Pay And Download
$15.00
Complete Test Bank With Answers
Sample Questions Posted Below
Chapter 5
1. Which of the following is an example of biometrics:
(a) DNA
(b) Fingerprints
(c) Voice prints
(d) All of the above
Correct answer: d – pg 257-258
2. In the early days of computing (1960’s to the early 1970’s), a “hacker” was:
(a) An incompetent programmer who wrote programs that did not work properly
(b) A busy programmer who reused code to save time
(c) A creative programmer who wrote very elegant or clever programs
(d) A new programmer who wrote simple programs
Correct answer: c – pg 231
3. Hacktivism is:
(a) A political activist group promoting tougher anti-hacking laws
(b) The counter-hacking techniques used by the FBI and other law enforcement agencies
(c) The use of hacking to promote a political cause
(d) A newsletter for hackers
Correct answer: c – pg 236
4. Web sites that look attractive to hackers, but are closely monitored so that everything the hacker does at the site is recorded and studied are known as:
(a) Honey pots
(b) Digital surveillance
(c) Computer entrapment
(d) Hacker crackdown
Correct answer: a – pg 246
5. Which of the following is NOT a program used by hackers to gain access to your computer:
(a) Keyloggers
(b) Trojans
(c) Rootkits
(d) Honey pots
Correct answer: d – pg 246
6. In 2000, a French court ordered Yahoo! to block access by French people to
(a) Web sites containing pornography
(b) an Al Qaeda training manual
(c) online auction sites containing Nazi materials
(d) a Web site containing instructions for making bombs
Correct answer: c – pg 260-261
Chapter 5
______ The government cannot monitor online activity of suspected hackers without a court order. (F)
______ Computer forensics specialists cannot recover deleted files from an erased disk. (F)
Chapter 5
1. Give two ways to identify an email as a phishing attempt
2. How did the USA PATRIOT Act expand the Computer Fraud and Abuse Act?
3. What are two significant issues raised by the Stuxnet worm, which damaged equipment in a uranium enrichment plant in Iran?
4. Why is “harmless hacking” not harmless?
5. Give arguments for and against hiring former hackers to enhance security.
Chapter 5
denial-of-service (DOS) | an attack in which hackers overload a target site with requests for information. |
hactivism | hacking to promote a political cause |
honey pots | Web sites that are specifically designed to be attractive to hackers |
phishing | sending millions of emails fishing for information to use to impersonate someone and steal money or goods |
pharming | planting false Internet addresses in the tables on a Domain Name Server (DNS) so that when someone types a URL, they are re-directed to a bogus site |
biometrics | biological characteristics that are unique to an individual |
libel | written defamation |
slander | verbal defamation |
CFAA | a law which covers unauthorized access to computers over which the federal government has jurisdiction, such as government computers, financial systems, medical systems, and activities that involve computers in more than one state |
There are no reviews yet.