Course Hero Logo

Question 23 05 05 pts in the past the term was

Course Hero uses AI to attempt to automatically extract content from documents to surface to you and others so you can study better, e.g., in search results, to enrich docs, and more. This preview shows page 9 - 14 out of 68 pages.

Question 230.5 / 0.5 pts
In the past, the term ____ was commonly used to refer to a person who uses advancedcomputer skills to attack computers.
Question 240.5 / 0.5 pts____ are individuals who want to attack computers yet they lack the knowledge ofcomputers and networks needed to do so.Correct!
Question 250.5 / 0.5 ptsA computer ____ is a person who has been hired to break into a computer and stealinformation.mole
Question 260.5 / 0.5 ptsTerrorists who turn their attacks to the network and computer infrastructure to causepanic among citizens are known as ____.hackershacktivistsCorrect!
cyberterroristsspiesQuestion 270.5 / 0.5 ptsIn a general sense, ____________________ can be defined as the necessary steps toprotect a person or property from harm.Correct!Correct AnswerssecurityQuestion 280.5 / 0.5 ptssecurity
A(n) ____________________ is defined as something that has a value.Correct!Correct AnswersassetQuestion 290.5 / 0.5 ptsTargeted attacks against financial networks, unauthorized access to information, and thetheft of personal information are sometimes known as ____________________.Correct!Correct AnswerscybercrimeQuestion 300.5 / 0.5 ptsIt is vital to have ____________________ security on all of the personal computers todefend against any attack that breaches the perimeter.Correct!Correct AnswerslocalQuestion 310.5 / 0.5 ptsIt is important that action be taken in advance in order to ____________________. Thismay involve keeping backup copies of important data stored in a safe place.Question 320.5 / 0.5 ptsMatch each term with the correct statement below.Correct!
Due to overwhelmed vendors trying to keep pace by updating their productsagainst attacksCorrect!Potentially the next target for attackers.Correct!Made possible by new software tools and techniquesCorrect!Results in attackers that can launch attacks against millions of computers withinminutesCorrect!

Upload your study docs or become a

Course Hero member to access this document

Upload your study docs or become a

Course Hero member to access this document

End of preview. Want to read all 68 pages?

Upload your study docs or become a

Course Hero member to access this document

Term
Spring
Professor
ScottEhrhorn
Tags
E mail, Personal computer, World Wide Web

Newly uploaded documents

Show More

Newly uploaded documents

Show More

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture