11 Questions
What is the primary purpose of a computer security risk?
To cause a loss or damage to computer hardware, software, data, information, or processing capability
Which of the following is NOT a category of perpetrators of cybercrime?
Cybersurveillant
What is the key distinction between a hacker and a cracker?
Crackers access computers or networks illegally, but have the intent of destroying data, stealing information, or other malicious actions, while hackers do not.
Which of the following is NOT a type of computer crime?
Cybersurveillance
What is the term used to refer to software used by cybercriminals?
Crimeware
Which of the following is NOT a potential consequence of a computer security risk?
Improvement of computer processing capability
What is the key difference between a script kiddie and a corporate spy?
Script kiddies lack the technical skills and knowledge that corporate spies possess.
What is the primary goal of a cyberterrorist's actions?
To destroy or damage computers for personal reasons.
What is the primary purpose of a rootkit?
To allow someone from a remote location to take full control of the computer.
What is the difference between a computer virus and a worm?
A virus requires user intervention to spread, while a worm can spread automatically.
What is the purpose of the Computer Emergency Response Team Coordination Center (CERT/CC)?
To offer assistance and information about Internet security breaches.
Test your knowledge about computer security risks and measures to protect computers and data. Explore different types of security breaches and the impact they can have on hardware, software, and information.
Make Your Own Quizzes and Flashcards
Convert your notes into interactive study material.
Get started for free