Quantitative Methods / Research > QUESTIONS & ANSWERS > CIS 3250 QUIZ CHAPTER 03 Cyberattacks and Cybersecurity | Florida State University (All)
Florida State University CIS 3250 QUIZ CHAPTER 03 Cyberattacks and Cybersecurity 1. The Controlling the Assault of Non-Solicited Pornography and Marketing (CAN-SPAM) Act states that it is leg ... al to spam, provided the messages a few basic requirements. 2. Malware that stops you from using your computer or accessing your data until you meet certain demands is known as which of the following? 3. The cost to repair the worldwide damage done by a computer worm has exceeded $1 billion on more than one occasion. 4. In computing, a term for any sort of general attack on an information system that takes advantage of a particular system vulnerability is known as which of the following? 5. Whenever possible, automated system rules should mirror an organization’s written policies. 6. Which of the following is a form of Trojan horse which executes when it is triggered by a specific event such as a change in particular file, by typing a specific series of keystrokes, or by a specific time or date? 7. Employees and contract workers must be educated about the importance of security so that they will be motivated to understand and follow the security policies. 8. Computer forensics is such a new field that there is little training or certification processes available . 9. Cyberterrorism is the intimidation of the government or the civilian population by using information technology to disable critical national infrastructure to achieve political, religious, or ideological goals. 10. A completed risk assessment identifies the most dangerous threats to a company and helps focus security efforts on the areas of highest payoff. 11. Which type of an attacker hacks or websites in an attempt to promote a political ideology? 12. Ransomware is a malware that stops you from using your computer or accessing certain data until you meet certain demands, such as paying a ransom or sending photos to the attacker. 13. A spear phishing attack typically employs a group of zombies to keep the target so busy responding to a stream of automated requests the legitimate users cannot access the target. 14. An antivirus software scans for specific sequence of bytes that indicates the presence of specific malware. This sequence of bytes is known as which of the following? 15. Rootkit is a set of programs that enables its users to gain administrator-level access to a computer without the end user’s consent or knowledge. 16. Which of the following is a federal law that provides a definition of the term cyberterrorism and under which young people primarily involved in what they consider to be minor computer pranks have been tried as cyberterrorist? 17. Trojan horse has become an umbrella term for many types of malicious code. 18. Which of the following concepts recognizes that managers must use their judgement to ensure that cost of control does not exceed the system’s benefits or the risks involved? 19. Discussing security attacks through public trials and the associated publicity has not only enormous potential costs in public relations but real monetary costs as well. 20. Which of the following is a partnership between the Department of Homeland Security and the public and private sectors, established in 2003 to protect the Nation’s Internet infrastructure against cyberattacks? [Show More]
Last updated: 7 months ago
Preview 1 out of 2 pages
Buy this document to get the full access instantly
Instant Download Access after purchase
Buy NowInstant download
We Accept:
Can't find what you want? Try our AI powered Search
Connected school, study & course
About the document
Uploaded On
Nov 08, 2022
Number of pages
2
Written in
All
This document has been written for:
Uploaded
Nov 08, 2022
Downloads
0
Views
147
Scholarfriends.com Online Platform by Browsegrades Inc. 651N South Broad St, Middletown DE. United States.
We're available through e-mail, Twitter, Facebook, and live chat.
FAQ
Questions? Leave a message!
Copyright © Scholarfriends · High quality services·