Computer Criminal Categories
18 Questions
0 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to Lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

Which category of computer criminals commit business or information sabotage for personal gain?

  • Outside crackers
  • People with technical knowledge (correct)
  • Career criminals
  • Current or former employees

What motivates career criminals to use computers in their crimes?

  • Revenge against former employers
  • To assist in crimes (correct)
  • Personal gain
  • To exploit human weaknesses

What is the impact of unauthorized access to computer systems?

  • Only stealing information
  • Only accessing systems with the intent to commit information modification
  • Only stealing use of computer resources
  • Stealing information, stealing use of computer resources, and accessing systems with the intent to commit information modification (correct)

What is an example of industrial espionage?

<p>Business sabotage (A)</p> Signup and view all the answers

What is a zero-day?

<p>An undisclosed hardware or software vulnerability (A)</p> Signup and view all the answers

What is an example of an insider threat?

<p>Insider abuse (D)</p> Signup and view all the answers

What is a common threat to IS security due to employee negligence?

<p>Careless employees leave computer monitors on for view (C)</p> Signup and view all the answers

What is a type of malicious software that demands payment in exchange for restoring access to data?

<p>Ransomware (D)</p> Signup and view all the answers

What is a reason why fired employees may pose a threat to an organization's IS security?

<p>They may be resentful and install harmful code (A)</p> Signup and view all the answers

What is a risk associated with jailbreaking a mobile device?

<p>Allowing unsecured apps to be loaded (A)</p> Signup and view all the answers

What type of cyber attack is a backup policy designed to protect against?

<p>Ransomware (B)</p> Signup and view all the answers

What is a type of attack that involves flooding a system with traffic in order to make it unavailable?

<p>Denial of service (B)</p> Signup and view all the answers

What is the primary motivation of hacktivist groups like Anonymous?

<p>Political or ideological goals (B)</p> Signup and view all the answers

What is a risk associated with lost mobile devices without the capability to remotely wipe data?

<p>Data on the device can be accessed by unauthorized personnel (B)</p> Signup and view all the answers

What is the term for the unauthorized use of a company's internal resources or information by an employee or contractor?

<p>Insider threat (A)</p> Signup and view all the answers

What is the primary purpose of end-to-end encryption?

<p>To prevent unauthorized access to confidential files (C)</p> Signup and view all the answers

What is the term for the use of cyber attacks to gather sensitive information or disrupt operations for competitive advantage?

<p>Industrial espionage (D)</p> Signup and view all the answers

What is the term for the process of testing one's own systems to identify vulnerabilities?

<p>Penetration testing (D)</p> Signup and view all the answers

More Like This

Computer Hacking and Cybercrimes
10 questions
Cyber Crime and Hacking
12 questions
Cyber Crime Tactics and Techniques
18 questions
Use Quizgecko on...
Browser
Browser