AIU Faculty of Informatics - CS Chapter 11 Security Quiz
15 Questions
0 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

What is the main purpose of computer security measures?

  • To ensure computers operate at maximum speed
  • To facilitate easy sharing of information
  • To enhance the visual appeal of computer interfaces
  • To prevent unauthorized access to computers and networks (correct)
  • What does cybercrime entail?

  • Only physical theft or damage
  • Any illicit action via the internet (correct)
  • Only activities related to corporate espionage
  • Any legal act involving technology
  • What is a computer security risk?

  • Only physical damage to computer hardware
  • Any threat, action, or event that negatively impacts assets through exploiting a vulnerability (correct)
  • A legal action that benefits an organization or individual
  • A positive impact on computer processing capabilities
  • What is a hacker's primary intention?

    <p>To gain unauthorized access and potentially harm data or networks</p> Signup and view all the answers

    How are cyber criminals categorized?

    <p>Hackers, crackers, unethical employees</p> Signup and view all the answers

    Why is it crucial to protect computers and their information?

    <p>To avoid unauthorized access and prevent loss or theft of information</p> Signup and view all the answers

    Which type of cybercriminal is defined as an unskilled user who relies on premade scripts or programs to gain illegal access without understanding the process?

    <p>Script Kiddie</p> Signup and view all the answers

    What method uses words from a file to speed up guessing a password during an attack?

    <p>Dictionary attack</p> Signup and view all the answers

    What do cyber extortionists threaten to do if not paid a certain amount of money?

    <p>Disclose private or confidential information</p> Signup and view all the answers

    Which type of cybercriminal targets the infrastructure electronically to hinder or completely stop computers at ministries, governmental organizations, air traffic control system, etc.?

    <p>Cyber terrorists</p> Signup and view all the answers

    What do unethical employees do with the confidential information they exploit from a company's computer system?

    <p>Sell it to a rival company</p> Signup and view all the answers

    Which type of malicious program infects the boot sector on hard disks and prevents normal operation?

    <p>Virus</p> Signup and view all the answers

    What kind of team does corporate espionage specialists possess, specializing in computers and communications?

    <p>Highly skilled team in computers and communications</p> Signup and view all the answers

    "Corporate espionage" involves the unethical act of spying on and stealing ideas from:

    <p>Rival corporations</p> Signup and view all the answers

    What is the term used for those who exploit vulnerabilities in a company's computer system for financial gains or revenge?

    <p>Unethical employees</p> Signup and view all the answers

    More Like This

    Use Quizgecko on...
    Browser
    Browser