Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

3 1 . A computer _ _ _ _ risk is any event or action that could cause a loss of or damage to computer

31. A computer ____ risk is any event or action that could cause a loss of or damage to computer hardware, software, data, information, or processing capability.
a. security
b. liability
c. terrorism
d. network
32. A(n)____ has the same intent as a cracker but does not have the technical skills and knowledge.
a. script kiddie
b. hacker
c. cyberextortionist
d. cyberterrorist
33. A(n)____ is someone who uses e-mail as a vehicle for extortion.
a. cyberextortionist
b. hacker
c. script kiddie
d. cyberterrorist
34. A(n)____ is someone who uses the Internet or network to destroy or damage computers for political reasons.
a. cyberterrorist
b. hacker
c. script kiddie
d. cyberextortionist
35. Computer viruses, worms, Trojan horses, and rootkits are classified as ____, which are programs that act without a users knowledge and deliberately alter the computers operations.
a. malware
b. untrusted sources
c. threats
d. cybermals
36. A(n)____ source is a company or person a user believes will not send a virus-infected file knowingly.
a. trusted
b. legitimate
c. secure
d. backup
37. As shown in the accompanying figure, a(n)____ program protects a computer against viruses by identifying and removing any computer viruses found in memory, on storage media, or on incoming files.
a. antivirus
b. hoax
c. secure
d. antispyware
38. A virus ____ is an e-mail message that warns users of a nonexistent virus, worm, or Trojan horse.
a. hoax
b. myth
c. threat
d. DoS
39. A particularly devastating type of DoS attack is the ____ DoS attack, in which multiple unsuspecting computers are used to attack multiple computer networks.
a. distributed
b. delayed
c. limited
d. staggered
40.____ is a technique intruder use to make their network or Internet transmission appear legitimate to a victim computer or network.
a. Spoofing
b. Rebuking
c. Transmitting
d. Victimizing

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Students also viewed these Databases questions