Which of the following acts have made it a crime to break

Assignment Help Computer Network Security
Reference no: EM13462953

Question 1The Computer Fraud and Abuse Act of 1986 prohibits ________.Answer threatening to damage computer systems in order to extort money or other valuables

  • the use of encoded chips to provide access to companies' confidential information
  • accessing company e-mail or other such confidential information from public computers
  • contracting with consultants outside the United States to process key information
  • gaining access to voice-related communications for investigation or any other purpose

Question 2A mass cyber attack occurred in a country when it took severe actions against a group of citizens who protested the country's policies. The attack involved a denial-of-service in which selected sites were bombarded with traffic to force them offline. This is an example of ________.

Answer hot backing up

  • cyberbullying
  • logic bombing
  • cybersquatting
  • cyberterrorism

Question 3Robert receives a mail which says he has won an online lottery worth $50 Billion. Robert was wondering how he could win it without even buying the lottery. It was a spam mail intended to obtain the bank account details and the credit card number of Robert. Such attempts to trick financial account and credit card holders are called ________.

  • spim hacking
  • tunneling
  • logic bombing
  • cyberterrorism

Question 4Which of the following acts have made it a crime to break into any electronic communications service, including telephone services?

  • the Family Educational Rights and Privacy Act
  • the Computer Fraud and Abuse Act
  • the Electronic Communications Privacy Act
  • the Foreign Intelligence Surveillance Act

Question 5Organizations periodically have an external entity review the controls so as to uncover any potential problems in the controls. This process is called ________.

  • a recovery point objective analysis
  • a recovery time objective analysis
  • an information systems audit
  • risk analysis

Question 6An organization does not implement countermeasures against information threats; instead it simply absorbs the damages that occur. This approach is called ________.

  • risk rescheduling
  • risk reduction
  • risk mitigation
  • risk transference

Question 7Albitrex Systems is an Asian software consulting firm which develops solutions for companies in the United States and Europe. The company is heavily dependent on Internet for transporting data. The company wants to ensure that only authorized users access the data and that the data cannot be intercepted and compromised. Which of the following would be most helpful to the company in achieving this goal?

  • hot backing up
  • spam filtering
  • open transmitting
  • tunneling

Question 8An organized attempt by a country's military to disrupt or destroy the information and communication systems of another country.Which of the following terms best represents such attacks by a country?

  • cyberwar
  • Web vandalism
  • Internet hoaxing
  • cyber terrorism

Question 9________ are false messages often circulated online about new viruses, earthquakes ; kids in trouble; cancer causes; or any other topic of public interest.

  • Logic bombs
  • Cookies
  • Malware
  • Honeypots

Question 10Which of the following refers to the practice of deliberately causing emotional distress in the victim?

  • cyberstalking
  • cybersquatting
  • cyberbullying
  • bot herdering

Reference no: EM13462953

Questions Cloud

Create a flowchart and give the pseudocode for searching an : respond to the following about arrays and their implementations describe an array and its various implementations.
Create a flowchart to show the process that will allow the : 1.create a flowchart to show the process that will allow the implementation of stack push and pop operations.2.create a
Explain physical social cognitive and emotional development : jeff is now 50 years old. he is still overweight and has developed both high blood pressure and type 2 diabetes. at the
Explain the relationship between family systems and : explain in detail using your readingspresentations from this moduleweek to support what you say the relationship
Which of the following acts have made it a crime to break : question 1the computer fraud and abuse act of 1986 prohibits .answer threatening to damage computer systems in order to
What neurological disorder disease or accident took place : choose a well-documented historical case study of an individual who experienced a neurological disorder disease or
Discuss new ways for employees to use web-based : discuss new ways for employees to use web-based self-service applications in their companies that will help save time
In reflecting on unpleasant experience what one thing about : the primary concern in this paper will be to discuss about the degree of influence that todays children render on the
In your opinion determine the biggest challenges facing : 1. in your opinion what are the biggest challenges facing mncs in todays economy and why? allow for political

Reviews

Write a Review

 

Computer Network Security Questions & Answers

  Describing security topology covers four primary areas

Security topology covers four primary areas of concern (design goals, security zones, technologies, and business requirements). Describe each area including key topics in each area. Discuss software threats.

  Cluster architecture for the servers and databases

What type of OS to use along with the file system and why is this architecture is better than others? Will you use the same OS for servers and Desktops? Will your file system of choice provide security?

  Implement the s-box functionality as a class

Implement the cipher as a class which implements the provided interface.

  Cybersecurity research paper

Identifying and explaining how the breach occurred and identifying and discussing known or suspected losses of confidentiality, integrity, and availability for information and/or information systems

  Defects of gsm networks

Security mechanism, threat, GSM networks, DDoS attacks, IPv4, IPv6, IPsec integrity, authentication and privacy, IPsec AH,  ‘single sign-on' in the context of access control, Secure Electronic Transaction (SET) protoco,  Encryption

  Difference between the terms safety and security

What is the difference between the terms ‘safety' and ‘security' and what is the conclusion of the paper?

  It project management tasks

Project life cycle consists of different phases. Recognize the main IT project management tasks associated with the concept, development and closeout phases of the project life cycle.

  Define security infrastructure and protocols

The SSL protocol uses (X.509) certificates to create a secure session between a server and a client in a web session. Discuss the browser-based trust model assumed in SSL, and compare it with the trust model used in Kerberos.

  Importance of presentation and content in presentation

There has been a discussion for years on which is more important, content or presentation. This is very important when thinking about creating a PowerPoint slideshow.

  Which will encrypt each users data in a file

Acme Inc. is developing the next generation financial tracking program, and Alice has been given the task of writing the encryption component, which will encrypt each user's data in a file on the hard drive.

  Combine the two disks into one logical volume

Illustrate your explanation by using the Linux Log- ical Volume Manager to combine the two spare disks available on the Virtual Debian distribution. Combine the two disks into one logical volume. Format the new logical disk and modify the /etc/fst..

  Find at least four sites that offer malware listings

Search a number of antivirus companies websites and find at least four sites that offer malware listings and compare their latest malware lists

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd