Mgmt 450-ALA4

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

Select the true statements about packet sniffers.

-Legitimate sniffers are used for routine examination and problem detection -Unauthorized sniffers are used to steal information

White hat hackers use the same techniques and tools that are used by illegitimate hackers. These tools include which of the following?

-Back door programs -Social engineering -Rootkits

Select the true statements about state-sponsored cyberwarefare.

-Can be used to send warnings or to create conflict between countries. -Originate and are executed by foreign governments. -Attacks can be directly launched by a foreign government or by a group or individual who has been paid by to execute the attack

According to the Federal Emergency Management Agency (FEMA), which of the following are steps businesses can take to help protect systems, data, and information from natural disasters?

-Create a business continuity plan -Utilize off-site cloud storage -Store data in different areas across the United States (geographic data redundancy)

Select the reasons a government may choose to get involved in state-sponsored cyberwarfare.

-Cyberwarfare is often difficult to trace and identify. -Cyberwarfare can cause widespread damage to IT infrastructure. -Cyberwarfare is relatively inexpensive when compared to traditional warfare.

Select what's true about Trojan malware.

-Often found attached to free downloads and apps -Similar to viruses, but do not replicate themselves -Often used to find passwords, destroy data, or to bypass firewalls

Which of the following are considered cybercrimes?

-Trojan horse viruses -Digital identity theft -Computer hacking

Select what's true about how a Trojan infects a computer system.

-Trojans are commonly used by hackers to gain access to systems and devices. -Hackers use Trojans to create a backdoor into a user's system which allows them to spy on the computer's activities. -Trojans are designed using some sort of social engineering tactic.

Mohammed is experiencing issues with his work computer. He speaks to the IT department and they identify various symptoms of a computer virus. Symptoms of a computer virus include:

-Unexpected error messages -The operating system may not launch properly -Critical files may be automatically deleted

Malware is short for malicious software and is designed to steal information, destroy data, impact the operations of a computer or network, or frustrate the user. Common types of malware include:

-Viruses -Worms -Trojans

Which of the following statements about computer viruses are true?

-Viruses can destroy programs or alter the operations of a computer or network. -A computer virus is software that infects computers and is created using computer code.

What type of hacker breaks into computer systems with the intent of causing damage or stealing data?

Black hat hackers

A ___ hat hacker breaks into computer systems with the intent of causing damage or stealing data.

Blank 1: black

A deliberate misuse of computers and networks via the Internet that uses malicious code to modify the normal operations of a computer or network is called a ___.

Blank 1: cyberattack, cyber attack, or cybercrime

Cyberattacks that originate and are executed by foreign governments is called state ___ sponsored . These attacks can be directly launched by a foreign government or by a group or individual who has been paid by to execute the attack.

Blank 1: cyberwarfare or cyber warfare

Businesses need to take steps to protect computer systems, data, and information from ___ disasters.

Blank 1: natural

Activities where white-hat hackers are paid to hack into private networks and applications is referred to as ___ testing.

Blank 1: penetration

As reported by Andrei Ene, Tiny Banker ___ (TBT) is one of the worst malware attacks in the last 10 years.

Blank 1: trojan or Trojan

Sharing infected files and opening an infected email attachment are ways that a computer ___ can infect a digital device.

Blank 1: virus

Computer experts that attempt to hack into a network to ensure that it is protected against intrusions are called ___ -hat hackers.

Blank 1: white

Cyberattacks that originate and are executed by foreign governments is called state-sponsored ___ . These attacks can be directly launched by a foreign government or by a group or individual who has been paid by to execute the attack.

Cyberwarfare

Malware that encrypts a computer's data, forcing the victim to purchase a decryption code, is called ___ .

Ransomware

Often accompanying downloaded music or apps, programs that appear to be legitimate, but executes an unwanted activity when activated is called a _____.

Trojan

A deliberate misuse of computers and networks, _____ use malicious code to modify the normal operations of a computer or network.

cyberattacks

A crime in which a computer is the object of the crime or is used to commit a criminal offense is called _____.

cybercrime

Malware is short for ______ software.

malicious

Many organizations hire computer experts who test the security measures of an organization's information systems to ensure they are protected against intrusions. These experts use a variety of techniques including hacking, penetration testing, and vulnerability testing. These types of experts are known as _____ hackers.

white-hat


Ensembles d'études connexes

Week 5: SAM 02-31 ¿Hay desliz (glide)? (Letras y sonidos: More on vowels in Spanish)

View Set