Cyber Security Chapter 4 and 5
. Hackers who are motivated by financial gains and who conduct both bad and ethical hacking are referred to as ______.
gray hats
In 2015, the most common crime reported to the Federal Consumer Commission was ______.
identify theft
The Identity Theft Resource Center estimates that it takes on average ______ hours to repair the damage of identity theft.
. 600
______ is defined as a collection of infected machines worldwide that receive commands and perform some illegal actions such as distributed denial of service attacks, among others.
. A botnet
. The intentional, aggressive behavior toward another person that is performed through electronic means is also known as ______.
. cyberbullying
Threats to cybersecurity originate from all of the following sources EXCEPT ______.
. individual
. Human behavior that departs from compliance with established policies, regardless of whether it results from malice or a disregard for security policies, is the manifestation of a/an ______ threat.
. insider
Per the 1998 Assumption Deterrence Act, the text identified all of the following types of punishment EXCEPT______.
. probation
. According to the Federal Trade Commission, all of the following are ways that consumers can prevent identity theft EXCEPT ______.
. using easy passwords
. One of the most persistent threats for the United States in terms of cyberattacks originates in ______.
China
Which of the following
Criminals directly ask the victim for their personal information.
. In 1998 Congress passed the Assumption Deterrence Act making identity theft ______.
a felony crime
Groups with displeasure of government are often motivated by all of the following EXCEPT______.
aristocracy
According to the text, which of the following entities are considered a special target for botnets?
banks and financial institutions
. Hackers who are motivated by personal gain or a certain cause are often referred to as ______.
black hats
The "bad guy" hackers are known as ______.
black hats
The use of computer networks and technologies as a means for conducting attacks that target critical national infrastructures or governmental assets has a psychological, social, political, or religious motive, causes harm to individuals or groups, or physically damages infrastructures is referred to as ______.
cyberterrorism
A ______ refers to persons who attempt unauthorized access to a control system device and/or network using a data communications pathway.
cyberthreat
Edward Snowden, an American computer professional
decrypt your phone calls and text messages
. Cyber terrorism attacks often take the form of ______.
denial-of-service attacks
The posting of harassing messages aiming to cause harm to the victim is also known as ______.
denigration
. All of the following were identified as vulnerable infrastructures EXCEPT______.
education
. Hackers with their abilities to research vulnerabilities in software products and disclose them to companies that developed the software are known as ______.
ethical hackers
People who are "tricked" by others into giving up access information or information about themselves to an external party are known as ______ insiders
exploited
. According to the text, logic bombs are typically installed by outsiders of an organization or corporation.
false
. Some of the most common insider cybersecurity crimes are cyberbullying and cyberharassment.
false
International threats are those that originate from inside the company or organization.
false
Malicious insiders may delete or expose sensitive information by incident—either by pressing a wrong key or by other errors.
false
Using the same password for several accounts does not make it easy for thieves to steal a victim's information.
false
. The exchange of insults in a public setting, such as a bulletin board or chat room, is known as ______.
flaming
Consumer crimes that include identity theft, phishing scams, and spam fall within which of the following categories?
fraud and financial crimes
. Which of the following was NOT identified as one of the main forms of international threats?
hacking or spying on city and local governments
The most serious insider cybercrimes include all of the following EXCEPT______.
harassment
Which of the following countermeasures helps prevent e-mail spoofing, that is, the forgery of an e-mail header to make it appear as if it is coming from a friend or employee?
implement message authentication
. Which of the following is NOT a behavior/method that falls under the category of cyberbullying?
inclusion
. According to the text, cyberthreats originate mainly from all of the following entities EXCEPT______.
local governments
Threats that originate from inside the company or organization are referred to as ______.
local threats
. The Internal Revenue Service uses which of the following methods to contact a taxpayer?
The least common but most costly is ______ insider threat.
malicious
According to the text, human trafficking consists of all of the following elements EXCEPT ______.
outcome
Botnets use ______ architecture in which each workstation has the same capabilities and responsibilities.
peer-to-peer
. All of the following are examples of social engineering EXCEPT______.
spam
Which of the following was NOT identified as a type of personal information that is sought out by identity thieves?
telephone number
. Advanced hackers are typically motivated by financial or political goals.
true
. Consumer crimes are deceptive practices that result in financial or other losses for consumers in the course of seemingly legitimate business transactions
true
Commercial e-mail is defined as any electronic mail message the primary purpose of which is commercial advertisement or promotion of products or services.
true
Hacktivists engage in political action against a certain person, group, or even nation-state. Nation-states are mainly engaging in political and economic espionage.
true
Insiders are people who are current or former employees of a company, contractors, or friends of employees.
true
Mail-order-brides typically come from developing countries and countries where women don't see the possibility of developing their full potential.
true
Social engineering is any act that influences a person to take an action that may or may not be in his or her best interest.
true
The negative connotation of the word hackercould be defined as "a malicious meddler who tries to discover sensitive information by poking around. Hence password hacker, network hacker. The correct term for this sense is cracker."
true
Using two-factor identification is recommended for protecting private information, such as using a password and a fingerprint or other physical device.
true
low probability that the criminals will get caught and convicted and public exposure are some of the reasons as to why so few victims report the crimes.
true
According to national surveys, ______ are the second greatest threat to a company's cybersecurity, only trumped by hackers
. insiders
. Which of the following countermeasures recommends that companies must complete regular data backups?
. complete regular updates
Which of the following are considered small programs or sections of a program triggered by some event such as a certain date or time, a certain percentage of disk space filled, or the removal of a file?
. logic bombs
. Which of the following laws does NOTapply to hackers?
Hackers are evil people.
______ refers to all types of crime in which someone wrongfully obtains and uses another person's personal data in some way that involves fraud or deception, typically for economic gain.
Identity theft
Which of the following characteristics of hackers is NOTtrue?
The members meet each other quite often.
Botnets typically infect computers via ______ or drive-by-downloads.
USBs
According to the Federal Trade Commission, using security software on your computer, such as antivirus, anti-spyware, and a firewall, does not help prevent identity theft.
false
According to the text, cybercrime only has one layer.
false
. Which of the following is NOT considered a main type of insider threat?
feared
According to the text, phishing scams typically target ______.
personal information
Access to the Internet, sexual deviance and antisociality have been found to be main explanatory factors of Internet-based child pornography offenses.
true
National threats originate from individuals inside the United States, aiming to attack local or national governments and infrastructures
true
Phishing is also referred to as "brand spoofing" or "carding."
true
. The ______, an underground web, allows offenders to stay anonymous and undetected, as these are not traceable by police.
. Dark Net
typically work independently to expose security vulnerabilities or practices that endanger individuals' private data.
. Gray hats
______ is defined as unsolicited commercial e-mail that includes any commercial emails addressed to a recipient with whom the sender has no existing business or personal relationship and not sent with the consent of the recipient.
. Spam