Identify A True Statement About A Vulnerability Scanner
Question:
Answer: A
Question: The individuals who are knowledgeable enough to gain access to computer systems without authorization are referred to as ________.
A) hackers
B) bots
C) online predators
D) worms
E) power users
Answer: A
Question: Which of the following is one of the main federal laws against computer crimes in the United States?
A) Satellite Act of 1962
B) Trade Expansions Act of 1962
C) United States Information and Educational Exchange Act
D) Central Intelligence Agency Act
E) Electronic Communications Privacy Act of 1986
Answer: E
Question:
Answer: B
Question: Which of the following U.S. laws amended the Computer Fraud and Abuse Act to allow investigators to easily access voice-related communications?
A) the Non-Detention Act
B) the Espionage Act
C) the Patriot Act
D) the Video Privacy Protection Act
E) the Clery Act
Answer: C
Question:
Answer: B
Question: Some violations of state and federal computer crime laws are punishable by fines and by not more than one year in prison. Such violations are charged as ________.
A) misdemeanors
B) felonies
C) embezzlements
D) indictments
E) larcenies
Answer: A
Question: Computer criminals who attempt to break into systems or deface Web sites to promote political or ideological goals are called ________.
A) hacktivists
B) crackers
C) social promoters
D) internet activists
E) online predators
Answer: A
Question: People who break into computer systems with the intention of doing damage or committing a crime are called ________.
A) bots
B) white hats
C) worms
D) cyber spies
E) crackers
Answer: E
Question:
Answer: A