1/19
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
Hackers who are motivated by financial gains and who conduct both bad and ethical hacking are referred to as ______.
gray hats
Using two-factor identification is recommended for protecting private information, such as using a password and a fingerprint or other physical device.
True
Social engineering is any act that influences a person to take an action that may or may not be in his or her best interest.
True
Hackers who are motivated by personal gain or a certain cause are often referred to as ______.
black hats
Insiders are people who are current or former employees of a company, contractors, or friends of employees.
True
Low probability that the criminals will get caught and convicted and public exposure are some of the reasons as to why so few victims report the crimes.
True
People who are "tricked" by others into giving up access information or information about themselves to an external party are known as ______ insiders.
exploited
Which of the following characteristics of hackers is NOT true?
The members meet each other quite often.
Which of the following is NOT considered a main type of insider threat?
feared
The most serious insider cybercrimes include all of the following EXCEPT ______.
harassment
According to the text, cyberthreats originate mainly from all of the following entities EXCEPT ______.
local government
The use of computer networks and technologies as a means for conducting attacks that target critical national infrastructures or governmental assets has a psychological, social, political, or religious motive, causes harm to individuals or groups, or physically damages infrastructures is referred to as ______.
cyber terrorism
National threats originate from individuals inside the United States, aiming to attack local or national governments and infrastructures.
True
All of the following are examples of social engineering EXCEPT ______.
spam
Groups with displeasure of government are often motivated by all of the following EXCEPT ______.
aristocracy
All of the following were identified as vulnerable infrastructures EXCEPT ______.
education
Threats that originate from inside the company or organization are referred to as ______.
local threats
Cyber terrorism attacks often take the form of ______.
denial of service attacks
Which of the following was NOT identified as one of the main forms of international threats?
hacking or spying on city and local governments
A ______ refers to persons who attempt unauthorized access to a control system device and/or network using a data communications pathway.
cyberthreat