Cyberspace, Cybersecurity, and Cybercrime 1st Test Bank By Kremling

Instant download Cyberspace, Cybersecurity, and Cybercrime 1st Test Bank By Kremling. You don't have to wait as you'll be able to download the files immediately after placing your order. All chapters are included with all the questions and correct answers. Get the Cyberspace, Cybersecurity, and Cybercrime 1st Test Bank By Kremling today and start getting better grades.



Chapter 3: Threat Factors – Computers as Targets
Test Bank

Multiple Choice


1. Which of the following was NOT identified as a phase of convergence in the evolution of cybercrime?
a. Technology is separate from people.
b. Man is using technology.
c. Technology replaces people.
d. Technology takes over the world.
Ans: D
Learning Objective: 3-5: Describe countermeasures to threats that target computers and mobile devices.
Cognitive Domain: Application
Answer Location: Phases of Convergence
Difficulty Level: Medium

2. In 2001, the first malware attack that fell into phase 3 of convergence was known as ______.
a. Code Red
b. Code Blue
c. Code Black
d. Code Green
Ans: A
Learning Objective: 3-5: Describe countermeasures to threats that target computers and mobile devices.
Cognitive Domain: Application
Answer Location: Phases of Convergence
Difficulty Level: Medium

3. E-mail-borne viruses took place in which of the following phases of convergence?
a. phase 1
b. phase 2
c. phase 3
d. all of these
Ans: B
Learning Objective: 3-5: Describe countermeasures to threats that target computers and mobile devices.
Cognitive Domain: Application
Answer Location: Phases of Convergence
Difficulty Level: Medium

4. In 2001, the original Code Red malware initiated a ______ attack on the White House.
a. denial of service
b. rogue access point
c. phishing
d. keylogging
Ans: A
Learning Objective: 3-5: Describe countermeasures to threats that target computers and mobile devices.
Cognitive Domain: Knowledge
Answer Location: Phases of Convergence
Difficulty Level: Easy

5. According to the text, by the year 2020, the economic cost of cybercrime is expected to go above ______ trillion.
a. 1
b. 2
c. 3
d. 4
Ans: C
Learning Objective: Various.
Cognitive Domain: Knowledge
Answer Location: Main Targets in Information Technology
Difficulty Level: Easy

6. Which of the following is NOT considered one of the main targets in information technology?
a. people
b. software
c. hardware
d. network
Ans: A
Learning Objective: Various.
Cognitive Domain: Knowledge
Answer Location: Main Targets in Information Technology
Difficulty Level: Easy

7. Which of the following was not identified as a countermeasure for networks in text?
a. host-based mitigation
b. data backup
c. proactive measures
d. network-based mitigation
Ans: B
Learning Objective: Various.
Cognitive Domain: Application
Answer Location: Main Targets in Information Technology
Difficulty Level: Medium

8. Which of the following was not identified as a hardware device in the text?
a. modems
b. network appliances
c. surveillance systems
d. industrial control systems
Ans: A
Learning Objective: Various.
Cognitive Domain: Application
Answer Location: Main Targets in Information Technology
Difficulty Level: Medium

9. Which of the following was identified as a software attack in the text?
a. counterfeiting products
b. brute force
c. drive-by-downloads
d. denial-of-service
Ans: D
Learning Objective: Various.
Cognitive Domain: Application
Answer Location: Main Targets in Information Technology
Difficulty Level: Medium

10. Which of the following is NOT considered one of the main issues with cybersecurity?
a. confidentiality of data
b. integrity of data
c. cost of data
d. availability of data
Ans: C
Learning Objective: Various.
Cognitive Domain: Application
Answer Location: Main Targets in Information Technology
Difficulty Level: Medium

11. In the ______ cluster, computer infrastructure and vulnerabilities are the focus of attacks.
a. technological
b. socio-political
c. socio-economic
d. human-machine
Ans: D
Learning Objective: Various
Cognitive Domain: Comprehension
Answer Location: Main Targets in Information Technology
Difficulty Level: Easy

12. In the ______ cluster, computers are the target of the cybercrimes.
a. human-machine
b. socio-economic
c. socio-political
d. technological
Ans: D
Learning Objective: Various
Cognitive Domain: Comprehension
Answer Location: Main Targets in Information Technology
Difficulty Level: Easy

13. Which of the following has NOT contributed to the increase in threats to mobile devices?
a. increase in smartphones
b. Apple Inc. technology
c. storing information on devices
d. sophisticated smartphone technology
Ans: B
Learning Objective: 3-5: Describe countermeasures to threats that target computers and mobile devices.
Cognitive Domain: Application
Answer Location: Threats to Mobile Devices
Difficulty Level: Medium

14. A ______ is a small software program designed to spread from one computer to another and to interfere with computer operation.
a. virus
b. worm
c. Trojan horse
d. bug
Ans: A
Learning Objective: 3-2: Explain the threat viruses pose to computers and computer users.
Cognitive Domain: Comprehension
Answer Location: Viruses
Difficulty Level: Easy

15. According to the text, virus files typically end in ______.
a. .exe
b. .doc
c. .mp4
d. .jpg
Ans: A