Computer Criminal Categories
18 Questions
0 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

Which category of computer criminals commit business or information sabotage for personal gain?

  • Outside crackers
  • People with technical knowledge (correct)
  • Career criminals
  • Current or former employees
  • What motivates career criminals to use computers in their crimes?

  • Revenge against former employers
  • To assist in crimes (correct)
  • Personal gain
  • To exploit human weaknesses
  • What is the impact of unauthorized access to computer systems?

  • Only stealing information
  • Only accessing systems with the intent to commit information modification
  • Only stealing use of computer resources
  • Stealing information, stealing use of computer resources, and accessing systems with the intent to commit information modification (correct)
  • What is an example of industrial espionage?

    <p>Business sabotage</p> Signup and view all the answers

    What is a zero-day?

    <p>An undisclosed hardware or software vulnerability</p> Signup and view all the answers

    What is an example of an insider threat?

    <p>Insider abuse</p> Signup and view all the answers

    What is a common threat to IS security due to employee negligence?

    <p>Careless employees leave computer monitors on for view</p> Signup and view all the answers

    What is a type of malicious software that demands payment in exchange for restoring access to data?

    <p>Ransomware</p> Signup and view all the answers

    What is a reason why fired employees may pose a threat to an organization's IS security?

    <p>They may be resentful and install harmful code</p> Signup and view all the answers

    What is a risk associated with jailbreaking a mobile device?

    <p>Allowing unsecured apps to be loaded</p> Signup and view all the answers

    What type of cyber attack is a backup policy designed to protect against?

    <p>Ransomware</p> Signup and view all the answers

    What is a type of attack that involves flooding a system with traffic in order to make it unavailable?

    <p>Denial of service</p> Signup and view all the answers

    What is the primary motivation of hacktivist groups like Anonymous?

    <p>Political or ideological goals</p> Signup and view all the answers

    What is a risk associated with lost mobile devices without the capability to remotely wipe data?

    <p>Data on the device can be accessed by unauthorized personnel</p> Signup and view all the answers

    What is the term for the unauthorized use of a company's internal resources or information by an employee or contractor?

    <p>Insider threat</p> Signup and view all the answers

    What is the primary purpose of end-to-end encryption?

    <p>To prevent unauthorized access to confidential files</p> Signup and view all the answers

    What is the term for the use of cyber attacks to gather sensitive information or disrupt operations for competitive advantage?

    <p>Industrial espionage</p> Signup and view all the answers

    What is the term for the process of testing one's own systems to identify vulnerabilities?

    <p>Penetration testing</p> Signup and view all the answers

    More Like This

    Use Quizgecko on...
    Browser
    Browser