127 the purpose of a honeypot is to a log an

Info icon This preview shows pages 7–10. Sign up to view the full content.

View Full Document Right Arrow Icon
127 The purpose of a honeypot is to A. Log an intruder’s actions. B. Act as a decoy to keep the intruder interested while his or her origin and identity are traced. C. Deflect Denial of Service attacks away from production servers. D. Provide direct evidence of a break-in. Answer: B See Chapter 9. A honeypot is designed to keep an intruder sniffing around long enough for investigators to determine his or her origin and identity. 128 Which of the following is NOT a precaution that needs to be taken before monitoring e-mail? A. Coming up with strict procedures that define under what circumstances e-mail may be searched B. Posting a notice visible to all stating that e-mail is company information subject to search C. Issuing monitoring tools to all e-mail administrators D. Making sure that all employees know that it’s being monitored Answer: C See Chapter 9. This isn't a precaution at all @@md not even a step that would be considered. The other items do need to be taken before any monitoring is performed. 129 Intellectual property laws apply to
Image of page 7

Info icon This preview has intentionally blurred sections. Sign up to view the full version.

View Full Document Right Arrow Icon
A. Trade secrets, trademarks, copyrights, and patents B. Trademarks, copyrights, and patents C. Trademarks only D. Patents only Answer: A See Chapter 9. Intellectual property laws apply to trade secrets, trademarks, copyrights, and patents. 130 In order to be admissible, electronic evidence must A. Be legally permissible B. Not be copied C. Have been in the custody of the investigator at all times D. Not contain viruses Answer: A See Chapter 9. Evidence gathered in violation of any laws can’t be admitted in court. 131 Which agency has (or agencies have) jurisdiction over computer crimes in the United States? A. The Department of Justice B. The Electronic Crimes Task Force C. Federal, any state, or local jurisdiction D. The FBI and the Secret Service Answer: C See Chapter 9.Federal, state, and local laws cover computer crime. Depending on the crime, one or more levels of government may have jurisdiction. 132 Under what circumstance may evidence be seized without a warrant? A. If it’s in the public domain B. If it’s believed that its destruction is imminent C. In international incidents D. If it’s on a computer Answer: B See Chapter 9. Evidence may be seized only if law enforcement believes that it’s about to be destroyed (which is an example of exigent circumstances). 133 Motive, means, and opportunity A. Are required prior to the commission of a crime B. Are the required three pieces of evidence in any criminal trial
Image of page 8
C. Are the three factors that determine whether someone may have committed a crime D. Are the usual ingredients in a sting operation Answer: C See Chapter 9. Motive, means, and opportunity are the standard criteria used when considering a possible suspect in a crime. 134 Using social skills to acquire critical information about computer systems is known as A. Social espionage B. Social engineering C. Social racketeering D. Eavesdropping Answer: B See Chapter 9. Social engineering is the term used to describe the activity carried out by individuals who often claim to be someone that they're not in order to elicit information from unsuspecting individuals who are just trying to be helpful.
Image of page 9

Info icon This preview has intentionally blurred sections. Sign up to view the full version.

View Full Document Right Arrow Icon
Image of page 10
This is the end of the preview. Sign up to access the rest of the document.

{[ snackBarMessage ]}

What students are saying

  • Left Quote Icon

    As a current student on this bumpy collegiate pathway, I stumbled upon Course Hero, where I can find study resources for nearly all my courses, get online help from tutors 24/7, and even share my old projects, papers, and lecture notes with other students.

    Student Picture

    Kiran Temple University Fox School of Business ‘17, Course Hero Intern

  • Left Quote Icon

    I cannot even describe how much Course Hero helped me this summer. It’s truly become something I can always rely on and help me. In the end, I was not only able to survive summer classes, but I was able to thrive thanks to Course Hero.

    Student Picture

    Dana University of Pennsylvania ‘17, Course Hero Intern

  • Left Quote Icon

    The ability to access any university’s resources through Course Hero proved invaluable in my case. I was behind on Tulane coursework and actually used UCLA’s materials to help me move forward and get everything together on time.

    Student Picture

    Jill Tulane University ‘16, Course Hero Intern