Cybercrime
Which of the following is true of the Digital Revolution?
) It has created a new forum for both terrorist activity and criminal behavior.
According to the Office of Juvenile Justice and Delinquency Prevention (OJJDP) and the National Center for Missing and Exploited Children (NCMEC), almost all possessors of child pornography are black males who are under the age of 25. B
...) False
________ involves the use of radio waves to facilitate the transfer of information between an electronic tag (or label) and a reader.
...A) RFID
At the dawn of the computer age, the term "computer crime" usually referred to the theft of computers or computer components.
...A) True
Not all crimes involving computers can be characterized as "computer crime."
...A) True
Spamming refers to the abuse of electronic messaging systems to randomly or indiscriminately send unsolicited bulk messages.
...A) True
Vengeance or terrorist stalkers are motivated by either economic gain or revenge.
...A) True
What was the Illuminati?
...A) a board owned and operated by Steve Jackson Games
Which of the following types of fraud occurs when a fraudster adds hidden charges to the advertised price, perhaps in shipping or handling?
...A) fee stacking
Which of the following is NOT a primary motivation for the possession of child pornography?
...A) fight for legalizing man/boy sexual relationship
refers to a software program or hardware device that records everything you type into a compromised computer?
...A) keyloggers
The individuals who seek to re-establish a relationship with an unwilling partner and are considered the most dangerous of stalkers are known as ________.
...A) obsessional stalkers
Which of the following refers to redirecting thin slices of accounts into a designated location?
...A) salami technique
Recent studies indicate that the emergence of cloud computing and removable media has effectively decreased theft of information or breaches in digital security.
...B) False
Which of the following is true of the infamous hacking board Plovernet?
...B) It was a breeding ground for hacking groups like LoD.
Cybervandalism and cyberterrorism are examples of which category of online crime?
...B) interference with lawful use of computers
Which of the following refers to a seller in an auction driving up the cost of his or her own item by bidding on it?
...B) shill bidding
To steal credit card information by installing devices on card readers located in ATMs, gas pumps, restaurants, grocery stores, retail establishments, or any other area where magnetic strip card readers are employed is known as ________.
...B) skimming
Which of the following refers to two distinct methods of distributed denial of service (DDoS) attacks?
...B) smurfing and fraggling
Electronic purses come in two primary types: limited or closed, and multipurpose or open.
false
Increasing dependence on cyber information is one of the disadvantages of the Internet.
true
Which of the following devices introduces commands and information to the computer?
... D) keyboard
Which of the following refers to the unauthorized attempt to gain access to information about a system?
... D) probe
What can the exponential increase in online harassment, stock manipulation, and child pornography be attributed to?
... D) the increase in anonymous e-mail accounts and remailers
What is the purpose of random access memory in the computer system?
... D) to temporarily store information
A deliberate, politically or religiously motivated attack against data compilations, computer programs, and/or information systems that is intended to disrupt and/or deny service or acquire information that disrupts the social, physical, or political infrastructure of a target, is known as ________.
...A) cyberterrorism
Which of the following launched the first online casino in 1995 with 18 games?
...C) Internet Casinos, Inc.
What is the term used to describe the final destination of discarded, lost, or destroyed data?
...C) bit bucket
Which of the following refers to the deliberate manipulation of an existing program to redirect or reroute data representing monies or economic exchanges?
...C) data diddling
Which of the following refers to the sale of stolen goods through technological means?
...C) e-Fencing
Which of the following refers to stalkers who are delusional and believe that their victim is in love with them or has had a previous relationship with them?
...C) erotomaniacs
Which of the following refers to a malware program that encrypts or otherwise renders computer or digital resources inoperable or inaccessible in furtherance of the illegal compulsion of an action or exchange?
...C) ransomware
Which of the following refers to a computer that has been compromised by some form of malware, enabling the criminal to remotely control that computer?
...C) zombie
Which of the following statements regarding online gaming is untrue?
...D) Minors accessibility to online gaming is restricted, as age verification is mandatory.
Which of the following best defines shoulder surfing?
...D) literally watching someone from behind, as he or she inputs a password
According to the Office of Juvenile Justice and Delinquency Prevention (OJJDP) and the National Center for Missing and Exploited Children (NCMEC), almost all possessors of child pornography are ________.
...D) white males who are older than 25
Which of the following qualifies as social engineering?
... C) befriending a company's cleaning crew to gain access to rooms and buildings
Which of the following is the least destructive category of hackers?
... C) informational voyeurs
What is the most important component of a computer?
... C) motherboard
Which was the first event to signal the potential of computer crime?
... C) the hacking of the MILNET system
How are websites identified?
... C) through uniform resource locator
Which of the following is NOT one of the primary motivations for computer intrusion in contemporary society?
... C) to benefit others
Which of the following is NOT a general category of computer crime?
... C) vicinage
________ hat hackers are individuals who identify and exploit system vulnerabilities for nefarious purposes.
... D) Black
Which of the following is NOT a reason for the popularity of bulletin boards among subversive organizations?
... B) perception of Second Amendment protection
________ can be defined as the reproduction, distribution, and use of software without the permission or authorization of the owner of copyright.
... C) Data piracy
What is a collection of hyperlinked pages of information distributed over the Internet via a network protocol?
... C) World Wide Web
Which of the following is a valid reason why a corporation might welcome federal assistance to help catch a cyber criminal?
) Criminals access different services to disguise their location.
The issue of vicinage has been simplified by the lack of international guidelines for cyberactivity.
... B) False
What is the term used to refer to the method of cracking passwords by manually entering all possible key combinations?
... B) brute force
Who developed the Electronic Numerical Integrator and Computer (ENIAC)?
... C) John W. Mauchly and John Presper Eckert
Which of the following is a self-contained program that may spread functional copies of itself to other computer systems?
... C) worm
Which of the following hacking-related developments occurred after the year 2000?
... D) the emergence of identity theft as an issue for consumers
The theft and resale of which computer component has proven to be the most lucrative?
... A) CPUs
________ was the most infamous of all hackers and has been the subject of numerous books and movies.
... A) Kevin Mitnick
In which Mac OS did Apple introduce its first Unix-based operating system?
... A) Mac OS X
______ are the least sophisticated of all cybercriminals.
... A) Script kiddies
Which of the following does NOT accurately describe the Secret Service actions that prompted the seminal court case Steve Jackson Games, Inc. v. U.S. Secret Service et al.?
... A) The Secret Service used a DDoS attack to infiltrate and sabotage the company's operations.
Blue boxes were extremely popular among college dorms and were widely considered harmless by users.
... A) True
Traditional hacker culture was characterized by an antiestablishment rhetoric.
... A) True
Which Windows operating system paved the way for the development of peer-to-peer networks?
... A) Windows NT 3.1
What is Gopher?
... A) an information retrieval tool
Which of the following tells the computer in which order to access drives?
... A) boot sequence
Which of the following is structured to allow users to participate in real-time conversations?
... A) chat rooms
What does the term wetware refer to?
... A) humans operating computers
Which of the following is a factor that leads many individual users of the Internet to assume that their identities are safely protected?
... A) the dearth of interjurisdictional communications
________ are designed to strip the source-address information from e-mail messages.
... B) Anonymizers
Which of the following hacking-related developments occurred during the 1990s?
... B) Commercially available security products are introduced.
Like traditional communication carriers, Internet service providers are required to maintain transmission records.
... B) False
Who was the first person to successfully introduce a device exclusively designed for data processing?
... B) Herman Hollerith
Which of the following interprets program instructions and processes data in the computer?
... B) central processing unit
Which of the following groups does NOT figure in the multilateral film privacy strategy of the Chinese Triads?
... B) hacktivits
What motivates pure hackers to steal information?
... B) intellectual challenge
Traditionally, trial and appellate courts evaluated the constitutionality of computer crime statutes, searches, and investigations through the lens of the ________.
A) First and Fourth Amendments
For users, 24-hour accessibility equates to 24-hour vulnerability.
A) True
Intranets are small local networks connecting computers within one organization, controlled by a common system administrator.
A) True
Operating systems may be either single-user or multiple-user.
A) True
The smallest piece of data is called a bit.
A) True
Which of the following characteristics of new payment methods has facilitated money laundering and terrorist financing?
A) anonymity in transactions
Which of the following is NOT a reason why many businesses and corporations underreport computer crimes?
A) consumers don't care about confidentiality
One of the earliest examples of computer crime is ________, which consists of an activity in which telecommunications systems are manipulated and ultimately compromised.
A) phreaking
One of the earliest computers developed by Charles Babbage was created to tabulate the 1880 U.S. census.
B) False
Which of the following allows perpetrators to commit multinational cybercrime with little fear of judicial sanctions?
B) The lack of physical boundaries
What did the Fifth Circuit Court of Appeals rule in U.S. v. Finley?
B) The post-arrest search of a suspect's cell phone was constitutional.
Closed system cards and open system cards are two primary types of ________.
B) prepaid cards
Which of the following involves payments that rely on a bank account and a web-based transfer of funds to or from an established financial account?
C) Internet payment services
what according to a study conducted by the Department of Justice, were perceived as the number one target for computer crime?
C) businesses
Corporations and private entities that offer discounts on software or training to law enforcement agencies are called ________.
C) friendly vendors
Which of the following e-payment methods stores funds on an integrated circuit chip in the card?
C) stored value card
Which of the following is an example of computer-initiated criminal activity?
C) wire transfers
has traditionally encompassed abuses and misuses of computer systems or computers connected to the Internet, resulting in direct and concomitant losses.
Cybercrime
Which of the following is NOT a problem in the investigation of cybercrime?
D) a widespread perception of cybercrime as worse than "traditional" crime
All the following are categories into which computer crimes are traditionally divided EXCEPT ________.
D) computer as a weapon
For what purpose did British scientists build Colossus I?
D) cryptanalysis
Expenditures on which area represent a nonrecurring expense for a computer crime unit?
D) establishing a computer laboratory
Which payment method is typically associated with a card payment network such as Visa or MasterCard?
D) prepaid card
includes any criminal activity which involves the unauthorized access, dissemination, manipulation, destruction, or corruption of electronically stored data.
Digital crime
Law enforcement has been threatened and weakened by the advent of the Internet and has not been able to benefit from it.
False
Much computer-related crime involves specialist users.
False
The lack of physical boundaries and the removal of traditional jurisdictional demarcations allow perpetrators to commit multinational crime with little fear of judicial sanctions.
true