Enhanced Discovering Computers 2017 (Shelly Cashman Series) (MindTap Course List)
1st Edition
ISBN: 9781305657458
Author: Misty E. Vermaat, Susan L. Sebok, Steven M. Freund, Mark Frydenberg, Jennifer T. Campbell
Publisher: Cengage Learning
expand_more
expand_more
format_list_bulleted
Expert Solution & Answer
Chapter 5, Problem 1M
Program Description Answer
A script kiddie is a hacker who does not have any cracker and technical knowledge.
Therefore, the correct option is “H”.
Expert Solution & Answer
Want to see the full answer?
Check out a sample textbook solutionStudents have asked these similar questions
What is the purpose of the Communications Decency Act?
Group of answer choices
a. prevent minors from gaining access to sexually explicit materials on the Internet.
b. give minors access to the internet
c. Monitor what minors do on the internet
d. none of the above
_____________in cyberspace is enabled largely through the use of anonymous remailers, which strip off the identifying information on an email message and substitute an anonymous code or a random number.
Group of answer choices
a. Anonymous caller
b. Anonymous communication
c. Private communication
d. Unknown communication
CAN-SPAM Act requires:
Group of answer choices
a. An opt-out mechanism that permits recipients of the mail not to receive further messages
b. Identification of the email as an advertisement
c. A valid return email address along with the physical postal address of the sender
d. All of the above
121.
Script kiddie is
a) someone who subverts computer security without authorization or who uses technology (usually a computer or the Internet) for terrorism, vandalism (malicious destruction), credit card fraud, identity theft, intellectual property theft, or many other types of crime.
b) a person, usually not an expert in computer security, who breaks into computer systems by using prepackaged automated tools written by others.
c) hacker who utilizes technology to announce a political message.
d) None of these
101.
A vulnerability scanner is
a) a prepared application that takes advantage of a known weakness.
b) a tool used to quickly check computers on a network for known weaknesses.
c) an application that captures TCP/IP data packets, which can maliciously be used to capture passwords and other data while it is in transit either within the computer or over the network.
d) a situation in which one person or program successfully masquerades as another by falsifying data and thereby gaining illegitimate access.
Chapter 5 Solutions
Enhanced Discovering Computers 2017 (Shelly Cashman Series) (MindTap Course List)
Ch. 5 - Prob. 1SGCh. 5 - Prob. 2SGCh. 5 - Prob. 3SGCh. 5 - Prob. 4SGCh. 5 - Prob. 5SGCh. 5 - Prob. 6SGCh. 5 - Prob. 7SGCh. 5 - Prob. 8SGCh. 5 - Prob. 9SGCh. 5 - Prob. 10SG
Ch. 5 - Prob. 11SGCh. 5 - Prob. 12SGCh. 5 - Prob. 13SGCh. 5 - Prob. 14SGCh. 5 - Prob. 15SGCh. 5 - Prob. 16SGCh. 5 - Prob. 17SGCh. 5 - Prob. 18SGCh. 5 - Prob. 19SGCh. 5 - Prob. 20SGCh. 5 - Prob. 21SGCh. 5 - Prob. 22SGCh. 5 - Prob. 23SGCh. 5 - Prob. 24SGCh. 5 - Prob. 25SGCh. 5 - Prob. 26SGCh. 5 - Prob. 27SGCh. 5 - Prob. 28SGCh. 5 - Prob. 29SGCh. 5 - Prob. 30SGCh. 5 - Prob. 31SGCh. 5 - Prob. 32SGCh. 5 - Prob. 33SGCh. 5 - Prob. 34SGCh. 5 - Prob. 35SGCh. 5 - Prob. 36SGCh. 5 - Prob. 37SGCh. 5 - Prob. 38SGCh. 5 - Prob. 39SGCh. 5 - Prob. 40SGCh. 5 - Prob. 41SGCh. 5 - Prob. 42SGCh. 5 - Prob. 43SGCh. 5 - Prob. 44SGCh. 5 - Prob. 45SGCh. 5 - Prob. 46SGCh. 5 - Prob. 47SGCh. 5 - Prob. 48SGCh. 5 - Prob. 49SGCh. 5 - Prob. 1TFCh. 5 - Prob. 2TFCh. 5 - Prob. 3TFCh. 5 - Prob. 4TFCh. 5 - Prob. 5TFCh. 5 - Prob. 6TFCh. 5 - Prob. 7TFCh. 5 - Prob. 8TFCh. 5 - Prob. 9TFCh. 5 - Prob. 10TFCh. 5 - Prob. 11TFCh. 5 - Prob. 12TFCh. 5 - Prob. 1MCCh. 5 - Prob. 2MCCh. 5 - Prob. 3MCCh. 5 - Prob. 4MCCh. 5 - Prob. 5MCCh. 5 - Prob. 6MCCh. 5 - Prob. 7MCCh. 5 - Prob. 8MCCh. 5 - Prob. 1MCh. 5 - Prob. 2MCh. 5 - Prob. 3MCh. 5 - Prob. 4MCh. 5 - Prob. 5MCh. 5 - Prob. 6MCh. 5 - Prob. 7MCh. 5 - Prob. 8MCh. 5 - Prob. 9MCh. 5 - Prob. 10MCh. 5 - Prob. 2CTCh. 5 - Prob. 3CTCh. 5 - Prob. 4CTCh. 5 - Prob. 5CTCh. 5 - Prob. 6CTCh. 5 - Prob. 7CTCh. 5 - Prob. 8CTCh. 5 - Prob. 9CTCh. 5 - Prob. 10CTCh. 5 - Prob. 11CTCh. 5 - Prob. 12CTCh. 5 - Prob. 13CTCh. 5 - Prob. 14CTCh. 5 - Prob. 15CTCh. 5 - Prob. 16CTCh. 5 - Prob. 17CTCh. 5 - Prob. 18CTCh. 5 - Prob. 19CTCh. 5 - Prob. 20CTCh. 5 - Prob. 21CTCh. 5 - Prob. 22CTCh. 5 - Prob. 23CTCh. 5 - Prob. 24CTCh. 5 - Prob. 25CTCh. 5 - Prob. 26CTCh. 5 - Prob. 27CTCh. 5 - Prob. 28CTCh. 5 - Prob. 29CTCh. 5 - Prob. 1PSCh. 5 - Prob. 2PSCh. 5 - Prob. 3PSCh. 5 - Prob. 4PSCh. 5 - Prob. 5PSCh. 5 - Prob. 6PSCh. 5 - Prob. 7PSCh. 5 - Prob. 8PSCh. 5 - Prob. 9PSCh. 5 - Prob. 10PSCh. 5 - Prob. 11PSCh. 5 - Prob. 1.1ECh. 5 - Prob. 1.2ECh. 5 - Prob. 1.3ECh. 5 - Prob. 2.1ECh. 5 - Prob. 2.2ECh. 5 - Prob. 2.3ECh. 5 - Prob. 3.3ECh. 5 - Prob. 4.1ECh. 5 - Prob. 4.2ECh. 5 - Prob. 4.3ECh. 5 - Prob. 5.1ECh. 5 - Prob. 5.2ECh. 5 - Prob. 5.3ECh. 5 - Prob. 1IRCh. 5 - Prob. 2IRCh. 5 - Prob. 3IRCh. 5 - Prob. 4IRCh. 5 - Prob. 5IRCh. 5 - Prob. 1CTQCh. 5 - Prob. 2CTQCh. 5 - Prob. 3CTQCh. 5 - Prob. 4CTQ
Knowledge Booster
Similar questions
- 129. Black hat is a) someone who subverts computer security without authorization or who uses technology (usually a computer or the Internet) for terrorism, vandalism (malicious destruction), credit card fraud, identity theft, intellectual property theft, or many other types of crime. b) a person, usually not an expert in computer security, who breaks into computer systems by using prepackaged automated tools written by others. c) hacker who utilizes technology to announce a political message. d) None of thesearrow_forwardA keylogger was used to get the password of a victim's Facebook account, and the hacker tried to extort money from the victim. The victim is informed that the contents of his emails will be abused unless he pays the money. What was the offense that was committed in violation of RA 10175? What are the ramifications? Justify your answer.arrow_forward11) Which description best represent Polymorphic Threat? A. A virus, that is a type of malware, constantly changes its identifiable features in order to evade detection and create devastation. B. A software that is constantly monitoring user's behavior on his or her personal computer C. A software that locks all your files and only unlocks them after you pay a fee D. A software that secretly takes up all your CPU resources and slows down your computer 12) What is cryptojacking? A. Software installed on a computer that produces pop-up ads using your browser; the ads are often based on your browsing habits. B. A program that appears to be harmless but actually produces harmful results. A program that cannot reproduce itself but masquerades as something the user wants and tricks them into activating it so it can do its damage and spread C. The malware infects your computer and uses your CPU cycles to mine Bitcoin for your attacker's profit. The mining software may run in the…arrow_forward
- Select the possible ways to protect information A. By using authentication of users B. By installing firewall to prevent email spam C. By using anti-virus to protect it from malware D. By having a requiring user to present valid id upon entering in record section E. By having a metal cabinet to protect printed record from fire and floodarrow_forward77. What is a Firewall in Computer Network? a. The physical boundary of Network b. An operating System of Computer Network c. A system designed to prevent unauthorized access d. A web browsing Softwarearrow_forwardQuestion 1a) A computer virus is a potentially damaging computer program that affects, or infects, a computer negatively by altering the way the computer works without the user’s knowledge. How is this different among Trojan horse, rootkit and worm in terms of effects and altering? b) Infected computers can suffer from one or more symptoms, for example Corrupted files, low memory and OS running slower. Including the examples given, how would you explain other forms of symptoms that an affected computer is likely to exhibit? c) Malware delivers its payload on a computer when a user;i. Opens an infected fileii. Runs an infected programiii. Boots the computer with infected removable media insertediv. Connects to an unprotected computer or networkv. When a certain condition or event occurs, such as the clock changing to a specific dateNote: You are required to explain in details the activities of the user that causes the release of malware payloads.arrow_forward
- A- is users permissions B-is Encryption C- Anti-Virus D- is Firewall We need to know the purpose and technical details of each security Don't just describe them, you have to justify them. So explain why they are important NO HANDWRITING AND NO SIMILARITYarrow_forward112. Security exploit is a) a prepared application that takes advantage of a known weakness. b) a tool used to quickly check computers on a network for known weaknesses. c) an application that captures TCP/IP data packets, which can maliciously be used to capture passwords and other data while it is in transit either within the computer or over the network. d) a situation in which one person or program successfully masquerades as another by falsifying data and thereby gaining illegitimate access.arrow_forwardQuestion 5 In a network that contains two servers and twenty workstations, where is the best place to install an anti-virus programarrow_forward
- 2. What are online threats?a. They are types of viruses which can harm your computerb. They help your computer in being safec. They are different types of ICT Shortcuts3. What effect can adware have on your system?a. Bad computer performanceb. Bad internet connectionc. Viruses attacking your system4. What does malware do to your computer?a. Deletes your personal files and applicationsb. Gains access to a user’s system in order to carry out certain tasks which a hacker has scheduledc. Slows down your system5. What is unauthorized transfer or copying?a. Copying or transferring software without the permission of the userb. Copying or transferring software with the permission of the userc. Hacking in to a user's system6. Which one of these is a type of viruses?a. White hatb. Red hatc. Internet Worm7. What are computer shortcuts?a. They are easier and faster way to navigate through your computerb. They are a slower and hard way to navigate through your computerc. A type of virus8. How can…arrow_forward131. Grey hat is a) hacker breaks security for altruistic or at least non-malicious reasons. b) hacker of ambiguous ethics and/or borderline legality, often frankly admitted. c) someone outside computer security consulting firms that are used to bug test a system prior to its launch, looking for exploits so they can be closed. d) None of thesearrow_forward113 Spoofing attack is a) an application that captures TCP/IP data packets, which can maliciously be used to capture passwords and other data while it is in transit either within the computer or over the network. b) a situation in which one person or program successfully masquerades as another by falsifying data and thereby gaining illegitimate access. c) a toolkit for hiding the fact that a computer’s security has been compromised, is a general description of a set of programs which work to subvert control of an operating system from its legitimate (in accordance with established rules) operators. d) None of thesearrow_forward
arrow_back_ios
SEE MORE QUESTIONS
arrow_forward_ios
Recommended textbooks for you
- Fundamentals of Information SystemsComputer ScienceISBN:9781337097536Author:Ralph Stair, George ReynoldsPublisher:Cengage Learning
Fundamentals of Information Systems
Computer Science
ISBN:9781337097536
Author:Ralph Stair, George Reynolds
Publisher:Cengage Learning