Podcast
Questions and Answers
What is the primary purpose of a computer security risk?
What is the primary purpose of a computer security risk?
- To access data without causing any damage
- To engage in a deliberate act that is against the law
- To cause a loss or damage to computer hardware, software, data, information, or processing capability (correct)
- To leave messages or alter data
Which of the following is NOT a category of perpetrators of cybercrime?
Which of the following is NOT a category of perpetrators of cybercrime?
- Cracker
- Script kiddie
- Cybersurveillant (correct)
- Hacker
What is the key distinction between a hacker and a cracker?
What is the key distinction between a hacker and a cracker?
- Hackers access computers or networks illegally, while crackers do not.
- Hackers are computer enthusiasts, while crackers are malicious actors.
- Crackers access computers or networks illegally, but have the intent of destroying data, stealing information, or other malicious actions, while hackers do not. (correct)
- Hackers and crackers are the same thing.
Which of the following is NOT a type of computer crime?
Which of the following is NOT a type of computer crime?
What is the term used to refer to software used by cybercriminals?
What is the term used to refer to software used by cybercriminals?
Which of the following is NOT a potential consequence of a computer security risk?
Which of the following is NOT a potential consequence of a computer security risk?
What is the key difference between a script kiddie and a corporate spy?
What is the key difference between a script kiddie and a corporate spy?
What is the primary goal of a cyberterrorist's actions?
What is the primary goal of a cyberterrorist's actions?
What is the primary purpose of a rootkit?
What is the primary purpose of a rootkit?
What is the difference between a computer virus and a worm?
What is the difference between a computer virus and a worm?
What is the purpose of the Computer Emergency Response Team Coordination Center (CERT/CC)?
What is the purpose of the Computer Emergency Response Team Coordination Center (CERT/CC)?