Ch03 computer and internet crime

Page 1

CHAPTER 3: COMPUTER AND INTERNET CRIME 1. Vishing frequently leads consumers to counterfeit Web sites designed to trick them into initiating a denial-of-service attack. a. True b. False ANSWER: False 2. The Fifth Amendment regulates the collection of the content of wire and electronic communications. a. True b. False ANSWER: False 3. Smart and talented hackers who are technically inept are referred to as lamers or script kiddies by more skilled hackers. a. True b. False ANSWER: True 4. Computer viruses differ from worms in that viruses can propagate without human intervention, often sending copies of themselves to other computers by email. a. True b. False ANSWER: False 5. The cost to repair the worldwide damage done by a computer worm has exceeded $1 billion on more than one occasion. a. True b. False ANSWER: True 6. The security of any system or network is a combination of technology, policy, and people and requires a wide range of activities to be effective. a. True b. False ANSWER: True 7. According to the 2010/11 CSI Computer Crime and Security Survey, malware infection incidents were the most common security incident. a. True b. False ANSWER: True


Turn static files into dynamic content formats.

Create a flipbook
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.