• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/18

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

18 Cards in this Set

  • Front
  • Back
Business losses that are a result of computer crime are difficult to estimpat for which of the following reasons?
Companies are sometimes reluctant to report computer crime because it is bad advertising.`
According to a 2004 Computer Security Institute CSI/FBI Computer Crime and Security Survey, what percentage of organizations experiencing computer attacks reported them to law enforcement agencies?
20 percent
The CISSP categorizes computer attacks by type. Which of the following is not one of the categories identified by the CISSP?
a) terrorist attack b)thrill attack C) SUBTERFUGE ATTACK d) business attack
What type of individual is most likely to perform a "grudge attack?"
an employee who feels he has been mistreated by his employer.
Computer crime is generally made possible by which of the following?
system design flaws
Which of the following computer crimes involves overtaxing a computer's resources until it is no longer functional?
Denial of Service (DoS)
The computer criminal who calls a help desk trying to obtain another user's password is most likely a:
social engineer
We inherited which of out legal systems from England?
Common law
Computer laws have become incresingly difficult to enforce for which of the following reasons?
the inability of legislation in the United States to keep pace with technological advances
"Natural justice" is
primitive and thus "natural."
The Patent and Trademark Office (PTO) resisted patenting software for years for what primary reason?
Software was too intangible.
Which of the following statements is true about a "trade secret"?
It is a patent "in the works."
Which of the following is not one of the FTC's four Fair Informatio Practices?
Web sites must have 100 percent availabity in case the user wishes to change his personal information.
What can be said about the European Union Data Protection Directive of 1998?
It resulted in the "Safe Harbor Privacy Principles" that allowed the United States to meet minimum privacy controls in the European Union.
Which of the following definitions best describes "computer forensics"?
investigating crimes committed using computers
The ISC2 Code of Ethics is intended to
provide guidance on encouraging good behavior.
What bearing does ethics have on the information security specialist?
All
Ethical coduct is expected of all IS specialists.

It helps define a high moral code of professional behavior

It speaks to the credibility of the individual.
Which of the following is not one of the provisions of the ISC2 Code of Ethics?
a) Act honorably, responsibly, and legally.

b)Provide thoroug and competent service to your customers and peers.

C) JUDGE NOT LEST YOU BE JUDGED

d) Strive to protect society and its components.