NEED A PERFECT PAPER? PLACE YOUR FIRST ORDER AND SAVE 15% USING COUPON:

SOLVED

11) WikiLeaks is a famous not-for-profit whistle-blowing Web site. MasterCard and Visa stopped payments to WikiLeaks after a series of leaks by the site. An anonymous group attacked the Web sites of both MasterCard and Visa reacting to this. These attackers, who tried to protect WikiLeaks, can be called ________. A) hacktivists B) crackers C) ethical hackers D) patriot hackers E) cyber soldiers 12) Employees steal time on company computers to do personal business. This can be considered an example of ________. A) unauthorized access B) hacking C) Web vandalism D) cyberstalking E) cyberbullying 13) A(n) ________ is a destructive program that disrupts the normal functioning of computer systems. A) virus B) worm C) Trojan horse D) spam E) adware 14) In May 2000, a malware email with “I LOVE YOU”in the subject field, spread to numerous computers in the world. The program replicated itself to everyone in the user’s Outlook address book and then destroyed local files. This love email forced several organizations to shut down their e-mail systems. The malware discussed here is an example of a ________. A) Trojan horse B) spyware C) computer virus D) spam E) logic bomb 15) Ronald downloads a movie from the Internet. During this process, his system gets affected by malicious software. The file does nothing initially and his system functions as usual for a few days. Later the file reproduces itself and starts to slow down his system. In a month’s time his system is fully affected by the malware. Which of the following is most similar to the situation described here? A) Albert visits a travel Web site to book a flight from New York to Los Angeles. He visits the Web site from his computer after 15 days and his home page is set by default to book return tickets from Los Angeles to New York. B) Mary’s computer gets affected by malicious software. Her computer appears to be performing as usual though the malware is performing underlying functions dictated by the intrusive code. C) Andrew uses Windows operating system. A malicious code affects his computer and changes the name of his Internet explorer to ABC Net. The malware steals his personal information by remaining as a host. D) Robert receives a mail with the subject line “I am here.” When he opens the mail, he loses all the local files and the file is sent to all the contacts in his outlook ID. E) Anderson receives a malware file through email. On January 1st, the malware alters the name of his local files and displays funny names. 16) A(n) ________ is a variation of a virus that is targeted at networks and takes advantage of security holes in operating systems and other software to replicate endlessly across the Internet. This causes servers to crash and denies service to Internet users. A) spyware B) worm C) virus D) Trojan horse E) DOS virus 17) The official Web site of the Iranian government was made unreachable by foreign activists seeking to help the opposition parties during the 2009 Iranian election protests. Web sites belonging to many Iranian news agencies were also made unreachable by the activists. This cyber protest is an example of a(n) ________ attack. A) denial of service B) logic bombs C) Trojan horse D) online predator E) bot herder 18) ________ refers to any software that covertly gathers information about a user through an Internet connection without the user’s knowledge. A) Spyware B) Spam C) Web filter D) Cookie E) Bot herder 19) Which of the following terms represents junk newsgroup postings used for the purpose of advertising for some product or service? A) spam B) adware C) cookie D) Internet hoax E) Web filter 20) Robert receives a mail which says he has won an online lottery worth $50 Billion. Robert was wondering how he could win it without even buying the lottery. It was a spam mail intended to obtain the bank account details and the credit card number of Robert. Such attempts to trick financial account and credit card holders are called ________. A) logic bombing B) spim hacking C) phishing D) tunneling E) cyberterrorism

Solution:

15% off for this assignment.

Our Prices Start at $11.99. As Our First Client, Use Coupon Code GET15 to claim 15% Discount This Month!!

Why US?

100% Confidentiality

Information about customers is confidential and never disclosed to third parties.

Timely Delivery

No missed deadlines – 97% of assignments are completed in time.

Original Writing

We complete all papers from scratch. You can get a plagiarism report.

Money Back

If you are convinced that our writer has not followed your requirements, feel free to ask for a refund.