CC201-Quiz Questions

¡Supera tus tareas y exámenes ahora con Quizwiz!

According to Routine Activities Theory, what must be present for crime to occur?

A & B: Motivated offender, and suitable target

What are "definitions," according to social learning theories?

Attitudes about deviant behavior

How can a computer or device be used as a tool to commit a crime?

B & C; as a communications medium; as an incidental device (such as for storage)

Pirates would fall into which category of Wall's typology?

Cyber-theft

Cyberterrorists and cyberbullies would fall into which category of Wall's typology?

Cyber-violence

T/F: Using antivirus software will completely safeguard your computer from malware attacks.

False

What is sovereignty as it relates to cybercrime?

Jurisdictional boundaries

T/F: Hackers build things; crackers break them.

True

CH 12 & 13 What is the process of cleaning a digital storage device called?

wiping

What is the age of consent in Alabama? What is the federal age of consent?

16; 18

What is the name of the website where Anonymous got its start?

4chan

Regarding general strain theory, what might cause negative emotions, which could lead to criminal behavior?

A & B: losing a positive influence, such as a job or a positively influential person (like grandma), and presence of noxious stimuli, such as bullying

The Fourth Amendment provides protections involving which of the following?

A&B- The right against unreasonable searches and seizures, requirements for obtaining a warrant, including probable cause and particularity

Which phase of computer forensics was characterized by a lack of formal structure, protocols, training, and tools, as well as issues with chain of custody?

Ad hoc

Alabama registers all sex offenders as Tier 3 offenders, which means....

Alabama policy requires all sex offenders to register as Tier 3, regardless of offense, even though Tier 3 is usually reserved for the most serious offenses in other states.

Which of the following would be included in digital forensics?

All of the above- Xbox, cell phone, laptop

In order for statements to be protected under the Fifth Amendment, they must be...

All of the above- compelled, testimonial, incriminating

The Fifth Amendment provides protections involving which of the following?

All of the above- grand jury hearings, imminent domain, double jeopardy, self-incrimination

Which of the following is essential for obtaining a search warrant?

All of the above- neutral judge, probable cause, particularity

Which of the following is a risk factor for being a victim of cyberbullying?

All of the above- participating in social media, sharing information online, and Real-world bullying experiences

Regarding deterrence theory, punishments must be what in order to prevent crime?

All of the above: swift, certain, severe relative to the crime

Terrorism is...

All of the above: the actual use of violence by an individual or group motivated by ideological or political objectives, the threatened use of violence by an individual or group motivated by ideological or political objectives, and the most extreme form of political expression

Cyberbullying and online harassment victims may choose not to report the incident because they fear...

All of the above: they may not be believed or taken seriously, they may have their phone or other devices taken away, and revictimization

Section 875 of Title 18 of the US federal code regarding harassment and stalking makes it a crime to transmit which type of communications via Internet, telephone, or postal mail?

All of the above: threat of damage to persons, and threat of damage to property and ransom and/or blackmail

A bit-for-bit copy of the original disk or file is known as _______________.

An image

SWGDE defines digital evidence as...

Any information of probative value that is stored and/or transmitted in binary form.

What is the name of this principle where a roommate can authorize a search of the common areas of shared housing?

Apparent authority principle

According to techniques of neutralization theory, hackers that believe they are acting for the benefit of the greater good is an example of which justification for behavior?

Appeal to higher loyalties

What was the name of the Egyptian movement where Anonymous came to the aid of the citizens fighting back against government oppression and censorship?

Arab Spring

Based on the requirements set forth by the Electronic Communications Protection Act (ECPA), which of the following would be the easiest for an investigator to obtain?

Basic subscriber information (name, etc.)

__________ file-sharing allows for downloading bigger files at a higher rate of speed because it downloads the files from multiple sources simultaneously, whereas with _______ file-sharing, each file downloads from only one client.

Bit torrent; peer-to-peer

Botnets are a form of what kind of malware:

Blended threat

Hardware write-blockers are also known as...

Bridges

Consider the following scenario: Greg Jones, a crime scene technician (unrelated to the Greg Jones who allegedly stole Big Al's head), overhears the detectives discussing the case he is currently working. The evidence Jones is "bagging and tagging" belongs to a suspected child pornographer! Jones finds a Barbie doll in a desk drawer of the home office and is disgusted, automatically assuming the doll was used to lure a child online. He bags and labels the doll but misses the notebook underneath the doll which contains an account ledger. In actuality, Jones is working a case involving an employee who is suspected of stealing corporate money; the detectives had been discussing another case entirely. In this instance, Jones has demonstrated what?

Confirmation Bias

The _________ made copyright infringement a federal crime, thereby removing prosecutorial power from the states.

Copyright Act of 1976

What did the PROTECT Act (2003) do?

Criminalized virtual child porn featuring a digital or computer-generated image that features a minor engaged in sexually explicit content.

Pedophiles would fall into which category of Wall's typology?

Cyber-porn/obscenity

Hackers, crackers, and phreakers would fall into which category of Wall's typology?

Cyber-trespass

Military operations that utilize virtual means to achieve similar ends to conventional attacks are generally considered to be a form of what?

Cyberwarfare

Which of the following is not a key norm of the hacker subculture?

Delinquency

Posting comments about an individual's character or behavior that are designed to cause harm is known as...

Denigration

Which theory uses fear of punishment as a way of preventing crime?

Deterrence Theory

Which criminological theory states that crime is a learned behavior stemming from intimate relationships? In particular, this theory states that individuals learn techniques for engaging in criminal behavior, as well as definitions regarding this behavior.

Differential Association Theory

Which Act made it illegal to tamper with or circumvent protective technology on copyrighted works?

Digital Millennium Copyright Act

In class, I gave an example of a court judge who was attending the NCFI's digital forensics training program for jurists. This particular judge had had his secretary fill out the necessary form and fax it to the institute in Hoover, Alabama. When he arrived at the institute for training, he told the instructors that he had never even touched a computer prior to the class. This judge would be an example of a ________________.

Digital immigrant

What is the most important part of an investigation?

Documentation/transparency

Which of the following is an identification document, as defined by the Identity Theft Assumption and Deterrence (ITAD) Act?

Drivers License, Fingerprints, Social Security Number

Who was the NSA contractor who publicly disclosed thousands of classified documents to journalists, detailing the existence of various active intelligence programs designed to mine electronic communications data mined by technology companies and service providers, such as Apple, Facebook, etc?.

Edward Snowden

Which phase of digital forensics is considered the "golden age"?

Enterprise

__________ refers to the reliability and truthfulness of the evidence.

Evidence integrity

CH 14 T/F: According to the Daubert standard, the only admissibility requirement for scientific evidence is that it must be generally accepted as reliable by the scientific community.

False

T/F: A PhD is required for a person to be an expert witness in a court case.

False

T/F: A warrant is always needed in order to lawfully conduct a search.

False

T/F: A write-blocker is used to ensure a hard drive is wiped completely.

False

T/F: All hackers are antisocial and introverted, preferring not to interact with other hackers.

False

T/F: All pedophiles are contact offenders.

False

T/F: Anatomy books contain content classified as "obscene."

False

T/F: Bestiality is strictly illegal in the United States.

False

T/F: Card skimmers are expensive, bulky, and hard to install.

False

T/F: Digital Forensics is currently standardized.

False

T/F: Digital forensics can only be used in criminal court cases, not civil.

False

T/F: Hacking behavior is always criminal.

False

T/F: Hash value collisions are very likely to occur.

False

T/F: In order to commit cybercrime, an individual must possess a high level of technological skill.

False

T/F: Locard's Principle of Exchange only applies to digital forensics investigations.

False

T/F: Seto (2012) approved of pedophilia and argued that it should be considered another form of sexuality, like heterosexuality or homosexuality.

False

T/F: The CFAA penalizes those who act unintentionally.

False

T/F: The Internet operates on the World Wide Web.

False

T/F: The United States has a strict key disclosure law.

False

T/F: The emergence of technology and the Internet created pornography.

False

T/F: The term "cyberbullying" often applies to adults, whereas "online harassment" is used solely for juveniles.

False

T/F: The word "deviance" applies only to illegal acts.

False

T/F: Trust is not very important in the online black market.

False

What was the first state to establish a cybercrime law?

Florida

Which state was the first to implement a law on computer crime?

Florida

The scientific process of gathering and examining information to be used by the criminal justice system is known as what general term?

Forensic science

______________ is commonly defined as the criminal acquisition of money or property from victims through the use of deception or cheating.

Fraud

Based on the requirements set forth by the Electronic Communications Protection Act (ECPA), which of the following would be the most difficult for an investigator to obtain?

Full email account records without customer notification

Which criminological theory focuses on the negative emotions caused by certain events and relationships in a person's life?

General Strain Theory

(CH11) Which criminological theory states that crime is a consequence of low self-control?

General theory of crime

The Jeep guys (aka the men who found flaws in Jeep's system that allowed for someone to hack in and gain control of the vehicle) would be considered...

Grey hat hackers

According to Durkin, __________ are those interested in preparing a child for a sexual relationship.

Groomers

The first case to establish the validity of FTK (Forensic Toolkit) software for use in digital forensic investigations was...

Gutman v Klein

Which philosophy viewed hacking as a form of creation and art and was most concerned with maintaining respect for the craft?

Hacker ethic

For adult internet users, the rate of experiencing online harassment is around 40%. However, these rates are _______ for young adults (age 18-24) at _________.

Higher; 70%

What is the non-governmental agency that provides a reporting mechanism for cybercrime complaints? This particular agency serves as a coordinator between the FBI and local law enforcement to respond to various forms of cybercrime.

IC3 (Internet Crime Complaint Center)

______________ is the unlawful use of someone else's personal information.

Identity theft

_____________________ is the general term for an original idea which involves some form of creative expression that, when put into a fixed medium, becomes a tangible asset viewable by others.

Intellectual property`

In the "World Wide Web as a building" example, I talked about a janitor who allowed a stranger posing as a professor access to an office inside the building. Likewise, a company employee may misuse their credentials to access confidential data for someone who falsely claims to be a fellow employee. In this case, the janitor/company employee would be an ______________ actor and the imposter would be an _______________ actor.

Internal; external

Which of the phone phreakers obtained his nickname by using a whistle he found in a box of breakfast cereal?

John Draper, AKA Captain Crunch

Which of the following is an example of a trade secret?

KFC's classified recipe for fried chicken

In which case did the US Supreme Court rule that the defendant had taken steps to ensure his privacy (i.e., by closing the phone booth door), and thus, he had a reasonable expectation of such privacy?

Katz v. United States

What is the name of the online software used by many Anonymous members to launch a DDOS attack?

Low orbit ion cannon

What is the name of the group that branched out of Anonymous and engaged in more harmful behaviors, such as defacing an epilepsy website with brightly flashing gifs that caused seizures in some viewers?

Lulzsec

The first worm ever created was the _______ worm.

Morris

An individual (or group of individuals) who hack into a corporation's servers on behalf of a government authority is known as a ___________________ hacker, whereas an individual hacking another individual for their own personal gain is an example of a _____________________ hacker.

Nation-state; non-nation-state

Consider the following scenario: A parent buys an electronic tablet for their 3-year-old child. In this scenario, the 3-year-old child would be a digital ____________.

Native

According to Durkin, __________ are those interested in discussing common interests with others.

Networkers

Consider the following scenario: Greg Jones receives an email asking him to transfer money into the sender's account. The sender says their own extensive wealth is currently inaccessible, but if Greg will send the money and help the sender leave the area, the sender will reward Greg handsomely for his efforts. Greg is suspicious at first, but then he continues to read the email and sees that the sender is offering to pay him back with 200% interest! Greg does the math and realizes that if he sends this person the amount they are requesting, then Greg can make enough money back to buy that new car he's been wanting! Should Greg send the money or offer his bank account information?

No! This is an advance-fee email scheme! Don't fall for it, Greg!

Is Seto (2012) arguing for pedophilia to be classified as a sexual orientation?

No. They are simply proposing a topic of research.

According to the Miller standard, would anatomy books containing images of nude bodies be considered obscene material?

No; anatomy books have scientific value.

Consider the following scenario: The police suspect Greg Jones of cyberstalking Big Al on social media and using this information to steal the mascot's head. The police do not have enough evidence to support a search warrant, but they want to speak to Jones about the incident. When the investigating officers arrive at Jones' apartment, he is not home. The police ask Jones' roommate if they can come in and look for the mascot head, and due to a long-standing feud between Jones and his roommate over The Dishwasher Incident of 2014, the roommate consents to a search of the premises. The officers search the kitchen and living room but do not find the mascot head or any other significant evidence. However, the officers seize Jones' laptop computer, which was located in the nightstand drawer in his bedroom. The door to Jones' room had been closed prior to the search. If there are incriminating files on Jones' computer, can this be used as evidence at trial? Why or why not?

No; if the roommate consents to a search, a search can only be conducted of the common rooms.

Consider the following scenario: A new website featuring pornographic content registers its domain name as "fuzzypandas.com." There is no reference to pandas or bears of any sort anywhere on the site. Is this domain name legal?

No; the Truth in Domain Names Act criminalized the use of misleading domain names for pornographic websites.

(CH10) Cyberterrorists are more often ______, whereas cyberwarfare generally involves ______.

Non-nation-state actors; nation-state actors

Cyberterrorists are more often ______, whereas cyberwarfare generally involves ______.

Non-nation-state actors; nation-state actors

Consider the following scenario: Greg Jones buys a can of soda out of a drink machine at his school. However, he finds that the drink is not fizzy enough to meet his high standards for soft drinks. Greg attempts to contact Coca-Cola and lodge a complaint, but after waiting on hold for two hours, Greg decides that a simple phone call will not satisfy his need for revenge against Coca-Cola for the lack of fizziness in their soft drinks and the time they stole from his life while he waited for someone to answer the phone. In retaliation, Greg launches a DDOS attack against coke.com, thereby restricting the flow of legitimate traffic to the Coca-Cola website. In this instance, Greg Jones would be what kind of actor?

Non-nation-state, looking to fulfill individual desires

The first case to establish the validity of EnCase software for use in digital forensic investigations was...

Ohio v Cook

Regarding forms of cyberbullying, the unintended sharing of personal information with others is known as _______, whereas convincing others to share personal information about themselves and then distributing that communication in a public forum is considered _______.

Outing; trickery

The changes that a piece of malware causes to a computer system upon activation (what the malware actually does to the computer) is known as...

Payload

The following picture is an example of which type of online fraud? (off brand website name)

Phishing attempt

Which specific type of malware did I call a "computer hostage situation"?

Ransomware/scareware

_____________ means obtaining the same results using the same methods, whereas _____________ means obtaining the same results using different methods.

Repeatability; reproducibility

Of the criminological theories discussed in class, which is also a victimization theory?

Routine activities theory

The Children's Internet Protection Act and the Neighborhood Children's Protection Act required which of the following, specifically?

Schools and libraries must use parental controls to block access to potentially pornographic material online

Which religious group did Anonymous target heavily in its early days?

Scientology

Who is most likely to be motivated by a desire for notoriety?

Script kiddies

The goal of steganography is ______________, whereas the goal of encryption is _______________.

Secrecy; privacy

Megan's Law and SORNA relate to...

Sex offender registries.

The leftover space that has been marked for deletion but has yet to be overwritten is known as what?

Slack space

Psychologically manipulating people to perform an action or divulge confidential information is known as ________________________.

Social engineering

According to _________, people behave differently online than in the real world because the Internet offers anonymity and escapism. Therefore, someone might be posting inflammatory messages on anonymous online forums because they can say what they want without fear of repercussions (such as losing their job) and because it provides an outlet, or an escape, from their everyday life.

Space transition theory

Who invented the Apple I, the first Apple computer?

Steve Wozniak

Which statement is true about the following image?

The email is likely an example of a phishing attempt

Prior to the emergence of the Internet, child pornography was primarily a cottage industry, meaning...

Those who wanted it had to make it for themselves.

A ______________ is distinctive characteristic that identifies the goods of one manufacturer or seller from another. An example of this is the Nike swoosh.

Trademark

According to Durkin, __________ are those interested in sharing child pornography images with other such enthusiasts.

Traders

According to Durkin, __________ are those who seek out physical contact with children.

Travelers

Making a deliberately offensive or provocative post online with the aim of eliciting an angry response is known as...

Trolling

(CH9) T/F: Cyberbullying is often more repetitive and visible than traditional bullying.

True

T/F: Based on the requirements set forth by the Electronic Communications Privacy Act (ECPA), an investigator must have a search warrant in order to access full account records of an email client.

True

T/F: Based on the requirements set forth by the Electronic Communications Privacy Act (ECPA), an investigator only needs a subpoena in order to access basic email subscriber information (e.g., name).

True

T/F: Cyberterrorism involves an attack on computer systems that is intended to cause harm for the purpose of effecting ideological, political, or social change.

True

T/F: Digital piracy is the unauthorized and illegal copying of digital media without the explicit permission of the copyright holder.

True

T/F: Disney's Mickey Mouse is currently protected under copyright, as well as trademark laws.

True

T/F: Documenting the air temperature at a crime scene is important.

True

T/F: Hash values are considered "digital fingerprints."

True

T/F: In US v. Alkhabaz, the court ruled that a true or credible threat must be present in order for the behavior to be considered stalking.

True

T/F: Online harassment typically does not portray a threat.

True

T/F: Salami slicing is a form of embezzlement.

True

T/F: The General Theory of Crime states that criminals are impulsive, have low self-control, and are more focused on immediate gratification.

True

T/F: The US Postal Inspection Service is involved in investigating some child pornography cases.

True

T/F: The term "hacker" was originally a badge of honor bestowed upon those who utilized shortcuts in slow-moving computer programs.

True

T/F: There are no federal laws regarding cyberbullying.

True

T/F: Viruses were initially intended to be benign bits of code.

True

The United States does not have any encryption key disclosure laws to mandate individuals give passwords or access information to law enforcement officials.

True

In which case did the US Supreme Court rule that, by failing to pay the rent on his storage locker, the defendant had no reasonable expectation of privacy?

US v. Poulson

Which Act modified the language of the CFAA to allow investigation in foreign nations, including any computer in the world used in a manner that affects interstate or foreign commerce and communications of the United States?

USA PATRIOT Act

What is the non-governmental agency that operates via private, volunteer citizens and operates as a resource to assist individuals who experience harassment or stalking?

WHOA (Working to Halt Online Abuse)

To what does Locard's principle of exchange refer?

When there is contact between two items, there is an exchange of material.

Which of the following is part of the Miller standard?

Whether the work depicts or describes, in a patently offensive way, sexual conduct specifically defined by the applicable state law, whether the work, taken as a whole, lacks serious literary, artistic, political, or scientific value, whether the average person, applying contemporary community standards, would find that the work, taken as a whole, appeals to the prurient interest

Consider the following scenario: Greg Jones is a computer programmer hired by Coke.com to hack into the soda company's own servers in order to find vulnerabilities in the system. Upon discovering the flaws in the system, Jones gives this information only to those in the IT department at Coca-Cola. In this case, Greg Jones is a:

White hat hacker

Which is the only type of malware that can self-replicate?

Worm

In order to ensure reliability, NIST established which of the following as part of the criteria for imaging tools used in digital investigations?

all of the above- The tool shall be able to verify the integrity of a disk image file, the tool shall make a bit-for-bit duplicate of an original disk or partition, the tool shall not alter the original disk

Which standard of proof is higher? This requires that the adjudicating body (judge and jury) believe with near certainty that the defendant is responsible and culpable of committing the crimes charged against them.

beyond a reasonable doubt

Which standard of proof is used for criminal cases?

beyond a reasonable doubt

Which of the following would be included in computer forensics?

laptop

Which standard of proof is used in civil cases?

preponderance of the evidence


Conjuntos de estudio relacionados

Chapter 09 Quiz: Finance: Acquiring and Using Funds to Maximize Value

View Set

Newton's Second Law Physics Quiz retake

View Set

sociology test chp. 4, sociology test chp. 5, sociology test chp. 6

View Set

Oxford Word Skills, English Vocabulary, Advanced by Ruth Gairns & Redman (complete set), Oxford Word Skills Advanced - Units 14-26

View Set

PSYCH 4035 Chapter 15 (Schizophrenia)

View Set

ECON101 EXAM 1: Principles of Economics

View Set