Filters
Question type

Study Flashcards

An intentionally disruptive program that spreads either from program-to-program or from disk-to-disk is known as a


A) Trojan horse.
B) virus.
C) worm.
D) botnet.

E) B) and D)
F) C) and D)

Correct Answer

verifed

verified

The majority of computer crimes are committed by


A) domestic hackers.
B) company employees.
C) foreign hackers.
D) teenage computer geniuses.

E) A) and D)
F) All of the above

Correct Answer

verifed

verified

A logic bomb that was created to erupt on Michelangelo's birthday is an example of a


A) malware.
B) spyware.
C) time bomb.
D) macro virus.

E) B) and D)
F) B) and C)

Correct Answer

verifed

verified

Criminal hacking is also known as


A) phishing.
B) a Trojan horse.
C) cracking.
D) computer forensics.

E) All of the above
F) None of the above

Correct Answer

verifed

verified

Hackers who hijack legitimate Web sites and redirect users to other sites are called


A) hackers.
B) Trojan horses.
C) Webjackers.
D) denial-of-service attackers.

E) B) and D)
F) None of the above

Correct Answer

verifed

verified

Software that allows different levels of security per user is known as access-control software.

A) True
B) False

Correct Answer

verifed

verified

Match the Act on the left to the appropriate explanation on the right. -Digital Millennium Copyright Act


A) created as a result of the first headline-making worm
B) declared unconstitutional by the Supreme Court
C) used to arrest a student for writing to crack an Adobe product
D) defines what kinds of communications are legal online
E) created in 2001 as a response to the terrorist attacks of September 11, 2001
F) provides almost instant information on crimes and criminals

G) A) and B)
H) D) and F)

Correct Answer

verifed

verified

A program that masquerades as a useful program,but is really a destructive program,is a(n)


A) worm.
B) Trojan horse.
C) virus.
D) botnet.

E) All of the above
F) A) and B)

Correct Answer

verifed

verified

Networks of zombie computers are also known as ________.

Correct Answer

verifed

verified

The most common form of computer crime is theft.

A) True
B) False

Correct Answer

verifed

verified

What was the name of the worm that demonstrated that a system could be infected by email even if the mail wasn't opened?


A) The Love Bug
B) Melissa
C) rxbot
D) BubbleBoy

E) A) and D)
F) All of the above

Correct Answer

verifed

verified

The Code Red worm attacked


A) UNIX operating systems.
B) Microsoft Word.
C) Microsoft server software.
D) personal computers.

E) C) and D)
F) A) and B)

Correct Answer

verifed

verified

In 1999,the Melissa virus was a widely publicized


A) email virus.
B) worm.
C) Trojan horse.
D) time bomb.

E) A) and C)
F) A) and B)

Correct Answer

verifed

verified

A public key is only available to the user originating a message.

A) True
B) False

Correct Answer

verifed

verified

________ refers to electronic trespassing or criminal hacking.

Correct Answer

verifed

verified

PGP uses the popular RSA public key cryptosystem.

A) True
B) False

Correct Answer

verifed

verified

Computer crime often goes unreported because businesses fear negative publicity.

A) True
B) False

Correct Answer

verifed

verified

The scrambling of code in an email message can be done using


A) cryptography.
B) programming.
C) auditing.
D) decryption.

E) All of the above
F) B) and D)

Correct Answer

verifed

verified

________ programs search for and eliminate viruses.

Correct Answer

verifed

verified

A challenge with high-tech weapons is that they reduce the amount of time people have to make life-and-death decisions.

A) True
B) False

Correct Answer

verifed

verified

Showing 61 - 80 of 84

Related Exams

Show Answer