Chapter 3: Threat Factors – Computers as Targets
Test Bank
Multiple Choice
1. Which of the
following was NOT identified as a phase of convergence in the evolution of
cybercrime?
a. Technology is
separate from people.
b. Man is using
technology.
c. Technology
replaces people.
d. Technology takes
over the world.
Ans: D
Learning Objective:
3-5: Describe countermeasures to threats that target computers and mobile
devices.
Cognitive Domain:
Application
Answer Location: Phases
of Convergence
Difficulty Level: Medium
2. In 2001, the
first malware attack that fell into phase 3 of convergence was known as ______.
a. Code Red
b. Code Blue
c. Code Black
d. Code Green
Ans: A
Learning Objective:
3-5: Describe countermeasures to threats that target computers and mobile
devices.
Cognitive Domain:
Application
Answer Location: Phases
of Convergence
Difficulty Level:
Medium
3. E-mail-borne
viruses took place in which of the following phases of convergence?
a. phase 1
b. phase 2
c. phase 3
d. all of these
Ans: B
Learning Objective:
3-5: Describe countermeasures to threats that target computers and mobile
devices.
Cognitive Domain:
Application
Answer Location: Phases
of Convergence
Difficulty Level:
Medium
4. In 2001, the
original Code Red malware initiated a ______ attack on the White House.
a. denial of service
b. rogue access point
c. phishing
d. keylogging
Ans: A
Learning Objective:
3-5: Describe countermeasures to threats that target computers and mobile
devices.
Cognitive Domain: Knowledge
Answer Location: Phases
of Convergence
Difficulty Level:
Easy
5. According to
the text, by the year 2020, the economic cost of cybercrime is expected to go
above ______ trillion.
a. 1
b. 2
c. 3
d. 4
Ans: C
Learning Objective:
Various.
Cognitive Domain: Knowledge
Answer Location:
Main Targets in Information Technology
Difficulty Level:
Easy
6. Which of the
following is NOT considered one of the main targets in information technology?
a. people
b. software
c. hardware
d. network
Ans: A
Learning Objective:
Various.
Cognitive Domain: Knowledge
Answer Location:
Main Targets in Information Technology
Difficulty Level:
Easy
7. Which of the
following was not identified as a countermeasure for networks in text?
a. host-based mitigation
b. data backup
c. proactive measures
d. network-based mitigation
Ans: B
Learning Objective:
Various.
Cognitive Domain:
Application
Answer Location:
Main Targets in Information Technology
Difficulty Level:
Medium
8. Which of the
following was not identified as a
hardware device in the text?
a. modems
b. network appliances
c. surveillance systems
d. industrial control
systems
Ans: A
Learning Objective:
Various.
Cognitive Domain:
Application
Answer Location:
Main Targets in Information Technology
Difficulty Level:
Medium
9. Which of the
following was identified as a software attack in the text?
a. counterfeiting products
b. brute force
c. drive-by-downloads
d. denial-of-service
Ans: D
Learning Objective:
Various.
Cognitive Domain:
Application
Answer Location:
Main Targets in Information Technology
Difficulty Level: Medium
10. Which of the
following is NOT considered one of the main issues with cybersecurity?
a. confidentiality of
data
b. integrity of
data
c. cost of data
d. availability of
data
Ans: C
Learning Objective:
Various.
Cognitive Domain:
Application
Answer Location:
Main Targets in Information Technology
Difficulty Level:
Medium
11. In the ______
cluster, computer infrastructure and vulnerabilities are the focus of attacks.
a. technological
b. socio-political
c. socio-economic
d. human-machine
Ans: D
Learning Objective:
Various
Cognitive Domain:
Comprehension
Answer Location:
Main Targets in Information Technology
Difficulty Level:
Easy
12. In the ______
cluster, computers are the target of the cybercrimes.
a. human-machine
b. socio-economic
c. socio-political
d. technological
Ans: D
Learning Objective:
Various
Cognitive Domain:
Comprehension
Answer Location:
Main Targets in Information Technology
Difficulty Level:
Easy
13. Which of the
following has NOT contributed to the increase in threats to mobile devices?
a. increase in
smartphones
b. Apple Inc.
technology
c. storing information
on devices
d. sophisticated smartphone
technology
Ans: B
Learning Objective:
3-5: Describe countermeasures to threats that target computers and
mobile devices.
Cognitive Domain:
Application
Answer Location:
Threats to Mobile Devices
Difficulty Level:
Medium
14. A ______ is a
small software program designed to spread from one computer to another and to
interfere with computer operation.
a. virus
b. worm
c. Trojan horse
d. bug
Ans: A
Learning Objective:
3-2: Explain the threat viruses pose to computers and computer users.
Cognitive Domain:
Comprehension
Answer Location:
Viruses
Difficulty Level:
Easy
15. According to
the text, virus files typically end in ______.
a. .exe
b. .doc
c. .mp4
d. .jpg
Ans: A