I Hate CBT's

View Original

Identify A True Statement About A Vulnerability Scanner

Question:

Answer: A

Question: The individuals who are knowledgeable enough to gain access to computer systems without authorization are referred to as ________.

A) hackers

B) bots

C) online predators

D) worms

E) power users

Answer: A

Question: Which of the following is one of the main federal laws against computer crimes in the United States?

A) Satellite Act of 1962

B) Trade Expansions Act of 1962

C) United States Information and Educational Exchange Act

D) Central Intelligence Agency Act

E) Electronic Communications Privacy Act of 1986

Answer: E

Question:

Answer: B

Question: Which of the following U.S. laws amended the Computer Fraud and Abuse Act to allow investigators to easily access voice-related communications?

A) the Non-Detention Act

B) the Espionage Act

C) the Patriot Act

D) the Video Privacy Protection Act

E) the Clery Act

Answer: C

Question:

Answer: B

Question: Some violations of state and federal computer crime laws are punishable by fines and by not more than one year in prison. Such violations are charged as ________.

A) misdemeanors

B) felonies

C) embezzlements

D) indictments

E) larcenies

Answer: A

Question: Computer criminals who attempt to break into systems or deface Web sites to promote political or ideological goals are called ________.

A) hacktivists

B) crackers

C) social promoters

D) internet activists

E) online predators

Answer: A

Question: People who break into computer systems with the intention of doing damage or committing a crime are called ________.

A) bots

B) white hats

C) worms

D) cyber spies

E) crackers

Answer: E

Question:

Answer: A