Chapter 13 Quiz: Q1
A virus can reside in a file (or many files) on the hard drive, but it would not be active in memory. As such, it is not as important to scan live memory as it is to scan the hard drive. Group of answer choices True False
False
A zombie computer would send requests to access to the target site again and again. Group of answer choices True False
True
Spear-phishing is when the phisher sends fraudulent emails to a certain organization's employees. Group of answer choices True False
True
A company's risk assessment process can include numerous threats to the computers and networks. Which of the following can be considered an adverse event? Group of answer choices Distributed denial-of-service attack All of the above Harmful virus Email attachment with harmful worm
All of the above
There has been a data breach at your business and the business has lost some customer data. It has led to angry customers who have filed charges. What is a recommended course of action to prepare for future events? Group of answer choices meet with your lawyers to prepare to counter-sue the customers settle with the customers, however much it may cost activate the forensics analysis team and prepare documentation none of these answers
activate the forensics analysis team and prepare documentation
A hacktivist is someone who _______. Group of answer choices hacks computers or Web sites in an attempt to promote a political ideology attempts to destroy the infrastructure components of governments violates computer or Internet security maliciously or for illegal personal gain attempts to gain financially and/or disrupt a company's information systems and business operations
hacks computers or Web sites in an attempt to promote a political ideology
In a denial-of-service (DDoS) attack, the perpetrator ____. Group of answer choices refuses to accept any email from any sender changes the configuration information of the infected computers sends out a huge number of spam emails to all of those in your contacts list instructs the zombie computers to send simple access requests to target computers
instructs the zombie computers to send simple access requests to target computers
Which of the following subject areas does the USA Patriot Act cover? Group of answer choices Credit card fraud Transmitting virus programs Identity theft Cyberterrorism
Cyberterrorism
Which of these organizations offers guidelines on developing security policies? Group of answer choices CISCO DHS SANS IBM
SANS