Cybersecurity
According to the text, human trafficking consists of all of the following elements EXCEPT:
outcome
______ is a weakness in a product that could allow an attacker to compromise the integrity, availability, or confidentiality of that product.
security vulnerability
The posting of harassing messages aiming to cause harm to the victim is also known as:
denigration
Internet users generally struggle with identifying when their computer has been attacked. In order to quickly respond to a cyberattack on their system, a user would have to be able to overcome which of the following internet threats?
1s and 0s
According to the text, by the year 2020, the economic cost of cybercrime is expected to go above:
3 trillion
According to the text, the surface web only accounts for about _______ percent of all the Internet.
4
The surface web is often compared to the tip of the iceberg of the Internet, as the deep web is _____ bigger than the surface web.
400-500
Which of the following differential association theory points was not proposed by Edwin Sutherland?
Behavior is learned the best in larger social groups.
The ______ creates a cybersecurity information sharing system for public and private entities.
Cybersecurity Information Sharing Act of 2015
According to the text, logic bombs are typically installed by outsiders of an organization or corporation.
False
Criminals as well as average internet users are good at hiding their identifying information online.
False
______ is often referred to as a peer-to-peer platform for censorship-resistant communication and publishing.
Freenet
Which of the following laws does NOT apply to hackers?
Hackers are evil people
Some people have suggested applying the ______ to cybercrimes, because they are similar in that there is often no clear jurisdiction.
Law of the Sea
Which of the following was NOT identified in the text as an example of a research tool and database located on the deep web?
LexisNexis
______ has become one of the most feared threats to cybersecurity.
Ransomware
Which of the following characteristics of hackers is NOT true?
The members meet each other quite often
Consumer crimes are deceptive practices that result in financial or other losses for consumers in the course of seemingly legitimate business transactions.
True
Cyberattacks are cheap and unconstrained by geography and distance to the target.
True
insiders are people who are current or former employees of a company, contractors, or friends of employees.
True
The collection and analysis of information that produces timely reporting, with context and relevance to a supported decision-maker, is referred to as:
cyberintelligence
An intentional act, committed via computer or communication system and motivated by political, religious, or ideological objectives, against information, data, or computer systems/programs, intended to cause severe harm, death, or destruction to civilians, is referred to as:
cyberterrorism
A _______ refers to persons who attempt unauthorized access to a control system device and/or network using a data communications pathway.
cyberthreat
Cyber terrorism attacks often take the form of:
denial-of-service attacks
According to the text, China also engages in economic ______ against the United States and other countries.
espionage
In 1987, the ________ strengthened the security measures for online systems.
Computer Security Act
The opportunity to create new businesses and markets online best describes which aspect of internet development?
commercialization
Which of the following countermeasures recommends that companies must complete regular data back up?
complete regular updates
Edward Snowden, an American computer professional, provided all of the following tips for keeping data private EX
decrypt your phone calls and text messages
Which of the following is NOT considered a main type of insider threat?
feared
The Economic Espionage Act of 1996 makes it a _______ to steal or interfere with trade secrets.
federal crime
MMS viruses can disrupt phone service, steal information, block data, and track the users' movement.
True
One of the oldest reasons for threats of harm by nation-states is power.
True
Helping people and the community return to normal, if possible, is a part of:
recovery
Systems utilized by many of the nation's critical infrastructures to provide automated control of the function of the infrastructure are referred to as:
supervisory control and data acquisition systems
Undocumented, nonmalicious, surprises installed on a program by the creator are referred to as:
Easter eggs
Encryption and going dark is a relatively new invenetion
False
According to the text, the internet was built to be a free and open access tool. Which of the following best represents this concept?
Napster
According to the text, cyberwarfare generally includes which of the following?
cyberespionage and cybersabotage
ISIS and the operators have utilized technological advances such as social media to do all of the following EXCEPT:
denounce themselves
Asserting that criminal behavior is learned via intimate personal groups is
differential association theory
The first "software" was the Morse code developed by Samuel F.B. Morse. The Morse code made telegraphing much easier by using:
dots and dashes
According to the text, some of the most popular products advertised on the hidden wiki are:
drugs
The _______ prohibited the bulk collection of digital information.
USA Freedom Act
Botnets typically infect computers via _______ or drive-by-downloads.
USBs
All of the following were identified as vulnerable infrastructures EXCEPT:
education
Which of the following critical infrastructures was NOT a focus of the Network and Information Security
education
Which of the following cyber terror attacks was NOT identified by the National Association of Regulatory Utility Commissioners?
education
Which of the following was NOT identified as sectors of critical infrastructure?
education sector
Economic cyberespionage is typically carried out by all of the following EXCEPT:
individual actors
Entities that have resources to put toward security and many not be subjected to the scrutiny and restrictions are usually in the:
private sector
Per the 1998 Assumption Deterrence Act, the text identified all of the following types of punishment EXCEPT:
probation
The ______ has the responsibility to coordinate federal, state, and local governments, laboratories, critical infrastructure owners and operators, and other entities to accomplish goals pertinent to the National Cybersecurity and Critical Infrastructure Protection Act of 2014
secretary of state
Which of the following was NOT identified as one of the main forms of international threats?
hacking or spying on city and local governments
Assessing critical assets that need to be protected, such as trade secrets to determine what receives the highest priority, is a component of:
identifying sensitive information
In 2015, the most common crime reported to the Federal Consumer Commission was:
identity theft
In 2015, a cyberattack was launched against Ukraine by the Russians. The ________ attack to shut down the power grid based in Russia was possibly backed by the Russian government.
killdisk
The first responders to most catastrophic events are usually at the _______ level.
local
China is known to prioritize ______ control over cyber defense strategies.
political information
Efforts to identify threats, determine vulnerabilities, and identify required resources is known as:
preparedness
Examining trends that are necessary for crime to occur is an element of:
routine activity theory
Which of the following systems led to the creation of the Morse code?
telegraph system
According to the Federal Trade Commission, all of the following are ways that consumers can prevent identity theft EXCEPT:
using easy passwords
According to the text, three aspects must be taken into account to determine risk: the threat, the asset, and the:
vulnerability
Sites on the ToR network end in ______, but if you were to type the web address into Google, the website would not be found.
.onion
Outsiders in the hacker subculture who do not have the skills and use prewritten programs are referred to as:
script kiddies
Which of the following cyber terror attack targets was NOT identified by the National Association of Regulatory Utility Comissioners?
sport arenas
On average, Google accesses _______ percent of the surface web.
16
The _______ requires the secretary of homeland security to assess the work of the cybersecurity workforce of the Department of Homeland Security and develop a comprehensive strategy to improve the readiness and quality of the cybersecurity workforce.
Cybersecurity Workforce Act 2014
According to the text, cyberattacks focus mainly on the destruction of sensitive information
False
Which of the following risks is not created by Trojan Horses?
Internet slowdown
_______ is defined as a collection of infected machines worldwide that receive commands and perform some illegal actions such as distributed denial of service attacks, among others.
a botnet
The Syrian Electronic Army has been responsible for attacks against which of the following?
all of the above
According to the text, it is extremely difficult to do which of the following?
all of these
This difference in _________ convictions greatly hampers the development of universal enforcement rules.
all of these
The ______ of the internet might be a concern for parents regarding who their children may be talking to online.
anonymity/identity
Groups with displeasure of government are often motivated by all of the following EXCEPT:
aristocracy
Two of the most popular forms of cryptocurrency are:
bitcoin and dash
Which of the following types of cryptocurrency claims to improve on bitcoins by offering an enhanced level of security?
dash
A _______ malware is disguised as, or embedded within legitimate software where it installs itself and runs automatically once it is downloaded.
Trojan Horse
The Syrian Electronic Army has collected information using which of the following cyberattack techniques?
Trojan Horses
The term terrorism refers to a tactic.
True
Which of the following countries is known to be the most advanced with regard to computers, hardware, and software?
United States
Hacker subcultures may consist of various identifying factors. Which of the following is NOT likely to be one of those factors?
a dislike for information technology
In 1998 Congress passed the Assumption Deterrence Act making identity theft:
a federal crime
_______ may use ToR for competitions, keeping strategies secret, and internal accountability.
businesses
The Darknet Silk Road runs like a black market ________ site for drugs, drug paraphernalia, and other goods and services.
eBay-type
An act that occurs when an actor, knowing that his or her actions will benefit any foreign government, instrumentality, or agent, steals, copies, or receives a trade secret is referred to as:
economic espionage
All of the following are components of the impact element EXCEPT:
economic gain
Which of the following was NOT identified as one of the components of the motivation element?
economical
People who are "tricked" by others into giving up access information or information about themselves to an external party are known as ______ insiders.
exploited
There is a universal definition of terrorism in the United States and in the international community.
false
Which of the following was identified as a sector of critical infrastructures?
financial services sector
The exchange of insults in a public setting, such as a bulletin board or chat room, is known as:
flaming
Consumer crimes that include identity theft, phishing scams, and spam fall within which of the following categories?
fraud and financial crimes
Which of the following was NOT identified as an entity that must collaborate and cooperate in order to enhance cyberterrorism deterrence?
hackers
The most serious insider cybercrimes include all of the following EXCEPT:
harassment
The ____ layer of cyberspace is best described as where the platform nature of the internet is defined and created.
logic
The least common but most costly is _______ insider threat.
malicious
The ______ technique target file-sharing tools, such as Google Drive
man-in-the-cloud
The ___ technique target devices that can be connected, such as car alarms, thermostats, etc.
man-in-the-internet of things
Botnets use _______ architecture in which each workstation has the same capabilities and responsibilities.
peer-to-peer
According to the text, phishing scams typically target:
personal information
Which of the following was identified as a tool of attack in the conceptual framework of defining cyberterrorism?
psychological operation
Examples of proprietary information include all of the following EXCEPT:
public records
Profit, fame, and challenge are characteristics of the _____ in a traditional attack.
purpose
work-for-hire hackers who work for private security corporations are also referred to as:
red teams
The conceptual framework that encompasses the definition of cyberterrorism includes all of the following elements EXCEPT:
results
All of the following are layers of cyberspace except
social layer
The uncontrollable nature of ______ poses great challenges to coordinating effective federal and state law enforcement responses to cyberattacks and terrorist acts.
social media
All of the following are examples of social engineering EXCEPT:
spam
An ethnic, regional, economic, or social group exhibiting characteristic patterns of behavior sufficient to distinguish it from others within an embracing culture or society is referred to as a:
subculture
According to the text, low socioeconomic status is a predominate marker for engaging in crime in:
subculture theory
according to the text, low socioeconomic status is a predominate marker for engaging in crime in:
subculture theory
According to the text, the most pervasive cyberthreat may be:
theft of intellectual property
Which fo the Internet gateways to vulnerability can be described as the computer code of the internet?
1s and 0s
_______ is an encryption that refers to a digital signature providing proof of authorship.
Attribution
____ is an interdependent network of information technology infrastructures include the internet, telecommunications networks, and computer systems.
Cyberspace
Development of the _______ resolved issues with hierarchal host names making it easier for the person to access the internet.
DNS
In 2001, the original Code Red malware initiated a _____ attack on the White House
Denial of Service
The leading agency for investigating cyberattacks by criminals, overseas adversaries, and terrorist is known as the:
FBI
A cybercall is defined as an incident, or an attempt to cause an incident, that if successful would deny access to or degrade, disrupt, or destruct such a system or network.
False
_______ refers to all types of crime in which someone wrongfully obtains and uses another person's personal data in some way that involves fraud or deception, typically for economic gain.
Identity theft
Hacking cars or other means of transportation, such as airplanes, is an example of a security issues seen in which of the following techniques?
Man in the Internet of Things
______ may use ToR to protect sources, resources, and report from areas where it is dangerous.
Media
Which of the following countries was not identified as being one of the strong actors in world politics?
Mexico
Although multiple agencies play a role in our nation's cybersecurity, leading the way is the:
National Security Agency
The _____ is a primarily responsible for intelligence interception and interpretation/decryption.
National Security Agency
In 2016, the European Union passed the ______ establishing the first actual cybersecurity rules.
Network and Information Security Directive
The terrorist organization Boko Haram, also known as Jama'atu Ahlis Sunna Lidda'awati wal-Jihad, is from:
Nigeria
The hidden wiki is a popular way to search the darknets. It acts as a search engine for illicit good, products and services.
True
The holistic approach emphasizes that neither technology nor policies in themselves can effectively address the myriad of cyberthreats.
True
Which of the following is not an example of a cyberattack used by the Syrian Electronic Army?
Moonlight Maze
Cyberespionage can be classified into which of the following types?
both economic and political
_____ viruses infect data files
Macro
The surface web, which is available via regular search engines, is hosted by all of the following browsers EXCEPT:
Onion router
The Strategic Support Force intelligence unit is a part of which of the following?
People's Liberation Army
E-mail borne viruses took place in which of the following phases of convergence?
Phase 2
_____ is a service that can accessed via the internet.
World Wide Web
Cyberterror attacks may be conducted in a variety of ways EXCEPT:
creating hardware to prevent intrusions
The inventors of the internet likely didn't consider _______ during its development.
criminal abuse of the internet
Which of the following was NOT identified as a way that criminals get information from their victims?
criminals directly ask the victim for their personal information
Existing only in the digital arena, ______ is/are the only way that purchases on the deep web can be made in anonymity.
cryptocurrency
The intentional aggressive behavior toward another person that is performed through electronic means is also known as:
cyberbullying
Human behavior that departs from compliance with established policies, regardless of whether it results from malice or a disregard for security policies, is the manifestation of a/an _______ threat.
insider
According to national surveys, ______ are the second greatest threat to a company's cybersecurity, only trumped by hackers.
insiders
Historically, power has depended on which of the following strengths?
military
Solving complex mathematical puzzles every 10 minutes is a task usually seen with:
mining
Heightened inspections, improved surveillance, public health/agriculture testing, immunizations, and law enforcement operations to deter/disrupt illegal activity and apprehend perpetrators are ways to:
mitigate
Boko Haram has become more active on social media since 2015 when it established a/an _______ account.
According to the text, virus files end in:
.exe
Which of the following was NOT identified as one of the main issues associated with cyberespionage?
Nation-states and crime organizations never use independent hackers to avoid being associated with a cyberattack.
GhostNet was one of the most successful programs with regard to _______ cyberespionage.
political
The Identity Theft Resource Center estimates that it takes on average _____ hours to repair the damage of identity theft.
600
The _______ provided the basis for a comprehensive cyber security strategy.
Comprehensive National Cybersecurity Initiative
The Cybersecurity Information Sharing Act of 2015 calls for the cooperation of all of the following EXCEPT the:
president
The ________ proved to be symbolic legislation that assures the public that the international community is taking steps to combat cybercrime and the treat of a cyberwar.
Budapest Convention on Cybersecurity
n conjunction with local and tribal agencies, the Department of Homeland Security works to do all of the following EXCEPT:
prevent threat warnings from becoming public knowledge
Which of the following is NOT considered a portal of the darknet?
safari
According to the text, cybercrime only has one layer.
False
An individual who doesn't have the skills to hack on his/her own so uses prewritten programs to do so is referred to as dumpster diver.
False
Malicious insiders may delete or expose sensitive information by incident - either by pressing a wrong key or by other errors.
False
In 2014, President Obama attributed the Sony hack to the North Korean government and raised the issue of foreign obstruction of _______ Amendment rights in the United States.
First
A health tracker is an example of a device that can be used in the _______ technique.
Man-in-the-loT
Telephonic activities were defined much broader than most people would have expected by the:
National Security Agency
The electrical grid is a significant target because it is not just a U.S. infrastructure. It is also known as the:
North American grid
_______ was originally developed by the U.S. Naval Research Laboratory as a method of anonymous communication.
Onion Router (ToR)
Which of the following countries is considered one of the most advanced cyberespionage powers?
Russia
Low probability that the criminal will get caught and convicted and public exposure are some of the reasons as to why so few victims report the crimes.
True
The internet was originally guilt to be a free and open source, with minimal oversight.
True
Which of the following defines the acronym URL?
Uniform Resource Locator
On the darknet, prices are listed in _____ and are shipped to remote addresses or P.O. boxes.
bitcoins
The conceptual framework that encompasses the definition of cyberterrorism includes all of the following elements under target EXCEPT:
civilian homes
The use of computer networks and technologies as a means for conducting attacks that target critical national infrastructures or governmental assets has a psychological, social, political or religious motive, causes harm to individuals or groups, or physically damages infrastructures is referred to as:
cyberterrorism
According to RAND, actions by a nation-state or international organization to attack and attempt to damage another nation's computers or information networks is referred to as:
cyberwarfare
Hackers with their abilities to research vulnerabilities in software products and disclose them to companies that developed the software are known as:
ethical hackers
______ is a reference or a navigation element in a hypertext document that offers direct access to another section of the same document or to another hypertext document that is on part or part of a (different) domain.
hyperlink
Which of the following countermeasures helps prevent e-mail spoofing, that is, the forgery of an e-mail header to make it appear as if it is coming from a friend or employee?
implement message authentication
According to the text dams, railways, and power plants are considered:
infrastructures
Countries concerns with controlling the flow of information and goods online would be most concerned with which of the following aspects of the internet?
lack of barriers to entry
Threats that orginate from inside the company or organization are referred to as:
local threats
________ refers to attacks where a mass email is sent to multiple computers, requesting personal information be sent to a specific location.
phishing
Whereas in the past criminals had to physically approach their victims to carry out a crime , the Internet allows offenders to be in other states, or even continents, and still carry out the same crime. This best represents which of the following vulnerabilities of the internet?
time and space
Maneuvering around, trying to access unprotected WiFi networks, is referred to as:
wardriving
According to the text, deep web sites can include all of the following EXCEPT:
websites that are searchable
The role of _______ hackers in the collaborator effort of cybersecurity is vital.
white hat
According to General Michael Hayden, a cybersecurity knowledge gap exists between:
youthful generation and older generation
The ________ Computer Emergency Response Team (CERT) investigated the cyber intrusion that became known as Moonlight Maze.
Air Force's
The internet refers to the virtual environment in which people communicate and interact with others.
False
The majority of critical infrastructure in the United States is owned by the public sector.
False
Which of the following is comparable to the address you would put on a letter to tell the postal service to deliver a letter to?
URL
Stealthy and evasive attack techniques that can stay undetected are characteristics of the _______ in an advanced persistent threat attack.
approach
Criminal knowledge that their efforts will likely lead to success because there are so many potential victims and so few barriers or oversight online best describes which internet gateway to vulnerability?
asymmetries of cyberspace
Hackers who are motivated by personal gain or a certain cause are often referred to as:
black hats
One of the most persistent threats for the United States in terms of cyberattacks originates in:
china
According to the text, cyberthreats originate mainly from all of the following entities EXCEPT:
hackers
Threats to cybersecurity originate from all of the following sources EXCEPT:
individual
Which layer of cyberspace includes the creation and distribution of information and interactions between users?
information layer
Which of the following are considered small programs or sections of a program triggered by some event such as a certain date or time, a certain percentage of disk space filled, or the removal of a file?
logic bombs
The IRS uses which of the following methods to contact a taxpayer?
Which of the following best represents the contribution of IPS to the modern internet?
smaller computers with greater capabilities
_______ is defined as unsolicited commercial e-mail that includes any commercial emails addressed to a recipient with whom the sender has no existing business or personal relationship and not sent with the consent of the recipient.
spam
Which of the following was NOT identified as a type of personal information that is sought out by identity thieves?
telephone number
______ is a global system of interconnected computer networks that are set up to exchange various types of data.
the internet