Filters
Question type

Study Flashcards

In 1996 the General Accounting Office said that hackers had targeted the Pentagon __________ times and gained entry 2 of every 3 times.


A) 250,000
B) 100,000
C) half a million
D) a million

E) C) and D)
F) None of the above

Correct Answer

verifed

verified

Coasting along looking for doors to open is a quality of cookbook hackers.

A) True
B) False

Correct Answer

verifed

verified

The Nigerian scam involved:


A) contributions to overthrow Communist Nigerian government.
B) a fake charity for Nigerian refugees.
C) a smuggling operation to get dissenters out of Nigeria.
D) a ploy using deceptive emails and stories of sequestered funds

E) A) and B)
F) A) and C)

Correct Answer

verifed

verified

International cooperation in regards to stealing software has faltered because of minimal economic impact.

A) True
B) False

Correct Answer

verifed

verified

Showoffs have which of the following qualities?


A) Goal is to do the most damage
B) Goal is fun, not profit
C) Coasting along looking for doors to open
D) Goal is breaking in

E) All of the above
F) A) and C)

Correct Answer

verifed

verified

Explain what the "dark figure" of computer crime means.

Correct Answer

verifed

verified

The "dark figure" of computer crime is a...

View Answer

An authorized program planted on a computer is known as a(n) :


A) Trojan Horse.
B) Achilles Heel.
C) Sword of Damocles.
D) Cyclops Eye.

E) None of the above
F) B) and C)

Correct Answer

verifed

verified

Shoulder surfers ________________ access codes at airports.

Correct Answer

verifed

verified

The acronym EFT stands for:


A) east fun target.
B) ending fund target.
C) earned from trust.
D) electronic funds transfer.

E) C) and D)
F) None of the above

Correct Answer

verifed

verified

Which of the following is unlikely to be classed as a computer crime?


A) Phony tax returns
B) Public intoxication
C) Blowing up toilets
D) Pedophilia

E) A) and B)
F) A) and C)

Correct Answer

verifed

verified

The term "hacker" can include all of the following except a(n) :


A) norm-violating individual.
B) accidental tourist.
C) curious individual.
D) computer virtuoso.

E) A) and C)
F) All of the above

Correct Answer

verifed

verified

The fastest-spreading virus is a variation of the________________ virus.

Correct Answer

verifed

verified

Only the ________________ computer criminals are caught.

Correct Answer

verifed

verified

Identify and describe the four phases of computer viruses. Practically speaking, how do these stages work and what are the implications in the context of computer crime?

Correct Answer

verifed

verified

Dormancy: the virus does not destroy fil...

View Answer

If you send out 30,000 e-mails and get only one response, but you get $40.00 per response and you send out a half a million e-mails, how much money can you make?


A) $750,000
B) $100,00
C) $1 million
D) $250,000

E) B) and C)
F) A) and B)

Correct Answer

verifed

verified

Viruses:


A) infect the host computer.
B) multiply.
C) are triggered at some point in the future.
D) hide from virus protection programs.

E) A) and D)
F) None of the above

Correct Answer

verifed

verified

Computer crime has become increasingly globalized.

A) True
B) False

Correct Answer

verifed

verified

Mafiaboy got caught because he was traced through emails.

A) True
B) False

Correct Answer

verifed

verified

WAREZ sites encourage which of the following activities?


A) Violent acts
B) Contact with terrorist cells
C) Copying of copyrighted programs
D) Buying cheap foreign computers

E) B) and C)
F) None of the above

Correct Answer

verifed

verified

Reasons for the Nigerian scam include all of the following except:


A) it has a well-educated populace.
B) it is an oil-rich country with a healthy economy.
C) it uses English as a first language.
D) it is a well-populated country.

E) All of the above
F) A) and B)

Correct Answer

verifed

verified

Showing 21 - 40 of 63

Related Exams

Show Answer