Chapter 5 Computer Forensics Specialists Cannot Recover Deleted Files

subject Type Homework Help
subject Pages 4
subject Words 566
subject Authors Sara Baase

Unlock document.

This document is partially blurred.
Unlock all pages and 1 million more documents.
Get Access
page-pf1
Chapter 5
Multiple-choice Questions (with answers and references to the text)
1. Which of the following is an example of biometrics:
(a) DNA
(b) Fingerprints
(c) Voice prints
(d) All of the above
2. In the early days of computing (1960's to the early 1970's), a "hacker" was:
(a) An incompetent programmer who wrote programs that did not work properly
(b) A busy programmer who reused code to save time
(c) A creative programmer who wrote very elegant or clever programs
(d) A new programmer who wrote simple programs
3. Hacktivism is:
(a) A political activist group promoting tougher anti-hacking laws
(b) The counter-hacking techniques used by the FBI and other law enforcement agencies
(c) The use of hacking to promote a political cause
(d) A newsletter for hackers
4. Web sites that look attractive to hackers, but are closely monitored so that everything the
hacker does at the site is recorded and studied are known as:
(a) Honey pots
(b) Digital surveillance
page-pf2
(c) Computer entrapment
(d) Hacker crackdown
5. Which of the following is NOT a program used by hackers to gain access to your
computer:
(a) Keyloggers
(b) Trojans
(c) Rootkits
(d) Honey pots
6. In 2000, a French court ordered Yahoo! to block access by French people to
(a) Web sites containing pornography
(b) an Al Qaeda training manual
(c) online auction sites containing Nazi materials
(d) a Web site containing instructions for making bombs
True/False
______ The government cannot monitor online activity of suspected hackers without a court
order.
______ Computer forensics specialists cannot recover deleted files from an erased disk.
Short-answer Questions
1. Give two ways to identify an email as a phishing attempt
2. How did the USA PATRIOT Act expand the Computer Fraud and Abuse Act?
page-pf3
3. What are two significant issues raised by the Stuxnet worm, which damaged
equipment in a uranium enrichment plant in Iran?
4. Why is "harmless hacking" not harmless?
5. Give arguments for and against hiring former hackers to enhance security.
Matching Questions
Essay Questions
1. a. Briefly define identity theft.
b. Describe two techniques criminals can use to gather the information they
need to steal an identity.
c. Describe two ways a person can protect their identity.
d. Describe two ways a business can protect its customers from identity
thieves.
2. In the context of Internet content that some countries prohibit, discuss how the
"responsibility to prevent access" differs from the "authority to prevent entry".
Include examples.

Trusted by Thousands of
Students

Here are what students say about us.

Copyright ©2022 All rights reserved. | CoursePaper is not sponsored or endorsed by any college or university.