Chapter 19 – Investigations and Ethnics Flashcards
1
Q
- What is a computer crime?
Any violation of a law or regulation that involves a computer
A
Any violation of a law or regulation that involves a computer
2
Q
- What is the main purpose of a military and intelligence attack?
To obtain secret and restricted information from military or law enforcement sources
A
To obtain secret and restricted information from military or law enforcement sources
3
Q
- What type of attack targets proprietary information stored on a civilian organization’s system?
Business attack
A
Business attack
4
Q
- What goal is not a purpose of a financial attack?
Disclose confidential personal employee information
A
Disclose confidential personal employee information
5
Q
- Which one of the following attacks is most indicative of a terrorist attack?
Damaging the ability to communicate and respond to a physical attack
A
Damaging the ability to communicate and respond to a physical attack
6
Q
- Which of the following would not be a primary goal of a grudge attack?
Using automated tools to scan the organization’s systems for vulnerable ports
A
Using automated tools to scan the organization’s systems for vulnerable ports
7
Q
- What are the primary reasons attackers engage in thrill attacks? (Choose all that apply.)
Bragging rights, Pride of conquering a secure system
A
Bragging rights, Pride of conquering a secure system
8
Q
- What is the most important rule to follow when collecting evidence?
Never modify evidence during the collection process.
A
Never modify evidence during the collection process.
9
Q
- What would be a valid argument for not immediately removing power from a machine when an incident is discovered?
Valuable evidence in memory will be lost.
A
Valuable evidence in memory will be lost.
10
Q
- Hacktivists are motivated by which of the following factors? (Choose all that apply.)
Thrill, Political beliefs
A
Thrill, Political beliefs