Ask Computer Network & Security Expert

Question 1The Computer Fraud and Abuse Act of 1986 prohibits ________.Answer threatening to damage computer systems in order to extort money or other valuables

  • the use of encoded chips to provide access to companies' confidential information
  • accessing company e-mail or other such confidential information from public computers
  • contracting with consultants outside the United States to process key information
  • gaining access to voice-related communications for investigation or any other purpose

Question 2A mass cyber attack occurred in a country when it took severe actions against a group of citizens who protested the country's policies. The attack involved a denial-of-service in which selected sites were bombarded with traffic to force them offline. This is an example of ________.

Answer hot backing up

  • cyberbullying
  • logic bombing
  • cybersquatting
  • cyberterrorism

Question 3Robert receives a mail which says he has won an online lottery worth $50 Billion. Robert was wondering how he could win it without even buying the lottery. It was a spam mail intended to obtain the bank account details and the credit card number of Robert. Such attempts to trick financial account and credit card holders are called ________.

  • spim hacking
  • tunneling
  • logic bombing
  • cyberterrorism

Question 4Which of the following acts have made it a crime to break into any electronic communications service, including telephone services?

  • the Family Educational Rights and Privacy Act
  • the Computer Fraud and Abuse Act
  • the Electronic Communications Privacy Act
  • the Foreign Intelligence Surveillance Act

Question 5Organizations periodically have an external entity review the controls so as to uncover any potential problems in the controls. This process is called ________.

  • a recovery point objective analysis
  • a recovery time objective analysis
  • an information systems audit
  • risk analysis

Question 6An organization does not implement countermeasures against information threats; instead it simply absorbs the damages that occur. This approach is called ________.

  • risk rescheduling
  • risk reduction
  • risk mitigation
  • risk transference

Question 7Albitrex Systems is an Asian software consulting firm which develops solutions for companies in the United States and Europe. The company is heavily dependent on Internet for transporting data. The company wants to ensure that only authorized users access the data and that the data cannot be intercepted and compromised. Which of the following would be most helpful to the company in achieving this goal?

  • hot backing up
  • spam filtering
  • open transmitting
  • tunneling

Question 8An organized attempt by a country's military to disrupt or destroy the information and communication systems of another country.Which of the following terms best represents such attacks by a country?

  • cyberwar
  • Web vandalism
  • Internet hoaxing
  • cyber terrorism

Question 9________ are false messages often circulated online about new viruses, earthquakes ; kids in trouble; cancer causes; or any other topic of public interest.

  • Logic bombs
  • Cookies
  • Malware
  • Honeypots

Question 10Which of the following refers to the practice of deliberately causing emotional distress in the victim?

  • cyberstalking
  • cybersquatting
  • cyberbullying
  • bot herdering

Computer Network & Security, Computer Science

  • Category:- Computer Network & Security
  • Reference No.:- M9778130

Have any Question?


Related Questions in Computer Network & Security

Security challenges in emerging networksassignment

Security Challenges in Emerging Networks Assignment Description The purpose of this assignment is to develop skills to independently think of innovation. In this assignment students will first learn how to develop knowle ...

Security challenges in emerging networksassignment

Security Challenges in Emerging Networks Assignment Description The purpose of this assignment is to develop skills to independently think of innovation. In this assignment students will first learn how to develop knowle ...

Security challenges in emerging networksassignment

Security Challenges in Emerging Networks Assignment Description The purpose of this assignment is to develop skills to independently think of innovation. In this assignment students will first learn how to develop knowle ...

Security challenges in emerging networksassignment

Security Challenges in Emerging Networks Assignment Description The purpose of this assignment is to develop skills to independently think of innovation. In this assignment students will first learn how to develop knowle ...

Advanced network design assessment - human factors in

Advanced Network Design Assessment - Human factors in network analysis and design Purpose of the assessment - This assignment is designed to assess students' knowledge and skills related to the following learning outcome ...

Advanced network design assessment - human factors in

Advanced Network Design Assessment - Human factors in network analysis and design Purpose of the assessment - This assignment is designed to assess students' knowledge and skills related to the following learning outcome ...

Assignment descriptionproject scope a typical network

Assignment Description Project Scope: A typical network layout diagram of a firm is given below for illustrative purposes only. The service requirements are enclosed. Figure. Network layout of a firm Service requirements ...

Assignment descriptionproject scope a typical network

Assignment Description Project Scope: A typical network layout diagram of a firm is given below for illustrative purposes only. The service requirements are enclosed. Figure. Network layout of a firm Service requirements ...

After reading this weeks materials please respond to two 2

After reading this week's materials, please respond to TWO (2) of the following questions. AND PROVIDE CITATION IN APA 1. Describe the differences between bus, ring, star and mesh topologies. 2. Explain the TCP/IP Model ...

The abstract should not be more than 250 words describe

The abstract should not be more than 250 words. Describe your project, focusing on research questions and research method for next stage of the project. 1. Introduction [The introduction should describe what the project ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Why might a bank avoid the use of interest rate swaps even

Why might a bank avoid the use of interest rate swaps, even when the institution is exposed to significant interest rate

Describe the difference between zero coupon bonds and

Describe the difference between zero coupon bonds and coupon bonds. Under what conditions will a coupon bond sell at a p

Compute the present value of an annuity of 880 per year

Compute the present value of an annuity of $ 880 per year for 16 years, given a discount rate of 6 percent per annum. As

Compute the present value of an 1150 payment made in ten

Compute the present value of an $1,150 payment made in ten years when the discount rate is 12 percent. (Do not round int

Compute the present value of an annuity of 699 per year

Compute the present value of an annuity of $ 699 per year for 19 years, given a discount rate of 6 percent per annum. As