Cybersecurity

¡Supera tus tareas y exámenes ahora con Quizwiz!

According to the text, human trafficking consists of all of the following elements EXCEPT:

outcome

______ is a weakness in a product that could allow an attacker to compromise the integrity, availability, or confidentiality of that product.

security vulnerability

The posting of harassing messages aiming to cause harm to the victim is also known as:

denigration

Internet users generally struggle with identifying when their computer has been attacked. In order to quickly respond to a cyberattack on their system, a user would have to be able to overcome which of the following internet threats?

1s and 0s

According to the text, by the year 2020, the economic cost of cybercrime is expected to go above:

3 trillion

According to the text, the surface web only accounts for about _______ percent of all the Internet.

4

The surface web is often compared to the tip of the iceberg of the Internet, as the deep web is _____ bigger than the surface web.

400-500

Which of the following differential association theory points was not proposed by Edwin Sutherland?

Behavior is learned the best in larger social groups.

The ______ creates a cybersecurity information sharing system for public and private entities.

Cybersecurity Information Sharing Act of 2015

According to the text, logic bombs are typically installed by outsiders of an organization or corporation.

False

Criminals as well as average internet users are good at hiding their identifying information online.

False

______ is often referred to as a peer-to-peer platform for censorship-resistant communication and publishing.

Freenet

Which of the following laws does NOT apply to hackers?

Hackers are evil people

Some people have suggested applying the ______ to cybercrimes, because they are similar in that there is often no clear jurisdiction.

Law of the Sea

Which of the following was NOT identified in the text as an example of a research tool and database located on the deep web?

LexisNexis

______ has become one of the most feared threats to cybersecurity.

Ransomware

Which of the following characteristics of hackers is NOT true?

The members meet each other quite often

Consumer crimes are deceptive practices that result in financial or other losses for consumers in the course of seemingly legitimate business transactions.

True

Cyberattacks are cheap and unconstrained by geography and distance to the target.

True

insiders are people who are current or former employees of a company, contractors, or friends of employees.

True

The collection and analysis of information that produces timely reporting, with context and relevance to a supported decision-maker, is referred to as:

cyberintelligence

An intentional act, committed via computer or communication system and motivated by political, religious, or ideological objectives, against information, data, or computer systems/programs, intended to cause severe harm, death, or destruction to civilians, is referred to as:

cyberterrorism

A _______ refers to persons who attempt unauthorized access to a control system device and/or network using a data communications pathway.

cyberthreat

Cyber terrorism attacks often take the form of:

denial-of-service attacks

According to the text, China also engages in economic ______ against the United States and other countries.

espionage

In 1987, the ________ strengthened the security measures for online systems.

Computer Security Act

The opportunity to create new businesses and markets online best describes which aspect of internet development?

commercialization

Which of the following countermeasures recommends that companies must complete regular data back up?

complete regular updates

Edward Snowden, an American computer professional, provided all of the following tips for keeping data private EX

decrypt your phone calls and text messages

Which of the following is NOT considered a main type of insider threat?

feared

The Economic Espionage Act of 1996 makes it a _______ to steal or interfere with trade secrets.

federal crime

MMS viruses can disrupt phone service, steal information, block data, and track the users' movement.

True

One of the oldest reasons for threats of harm by nation-states is power.

True

Helping people and the community return to normal, if possible, is a part of:

recovery

Systems utilized by many of the nation's critical infrastructures to provide automated control of the function of the infrastructure are referred to as:

supervisory control and data acquisition systems

Undocumented, nonmalicious, surprises installed on a program by the creator are referred to as:

Easter eggs

Encryption and going dark is a relatively new invenetion

False

According to the text, the internet was built to be a free and open access tool. Which of the following best represents this concept?

Napster

According to the text, cyberwarfare generally includes which of the following?

cyberespionage and cybersabotage

ISIS and the operators have utilized technological advances such as social media to do all of the following EXCEPT:

denounce themselves

Asserting that criminal behavior is learned via intimate personal groups is

differential association theory

The first "software" was the Morse code developed by Samuel F.B. Morse. The Morse code made telegraphing much easier by using:

dots and dashes

According to the text, some of the most popular products advertised on the hidden wiki are:

drugs

The _______ prohibited the bulk collection of digital information.

USA Freedom Act

Botnets typically infect computers via _______ or drive-by-downloads.

USBs

All of the following were identified as vulnerable infrastructures EXCEPT:

education

Which of the following critical infrastructures was NOT a focus of the Network and Information Security

education

Which of the following cyber terror attacks was NOT identified by the National Association of Regulatory Utility Commissioners?

education

Which of the following was NOT identified as sectors of critical infrastructure?

education sector

Economic cyberespionage is typically carried out by all of the following EXCEPT:

individual actors

Entities that have resources to put toward security and many not be subjected to the scrutiny and restrictions are usually in the:

private sector

Per the 1998 Assumption Deterrence Act, the text identified all of the following types of punishment EXCEPT:

probation

The ______ has the responsibility to coordinate federal, state, and local governments, laboratories, critical infrastructure owners and operators, and other entities to accomplish goals pertinent to the National Cybersecurity and Critical Infrastructure Protection Act of 2014

secretary of state

Which of the following was NOT identified as one of the main forms of international threats?

hacking or spying on city and local governments

Assessing critical assets that need to be protected, such as trade secrets to determine what receives the highest priority, is a component of:

identifying sensitive information

In 2015, the most common crime reported to the Federal Consumer Commission was:

identity theft

In 2015, a cyberattack was launched against Ukraine by the Russians. The ________ attack to shut down the power grid based in Russia was possibly backed by the Russian government.

killdisk

The first responders to most catastrophic events are usually at the _______ level.

local

China is known to prioritize ______ control over cyber defense strategies.

political information

Efforts to identify threats, determine vulnerabilities, and identify required resources is known as:

preparedness

Examining trends that are necessary for crime to occur is an element of:

routine activity theory

Which of the following systems led to the creation of the Morse code?

telegraph system

According to the Federal Trade Commission, all of the following are ways that consumers can prevent identity theft EXCEPT:

using easy passwords

According to the text, three aspects must be taken into account to determine risk: the threat, the asset, and the:

vulnerability

Sites on the ToR network end in ______, but if you were to type the web address into Google, the website would not be found.

.onion

Outsiders in the hacker subculture who do not have the skills and use prewritten programs are referred to as:

script kiddies

Which of the following cyber terror attack targets was NOT identified by the National Association of Regulatory Utility Comissioners?

sport arenas

On average, Google accesses _______ percent of the surface web.

16

The _______ requires the secretary of homeland security to assess the work of the cybersecurity workforce of the Department of Homeland Security and develop a comprehensive strategy to improve the readiness and quality of the cybersecurity workforce.

Cybersecurity Workforce Act 2014

According to the text, cyberattacks focus mainly on the destruction of sensitive information

False

Which of the following risks is not created by Trojan Horses?

Internet slowdown

_______ is defined as a collection of infected machines worldwide that receive commands and perform some illegal actions such as distributed denial of service attacks, among others.

a botnet

The Syrian Electronic Army has been responsible for attacks against which of the following?

all of the above

According to the text, it is extremely difficult to do which of the following?

all of these

This difference in _________ convictions greatly hampers the development of universal enforcement rules.

all of these

The ______ of the internet might be a concern for parents regarding who their children may be talking to online.

anonymity/identity

Groups with displeasure of government are often motivated by all of the following EXCEPT:

aristocracy

Two of the most popular forms of cryptocurrency are:

bitcoin and dash

Which of the following types of cryptocurrency claims to improve on bitcoins by offering an enhanced level of security?

dash

A _______ malware is disguised as, or embedded within legitimate software where it installs itself and runs automatically once it is downloaded.

Trojan Horse

The Syrian Electronic Army has collected information using which of the following cyberattack techniques?

Trojan Horses

The term terrorism refers to a tactic.

True

Which of the following countries is known to be the most advanced with regard to computers, hardware, and software?

United States

Hacker subcultures may consist of various identifying factors. Which of the following is NOT likely to be one of those factors?

a dislike for information technology

In 1998 Congress passed the Assumption Deterrence Act making identity theft:

a federal crime

_______ may use ToR for competitions, keeping strategies secret, and internal accountability.

businesses

The Darknet Silk Road runs like a black market ________ site for drugs, drug paraphernalia, and other goods and services.

eBay-type

An act that occurs when an actor, knowing that his or her actions will benefit any foreign government, instrumentality, or agent, steals, copies, or receives a trade secret is referred to as:

economic espionage

All of the following are components of the impact element EXCEPT:

economic gain

Which of the following was NOT identified as one of the components of the motivation element?

economical

People who are "tricked" by others into giving up access information or information about themselves to an external party are known as ______ insiders.

exploited

There is a universal definition of terrorism in the United States and in the international community.

false

Which of the following was identified as a sector of critical infrastructures?

financial services sector

The exchange of insults in a public setting, such as a bulletin board or chat room, is known as:

flaming

Consumer crimes that include identity theft, phishing scams, and spam fall within which of the following categories?

fraud and financial crimes

Which of the following was NOT identified as an entity that must collaborate and cooperate in order to enhance cyberterrorism deterrence?

hackers

The most serious insider cybercrimes include all of the following EXCEPT:

harassment

The ____ layer of cyberspace is best described as where the platform nature of the internet is defined and created.

logic

The least common but most costly is _______ insider threat.

malicious

The ______ technique target file-sharing tools, such as Google Drive

man-in-the-cloud

The ___ technique target devices that can be connected, such as car alarms, thermostats, etc.

man-in-the-internet of things

Botnets use _______ architecture in which each workstation has the same capabilities and responsibilities.

peer-to-peer

According to the text, phishing scams typically target:

personal information

Which of the following was identified as a tool of attack in the conceptual framework of defining cyberterrorism?

psychological operation

Examples of proprietary information include all of the following EXCEPT:

public records

Profit, fame, and challenge are characteristics of the _____ in a traditional attack.

purpose

work-for-hire hackers who work for private security corporations are also referred to as:

red teams

The conceptual framework that encompasses the definition of cyberterrorism includes all of the following elements EXCEPT:

results

All of the following are layers of cyberspace except

social layer

The uncontrollable nature of ______ poses great challenges to coordinating effective federal and state law enforcement responses to cyberattacks and terrorist acts.

social media

All of the following are examples of social engineering EXCEPT:

spam

An ethnic, regional, economic, or social group exhibiting characteristic patterns of behavior sufficient to distinguish it from others within an embracing culture or society is referred to as a:

subculture

According to the text, low socioeconomic status is a predominate marker for engaging in crime in:

subculture theory

according to the text, low socioeconomic status is a predominate marker for engaging in crime in:

subculture theory

According to the text, the most pervasive cyberthreat may be:

theft of intellectual property

Which fo the Internet gateways to vulnerability can be described as the computer code of the internet?

1s and 0s

_______ is an encryption that refers to a digital signature providing proof of authorship.

Attribution

____ is an interdependent network of information technology infrastructures include the internet, telecommunications networks, and computer systems.

Cyberspace

Development of the _______ resolved issues with hierarchal host names making it easier for the person to access the internet.

DNS

In 2001, the original Code Red malware initiated a _____ attack on the White House

Denial of Service

The leading agency for investigating cyberattacks by criminals, overseas adversaries, and terrorist is known as the:

FBI

A cybercall is defined as an incident, or an attempt to cause an incident, that if successful would deny access to or degrade, disrupt, or destruct such a system or network.

False

_______ refers to all types of crime in which someone wrongfully obtains and uses another person's personal data in some way that involves fraud or deception, typically for economic gain.

Identity theft

Hacking cars or other means of transportation, such as airplanes, is an example of a security issues seen in which of the following techniques?

Man in the Internet of Things

______ may use ToR to protect sources, resources, and report from areas where it is dangerous.

Media

Which of the following countries was not identified as being one of the strong actors in world politics?

Mexico

Although multiple agencies play a role in our nation's cybersecurity, leading the way is the:

National Security Agency

The _____ is a primarily responsible for intelligence interception and interpretation/decryption.

National Security Agency

In 2016, the European Union passed the ______ establishing the first actual cybersecurity rules.

Network and Information Security Directive

The terrorist organization Boko Haram, also known as Jama'atu Ahlis Sunna Lidda'awati wal-Jihad, is from:

Nigeria

The hidden wiki is a popular way to search the darknets. It acts as a search engine for illicit good, products and services.

True

The holistic approach emphasizes that neither technology nor policies in themselves can effectively address the myriad of cyberthreats.

True

Which of the following is not an example of a cyberattack used by the Syrian Electronic Army?

Moonlight Maze

Cyberespionage can be classified into which of the following types?

both economic and political

_____ viruses infect data files

Macro

The surface web, which is available via regular search engines, is hosted by all of the following browsers EXCEPT:

Onion router

The Strategic Support Force intelligence unit is a part of which of the following?

People's Liberation Army

E-mail borne viruses took place in which of the following phases of convergence?

Phase 2

_____ is a service that can accessed via the internet.

World Wide Web

Cyberterror attacks may be conducted in a variety of ways EXCEPT:

creating hardware to prevent intrusions

The inventors of the internet likely didn't consider _______ during its development.

criminal abuse of the internet

Which of the following was NOT identified as a way that criminals get information from their victims?

criminals directly ask the victim for their personal information

Existing only in the digital arena, ______ is/are the only way that purchases on the deep web can be made in anonymity.

cryptocurrency

The intentional aggressive behavior toward another person that is performed through electronic means is also known as:

cyberbullying

Human behavior that departs from compliance with established policies, regardless of whether it results from malice or a disregard for security policies, is the manifestation of a/an _______ threat.

insider

According to national surveys, ______ are the second greatest threat to a company's cybersecurity, only trumped by hackers.

insiders

Historically, power has depended on which of the following strengths?

military

Solving complex mathematical puzzles every 10 minutes is a task usually seen with:

mining

Heightened inspections, improved surveillance, public health/agriculture testing, immunizations, and law enforcement operations to deter/disrupt illegal activity and apprehend perpetrators are ways to:

mitigate

Boko Haram has become more active on social media since 2015 when it established a/an _______ account.

twitter

According to the text, virus files end in:

.exe

Which of the following was NOT identified as one of the main issues associated with cyberespionage?

Nation-states and crime organizations never use independent hackers to avoid being associated with a cyberattack.

GhostNet was one of the most successful programs with regard to _______ cyberespionage.

political

The Identity Theft Resource Center estimates that it takes on average _____ hours to repair the damage of identity theft.

600

The _______ provided the basis for a comprehensive cyber security strategy.

Comprehensive National Cybersecurity Initiative

The Cybersecurity Information Sharing Act of 2015 calls for the cooperation of all of the following EXCEPT the:

president

The ________ proved to be symbolic legislation that assures the public that the international community is taking steps to combat cybercrime and the treat of a cyberwar.

Budapest Convention on Cybersecurity

n conjunction with local and tribal agencies, the Department of Homeland Security works to do all of the following EXCEPT:

prevent threat warnings from becoming public knowledge

Which of the following is NOT considered a portal of the darknet?

safari

According to the text, cybercrime only has one layer.

False

An individual who doesn't have the skills to hack on his/her own so uses prewritten programs to do so is referred to as dumpster diver.

False

Malicious insiders may delete or expose sensitive information by incident - either by pressing a wrong key or by other errors.

False

In 2014, President Obama attributed the Sony hack to the North Korean government and raised the issue of foreign obstruction of _______ Amendment rights in the United States.

First

A health tracker is an example of a device that can be used in the _______ technique.

Man-in-the-loT

Telephonic activities were defined much broader than most people would have expected by the:

National Security Agency

The electrical grid is a significant target because it is not just a U.S. infrastructure. It is also known as the:

North American grid

_______ was originally developed by the U.S. Naval Research Laboratory as a method of anonymous communication.

Onion Router (ToR)

Which of the following countries is considered one of the most advanced cyberespionage powers?

Russia

Low probability that the criminal will get caught and convicted and public exposure are some of the reasons as to why so few victims report the crimes.

True

The internet was originally guilt to be a free and open source, with minimal oversight.

True

Which of the following defines the acronym URL?

Uniform Resource Locator

On the darknet, prices are listed in _____ and are shipped to remote addresses or P.O. boxes.

bitcoins

The conceptual framework that encompasses the definition of cyberterrorism includes all of the following elements under target EXCEPT:

civilian homes

The use of computer networks and technologies as a means for conducting attacks that target critical national infrastructures or governmental assets has a psychological, social, political or religious motive, causes harm to individuals or groups, or physically damages infrastructures is referred to as:

cyberterrorism

According to RAND, actions by a nation-state or international organization to attack and attempt to damage another nation's computers or information networks is referred to as:

cyberwarfare

Hackers with their abilities to research vulnerabilities in software products and disclose them to companies that developed the software are known as:

ethical hackers

______ is a reference or a navigation element in a hypertext document that offers direct access to another section of the same document or to another hypertext document that is on part or part of a (different) domain.

hyperlink

Which of the following countermeasures helps prevent e-mail spoofing, that is, the forgery of an e-mail header to make it appear as if it is coming from a friend or employee?

implement message authentication

According to the text dams, railways, and power plants are considered:

infrastructures

Countries concerns with controlling the flow of information and goods online would be most concerned with which of the following aspects of the internet?

lack of barriers to entry

Threats that orginate from inside the company or organization are referred to as:

local threats

________ refers to attacks where a mass email is sent to multiple computers, requesting personal information be sent to a specific location.

phishing

Whereas in the past criminals had to physically approach their victims to carry out a crime , the Internet allows offenders to be in other states, or even continents, and still carry out the same crime. This best represents which of the following vulnerabilities of the internet?

time and space

Maneuvering around, trying to access unprotected WiFi networks, is referred to as:

wardriving

According to the text, deep web sites can include all of the following EXCEPT:

websites that are searchable

The role of _______ hackers in the collaborator effort of cybersecurity is vital.

white hat

According to General Michael Hayden, a cybersecurity knowledge gap exists between:

youthful generation and older generation

The ________ Computer Emergency Response Team (CERT) investigated the cyber intrusion that became known as Moonlight Maze.

Air Force's

The internet refers to the virtual environment in which people communicate and interact with others.

False

The majority of critical infrastructure in the United States is owned by the public sector.

False

Which of the following is comparable to the address you would put on a letter to tell the postal service to deliver a letter to?

URL

Stealthy and evasive attack techniques that can stay undetected are characteristics of the _______ in an advanced persistent threat attack.

approach

Criminal knowledge that their efforts will likely lead to success because there are so many potential victims and so few barriers or oversight online best describes which internet gateway to vulnerability?

asymmetries of cyberspace

Hackers who are motivated by personal gain or a certain cause are often referred to as:

black hats

One of the most persistent threats for the United States in terms of cyberattacks originates in:

china

According to the text, cyberthreats originate mainly from all of the following entities EXCEPT:

hackers

Threats to cybersecurity originate from all of the following sources EXCEPT:

individual

Which layer of cyberspace includes the creation and distribution of information and interactions between users?

information layer

Which of the following are considered small programs or sections of a program triggered by some event such as a certain date or time, a certain percentage of disk space filled, or the removal of a file?

logic bombs

The IRS uses which of the following methods to contact a taxpayer?

mail

Which of the following best represents the contribution of IPS to the modern internet?

smaller computers with greater capabilities

_______ is defined as unsolicited commercial e-mail that includes any commercial emails addressed to a recipient with whom the sender has no existing business or personal relationship and not sent with the consent of the recipient.

spam

Which of the following was NOT identified as a type of personal information that is sought out by identity thieves?

telephone number

______ is a global system of interconnected computer networks that are set up to exchange various types of data.

the internet


Conjuntos de estudio relacionados

Quizlet #7 - Chapter 13 -> Deductive Reasoning

View Set

Chp 3 Life policy options, Provisions and Exclusions

View Set

From: "The Meaning of Social Entrepreneurship" at https://entrepreneurship.duke.edu/news-item/the-meaning-of-social-entrepreneurship/ AND Chapter 10, Innovation and Entrepreneurship Toolkit

View Set

Med-Surge (Upper Respiratory EAQ)

View Set

NG304- Practice question Exam 1 - Chapter 8,9,10,11,2,3,4,5,6,7

View Set

Jensen's Health Assessment 3rd Ed. | Chapter 13

View Set