Podcast
Questions and Answers
What can a computer be in the context of an attack?
What can a computer be in the context of an attack?
- Only a subject
- Neither a subject nor an object
- Only an object
- Either a subject or an object (correct)
What is a threat agent?
What is a threat agent?
- A type of attack
- A specific instance or component of a threat (correct)
- A category of objects, persons, or other entities that presents a danger to an asset
- A weakness or fault in a system or protection mechanism
What is the term for a weakness or fault in a system or protection mechanism?
What is the term for a weakness or fault in a system or protection mechanism?
- Threat
- Threat agent
- Attack
- Vulnerability (correct)
What is an example of a vulnerability?
What is an example of a vulnerability?
What is the term for the value of information coming from its characteristics?
What is the term for the value of information coming from its characteristics?
What is an example of a critical characteristic of information?
What is an example of a critical characteristic of information?
What is a threat in the context of asset protection?
What is a threat in the context of asset protection?
What is the primary purpose of an online registration process for software?
What is the primary purpose of an online registration process for software?
What is a type of malware that spreads copies of itself from computer to computer without human interaction?
What is a type of malware that spreads copies of itself from computer to computer without human interaction?
What is the term for the ownership of ideas and control over the tangible or virtual representation of those ideas?
What is the term for the ownership of ideas and control over the tangible or virtual representation of those ideas?
What is the term for a program designed to damage, destroy, or deny service to a target system?
What is the term for a program designed to damage, destroy, or deny service to a target system?
What is a type of malware that disguises itself as legitimate software, often using social engineering to trick users into installing it?
What is a type of malware that disguises itself as legitimate software, often using social engineering to trick users into installing it?
In which countries were high piracy rates previously suggested?
In which countries were high piracy rates previously suggested?
What is a reason for piracy disregard mentioned in the study?
What is a reason for piracy disregard mentioned in the study?
How did respondents view virus hacking and system abuse?
How did respondents view virus hacking and system abuse?
In which countries did participants report intolerant attitudes toward personal use of organization computing resources?
In which countries did participants report intolerant attitudes toward personal use of organization computing resources?
What is notable about the Netherlands in terms of piracy rates?
What is notable about the Netherlands in terms of piracy rates?
What may contribute to the low tolerance for illicit system use?
What may contribute to the low tolerance for illicit system use?
What is the primary purpose of adware?
What is the primary purpose of adware?
What is the term for attempting to reverse calculate a password?
What is the term for attempting to reverse calculate a password?
What is a back door in the context of computer systems?
What is a back door in the context of computer systems?
What is the main difference between a brute force attack and a dictionary attack?
What is the main difference between a brute force attack and a dictionary attack?
What is the result of a successful denial of service attack?
What is the result of a successful denial of service attack?
What is the purpose of a spyware?
What is the purpose of a spyware?
What is the first commandment of computer ethics?
What is the first commandment of computer ethics?
What is the main challenge in determining ethical behavior in computer use across cultures?
What is the main challenge in determining ethical behavior in computer use across cultures?
What is the term for using another person's protected intellectual property without permission?
What is the term for using another person's protected intellectual property without permission?
What is the primary concern of the tenth commandment of computer ethics?
What is the primary concern of the tenth commandment of computer ethics?
In which type of court is copyright infringement typically tried?
In which type of court is copyright infringement typically tried?
What is the main focus of the third commandment of computer ethics?
What is the main focus of the third commandment of computer ethics?