Cyber crime Midterm 1-5
Which of the following has NOT contributed to the increase in threats to mobile devices
Apple Inc. technology
______ occur when a computer system is accessed without permission.
Network intrusions
______ viruses infect data files.
macro
Which of the following was NOT identified as a type of personal information that is sought out by identity thieves?
telephone number
______ is a global system of interconnected computer networks that are set up to exchange various types of data.
the internet
According to the text, virus files typically end in ______.
.exe
According to the text, by the year 2020, the economic cost of cybercrime is expected to go above ______ trillion.
3
In 1988, the Defense Advances Research Projects Agency (DARPA) created the ______ with the goal of striving for a safer and stronger Internet for all Americans.
Computer Emergency Readiness Team
Which of the following defines the acronym URL?
Uniform Resource Locator
The Internet provides opportunities for criminals to cause significant damage with minimum resources. For example, in 2017, the WannaCry ransomware attack resulted in several billion dollars of damage. This best represents which vulnerability of the Internet?
asymmetries of cyberspace
______ is an interdependent network of information technology infrastructures including the Internet, telecommunications networks, and computer systems.
cyberspace
The ______, an underground web, allows offenders to stay anonymous and undetected, as these are not traceable by police.
dark net
In 2001, the original Code Red malware initiated a ______ attack on the White House.
denial of service
Cascade is an example of which of the following types of virus?
file infector virus
Consumer crimes that include identity theft, phishing scams, and spam fall within which of the following categories?
fraud and financial crimes
Which of the following themes within the cybersecurity conceptualization literature was NOT identified by Craigen and his team?
funding
Making mistakes that can lead to security vulnerabilities is also referred to as ______.
human error
In the ______ cluster, computer infrastructure and vulnerabilities are the focus of attacks.
human machine
Which of the following can be described as unidirectional, or that a user can link from their content to another website's content without asking for approval from the owner of the destination page?
hyperlink
According to the text, dams, railways, and power plants are considered ______.
infrastructures
Which of the following are considered small programs or sections of a program triggered by some event such as a certain date or time, a certain percentage of disk space filled, or the removal of a file?
logic bombs
The Internal Revenue Service uses which of the following methods to contact a taxpayer?
According to the text, phishing scams typically target ______.
personal information
E-mail-borne viruses took place in which of the following phases of convergence?
phase 2
______ refers to attacks where a mass email is sent to multiple computers, requesting personal information be sent to a specific location.
phishing
Per the 1998 Assumption Deterrence Act, the text identified all of the following types of punishment EXCEPT ______.
probation
Which of the following best represents the contribution of IPS to the modern Internet?
smaller computers with greater capabilities
All of the following are layers of cyberspace EXCEPT ______.
social layer
_____ is defined as unsolicited commercial e-mail that includes any commercial emails addressed to a recipient with whom the sender has no existing business or personal relationship and not sent with the consent of the recipient.
spam
The ______ is responsible for collecting and decrypting threats both physical and cyber via the use of Signal Intelligence.
the national security agency
____ are software programs or pieces of hardware that help screen out hackers, viruses, and worms that try to reach computers via the Internet.
firewalls
The most serious insider cybercrimes include all of the following EXCEPT ______.
harassment
Which of the following is NOT a behavior/method that falls under the category of cyberbullying?
inclusion
Threats to cybersecurity originate from all of the following sources EXCEPT ______.
individual
The use of computer networks and technologies as a means for conducting attacks that target critical national infrastructures or governmental assets has a psychological, social, political, or religious motive, causes harm to individuals or groups, or physically damages infrastructures is referred to as ______.
cyberterroism
A ______ refers to persons who attempt unauthorized access to a control system device and/or network using a data communications pathway.
cyberthreat
Which of the following was NOT identified as one of the main forms of international threats?
hacking or spying on city and local governments
In 2015, the most common crime reported to the Federal Consumer Commission was ______.
identity theft
_____ refers to all types of crime in which someone wrongfully obtains and uses another person's personal data in some way that involves fraud or deception, typically for economic gain.
identity theft
Botnets use ______ architecture in which each workstation has the same capabilities and responsibilities.
peer to peer
it is the _____ who have to create, implement, and enforce cybersecurity policies.
people
a _______ is a weakness in a product that could allow an attacker to compromise the integrity, availability or confidentiality of a product.
Security Vulnerability
______ is a weakness in a product that could allow an attacker to compromise the integrity, availability, or confidentiality of that product.
Security vulnerability
______ is a reference or navigation element in a hypertext document that offers direct access to another section of the same document or to another hypertext document that is on or part of a (different) domain.
Hyperlink
Which of the following is comparable to the address you would put on a letter to tell the postal service to deliver a letter to?
URL
Botnets typically infect computers via ______ or drive-by-downloads.
USBs
Which of the following was NOT identified as a recommendation for increasing automotive cybersecurity?
aesthetic design
The ______ of the Internet might be a concern for parents regarding who their children may be talking to online.
anonymity/identity
______ is a bacterial disease, weaponized in powder form, which was sent to various television studios and congressional offices via mail in the early 2000s.
anthrax
The creation of ______ has led to the creation of new hacking/fraudster built-in malware techniques that can target users via smartphones and tablets.
apps
In 2001, the first malware attack that fell into phase 3 of convergence was known as ______.
code red
The opportunity to create new businesses and markets online best describes which aspect of Internet development?
commercialization
which of the following is not a dominant theme within the cybersecurity conceptualization literature?
communications
Which of the following countermeasures recommends that companies must complete regular data backups?
complete regular updates
Which of the following was not identified as a countermeasure for networks in text?
data backup
Cyber terrorism attacks often take the form of ______.
denial of service attacks
Cyberterrorism attacks usually take the form of
denial of service attacks
Hackers with their abilities to research vulnerabilities in software products and disclose them to companies that developed the software are known as ______.
ethical hackers
People who are "tricked" by others into giving up access information or information about themselves to an external party are known as ______ insiders.
exploited
Which of the following is NOT considered a main type of insider threat?
feared
Hackers who are motivated by financial gains and who conduct both bad and ethical hacking are referred to as ______.
gray hats
______ typically work independently to expose security vulnerabilities or practices that endanger individuals' private data
gray hats
Which of the following laws does NOT apply to hackers?
hackers are evil people
Which of the following countermeasures helps prevent e-mail spoofing, that is, the forgery of an e-mail header to make it appear as if it is coming from a friend or employee?
implement message authentication
Countries concerned with controlling the flow of information and goods online would be most concerned with which of the following aspects of the Internet?
lack of barriers to entry
name the three threats to cybersecurity
local , international, national.
According to the text, cyberthreats originate mainly from all of the following entities EXCEPT ______.
local governments
Threats that originate from inside the company or organization are referred to as ______.
local threats
The ______ layer of cyberspace is best described as where the platform nature of the Internet is defined and created.
logic
3 types of insider threats
malicious, careless, exploited
The ______ technique, also referred to as a banking Trojan, operates in the background of the computer by modifying banking transactions.
man in the browser
The ______ technique targets file-sharing tools, such as Google Drive.
man in the cloud
The ______ technique targets devices that can be connected, such as car alarms, thermostats, etc.
man-in-the-IoT
The interception of a message by a third party is also referred to as a ______ attack.
man-in-the-middle
According to the text, human trafficking consists of all of the following elements EXCEPT ______.
outcome
Which of the following is NOT considered one of the main targets in information technology?
people
Profit, fame, and challenge are characteristics of the ______ in a traditional attack.
purpose
Work-for-hire hackers who work for private security corporations are also referred to as ______.
read teams
Phase 1 of convergence is also referred to as?
sneaker-ware
what negative affects does cyberstalking have on the victim?
social, physical, psychological
In the ______ cluster, computers are the target of the cybercrimes.
technological
Which of the following was NOT identified as a phase of convergence in the evolution of cybercrime?
technology takes over the world
what are the three phases of convergence
1. separate from people 2. leverage technology 3. replace people
Internet users generally struggle with identifying when their computer has been attacked. In order to quickly respond to a cyberattack on their system, a user would have to be able to overcome which of the following Internet threats?
1s and 0s
The Identity Theft Resource Center estimates that it takes on average ______ hours to repair the damage of identity theft.
600
more than __% of all american households were using the internet in 2013.
74
The ______ Computer Emergency Response Team (CERT) investigated the cyber intrusion that became known as Moonlight Maze.
Air Force's
Development of the ______ resolved issues with hierarchical host names making it easier for the average person to access the Internet.
DNS
in phase 2, fraudsters developed the first gmail born viruses such as what?
Iloveyou and the Melissa Virus
_____ became notorious for being the one of the first cybersecurity intrusions to illustrate how vulnerable our technology is to malicious infiltration.
Moonlight Maze
One of the most persistent threats for the United States in terms of cyberattacks originates in ______.
China
the internet was born during the _______ era.
Cold War
Stealthy and evasive attack techniques that can stay undetected are characteristics of the ______ in an advanced persistent threat attack.
approach
Which of the following was NOT identified as a way that criminals get information from their victims?
Criminals directly ask the victim for their personal information.
which of the following is not an attack method associated with wireless attacks?
WiFi eavesdropping
______ is a service that can be accessed via the Internet.
World wide web
______ is an encryption component that refers to a digital signature providing proof of authorship.
attribution
The least common but most costly is ______ insider threat.
malicious
All of the following are examples of social engineering EXCEPT ______.
spam
usually hacker communities are male dominated
true
Which of the Internet gateways to vulnerability can be described as the computer code of the Internet?
1s and 0s
All of the following are considered public sector entities EXCEPT ______.
FusionX
Hacking cars or other means of transportation, such as airplanes, is an example of a security issue seen in which of the following techniques?
Man in the Internet of Things
____ is defined as a collection of infected machines worldwide that receive commands and perform some illegal actions such as distributed denial of service attacks, among others.
a botnet
In 1998 Congress passed the Assumption Deterrence Act making identity theft ______.
a felony crime
____ viruses attach to the original code, changing the start-up information of the program.
add-on
Which of the following was identified as a software attack in the text?
drive by downloads
Which of the following represents a complete URL?
https://www.fbi.gov
Which of the following is NOT a characteristic of a URL?
hypertext
Which layer of cyberspace includes the creation and distribution of information and interaction between users?
information layer
Whereas in the past criminals had to physically approach their victims to carry out a crime, the Internet allows offenders to be in other states, or even continents, and still carry out the same crime. This best represents which of the following vulnerabilities of the Internet?
time and space
in 1958, the advanced research projects agency was created by who?
President Dwight D Eisenhower
which type of malware locks the operating system of the computer, due to the violation of U.S. Federal law?
Ransomware
Groups with displeasure of government are often motivated by all of the following EXCEPT ______.
aristocracy
Criminal knowledge that their efforts will likely lead to success because there are so many potential victims and so few barriers or oversight online best describes which Internet gateway to vulnerability?
asymmetries of cyberspace
According to the text, which of the following entities are considered a special target for botnets?
banks and financial institutions
Hackers who are motivated by personal gain or a certain cause are often referred to as ______.
black hats
In 1987, the ______ strengthened the security measures for online systems.
computer security act
Submarine Network Policy is used to secure devices at the ______ level.
corporate
Which of the following is NOT considered one of the main issues with cybersecurity?
cost of data
The inventors of the Internet likely didn't consider ______ during its development.
criminal abuse of the Internet
three reasons people commit cybercrimes
curiosity, ideological reasons, financial gain
The intentional, aggressive behavior toward another person that is performed through electronic means is also known as ______.
cyber bullying
critical _____ are extremely vulnerable to cyber attacks, making information sharing with the private sector imperative.
infrastructures
Human behavior that departs from compliance with established policies, regardless of whether it results from malice or a disregard for security policies, is the manifestation of a/an ______ threat.
insider
According to national surveys, ______ are the second greatest threat to a company's cybersecurity, only trumped by hackers.
insiders
logic bombs usually installed by
insiders
Which of the following risks is not created by Trojan horses?
internet slowdown
Multimedia message services viruses target ______.
mobile devices
Which of the following was NOT identified as a hardware device in the text?
modems
Which of the following types of attacks can also happen accidentally?
noisy neighbor
A ______ malware is disguised as, or embedded within, legitimate software
trojan horse
According to the Federal Trade Commission, all of the following are ways that consumers can prevent identity theft EXCEPT ______.
using easy passwords
A ______ is a small software program designed to spread from one computer to another and to interfere with computer operation.
virus
According to General Michael Hayden, a cybersecurity knowledge gap exists between ______.
youthful generation and older generation
the exchange of insults in a public setting, such as a bulletin board or chat room, is known as ______.
flaming
What is the worm that originated from Russia that costed $38 billion?
My Doom
According to the text, the Internet was built to be a free and open access tool. Which of the following best represents this concept?
Napster
______ allowing individuals to access secured networks without the owners' knowledge is also known as a backdoor.
Rogue access points
The role of the ______ was extended in the Cybersecurity Enhancement Act of 2014.
Secretary of Commerce
Which of the following characteristics of hackers is NOT true?
The members meet each other quite often.
The "bad guy" hackers are known as ______.
black hats
Edward Snowden, an American computer professional, provided all of the following tips for keeping data private EXCEPT ______.
decrypt your phone calls and text messages
All of the following were identified as vulnerable infrastructures EXCEPT ______.
education