Question: 81. A hacktivist is someone who _______. a. attempts to gain financially and/or disrupt a companys information systems and business operations b. hacks computers or
81. A hacktivist is someone who _______. a. attempts to gain financially and/or disrupt a companys information systems and business operations b. hacks computers or Web sites in an attempt to promote a political ideology c. attempts to destroy the infrastructure components of governments d. violates computer or Internet security maliciously or for illegal personal gain 82. A botnet is a ____. a. network of robots that control an assembly line at a factory b. network of servers that exchange traffic data c. network of devices that are used for managing security d. network of computers that send out access requests to servers repeatedly 83. The purpose of Advanced Persistent Threat (APT) usually is to ____. a. steal money b. interrupt service c. steal data d. annoy the users 84. The US-CERT incident reporting system is used to ____. a. alert the bank about stolen credit cards
b. alert the government about missing computers c. alert the Border Patrol about undocumented workers d. alert the Department of Homeland Security about information security incidents 85. In a denial-of-service (DDoS) attack, the perpetrator ____. a. instructs the zombie computers to send simple access requests to target computers b. sends out a huge number of spam emails to all of those in your contacts list c. changes the configuration information of the infected computers d. refuses to accept any email from any sender 86. Which of the following subject areas does the USA Patriot Act cover? a. Cyberterrorism b. Identity theft c. Credit card fraud d. Transmitting virus programs 87. Which of these organizations offers guidelines on developing security policies? a. DHS b. SANS c. IBM d. CISCO 88. Which of the following security incidents is least costly to fix? a. theft of program source code b. alteration of corporate database c. theft of trade secrets d. defacing of web pages 89. Which of the following is the correct description of a firewall? a. It is a software that deletes viruses from attachments. b. It is hardware that prevents unauthorized data to enter the private network. c. It is a software and hardware combination that limits the incoming and outgoing Internet traffic. d. It is a concept used in developing security policies. 90. Which of the following is a vendor of popular anti-virus software? a. Microsoft b. Symantec c. McDonald's d. Bayer CHAPTER TEN:
91. The _____ requires all financial institutions to protect and secure customers' nonpublic data from unauthorized access or use. a. Gramm-Leach-Bliley Act of 1999 b. E-Government Act of 2002 c. USA Patriot Act of 2001 d. Sarbanes-Oxley Act of 2002 92. The _____ requires telephone companies to turn over customer information, including numbers called, without a court order if the Federal Bureau of Investigation (FBI) claims that the records are relevant to a terrorism investigation. a. Cable Act of 1992 b. Electronic Communications Privacy Act of 1986 c. Gramm-Leach-Bliley Act of 1999 d. USA Patriot Act of 2001 93. Which of the following statements is true of the E-Government Act of 2002? a. It renews the U.S. government's authority to monitor electronic communications of foreigners abroad and authorizes foreign surveillance programs by the National Security Agency (NSA). b. It requires federal agencies to post machine-readable privacy policies on their Web sites and to perform privacy impact assessments on all new collections of data of ten or more people. c. It restricts government access to certain records held by financial institutions. d. It defines procedures to request judicial authorization for electronic surveillance of persons engaged in espionage against the United States on behalf of a foreign power. 94. _____ is is an inflammation of the nerve that connects the forearm to the palm of the wrist. a. Carpal tunnel syndrome (CTS) b. Seated immobility thromboembolism (SIT) c. Chronic idiopathic mylofibrosis d. Behcet's syndrome 95. _____ states the principles and core values that are essential to a set of people and that, therefore, govern these people's behavior. a. Code of ethics b. Code of conduct c. Code of civil procedure d. Code of criminal procedure 96. Which legislation is designed to combat the growing crime of identity theft? a. E-Government Act of 2002 b. USA Freedom Act of 2015 c. USA Patriot Act of 2001 d. Fair and Accurate Credit Transactions Act of 2003 97. Federal law permits employers to monitor their employees' use of company-owned computer equipment, specifically _______. a. e-mails b. instant messages c. website views d. all of these answers 98. RFID chips embedded in objects generate radio transmissions that allow people to track the location and other associated data of those objects. It's been suggested that RFID chips be implanted ________. a. in children to enable parents to find them if lost b. in criminals to allow law enforcement agents to find them if needed c. in all humans to give medical professionals instant access to medical records and conditions
d. all of these answers 99. Suppose you have been receiving unsolicited phone calls from telemarketers. Which agency should you contact to prevent these 'junk' calls? a. The Federal Trade Commission b. Better Business Bureau c. your local police department d. The Department of Justice 100. Your cousin works at her desktop computer for prolonged period of time every day. She would like to minimize the harmful effects of such repetitive work. Her workspace should be designed with ______ in mind. a. privacy b. productivity c. economics d. ergonomics
Step by Step Solution
There are 3 Steps involved in it
Get step-by-step solutions from verified subject matter experts
