because of _____. |
b. a denial~of~service attack |
The second phase of an Advanced Persistent Threat attack is _____. |
c. incursion |
The purpose of Advanced Persistent Threat (APT) usually is to ____. |
c. steal data |
You had used an online service to apply for a credit card. As part of the process, you submitted your personal information such as SSN, date of birth, employer information, etc. Soon after you started receiving bills for items you did not purchase. You have become a victim of ________. |
c. identity theft |
The US~CERT incident reporting system is used to ____. |
d. alert the department of homeland security about information security incidents |
Which of the following subject areas does the USA Patriot Act cover? |
a. cyberterrorism |
Which of the following laws covers false claims regarding unauthorized use of credit cards? |
b. Fraud and Related Activity in Connection with Access Devices Statute |
A company’s risk assessment process can include numerous threats to the computers and networks. Which of the following can be considered an adverse event? |
d. all of the above |
Which of the following is the correct description of a firewall? |
c. it is a software and hardware combination that limits the incoming and outgoing Internet traffic. |
Which of the following shortcoming may be revealed during an IT security audit? |
c. whether only a limited number of people have access to critical data or not |
There has been a data breach at your business and the business has lost some customer data. It has led to angry customers who have filed charges. What is a recommended course of action to prepare for future events? |
a. activate the forensics analysis team and prepare documentation |
CSC220 Chapter 13
Share This
Unfinished tasks keep piling up?
Let us complete them for you. Quickly and professionally.
Check Price