Chapter 13 Quiz: Q1

¡Supera tus tareas y exámenes ahora con Quizwiz!

A virus can reside in a file (or many files) on the hard drive, but it would not be active in memory. As such, it is not as important to scan live memory as it is to scan the hard drive. Group of answer choices True False

False

A zombie computer would send requests to access to the target site again and again. Group of answer choices True False

True

Spear-phishing is when the phisher sends fraudulent emails to a certain organization's employees. Group of answer choices True False

True

A company's risk assessment process can include numerous threats to the computers and networks. Which of the following can be considered an adverse event? Group of answer choices ​Distributed denial-of-service attack All of the above Harmful virus Email attachment with harmful worm

All of the above

​There has been a data breach at your business and the business has lost some customer data. It has led to angry customers who have filed charges. What is a recommended course of action to prepare for future events? Group of answer choices ​meet with your lawyers to prepare to counter-sue the customers settle with the customers, however much it may cost activate the forensics analysis team and prepare documentation none of these answers

activate the forensics analysis team and prepare documentation

A hacktivist is someone who _______. Group of answer choices hacks computers or Web sites in an attempt to promote a political ideology attempts to destroy the infrastructure components of governments violates computer or Internet security maliciously or for illegal personal gain ​attempts to gain financially and/or disrupt a company's information systems and business operations

hacks computers or Web sites in an attempt to promote a political ideology

In a denial-of-service (DDoS) attack, the perpetrator ____. Group of answer choices ​refuses to accept any email from any sender changes the configuration information of the infected computers ​sends out a huge number of spam emails to all of those in your contacts list instructs the zombie computers to send simple access requests to target computers

instructs the zombie computers to send simple access requests to target computers

Which of the following subject areas does the USA Patriot Act cover? Group of answer choices Credit card fraud Transmitting virus programs ​Identity theft ​Cyberterrorism

​Cyberterrorism

Which of these organizations offers guidelines on developing security policies? Group of answer choices ​CISCO ​DHS ​SANS ​IBM

​SANS


Conjuntos de estudio relacionados

Transform the active sentences into passive sentences.

View Set

CAPÍTULO 6. ELABORACIÓN DEL MARCOTEÓRICO

View Set

Lesson 8: Distribution and Conversion Obversion Contraposition

View Set

Corporals Course- Administration

View Set

600 Chapt. 7 & 8 - Random Assignment, Control Techniques and and Types of Tests

View Set