Technology & Cybercrime Final
What is the name of the US bill that failed to pass in 2012 in order to combat rates of piracy and counterfeiting?
Child Online Protection Act The Megan Meier Act ---> Stop Online Piracy Act none of the above
Digital evidence only has a role in the analysis and prosecution of cybercrime.
False
What is the term used to refer to the organization of a hard drive into separate storage spaces?
extracting ---> partitioning wiping carving
What is the name of the malware used to compromise and harm uranium enrichment facilities in Iran?
Code-Red ---> Stuxnet Cryptolocker LOIC
Criminological theorists have yet to consider how socio-economic backgrounds affect the risk of cybercrime victimization and offending behaviors.
True
What is the term used to refer to files that have been manipulated in order to conceal the contents of the original file?
cleaned files wiped files deleted files ---> hidden files
What standard recognizes that scientific evidence can only be admitted if it is generally viewed as reliable by the scientific community?
---> Frye standard Daubert standard Evening standard none of the above
What US government agency operates the Computer Forensic Tool Testing Project?
---> National Institute of Standards and Technology (NIST) National Security Agency (NSA) Internet Crime Complaint Center (IC3) Action Fraud
Which of the following anonymization tools have been targeted by law enforcement to better identify cybercriminals?
---> Tor Proxify Spotify Hushmail
What is the term used to describe the stage in the forensic process where data is retrieved and preserved?
---> collection/acquisition report/presentation survey/identification examination/analysis
Which of the following forms of attack are commonly used by groups to disable websites and online services?
---> denial of service web defacements malware phishing
Akers' dynamic process of social learning begins with which of the following elements?
---> differential associations differential definitions differential reinforcement imitation
Which of the following is not a part of the Daubert standard for the admissibility of scientific evidence?
---> grant funding testing publication error rate
Which of the following is not a way that extremist groups use the Internet?
---> humor recruitment indoctrination communications
Which of the following is the source of low self-control in the general theory of crime?
---> ineffective parenting school instructors peer groups neighbors
Which of the following populations are largely considered the focus of research on cyberbullying?
---> juveniles adults the elderly toddlers
A software program that is freely available, and can be modified, used, or shared with anyone is called:
---> open source closed source proprietary malware
Under Willard's typology of cyberbullying, what is the category that refers to posting real information about another person to embarrass them?
---> outing flaming denigration stalking
What is the term used to refer to the copy and capture of original data files in a way that makes them available for analyses that minimizes the likelihood of error?
---> preservation instant process carving wiping
What is the name for a legal document signed by a judge or magistrate that authorizes law enforcement to conduct a search?
---> search warrant arrest warrant stop-and-frisk none of the above
What is the term used to refer to the process where individuals accept a radical ideology without directly engaging others as part of that movement?
---> self-radicalization scary practices revolutionary acceptance none of the above
What term is used to describe the period of time when forensic procedures and computer crime legislation began to harmonize?
---> structured phase Ad Hoc phase Golden Age none of the above
Cyberbullying, online harassment, and stalking are all forms of cyber-trespass under Wall's cybercrime typology.
False
Cybercrime research suggests that differential associations to deviant peers have no association with individual involvement in cybercrimes.
False
Grabosky argued that cybercrimes are most likely an issue of 'new wine, but no bottles.'
False
Ideologically-driven cyberattacks will not increase over the next decade due to the relative stabilization of Internet use across the world.
False
In the US, computer files are considered in plain view since they must be opened in order to view them, and are considered legal under the plain view doctrine.
False
In the US, the Frye standard states that scientific evidence can be admissible so long as it was developed in a rigorous fashion.
False
The NTFS system is used in older versions of windows operating systems, like Windows 98.
False
The process of logical extraction involves the use of file carving and keyword searches to identify evidence.
False
The term computer forensics refers to the analysis of digital evidence, including network traffic, computer forensics, and mobile device forensics.
False
The term e-jihad is often used to describe the range of groups who view that the white race has been sublimated by non-white racial and ethnic groups.
False
Under the Frye standard, the credentials of an expert witness can also be a part of the reliability test.
False
What is the name of the downloadable program individuals can use to anonymize their online activity from others that has been a focus of law enforcement investigations over the last few years?
Pingbox Slingbox GCHQ ---> Tor
The Computer Fraud and Abuse Act was extended to apply to cyberterror and warfare acts through the creation of what act?
The Copyright Act The Digital Millenium Copyright Act The Identity Theft Assumption and Deterrence Act ---> The PATRIOT Act
It is imperative that forensic technicians and examiners keep the preservation of evidence as transparent as possible to determine the validity of the process.
True
It is possible that wearable devices like FitBits will change the way we interact with the Internet, and our behaviors generally.
True
Many social networking platforms provide resources for victims of stalking, bullying, and harassment to report their experiences to the site.
True
One advantage of the Internet is that it allows extremist groups to communicate their message directly to wide audiences without the need to interact with traditional media outlets.
True
Outing is a form of cyberbullying where bullies reveal sensitive information about their target online without their permission or, in some cases, their knowledge.
True
Research suggests that the activities individuals engage in and the quantity of information they post online may increase their risk of victimization.
True
Researchers have found a substantial link between low self-control and participation in simple forms of computer hacking.
True
There is some concern that a hashing collision may take place where two separate drives are hashed, but have the same value.
True
Though there is no single definition of cyberterror, better definitions recognize the value of the Internet as a communications mechanism and target for attacks by extremist groups.
True
Which of the following is not a technique of neutralization?
appeal to higher loyalties denial of injury denial of victim ---> support for social movements
What is the term used to describe the use of hacking techniques to promote an activist agenda or express a political/social opinion?
black hat hacking noobing ---> hacktivism flash mob
The term ________ references direct relationships between police and the general public to identify certain forms of crime that are viewed as a challenge and finding ways to work together to combat the issue.
centralized response ---> community policing problem oriented policing none of the above
Home security systems, thermostats, and appliances that can be controlled via the web are examples of the _______
cybercrime devices serious technology platform ---> Internet of Things new Internet
What is the term used to refer to the use of information technology to gain advantage over an opponent, including the spread of false information?
cyberwar ---> information warfare physical attacks none of these
Generally speaking, if a criminal suggests that their victim was asking for it, they are applying which technique of neutralization?
denial of responsibility denial of injury condemnation of the condemners ---> denial of victim
Which of the following is not a negative outcome of cyberbullying victimization?
depression --->anorexia suicidal ideation anxiety
Which of the following is not a behavioral or attitudinal characteristic associated with cyberbullies?
easily frustrated impulsive ---> positive affect behavioral problems at school
Which of the following is not a type of strain identified in Agnew's general strain theory?
failure to achieve positively valued goals presence of negative stimuli ---> strain from achieving positively valued goals the removal of positively valued stimuli
What phrase references the process of searching for files and extracting that data without considering the larger file systems?
file signature wiping partitioning ---> file carving
What theory considers the decision-making processes of offenders and views the likelihood of offending as a judgement of risk relative to offending rewards?
general strain theory social learning subucultural theory ---> deterrence theory
What is the term used for legislation that mandates an individual provide encryption keys or passwords to law enforcement in digital forensic investigations?
information disclosure rules ---> key disclosure laws information abstention rights none of the above
What is the term used to describe a data storage device that is portable and located outside of a computer that can be connected via USB or other means?
internal hard drive ---> external hard drive software wetware
What is the name for services that allow individuals to remotely access files stored on web servers via the Internet?
mobile phones ---> cloud storage wearable devices none of the above
Which of the following is not a component of routine activities theory?
motivated offender ---> low self-control suitable target absence of capable guardian
Which of the following is not a part of the scientific method?
observation hypothesis ---> theory conclusion
What is the term used to describe a threat against a person or property evident in US laws against stalking?
serious complaint ---> true threat negative consequence false flag
What is the term used to describe the tangible or physical parts of a computer system?
software peripheral devices wetware ---> hardware
What is the name for the doctrine that allows police to search and seize evidence that may not be indicated in a search warrant but is in plain view of the officer and incriminating?
stop-and-frisk main road concern public exception ---> plain view
Search warrants are not required in which of the following circumstances in the US?
stop-and-frisk when evidence is being destroyed when consent is provided ---> all of the above
Which phrase is used to describe the period prior to the development of a formal structure, protocol, training, and tools for forensic analyses?
structured phase Golden Age ---> Ad Hoc phase none of the above
Which of the following is not a step in the process of digital forensic investigation?
survey/identification report/presentation ---> consumption/assessment examination/analysis
Which of the following is not a specific criteria identified for imaging tools by NIST?
the tool shall log I/O errors tools shall not alter the original disk ---> tools shall be affordable tools shall make a duplicate or image of an original disk
Which of the following elements is not typically included in definitions of cyberstalking?
victim reports fear of bodily harm offender willfully engages in repeated contact ---> victim had a previous relationship contact takes place through some electronic medium
Which of the following types of media have not been used by extremist groups to promote their agenda?
video games music magazines ---> none of the above
What is the name for the device that allows read-only access to all accessible data on a drive and keeps anything from being written to an original drive?
wiping tool ---> write-blocker EnCase Cell-brite