Answered You can buy a ready-made answer or pick a professional tutor to order an original one.

QUESTION

T06 CYBER SECURITY EXAM 1 (100% Answer)

1. What does the term wetware refer to?

A. Humans operating computers 

B. Evil crackers 

C. “Good” hackers 

D. A system vulnerability 

2. Which of the following, according to a study conducted by the Department of Justice, were perceived as the number one target for computer crime?

A. Financial institutions 

B. Individuals 

C. Businesses 

D. Educational institutions 

3. __________ includes any criminal activity which involves the unauthorized access, dissemination, manipulation, destruction, or corruption of electronically stored data.

A. Cybercrime 

B. Computer related crime 

C. Computer crime 

D. Digital crime 

4. Which of the following refers to the unauthorized attempt to gain access to information about a system?

A. Clickjacking 

B. Baud 

C. Banner grabbing 

D. Probe 

5. Which of the following characteristics of new payment methods has facilitated money laundering and terrorist financing?

A. Anonymity in transactions 

B. Increased competition 

C. Lower cost 

D. Lower interest rates 

6. Which of the following devices introduces commands and information to the computer?

A. Scanner 

B. Modem 

C. Printer 

D. Keyboard 

7. Which of the following is the least destructive category of hackers? 

A. Technological thrill seekers 

B. Insiders 

C. Informational voyeurs 

D. Hacktivists 

8. Which payment method is typically associated with a card payment network such as Visa or MasterCard?

A. Digital precious metals 

B. Mobile payment 

C. Electronic purse 

D. Prepaid card 

9. What is the purpose of random access memory in the computer system? permanently simultaneously

A. To store easily accessible information 

B. To transfer several bits of data 

C. To monitor data usage 

D. To temporarily store information 

10. Which of the following hacking-related developments occurred after the year 2000?

A. The release of the Morris worm 

B. Kevin Poulsen’s exploitation of the telecom system to “win” a Porsche 

C. The introduction of commercially available security products 

D. The emergence of identity theft as an issue for consumers 

11. __________ are designed to strip the source-address information from e-mail messages.

A. Copper boxes 

B. Anonymizers 

C. Ether cards 

D. Integrated chips 

12. What is the term used to describe the final destination of discarded, lost, or destroyed data?

A. Dead bit office 

B. Back door 

C. Bit bucket 

D. Sneaker closet 

13. Which of the following interprets program instructions and processes data in the computer?

A. Universal serial bus 

B. Central processing unit 

C. Random access memory 

D. Graphical user interface 

14. Which of the following tells the computer in which order to access drives?

A. Boot sequence 

B. Operating system 

C. Random access memory 

D. Application software 

15. __________ has traditionally encompassed abuses and misuses of computer systems or computers connected to the Internet, resulting in direct and concomitant losses.

A. Digital crime 

B. Computer-related crime 

C. Cybercrime 

D. Computer crime 

16. _________ are the least sophisticated of all cybercriminals.

A. Script kiddies 

B. Cyberpunks 

C. Cybercriminal organizations 

D. Crackers 

17. Which of the following is an example of computer-initiated criminal activity?

A. Spreading viruses 

B. Stealing home addresses 

C. Wire transfers 

D. Spamming 

18. Which Windows operating system paved the way for the development of peer-to-peer networks?

A. Windows NT 3.1 

B. Windows 95 

C. Windows 2.0 

D. Windows 98 SE 

19. Which of the following computer components had its origin in the cathode ray tube?

A. Printer 

B. Scanner 

C. Mouse 

D. Monitor 

20. What is Gopher?

A. An information retrieval tool 

B. An Internet service provider 

C. An e-mail system 

D. A low-cost video conferencing facility

Show more
  • @
  • 177 orders completed
ANSWER

Tutor has posted answer for $17.00. See answer's preview

$17.00

* **** **** the **** wetware ***** ****

* Humans ********* **********

* **** crackers

C “Good” hackers

* A system vulnerability

* ***** of *** following according ** * ***** conducted by *** ********** ** Justice **** ********* as *** ****** one ****** for computer *******

* ********* *************

B ************

C ***********

* *********** *************

* ********** ******** any ******** ******** ***** ******** *** unauthorized ****** ************* ************ destruction or corruption ** ************** ****** data

A Cybercrime

* Computer related ******

C ******** ******

D ******* crime

4 ***** ** the ********* ****** ** the ************ attempt ** **** ****** ** *********** ***** * ********

A Clickjacking

* *****

C ****** grabbing

* Probe

* ***** ** *** ********* *************** of *** payment ******* *** facilitated ***** ********** *** ********* ***********

* ********* in *************

* Increased ************

* Lower *****

* ***** ******** ******

6 ***** ** the ********* ******* ********** ******** *** information ** *** **********

* ********

* ******

* ********

* *********

* ***** ** *** ********* is *** ***** destructive ******** of *********

* Technological ****** ********

* *********

C ************* ********

* ************

8 ***** payment ****** ** ********* associated **** * card payment ******* **** as **** or MasterCard?

* ******* precious *******

* Mobile ********

C Electronic ******

* ******* *****

* **** ** *** ******* of random ****** memory in *** ******** ******* permanently ***************

A ** ***** ****** ********** ************

B ** transfer several **** ** *****

* ** ******* **** ******

D ** *********** ***** ************

** ***** of *** ********* *************** ************ ******** ***** *** year 2000?

A *** ******* ** *** Morris *****

* Kevin *************** ************ ** *** ******* ****** ** “win” * ********

* The introduction ** ************ ********* ******** *********

* The ********* of ******** ***** as ** ***** for **********

** __________ *** designed ** ***** the ************** *********** from e-mail *********

A ****** ******

* ************

* ***** cards

D ********** ******

12 What ** *** **** used to ******** *** ***** *********** ** discarded **** or destroyed ******

A Dead *** *******

B Back *****

* *** *******

D Sneaker *******

** ***** ** *** ********* interprets ******* instructions *** processes **** ** the **********

A ********* ****** ****

B ******* ********** *****

* ****** access *******

* Graphical **** **********

** ***** ** *** ********* ***** *** ******** ** ***** ***** to ****** ********

* **** *********

B ********* *******

* Random ****** memory

* Application software

** __________ has traditionally *********** abuses and ******* of computer ******* ** computers ********* ** *** ******** resulting ** ****** *** *********** *******

* ******* crime

B **************** ******

C ***********

D ******** ******

** ********* are *** ***** ************* ** *** ***************

A ****** ********

B ***********

* Cybercriminal **************

D Crackers

** ***** ** *** following ** ** example ** ****************** ******** activity?

A ********* ********

B ******** home **********

* **** transfers

D *********

** Which ******* operating system ***** the *** *** *** *********** ** ************ networks?

* ******* ** ***

* ******* ***

C Windows ***

D ******* ** SE

19 ***** ** *** ********* ******** ********** *** *** ****** ** *** ******* *** ******

* ********

* Scanner

* ******

D Monitor

** **** ** ********

* ** information ********* *****

* An Internet ******* *********

* ** e-mail *******

* * ******** ***** ************ ********

Click here to download attached files: T06 CYBERSECURITY EXAM 1.docx
or Buy custom answer
LEARN MORE EFFECTIVELY AND GET BETTER GRADES!
Ask a Question