Submitted by: Submitted by zachsprad
Views: 181
Words: 485
Pages: 2
Category: Other Topics
Date Submitted: 04/07/2013 08:03 PM
1. (TCO 1) Why is the Morris Worm significant? (Points : 3) |
It placed embarrassing text on people's screens.
This was the first large-scale attack on the Internet.
It was the very first virus on the Internet.
It attacked the Windows operating system.
|
2. (TCO 1) Background checks, drug testing, retirement, and termination are elements found in what type of policy? (Points : 3) |
Due diligence
Human resources
Equal opportunity
Privacy
|
3. (TCO 1) The term hacktivist refers to _____. (Points : 3) |
a hacker who works for the government
a hacker with low technical ability
a hacker motivated by a political agenda
a hacker who can write scripts
|
4. (TCO 1) What is a Solar Sunrise? (Points : 3) |
An attack that was made to look like an attack from Iraq but that was actually made by two teenagers from California who got training in Israel
Electronic interference resulting from solar flares and occurring most commonly in the early morning hours
A penetration test conducted by the FBI and other government agencies to test the defenses of government networks and critical infrastructures
The name of a virus that would burn up a hard drive at 6 a.m. on the day of the summer solstice
|
5. (TCO 1) What is an elite hacker? (Points : 3) |
A hacker with a high level of technical ability
A hacker who is wealthy and who is politically motivated
A hacker who has elitist ideas and hacks for political purposes
A hacker who searches for scripts and ready-made tools to use for attacks
|
6. (TCO 1) When information is modified by individuals who are not authorized to change it, a _____ has been suffered. (Points : 3) |
loss of confidentiality
loss of integrity
loss of functionality
loss of availability
|
7. (TCO 1) According to the Computer Crime and...