Save
A ________ is a person or organization that seeks to obtain data or other assets illegally,
without the owner's permission and often without the owner's knowledge.
A) target
B) vulnerability
C) threat
D) warning - (correct Answer) - C
Which of the following is considered a threat caused by human error?
A) An employee inadvertently installs an old database on top of the current one.
B) An employee intentionally destroys data and system components.
C) A virus and worm writer infects computer systems.
D) A hacker breaks into a system to steal for financial gain. - (correct Answer) - A
Which of the following is considered a computer crime?
A) accidentally deleting customer records
B) poorly written programs resulting in data losses
C) loss of data as a result of flooding
D) hacking of information systems - (correct Answer) - D
________ occurs when someone deceives by pretending to be someone else.
A) Hacking
B) Baiting
C) Sniffing
D) Pretexting - (correct Answer) - D
When referring to security threats, pretexting, sniffing, spoofing, and phishing are all
,examples of ________.
A) unauthorized data disclosure
B) incorrect data modification
C) faulty services
D) loss of infrastructure - (correct Answer) - A
A ________ pretends to be a legitimate company and sends an email requesting confidential
data, such as account numbers, Social Security numbers, account passwords, and so forth.
A) hacker
B) phisher
C) safeguard
D) sniffer - (correct Answer) - B
Email spoofing is a synonym for ________.
A) hacking
B) phishing
C) usurping
D) sniffing - (correct Answer) - B
________ is a technique for intercepting computer communications, either through a physical
connection to a network or, in the case of wireless networks, with no physical connection.
A) Spoofing
B) Phishing
C) Sniffing
D) Pretexting - (correct Answer) - C
________ take computers with wireless connections through an area and search for
unprotected wireless networks and then monitor and intercept wireless traffic at will.
A) Drive-by spoofers
B) Pretexters
C) Drive-by sniffers
, D) Phishers - (correct Answer) - C
Which of the following is an example of a sniffing technique?
A) IP spoofing
B) caches
C) ad blockers
D) adware - (correct Answer) - D
________ occurs when a person breaks into a network to steal data such as customer lists,
product inventory data, employee data, and other proprietary and confidential data.
A) Pretexting
B) Phishing
C) Hacking
D) Spoofing - (correct Answer) - C
Which of the following is most likely to be the result of hacking?
A) certain Web sites being blocked from viewing for security reasons
B) small amounts of spam in your inbox
C) an unexplained reduction in your account balance
D) pop-up ads appearing frequently - (correct Answer) - C
________ occurs through human error when employees do not follow proper procedures or
when procedures have not been well designed.
A) Unauthorized data disclosure
B) Incorrect data modification
C) Denial of service
D) Loss of infrastructure - (correct Answer) - B
________ occurs when computer criminals invade a computer system and replace legitimate
programs with their own unauthorized ones that shut down legitimate applications and substitute
their own processing to spy, steal and manipulate data, or other purposes.
A) Hacking