Cybersecurity Threats and Assets
30 Questions
0 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to Lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

What can a computer be in the context of an attack?

  • Only a subject
  • Neither a subject nor an object
  • Only an object
  • Either a subject or an object (correct)

What is a threat agent?

  • A type of attack
  • A specific instance or component of a threat (correct)
  • A category of objects, persons, or other entities that presents a danger to an asset
  • A weakness or fault in a system or protection mechanism

What is the term for a weakness or fault in a system or protection mechanism?

  • Threat
  • Threat agent
  • Attack
  • Vulnerability (correct)

What is an example of a vulnerability?

<p>A flaw in a software package (C)</p> Signup and view all the answers

What is the term for the value of information coming from its characteristics?

<p>Critical characteristics (C)</p> Signup and view all the answers

What is an example of a critical characteristic of information?

<p>Availability (D)</p> Signup and view all the answers

What is a threat in the context of asset protection?

<p>An object, person, or entity that represents a constant anger to an asset (A)</p> Signup and view all the answers

What is the primary purpose of an online registration process for software?

<p>To combat software piracy (D)</p> Signup and view all the answers

What is a type of malware that spreads copies of itself from computer to computer without human interaction?

<p>Worm (C)</p> Signup and view all the answers

What is the term for the ownership of ideas and control over the tangible or virtual representation of those ideas?

<p>Intellectual Property (D)</p> Signup and view all the answers

What is the term for a program designed to damage, destroy, or deny service to a target system?

<p>Malicious Code (A)</p> Signup and view all the answers

What is a type of malware that disguises itself as legitimate software, often using social engineering to trick users into installing it?

<p>Trojan Horse (B)</p> Signup and view all the answers

In which countries were high piracy rates previously suggested?

<p>Singapore, Hong Kong, and Pacific Rim countries (D)</p> Signup and view all the answers

What is a reason for piracy disregard mentioned in the study?

<p>Peer pressure (B)</p> Signup and view all the answers

How did respondents view virus hacking and system abuse?

<p>They universally condemned it (B)</p> Signup and view all the answers

In which countries did participants report intolerant attitudes toward personal use of organization computing resources?

<p>Singapore, Hong Kong, and England (C)</p> Signup and view all the answers

What is notable about the Netherlands in terms of piracy rates?

<p>It ranked third in piracy rates among surveyed nations (B)</p> Signup and view all the answers

What may contribute to the low tolerance for illicit system use?

<p>The similarity to common crimes (D)</p> Signup and view all the answers

What is the primary purpose of adware?

<p>To deliver and display advertising banners or popups to the user’s screen (A)</p> Signup and view all the answers

What is the term for attempting to reverse calculate a password?

<p>Password Crack (C)</p> Signup and view all the answers

What is a back door in the context of computer systems?

<p>A legitimate entry point left by system designers or maintenance staff (B)</p> Signup and view all the answers

What is the main difference between a brute force attack and a dictionary attack?

<p>The use of a list of commonly used passwords (A)</p> Signup and view all the answers

What is the result of a successful denial of service attack?

<p>The system becomes overloaded and cannot respond to legitimate requests (A)</p> Signup and view all the answers

What is the purpose of a spyware?

<p>To aid in gathering information about a person or organization without their knowledge (A)</p> Signup and view all the answers

What is the first commandment of computer ethics?

<p>Thou shalt not use a computer to harm other people (C)</p> Signup and view all the answers

What is the main challenge in determining ethical behavior in computer use across cultures?

<p>Different perspectives on ethics among nationalities (D)</p> Signup and view all the answers

What is the term for using another person's protected intellectual property without permission?

<p>Software license infringement (D)</p> Signup and view all the answers

What is the primary concern of the tenth commandment of computer ethics?

<p>Considering social consequences (C)</p> Signup and view all the answers

In which type of court is copyright infringement typically tried?

<p>Federal court (A)</p> Signup and view all the answers

What is the main focus of the third commandment of computer ethics?

<p>Not snooping around in other people's computer files (C)</p> Signup and view all the answers

More Like This

Network Security Overview
5 questions

Network Security Overview

AdequateSalamander avatar
AdequateSalamander
Computer Security Risks
11 questions
Use Quizgecko on...
Browser
Browser