Podcast
Questions and Answers
Which category of computer criminals commit business or information sabotage for personal gain?
Which category of computer criminals commit business or information sabotage for personal gain?
- Outside crackers
- People with technical knowledge (correct)
- Career criminals
- Current or former employees
What motivates career criminals to use computers in their crimes?
What motivates career criminals to use computers in their crimes?
- Revenge against former employers
- To assist in crimes (correct)
- Personal gain
- To exploit human weaknesses
What is the impact of unauthorized access to computer systems?
What is the impact of unauthorized access to computer systems?
- Only stealing information
- Only accessing systems with the intent to commit information modification
- Only stealing use of computer resources
- Stealing information, stealing use of computer resources, and accessing systems with the intent to commit information modification (correct)
What is an example of industrial espionage?
What is an example of industrial espionage?
What is a zero-day?
What is a zero-day?
What is an example of an insider threat?
What is an example of an insider threat?
What is a common threat to IS security due to employee negligence?
What is a common threat to IS security due to employee negligence?
What is a type of malicious software that demands payment in exchange for restoring access to data?
What is a type of malicious software that demands payment in exchange for restoring access to data?
What is a reason why fired employees may pose a threat to an organization's IS security?
What is a reason why fired employees may pose a threat to an organization's IS security?
What is a risk associated with jailbreaking a mobile device?
What is a risk associated with jailbreaking a mobile device?
What type of cyber attack is a backup policy designed to protect against?
What type of cyber attack is a backup policy designed to protect against?
What is a type of attack that involves flooding a system with traffic in order to make it unavailable?
What is a type of attack that involves flooding a system with traffic in order to make it unavailable?
What is the primary motivation of hacktivist groups like Anonymous?
What is the primary motivation of hacktivist groups like Anonymous?
What is a risk associated with lost mobile devices without the capability to remotely wipe data?
What is a risk associated with lost mobile devices without the capability to remotely wipe data?
What is the term for the unauthorized use of a company's internal resources or information by an employee or contractor?
What is the term for the unauthorized use of a company's internal resources or information by an employee or contractor?
What is the primary purpose of end-to-end encryption?
What is the primary purpose of end-to-end encryption?
What is the term for the use of cyber attacks to gather sensitive information or disrupt operations for competitive advantage?
What is the term for the use of cyber attacks to gather sensitive information or disrupt operations for competitive advantage?
What is the term for the process of testing one's own systems to identify vulnerabilities?
What is the term for the process of testing one's own systems to identify vulnerabilities?