Chapter 19 – Investigations and Ethnics Flashcards

1
Q
  1. What is a computer crime?

Any violation of a law or regulation that involves a computer

A

Any violation of a law or regulation that involves a computer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q
  1. What is the main purpose of a military and intelligence attack?
    To obtain secret and restricted information from military or law enforcement sources
A

To obtain secret and restricted information from military or law enforcement sources

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q
  1. What type of attack targets proprietary information stored on a civilian organization’s system?
    Business attack
A

Business attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q
  1. What goal is not a purpose of a financial attack?

Disclose confidential personal employee information

A

Disclose confidential personal employee information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q
  1. Which one of the following attacks is most indicative of a terrorist attack?
    Damaging the ability to communicate and respond to a physical attack
A

Damaging the ability to communicate and respond to a physical attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q
  1. Which of the following would not be a primary goal of a grudge attack?
    Using automated tools to scan the organization’s systems for vulnerable ports
A

Using automated tools to scan the organization’s systems for vulnerable ports

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q
  1. What are the primary reasons attackers engage in thrill attacks? (Choose all that apply.)
    Bragging rights, Pride of conquering a secure system
A

Bragging rights, Pride of conquering a secure system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q
  1. What is the most important rule to follow when collecting evidence?
    Never modify evidence during the collection process.
A

Never modify evidence during the collection process.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q
  1. What would be a valid argument for not immediately removing power from a machine when an incident is discovered?
    Valuable evidence in memory will be lost.
A

Valuable evidence in memory will be lost.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q
  1. Hacktivists are motivated by which of the following factors? (Choose all that apply.)
    Thrill, Political beliefs
A

Thrill, Political beliefs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly