100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached
logo-home
COSC 1307 Chapter 4 HW Questions with All Correct Answers $12.59   Add to cart

Exam (elaborations)

COSC 1307 Chapter 4 HW Questions with All Correct Answers

 3 views  0 purchase
  • Course
  • COSC 1307
  • Institution
  • COSC 1307

COSC 1307 Chapter 4 HW Questions with All Correct Answers What is a program that secretly takes over another computer for the purpose of launching attacks on other computers? - Answer-Zombie ______ phishing is a phishing expedition in which the emails are carefully designed to target a parti...

[Show more]

Preview 2 out of 5  pages

  • August 29, 2024
  • 5
  • 2024/2025
  • Exam (elaborations)
  • Questions & answers
  • COSC 1307
  • COSC 1307
avatar-seller
Scholarsstudyguide
COSC 1307 Chapter 4 HW Questions
with All Correct Answers

What is a program that secretly takes over another computer for the purpose of
launching attacks on other computers? - Answer-Zombie

______ phishing is a phishing expedition in which the emails are carefully designed to
target a particular person or organization. - Answer-Spear

What is a group of computers on which a hacker has planted zombie programs? -
Answer-Zombie farm

What is a phone scam that attempts to defraud people by asking them to call a bogus
telephone number to "confirm" their account information? - Answer-Vishing

Sock puppet marketing is the use of a Blank______ to artificially stimulate demand for a
product, brand, or service. - Answer-false identity

What reroutes requests for legitimate websites to false websites? - Answer-Pharming

What occurs when a network intrusion attacker takes advantage of programming errors
or design flaws to grant the attacker elevated access to the network and its associated
data and applications? - Answer-Privilege escalation

What uses a zombie farm, often by an organized crime association, to launch a massive
phishing attack? - Answer-Pharming attack

What occurs when attackers grant themselves a higher access level such as
administrator, allowing the attacker to perform illegal actions such as running
unauthorized code or deleting data? - Answer-Vertical privilege escalation

______ is a program that secretly takes over another computer for the purpose of
launching attacks on other computers. - Answer-Zombie

What occurs when attackers grant themselves the same access levels they already
have but assume the identity of another user? - Answer-Horizontal privilege escalation

A zombie Blank______ is a group of computers on which a hacker has planted zombie
programs. - Answer-farm

, What are computer viruses that wait for a specific date before executing their
instructions? - Answer-Time bombs

What is the use of a false identity to artificially stimulate demand for a product, brand, or
service? - Answer-Sock puppet marketing

What occurs when organizations use software that filters content, such as emails, to
prevent the accidental or malicious transmission of unauthorized information? - Answer-
Content filtering

______ are the principles and standards that guide our behavior toward other people. -
Answer-Ethics

Digital Blank______ is the measure of consumer, partner, and employee confidence in
an organization's ability to protect and secure data and the privacy of individuals. -
Answer-trust

______ are policies and procedures that address information management along with
the ethical use of computers and the Internet in the business environment. - Answer-
Epolicies

A(n) Blank______ computer use policy contains general principles to guide computer
user behavior. - Answer-ethical

What is the process of extracting large amounts of data from a website and saving it to
a spreadsheet or computer. - Answer-Data scraping

What are the principles and standards that guide our behavior toward other people? -
Answer-Ethics

A(n) Blank______ use policy requires a user to agree to follow it to be provided access
to corporate email, information systems, and the Internet. - Answer-acceptable

What is the measure of consumer, partner, and employee confidence in an
organization's ability to protect and secure data and the privacy of individuals? -
Answer-Digital trust

Which privacy policy details the extent to which email messages may be read by
others? - Answer-Email privacy policy

Which of the following are policies and procedures that address information
management along with the ethical use of computers and the Internet in the business
environment? - Answer-Epolicies

Which policy outlines the corporate guidelines or principles governing employee online
communications? - Answer-Social media policy

The benefits of buying summaries with Stuvia:

Guaranteed quality through customer reviews

Guaranteed quality through customer reviews

Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.

Quick and easy check-out

Quick and easy check-out

You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.

Focus on what matters

Focus on what matters

Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!

Frequently asked questions

What do I get when I buy this document?

You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.

Satisfaction guarantee: how does it work?

Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.

Who am I buying these notes from?

Stuvia is a marketplace, so you are not buying this document from us, but from seller Scholarsstudyguide. Stuvia facilitates payment to the seller.

Will I be stuck with a subscription?

No, you only buy these notes for $12.59. You're not tied to anything after your purchase.

Can Stuvia be trusted?

4.6 stars on Google & Trustpilot (+1000 reviews)

73314 documents were sold in the last 30 days

Founded in 2010, the go-to place to buy study notes for 14 years now

Start selling
$12.59
  • (0)
  Add to cart