Cyber Crime Midterm

Pataasin ang iyong marka sa homework at exams ngayon gamit ang Quizwiz!

What is a Botnet?

A botnet refers to a group of computers which have been infected by malware and have come under the control of a malicious actor.

Basically, a botnet is a network of infected computers which, under the command of a single master computer, work together to accomplish a goal. A Botnet relies on which of the following?

A large network of infected devices, known as "zombies." b.Someone to command the botnet who may be referred to as a "Bot Herder."

Which of the following best describes a "Script Kiddie?"

A person that does not have enough skill to write their own programs so they download attack programs

The best definition of a cyber criminal is which of the following?

A person who utilizes the Internet, computers, and related technology in the commission of a crime.

Lifetime Phones

A phone that has been reprogramed through its own keypad so that wireless bills are charged to someone else.

Tumbler Phone

A wireless phone that tumbles through a series of ESNs and makes the caller appear to be another new customer each time a call is made.

Which of the following are good practices in reporting Cyber Harassment in addition to Informing the offender that these messages are not wanted?

All of the above choices are good practices for reporting Cyber Harassment.

Crimeware Cocktails are best described by which of the following?

Blended threats combine the characteristics of more than one type of malware.

Trade Mark

Branding such as marks, logos, or slogans.

The Three Computer Crime categories are?

Computer (device) as the target, computer (device) is the tool, and computer (device) is incidental to the crime.

Contract

Contract defined items such as technology and business information.

Which of the following is the BEST ANSWER to the creation of the Internet.

Created (further developed) by the Department of Defense to facilitate communications during the Cold War

Copyright

Creative work such as software, films, music, or websites.

Select the most common way identity theft victim information is used from the following choices.

Credit card fraud.

ESN

Electronic Serial Number

Which of the following is FALSE about email harassment?

Email harassment is NOT a type of cyber harassment per Google.

T/F: A Brute Force Attack is a method to gain access to a site, server, or anything that is password protected and is only utilized against online targets.

FALSE

T/F: According to the FBI Internet Crime Complaint Center (IC3) only 50% of cyber crimes are reported.

FALSE

T/F: Drive-by downloads happen when you drive around looking for available public WiFi networks to download illegal items such as child pornography.

FALSE

T/F: Fencing is the sale of stolen goods, buying from thieves and selling to (often) unsuspecting buyers at a higher price. E-fencing is the sale of electronic items over the internet.

FALSE

T/F: In general, a "virus" is a program and a "worm" is a code but these terms get all mixed up.

FALSE

T/F: In order to commit a cyber crime, you need the ability to design and implement malicious software or code?

FALSE

T/F: Most computer crimes are prosecuted

FALSE

T/F: Remote Access Tool is a piece of software used to remotely access or control a computer and they are 100% illegal.

FALSE

T/F: Spyware is the kidnapping of digital Information and the demand for money for the return of the information.

FALSE

T/F: The Surface web is the largest part of the web comprising of over 90% of the information on the web.

FALSE

T/F: The Uniform Crime Reporting Program (UCR) and the National Incident Based Reporting System (NIBRS) are the primary official source of crime data (not counting the "NCVS" victim survey) in the United States but unfortunately, they do not track any categories of cyber crime.

FALSE

T/F: The Utilitarian Perspective of punishing cyber criminals focuses on retribution whereby cyber criminals get their "just deserts."

FALSE

T/F: The current Uniform Crime Reports (UCR) tracks identity theft offenses and includes several specific subcategories of identity theft

FALSE

T/F: Using an encrypted browser such as I2P or FreeNet completely protects the device or user against malware, identity theft, and accidentally committing a crime when searching on the Dark Net?

FALSE

T/F: While ransomware can make money, the amount gained never exceeds the amount stolen in the average U.S, bank robbery according to the FBI.

FALSE

Which of the following organizations is the lead federal agency in the U.S. for investigating cyber attacks by criminals, overseas adversaries, and terrorists?

Federal Bureau of Investigation (FBI)

Which of the following best describes a hacker who typically behaves in an ethical manner, but sometimes violates accepted ethics?

Grey Hat Hacker

Subscriber fraud occurs when someone signs up for service with fraudulently obtained customer information or false identification. Subscriber fraud goes hand in hand with what type of crime.

Identity theft

Which of the following is/are the most TRUE about identity theft?

Identity theft may include theft of a victim's real identity. Identity theft may include the theft of a victim's virtual identity.

Esoteric biometrics

Include an analysis of body odor, gait, +

Phishing

Involves fraudulent e-mails seeking information such as Nigerian 419 letter

Which of the following refers to using software to record everything a person types on their keyboard and then sends the log file to a specified server controlled by another person?

Keylogging

Cloned Phone

Loading a captured ESN or MIN into a cellular phone.

Which of the following best describe a "macro virus?"

Macro viruses take advantage of macro languages built into common systems of business software, most notably Microsoft Office.

Low Biometrics

Measures distinct features that have a reasonable level of accuracy (e.g., hand geometry, face recognition, voice recognition, and signature recognition).v

High Biometrics

Measures physical characteristics of high accuracy (e.g., retina, iris, and fingerprints).

MIN

Mobile Identification Number

Which of the following is FALSE regarding internet trolls?

None of the answers are false regarding internet trolls. They are all true.

Smishing

Phishing via a text or SMS message.

Which of the following best describes a "Logic Bomb?"

Programs designed to execute (or "explode") under certain conditions

Which of the following is FALSE regarding addressing cyber crime?

Prosecutors place significant resources into cyber crime investigations and prosecutions

Which of the following statements are TRUE about ransomware?

Ransomware employed at the behest of state actors may be designed primarily to cause disruption versus pure revenue generation.

Pharming

Redirecting the connection from legitimate IP address to redirect to a fake or malicious site

Browser hijacking is a form of unwanted software that modifies a web browser's settings without a user's permission to inject unwanted advertising into the user's browser. A browser hijacker may do which of the following?

Replace the existing home page, error page, or search engine with its own.

Trade Secrets

Secrets of value including private technology and formulas.

Spoofing

Soliciting funds via false, but apparently authentic, communications.

T/F: A "shell company" is a fraudulent or fictitious company

TRUE

T/F: A Trojan horse is commonly an unauthorized program contained within a legitimate program that performs functions unknown by the user.

TRUE

T/F: An "Insider Threat" is a who has or had legitimate access to an organization's computing environment and uses their access to commit crimes including corporate and industrial espionage.

TRUE

T/F: Biometrics data added to ID cards greatly assists in uncovering false IDs and may include fingerprints, iris scans, and voice prints.

TRUE

T/F: BlockChain.com is a website where you can manage your cryptocurrencies?

TRUE

T/F: Both '"mortgage fraud" and "air loans" are methods of defrauding banks and lending institutions by tricking them into giving loans for properties that are not actually up for sale (or even exist).

TRUE

T/F: Cyber Harassment is committing the crime of harassment through the use of the Internet, computers, and/or related technology.

TRUE

T/F: Email bombs are when hackers flood email account servers with thousands of messages, rendering them unable to accept or send mail.

TRUE

T/F: Four common forms of Interpersonal forms cyber crime include cyber bullying, cyber harassment, cyber stalking, and cyber predation.

TRUE

T/F: Insider fraud costs U.S. businesses more than $40 billion per year and employee theft plays a role in a significant percentage of business failures.

TRUE

T/F: Intellectual property is a work or invention that is the result of creativity, such as a manuscript or a design, to which one has rights and for which one may apply for a patent, copyright, trademark, etc.

TRUE

T/F: One international source of cyber crime measurement is the United Nations Office on Drugs and Crime (UNODC) who prepare a Comprehensive Study on Cybercrime (periodically)and maintain a "Repository" of Cyber Crime information

TRUE

T/F: One unfortunate reason that some victims of cyber bullying fail to report their victimization is the fear that the device which transmits the offending messages such as their smart phone will be taken from them.

TRUE

T/F: Originally, a hacker was a term of respect, used among computer programmers, designers, and engineers who might have illegally intruded into a system or computer but their intent was not to harm or steal.

TRUE

T/F: Professor Smith became a victim of cyber crime when in April, 2015, the United States Office of Personnel Management (OPM) security clearance files were hacked. The files contained extremely personal information used to grant government security clearances.

TRUE

T/F: The Surface Web is the public or visible web.

TRUE

T/F: The current state of computer security and cyber crime has basically become an "arms race" between software developers and anti-virus software developers on the one side and malicious hackers on the other side trying to exploit every security flaw for their own purposes or enjoyment

TRUE

T/F: The only way to hack or crack into a system is through the use of computer or device related technology.

TRUE

T/F: The term cracker was originally used to describe a malicious hacker who intrudes with criminal intent but today the term hacker may be also applied to somebody engaging in malicious or criminal instructions of a computer or device.

TRUE

T/F: There are many definitions of cyber crime but the International Association of Chiefs of Police (IACP) defines cyber crime as any crime conducted via the Internet, network or digital device.

TRUE

T/F: VPN stands for a Virtual Private Network and is commonly utilized as a way not to share information with websites

TRUE

T/F: Viruses may be the most recognized form of malware

TRUE

T/F: When some argue that cyber bullying is an example of freedom of speech, other argue that freedom of speech has NEVER been an absolute right and that freedom of speech is not the same as freedom to abuse.

TRUE

Which of the following is FALSE regarding the Chinese and Intellectual Property (IP)?

The Chinese, especially their governmental research and development programs, have reached the point they no longer need to steal ideas from other countries' businesses and governments.

Which of the following webs do many users employ the dedicated browser "The Onion Router" (Tor) to search for both legal and illegal content and items?

The Dark Web

The Deep Web is BEST described by which of the following?

The biggest part of the web (90% or more)

The cyber crime technique of "skimming" is best described by which of the following?

The electronic lifting of the full track data encoded on the magnetic stripe of a card such as a credit or debit card

Which of the following is FALSE concerning a scam to micro charge credit cards outlined in the course slides?

The scam ended after four years when about 50% of the account holders who had been micro charged complained about the charges.

Which of the following are FALSE about the web site market "Silk Road?"

The site owner, Ross Ulbricht, was found not guilty for crimes committed on his site.

Denigration

This action involves posting information about another that is disparaging and untrue.

Harassment

This cyber form of bullying entails repetitive messages, generally offensive to the recipient.

Flaming

This negative behavior occurs in a public setting, such as a chat room or discussion board, and is a brief exchange of insults between two or more parties

Exclusion & ostracism

This term describes when victims are rejected from their peer group and left out of technological communications.

Outing & Trickery

This type of cyber bullying refers to the "unauthorized" sharing of personal information with others.

Which of the following cyber malware CANNOT replicate?

Trojan Horses

Which of the following are TRUE regarding the Uniform Resource Locator commonly referred to an "URL?"

URLs are a unique identifier to a specific site on the Internet.

Clickjacking or User Interface (UI) Redress describes malicious websites (or legitimate ones that have been compromised) that lay an invisible frame over the site you see - complete with invisible buttons that can cover existing buttons. Any click the unsuspecting victim might execute could initiate actions the victim had no idea they were completing. Select the best answer to explain the reasons for clickjacking?

Unlock computer or device cameras and microphones b. Collecting fake Facebook likes c. Generate revenue d. All of the above (correct answer)

Which of the following are types or categories of malware?

Viruses and worms.

When hackers create false or shadow copies of legitimate Web sites that look just like the real ones (same pages and links) which the hacker utilizes to funnel all network traffic between the victims' browsers and the spoofed sites through the hacker's machine is known as which of the following?

Web or IP Spoofs

On JAN 4, 2020, the website of the Federal Depository Library Program (FDLP) was defaced with pro-Iranian, anti-US messaging showing President Trump being punched by an "Iranian Fist" in response to the JAN 3, 2020, U.S. airstrike in Iraq that killed Iranian Revolutionary Guard Gen. Qassem Soleimani. Which of the following terms best describes this type of cyber crime?

Web site defacement

Which of the following is FALSE regarding "malware?"

While the use of malware is extensive, it is always easy and inexpensive to remove and repair.

Routine Activities Theory (RAT) claims that crime is increasingly likely to occur when the following three factors occur together, at the same time, in the same space: 1.A motivated offender 2.A suitable target 3.Lack of a capable guardianship Which of the following answers apply the most to Routine Activities Theory?

Without adequate software protection there is a lack of capable guardians to protect people from digital crime. b.There are motivated cyber crime offenders such as hackers, all over the world. c.The rapid expansion of cyber related technology has increased the number of potential targets. d. All of the above may apply to Routine Activities Theory (CORRECT ANSWER)

Rootkits are a type of malware that are designed so that they can remain hidden on your computer. Which of the following is FALSE about rootkits.

You may accidentally download a rootkit through an infected mobile app but they cannot be hidden inside a downloaded file.

Which of the following are potential problems when using open wireless networks?

a. Networks may be left open intentionally in hotels, airports, coffee shops, etc., for customer use. b. These businesses will generally not keep track of who their network users are. c. Cyber criminals may use these open networks to commit crimes such as child pornography, etc. d. All of the above (correct answer)

Commercial espionage is the theft of intellectual property (IP) for gain or advantage. Which of the following answers describes any name or names that refer to commercial espionage? :

all of the above

While online dating sites have become commonplace and many people have found legitimate relationships though various sites, there are online dating and relationship scams. Which of the following are examples of these types of fraud? Select the best answer.

d. All of the above are examples of dating or romance fraud.

A cloned phone may be sold and used until...

service has ended


Kaugnay na mga set ng pag-aaral

Chapter 3 World Population and Global Inequality

View Set

Civil Rights and Civil Liberties

View Set

AP Human Geography: Agriculture Vocabulary

View Set

5 M's & "S" of the Industrial Revolution

View Set

Key Events of the American Revolution

View Set

Chemistry 1000 Tri C Midterm Chapters 1-8

View Set