Cybersecurity Threats and Assets
30 Questions
0 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to Lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

What can a computer be in the context of an attack?

  • Only a subject
  • Neither a subject nor an object
  • Only an object
  • Either a subject or an object (correct)
  • What is a threat agent?

  • A type of attack
  • A specific instance or component of a threat (correct)
  • A category of objects, persons, or other entities that presents a danger to an asset
  • A weakness or fault in a system or protection mechanism
  • What is the term for a weakness or fault in a system or protection mechanism?

  • Threat
  • Threat agent
  • Attack
  • Vulnerability (correct)
  • What is an example of a vulnerability?

    <p>A flaw in a software package (C)</p> Signup and view all the answers

    What is the term for the value of information coming from its characteristics?

    <p>Critical characteristics (C)</p> Signup and view all the answers

    What is an example of a critical characteristic of information?

    <p>Availability (D)</p> Signup and view all the answers

    What is a threat in the context of asset protection?

    <p>An object, person, or entity that represents a constant anger to an asset (A)</p> Signup and view all the answers

    What is the primary purpose of an online registration process for software?

    <p>To combat software piracy (D)</p> Signup and view all the answers

    What is a type of malware that spreads copies of itself from computer to computer without human interaction?

    <p>Worm (C)</p> Signup and view all the answers

    What is the term for the ownership of ideas and control over the tangible or virtual representation of those ideas?

    <p>Intellectual Property (D)</p> Signup and view all the answers

    What is the term for a program designed to damage, destroy, or deny service to a target system?

    <p>Malicious Code (A)</p> Signup and view all the answers

    What is a type of malware that disguises itself as legitimate software, often using social engineering to trick users into installing it?

    <p>Trojan Horse (B)</p> Signup and view all the answers

    In which countries were high piracy rates previously suggested?

    <p>Singapore, Hong Kong, and Pacific Rim countries (D)</p> Signup and view all the answers

    What is a reason for piracy disregard mentioned in the study?

    <p>Peer pressure (B)</p> Signup and view all the answers

    How did respondents view virus hacking and system abuse?

    <p>They universally condemned it (B)</p> Signup and view all the answers

    In which countries did participants report intolerant attitudes toward personal use of organization computing resources?

    <p>Singapore, Hong Kong, and England (C)</p> Signup and view all the answers

    What is notable about the Netherlands in terms of piracy rates?

    <p>It ranked third in piracy rates among surveyed nations (B)</p> Signup and view all the answers

    What may contribute to the low tolerance for illicit system use?

    <p>The similarity to common crimes (D)</p> Signup and view all the answers

    What is the primary purpose of adware?

    <p>To deliver and display advertising banners or popups to the user’s screen (A)</p> Signup and view all the answers

    What is the term for attempting to reverse calculate a password?

    <p>Password Crack (C)</p> Signup and view all the answers

    What is a back door in the context of computer systems?

    <p>A legitimate entry point left by system designers or maintenance staff (B)</p> Signup and view all the answers

    What is the main difference between a brute force attack and a dictionary attack?

    <p>The use of a list of commonly used passwords (A)</p> Signup and view all the answers

    What is the result of a successful denial of service attack?

    <p>The system becomes overloaded and cannot respond to legitimate requests (A)</p> Signup and view all the answers

    What is the purpose of a spyware?

    <p>To aid in gathering information about a person or organization without their knowledge (A)</p> Signup and view all the answers

    What is the first commandment of computer ethics?

    <p>Thou shalt not use a computer to harm other people (C)</p> Signup and view all the answers

    What is the main challenge in determining ethical behavior in computer use across cultures?

    <p>Different perspectives on ethics among nationalities (D)</p> Signup and view all the answers

    What is the term for using another person's protected intellectual property without permission?

    <p>Software license infringement (D)</p> Signup and view all the answers

    What is the primary concern of the tenth commandment of computer ethics?

    <p>Considering social consequences (C)</p> Signup and view all the answers

    In which type of court is copyright infringement typically tried?

    <p>Federal court (A)</p> Signup and view all the answers

    What is the main focus of the third commandment of computer ethics?

    <p>Not snooping around in other people's computer files (C)</p> Signup and view all the answers

    More Like This

    Computer Security and Cyber Security Quiz
    5 questions

    Computer Security and Cyber Security Quiz

    ConsistentTropicalRainforest avatar
    ConsistentTropicalRainforest
    Network Security Overview
    5 questions

    Network Security Overview

    AdequateSalamander avatar
    AdequateSalamander
    Use Quizgecko on...
    Browser
    Browser