COSC 1307 Chapter 4 HW Questions with All Correct Answers
4 views 0 purchase
Course
COSC 1307
Institution
COSC 1307
COSC 1307 Chapter 4 HW Questions with All Correct Answers
What is a program that secretly takes over another computer for the purpose of launching attacks on other computers? - Answer-Zombie
______ phishing is a phishing expedition in which the emails are carefully designed to target a parti...
COSC 1307 Chapter 4 HW Questions
with All Correct Answers
What is a program that secretly takes over another computer for the purpose of
launching attacks on other computers? - Answer-Zombie
______ phishing is a phishing expedition in which the emails are carefully designed to
target a particular person or organization. - Answer-Spear
What is a group of computers on which a hacker has planted zombie programs? -
Answer-Zombie farm
What is a phone scam that attempts to defraud people by asking them to call a bogus
telephone number to "confirm" their account information? - Answer-Vishing
Sock puppet marketing is the use of a Blank______ to artificially stimulate demand for a
product, brand, or service. - Answer-false identity
What reroutes requests for legitimate websites to false websites? - Answer-Pharming
What occurs when a network intrusion attacker takes advantage of programming errors
or design flaws to grant the attacker elevated access to the network and its associated
data and applications? - Answer-Privilege escalation
What uses a zombie farm, often by an organized crime association, to launch a massive
phishing attack? - Answer-Pharming attack
What occurs when attackers grant themselves a higher access level such as
administrator, allowing the attacker to perform illegal actions such as running
unauthorized code or deleting data? - Answer-Vertical privilege escalation
______ is a program that secretly takes over another computer for the purpose of
launching attacks on other computers. - Answer-Zombie
What occurs when attackers grant themselves the same access levels they already
have but assume the identity of another user? - Answer-Horizontal privilege escalation
A zombie Blank______ is a group of computers on which a hacker has planted zombie
programs. - Answer-farm
, What are computer viruses that wait for a specific date before executing their
instructions? - Answer-Time bombs
What is the use of a false identity to artificially stimulate demand for a product, brand, or
service? - Answer-Sock puppet marketing
What occurs when organizations use software that filters content, such as emails, to
prevent the accidental or malicious transmission of unauthorized information? - Answer-
Content filtering
______ are the principles and standards that guide our behavior toward other people. -
Answer-Ethics
Digital Blank______ is the measure of consumer, partner, and employee confidence in
an organization's ability to protect and secure data and the privacy of individuals. -
Answer-trust
______ are policies and procedures that address information management along with
the ethical use of computers and the Internet in the business environment. - Answer-
Epolicies
A(n) Blank______ computer use policy contains general principles to guide computer
user behavior. - Answer-ethical
What is the process of extracting large amounts of data from a website and saving it to
a spreadsheet or computer. - Answer-Data scraping
What are the principles and standards that guide our behavior toward other people? -
Answer-Ethics
A(n) Blank______ use policy requires a user to agree to follow it to be provided access
to corporate email, information systems, and the Internet. - Answer-acceptable
What is the measure of consumer, partner, and employee confidence in an
organization's ability to protect and secure data and the privacy of individuals? -
Answer-Digital trust
Which privacy policy details the extent to which email messages may be read by
others? - Answer-Email privacy policy
Which of the following are policies and procedures that address information
management along with the ethical use of computers and the Internet in the business
environment? - Answer-Epolicies
Which policy outlines the corporate guidelines or principles governing employee online
communications? - Answer-Social media policy
The benefits of buying summaries with Stuvia:
Guaranteed quality through customer reviews
Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.
Quick and easy check-out
You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.
Focus on what matters
Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!
Frequently asked questions
What do I get when I buy this document?
You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.
Satisfaction guarantee: how does it work?
Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.
Who am I buying these notes from?
Stuvia is a marketplace, so you are not buying this document from us, but from seller Scholarsstudyguide. Stuvia facilitates payment to the seller.
Will I be stuck with a subscription?
No, you only buy these notes for $12.59. You're not tied to anything after your purchase.