Question: 3 1 . A computer _ _ _ _ risk is any event or action that could cause a loss of or damage to computer

31. A computer ____ risk is any event or action that could cause a loss of or damage to computer hardware, software, data, information, or processing capability.
a. security
b. liability
c. terrorism
d. network
32. A(n)____ has the same intent as a cracker but does not have the technical skills and knowledge.
a. script kiddie
b. hacker
c. cyberextortionist
d. cyberterrorist
33. A(n)____ is someone who uses e-mail as a vehicle for extortion.
a. cyberextortionist
b. hacker
c. script kiddie
d. cyberterrorist
34. A(n)____ is someone who uses the Internet or network to destroy or damage computers for political reasons.
a. cyberterrorist
b. hacker
c. script kiddie
d. cyberextortionist
35. Computer viruses, worms, Trojan horses, and rootkits are classified as ____, which are programs that act without a users knowledge and deliberately alter the computers operations.
a. malware
b. untrusted sources
c. threats
d. cybermals
36. A(n)____ source is a company or person a user believes will not send a virus-infected file knowingly.
a. trusted
b. legitimate
c. secure
d. backup
37. As shown in the accompanying figure, a(n)____ program protects a computer against viruses by identifying and removing any computer viruses found in memory, on storage media, or on incoming files.
a. antivirus
b. hoax
c. secure
d. antispyware
38. A virus ____ is an e-mail message that warns users of a nonexistent virus, worm, or Trojan horse.
a. hoax
b. myth
c. threat
d. DoS
39. A particularly devastating type of DoS attack is the ____ DoS attack, in which multiple unsuspecting computers are used to attack multiple computer networks.
a. distributed
b. delayed
c. limited
d. staggered
40.____ is a technique intruder use to make their network or Internet transmission appear legitimate to a victim computer or network.
a. Spoofing
b. Rebuking
c. Transmitting
d. Victimizing

Step by Step Solution

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related Databases Questions!