Cyber Security Chapter 7-11 flash cards

¡Supera tus tareas y exámenes ahora con Quizwiz!

Cell phone providers are by law required to enable GPS tracking on at least ________ of devices in their network

95%

Two of the most popular forms of cryptocurrency are bitcoins and dogecoins

False

According to the text, censorship is mainly used by ______ governments, which have come into power by dint of monarchy, family dynasty, coup d'etat, rigged election, or some combination thereof

authoritarian

On the darknet, prices are listed in ______ and are shipped to remote addresses or P.O boxes

bitcoins

Which of the following types of cryptocurrency claims to improve on bitcoins by offering n enhanced level of security

dash

Protection against unwarranted search and seizure is a constitutional protection given by the ______

fourth amendment

Which of the following was NOT identified as an entity that must collaborate and cooperate in order to enhance cyberterrorism deterrence

hackers

The human brain thinks of life in a

linear fashion

According to the text, one of the latest trends is data _________

mining and brokerage

The conceptual framework that encompasses the definition of cyberterrorism includes all of the following elements except ________

results

Examining trends that are necessary for crime to occur is an element of

routine activity theory

Surface websites use ______ to browse the web in a systematic and automated manner

Crawlers

A new prank that is not only draining law enforcement resources but also creating very dangerous situations for citizens is known as __________

swatting

According to the text, which of the following entities contributes to the misunderstanding of what constitutes cyberterrorism

the media

The __________ is primarily responsible for the protection of civilian computers

Department of Homeland Security

Undocumented, non-malicious, surprises installed on a program by the creator are referred to as _________

Easter eggs

A holistic approach integrates all of the following factors except

Environmental

E-mail spoofing is the least common type of spoofing

Fakse

A cyber cell is defined as an incident, or an attempt to cause an incident, that if successful would deny access to or degrade, disrupt, or destruct such a system or network

False

Cybercrimes operate in a virtual environment, with undefined and specific jurisdictions

False

Cyberspace and cybersecurity are confined within national borders.

False

Google and Twitter are among the biggest data collection agencies

False

Recovery involves efforts to identify threats, determine vulnerabilities, and identify required resources.

False

Spoofing cannot be used to manipulate the stock market.

False

Surface webs make up a small part of the massive deep web and is where the majority of criminal activities on the deep web occur

False

The holistic approach emphasizes that technology and policies can effectively address the myriad of cyberthreats.

False

The idea that people learn to behave in certain ways based on imitating the behavior of those they are close to applies to only conventional behaviors

False

Using social media to recruit supporters has resulted in zero terror attacks in the United States and in the international community

False

When location services are turned on, cell phones are constantly sending signals of location and attach so called "metrotags" to all pictures

False

With increased digitalization of our personal info., the integrity of our data is at low risk

False

public-private partnerships are not necessary for the cybersecurity of our nation

False

In 2016, the European Union passed the _______ establishing the first actual cybersecurity rules

NIS directive

The ________ enables the secretary of homeland security to conduct cybersecurity activities that will defend, mitigate, respond to, or recover from cyber incidents to critical infrastructure

National Cybersecurity and Critical Infrastructure Protection Act of 2014

Although multiple agencies play a role in our nation's cybersecurity, leading the way is the ____________

National Security Agency

Telephonic activities were defined much broader than most people would have expected by the ________

National Security Agency

The ___________ is primarily responsible for intelligence interception and interpretation/decryption

National Security Agency

The terrorist organization Boko Haram, also known as Jama'atu Ahlis Sunna Lidda'awati wal-Jihad, is from _______

Nigeria

The electrical grid is a significant target because it isn't just a U.S. infrastructure. It is also known as the

North American grid

According to the text, it's extremely difficult to do which of the following?

all of these

The IoT are network-connected devices and sensors such as ________

all of these

This difference in _________convictions greatly hampers the development of universal enforcement rules.

all of these

Which of the following companies have fallen victim to cybercriminals in recent years

all of these

Two of the most popular forms of cryptocurrency are ____

bitcoin and dash

In 2016 a massive DOS attack brought down much of the Internet in Europe and the United States. The attack used a _______

botnet

The conceptual framework that encompasses the definition of cyberterrorism includes all of the following elements under target except?

civilian homes

Jeopardizing the security, integrity, confidentiality, or availability of an information system or network or any information stored on, processed on, or transiting such a system is also referred to as a ____________

cyber incident

According to the text, the domain is ________

cyberspace

Asserting that criminal behavior is learned via intimate personal groups is a premise for _________

differential association theory

The forgery of an e-mail header pretending to be a legitimate sender like a business or friend scamming the receiver into opening the e-mail and downloading malicious software or responding to a solicitation is an example of _________

e-mail spoofing

All of the following are components of the impact element except?

economic gain

All of the following countries are on the list of most censored countries in the world except _________

Turkey

Boko Haram has become more active on social media since 2015 when it established a/an _________ account

Twitter

The __________ prohibited the bulk collection of digital information

US Freedom Act

The ______________ gives government the authority to collect content records related to telephonic activities

USA PATRIOT Act

Which of the following was suggested as a way to avoid becoming a money mule

Utilizing fraud protection companies, such as PayPal

Which of the following was not identified as one of the components of the motivation element

economical

Which of the following critical infrastructures was NOT a focus of the NIS directive

education

Which of the following cyberterror attack targets was NOT identified by the National Association of Regulatory Utility Commissioners?

education

Which of the following was NOT identified as sectors of critical infrastructure?

education sector

Which of the following is not considered one of the responsibilities of the Department of Homeland Security?

ensure a fast, safe, and effective transportation system

In 2010, the Dodd-Frank Act made spoofing a(n) ________, but it has been difficult to prosecute spoofers

felony crime

Which of the following was identified as a sector of critical infrastructures

financial services sector

Europe and the U.S. government also engage in censorship, mainly targeting

hate speech

Assessing critical assets that need to be protected, such as trade secrets to determine what receives the highest priority, is a component of

identifying sensitive information

A holistic approach to cybersecurity involves cooperation between all of the following except

industries, lawmakers, and cybersecurity specialists

Which of the following is not a factor that leads to the deployment of SWAT officers

likelihood of surrender by the criminal

The first responders to most catastrophic events are usually at the _______ level

local

In ______ scams, criminals intercept e-mails between two businesses or a private person and a business and direct the purchasing party to send the payment for the product to a new bank account

man-in-the-midddle

Solving complex mathematical puzzles every 10 minutes is a task usually seen with ________

mining

People who are desperately looking for a job or are looking for a "work from home" job for a variety of reasons are referred to as

money mules

According to the routine activities theory, crime is more likely to occur if there is _________

predetermined location

Efforts to identify threats, determine vulnerabilities, and identify required resources is known as

preparedness

The Cybersecurity Information Sharing Act of 2015 calls for the cooperation of all of the following except the ___________

president

In conjunction with local and tribal agencies, the Department of Homeland Security works to do all of the following except ________

prevent threat warnings from becoming public knowledge

Entities that have resources to put toward security may not be subjected to the scrutiny and restrictions are usually in the

private sector

Examples of proprietary information include all of the following except

public records

Helping people and the community return to normal, if possible, is a part of ______

recovery

The __________ provided the basis for a comprehensive cyber security strategy

Comprehensive National Cybersecurity Initiative

Outsiders in the hacker subculture who do not have the skills and use prewritten programs are referred to as _________

script kiddies

The _____________ has the responsibility to coordinate federal, state, and local governments, laboratories, critical infrastructure owners and operators, and other entities to accomplish goals pertinent to the National Cybersecurity and Critical Infrastructure Protection Act of 2014

secretary of state

The uncontrollable nature of _______ poses great challenges to coordinating effective federal and state law enforcement responses to cyberattacks and terrorist acts.

social media

E-mail spoofing is used for which of the following campaigns?

spam and phishing

Which of the following cyber terror attack targets was NOT identified by the National Association of Regulatory Utility Commissioners

sports arenas

Dash eliminates this security issue by implementing a two-tier security network

True

Due to the simple nature of cyberspace and geopolitical relations, there is international cybersecurity law similar to that of the criminal law in the United States

True

Every nation-state is a sovereign entity; that is, only law enforcement in that nation has the right to enforce the laws

True

In order to access the deep web, special considerations are needed, including private URL addresses or, for some areas, specialized software.

True

In order to examine the threat aspect of risk assessment, it should be understood that risk can come from two sources: natural disasters and man-made disasters.

True

One main element of that terrorism tactic is to create fear in a population

True

One of the latest trends is data mining and data brokerage

True

One such tool used to mainpulate data and people is censorship

True

Taking a computer or device hostage until the owner pays a ransom is referred to as ransomware

True

The U.S. Foreign Intelligence Surveillance Court is a secret court

True

The government of Japan forced Google to reshoot street-level view because the images were enabling viewers to look inside the houses

True

The holistic approach emphasizes that neither technology nor policies in themselves can effectively address the myriad of cyberthreats.

True

The main purpose of national cybersecurity policies is to develop a comprehensive strategy to prevent and mitigate cyberattacks

True

The role of local-level agencies in cybersecurity is constantly evolving

True

The term terrorism refers to a tactic

True

Sites on the ToR network end in _____, but if you were to type the web address into Google, the website would not be found.

.onion

According to Moore's law, the growth in the information technology is exponential, such as ___________

1, 2, 4, 8, 16, 32,

On average, Google accesses _______ percent of the surface web

16

Which of the following differential association theory points was not proposed by Edwin Sutherland?

Behavior is learned the best in larger social groups

The _________ proved to be symbolic legislation that assures the public that the international community is taking steps to combat cybercrime and the threat of a cyberwar

Budapest Convention on Cybersecurity

________ may use ToR for competitions, keeping strategies secret, and internal acccountability

Businesses

In the 1970s, Gordon Moore showed how _______ doubled every two years

Central processing Units

The country with the best known and most discussed censorship is

China

The ________ creates a cybersecurity information sharing system for public and private entities

Cybersecurity Information Sharing Act of 2015

The _______ requires the secretary of homeland security to assess the work of the cybersecurity workforce of the Department of Homeland Security and develop a comprehensive strategy to improve the readiness and quality of the cybersecurity workforce

Cybersecurity Workforce Act 2014

An intentional act, committed via computer or communication system and motivated by political, religious or ideological objectives, against information, data, or computer systems/programs, intended to cause severe harm, death, or destruction to civilians, is referred to as?

Cyberterrorism

A radio frequency transmitter that blocks the communication between cell phones and text messages is referred to as a _________

GPS jammer

Which of the following was identified as one of the main tools used by criminals?

GPS jammer

_______ is known as one of the largest data collectors

Google

The most recent era of local-level policing is known as the _________

Homeland Security Era

Some people have suggested applying the _______ to cybercrimes because they are similar in that there is often no clear jurisdiction

Law of the Sea

Which of the following was NOT identified in the text as an example of a research tool and database located on the deep web?

LexisNexis

A health tracker is an example of a device that can be used in the _______ technique

Main-in-the-IoT

Which of the following sites was not identified as being one of the popular alternatives in the darknet?

Milky Way

The surface web, which is available via regular search engines, is hosted by all of the following browsers except __________

Onion Router

_________ was originally developed by U.S Naval Research Laboratory as a method of anonymous communication

Onion Router (ToR)

On November 6, 2014, law enforcement collaborating together and coordinated via Europol took down multiple darknet drug marketplaces, including Silk Road 2.0, in an operation referred to as _________

Operation Onymous

Which of the following was identified as a tool of attack in the conceptual framework of defining cyberterrorism

Psychological operation

_________ has become one of the most feared threats to cybersecurity

Ransomware

A technology that detects the current geolocation of a target, which may be anything from a vehicle to an item in a manufacturing plant to a person, is referred to as ________

Real Time Location Services

Edward Snowden, who released classified information about the U.S. government, found asylum in ________ which has declined to extradite Snowden

Russia

Which of the following is NOT considered a portal of the darknet?

Safari

A malicious practice in which communication is sent from an unknown source disguised as a source known to the receiver is referred to as _________

Spoofing

Systems utilized by many of the nation's critical infrastructures to provide automated control of the functions of the infrastructure are referred to as ___________

Supervisory control and data acquisition systems

Which of the following was not identified as a warning sign of money mule schemse

The position has a specific job description

A network within a network that is intended to protect communication from dragnet surveillance and monitoring by third parties such as ISPs is referred to as an anonymous overlay network

True

Attribution is a problem that governments across the globe face when such attacks occur

True

Authoritarian governments are not the only ones that manipulate the facts and block websites

True

Criminals can use GPS spoofing as a tool by creating false GPS signals. This is possible because the real GPS signals are very weak because satellites are far away

True

The role of ________ hackers in the collaborator effort of cybersecurity is vital

White hat

The most famous use of the Internet by Boko Haram was in utilizing which of the following to show the coverage of the kidnapping of the Chibok?

YouTube

Hacker subcultures may consist of various identifying factors. Which of the following is NOT likely to be one of those factors

a dislike for information technology

Cyberterror attacks my be conducted in a variety of ways, including?

creating hardware to prevent intrusions

Existing only in the digital arena, ________ is/are the only way that purchases on the deep web can be made in anonymity

cryptocurrency

Albert K. Cohen's subculture theory propositions are based on ________

delinquent boys

According to the text, some of the most popular products advertised on the hidden wiki are _________

drugs

Which of the following groups was not highlighted in this chapter

People's Liberation Army

______ is often refered to as a peer-to-peer platform for censorship-resistant communication and publishing.

Freenet

The deep web, which is not accessible through traditional search engines, is sometimes referred to as the ________

deep net

According to the text, the surface web only accounts for about ______ percent of all the internet

4

The surface web is often compared to the tip of the iceberg of the internet, as the deep web is _________ bigger than the surface web.

400-500

One of the oldest and largest hacker conventions is known as

DEFCON

Activists may utilize ToR to protect communications, investigations, and intelligence

False

An individual who doesn't have the skills to hack on his or her own so uses prewritten programs to do so is referred to as a dumpster diver

False

As law enforcement is attempting to infiltrate darknet websites, the group Anonymous is working to restore darknet sites that have been taken down.

False

Google, Facebook, and any website you can find via traditional search engines are all located on the darknet

False

There is a universal definition of terrorism in the US and in the international community

False

There is no concern that cyberterrorists will use the electrical grid system to attack critical infrastructure, as they do not have the means to do so.

False

The leading agency for investigating cyberattacks by criminals, overseas adversaries, and terrorists is known as the _______

Federal Bureau of Investigation

Which of the following constitutional Amendments established the right to freedom of speech

First

The Islamic State is also referred to as all of the following except?

Islamic Electronic Army

Heightened inspections, improved surveillance, public health/agriculture testing, immunizations, and law enforcement operations to deter/disrupt illegal activity and apprehend perpetrators are ways to ______

Mitigate

______ may use ToR to protect sources, resources, and report from areas where it is dangerous

People with malicious intent

According to the differential association theory, criminal behavior is acquired through interactions with other persons via communication

True

According to the routine activities theory, guardianship plays a major role in the prevalence of crime

True

Al-Qaeda has been known to recruit individuals with information technology or computer backgrounds.

True

Barry Colin, while working as a research analyst at Palo Alto's Institute for Security and Intelligence in the 1980s, first coined the term cyberterrorism

True

Cyberspace is a place in which computers function and data moves

True

The U.S. government should cooperate not only with national jurisdiction of law enforcement at all levels but the international community and private sector organizations as well

True

The hidden WIKI is a popular way to search the darknets. It acts as a search engine for illicit goods, products, and services

True

There are two main forms of darknets: peer-to-peer nets and large anonymous networks

True

Traditional crimes occur in a specific location/jurisdiction(s) and are thus subjected to the rule of law of that specific jurisdiction

True

Within criminal justice and criminology, subcultures may include the prison subculture, the criminal subculture, the courtroom working group, etc.

True

The Darknet Silk Road runs like a black market ________ site for drugs, drug paraphernalia, and other goods and services.

eBay-type

According to the text, the United States ranks _____ in pro-IS tweets.

fourth

An ethnic, regional, economic, or social group exhibiting characteristic patterns of behavior sufficient to distinguish it from others within an embracing culture or society is referred to as __________

subculture

According to the text, low socioeconomic status is a predominate marker for engaging in crime in _______

subculture theory

According to the conceptual framework of cyberterrorism, the method of action is _______

unlawful means

According to the text, three aspects must be taken into account to determine risk: the threat, the asset, and the _______

vulnerability

Maneuvering around, trying to access unprotected WiFi networks, is referred to as ____________

wardriving

According to the text, deep web sites can include all of the following except

websites that are searchable

In the 1950s and 60s, subculture theories began to examine the prevalence of ______

youth gangs


Conjuntos de estudio relacionados

Chapter 14: Infection, Infectious Diseases, and Epidemiology

View Set

Зарубіжна література

View Set

Financial Accounting Smartbook Chapter 2

View Set