Podcast
Questions and Answers
What are the two categories into which computer crime can be separated?
What are the two categories into which computer crime can be separated?
- Crimes facilitated by a computer and crimes where the computer is the target (correct)
- Software-related crimes and hardware-related crimes
- Malware-based crimes and phishing-based crimes
- Online crimes and offline crimes
Which of the following is NOT an overlapping type of computer security risk?
Which of the following is NOT an overlapping type of computer security risk?
- Bugs or misconfiguration problems that allow unauthorized remote users to access the system
- Interception of network data sent from browser to server or vice versa via network eavesdropping
- Unauthorized access to sensitive data through social engineering (correct)
- Browser-side risks
What is the first and perhaps the easier rule of computer security mentioned in the text?
What is the first and perhaps the easier rule of computer security mentioned in the text?
- Encryption of Data
- Regular Software Updates
- Firewall Protection
- Physical Security (correct)
What type of computer security risk involves hackers exploiting holes in operating systems of local and remote systems?
What type of computer security risk involves hackers exploiting holes in operating systems of local and remote systems?
What type of malicious software can start working on a computer once it has been used?
What type of malicious software can start working on a computer once it has been used?
What is the term for computer crimes where the computer is the target?
What is the term for computer crimes where the computer is the target?
What is the primary focus of physical security in computer security?
What is the primary focus of physical security in computer security?
What type of computer security risk involves unauthorized remote users exploiting bugs or misconfigurations?
What type of computer security risk involves unauthorized remote users exploiting bugs or misconfigurations?
What is the term for the type of malicious software that affects a computer system while it is connected to the internet?
What is the term for the type of malicious software that affects a computer system while it is connected to the internet?
What do hackers exploit when they find ways to access local and remote systems?
What do hackers exploit when they find ways to access local and remote systems?