Cybercrime

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

Which of the following is true of the Digital Revolution?

) It has created a new forum for both terrorist activity and criminal behavior.

According to the Office of Juvenile Justice and Delinquency Prevention (OJJDP) and the National Center for Missing and Exploited Children (NCMEC), almost all possessors of child pornography are black males who are under the age of 25. B

...) False

________ involves the use of radio waves to facilitate the transfer of information between an electronic tag (or label) and a reader.

...A) RFID

At the dawn of the computer age, the term "computer crime" usually referred to the theft of computers or computer components.

...A) True

Not all crimes involving computers can be characterized as "computer crime."

...A) True

Spamming refers to the abuse of electronic messaging systems to randomly or indiscriminately send unsolicited bulk messages.

...A) True

Vengeance or terrorist stalkers are motivated by either economic gain or revenge.

...A) True

What was the Illuminati?

...A) a board owned and operated by Steve Jackson Games

Which of the following types of fraud occurs when a fraudster adds hidden charges to the advertised price, perhaps in shipping or handling?

...A) fee stacking

Which of the following is NOT a primary motivation for the possession of child pornography?

...A) fight for legalizing man/boy sexual relationship

refers to a software program or hardware device that records everything you type into a compromised computer?

...A) keyloggers

The individuals who seek to re-establish a relationship with an unwilling partner and are considered the most dangerous of stalkers are known as ________.

...A) obsessional stalkers

Which of the following refers to redirecting thin slices of accounts into a designated location?

...A) salami technique

Recent studies indicate that the emergence of cloud computing and removable media has effectively decreased theft of information or breaches in digital security.

...B) False

Which of the following is true of the infamous hacking board Plovernet?

...B) It was a breeding ground for hacking groups like LoD.

Cybervandalism and cyberterrorism are examples of which category of online crime?

...B) interference with lawful use of computers

Which of the following refers to a seller in an auction driving up the cost of his or her own item by bidding on it?

...B) shill bidding

To steal credit card information by installing devices on card readers located in ATMs, gas pumps, restaurants, grocery stores, retail establishments, or any other area where magnetic strip card readers are employed is known as ________.

...B) skimming

Which of the following refers to two distinct methods of distributed denial of service (DDoS) attacks?

...B) smurfing and fraggling

Electronic purses come in two primary types: limited or closed, and multipurpose or open.

false

Increasing dependence on cyber information is one of the disadvantages of the Internet.

true

Which of the following devices introduces commands and information to the computer?

... D) keyboard

Which of the following refers to the unauthorized attempt to gain access to information about a system?

... D) probe

What can the exponential increase in online harassment, stock manipulation, and child pornography be attributed to?

... D) the increase in anonymous e-mail accounts and remailers

What is the purpose of random access memory in the computer system?

... D) to temporarily store information

A deliberate, politically or religiously motivated attack against data compilations, computer programs, and/or information systems that is intended to disrupt and/or deny service or acquire information that disrupts the social, physical, or political infrastructure of a target, is known as ________.

...A) cyberterrorism

Which of the following launched the first online casino in 1995 with 18 games?

...C) Internet Casinos, Inc.

What is the term used to describe the final destination of discarded, lost, or destroyed data?

...C) bit bucket

Which of the following refers to the deliberate manipulation of an existing program to redirect or reroute data representing monies or economic exchanges?

...C) data diddling

Which of the following refers to the sale of stolen goods through technological means?

...C) e-Fencing

Which of the following refers to stalkers who are delusional and believe that their victim is in love with them or has had a previous relationship with them?

...C) erotomaniacs

Which of the following refers to a malware program that encrypts or otherwise renders computer or digital resources inoperable or inaccessible in furtherance of the illegal compulsion of an action or exchange?

...C) ransomware

Which of the following refers to a computer that has been compromised by some form of malware, enabling the criminal to remotely control that computer?

...C) zombie

Which of the following statements regarding online gaming is untrue?

...D) Minors accessibility to online gaming is restricted, as age verification is mandatory.

Which of the following best defines shoulder surfing?

...D) literally watching someone from behind, as he or she inputs a password

According to the Office of Juvenile Justice and Delinquency Prevention (OJJDP) and the National Center for Missing and Exploited Children (NCMEC), almost all possessors of child pornography are ________.

...D) white males who are older than 25

Which of the following qualifies as social engineering?

... C) befriending a company's cleaning crew to gain access to rooms and buildings

Which of the following is the least destructive category of hackers?

... C) informational voyeurs

What is the most important component of a computer?

... C) motherboard

Which was the first event to signal the potential of computer crime?

... C) the hacking of the MILNET system

How are websites identified?

... C) through uniform resource locator

Which of the following is NOT one of the primary motivations for computer intrusion in contemporary society?

... C) to benefit others

Which of the following is NOT a general category of computer crime?

... C) vicinage

________ hat hackers are individuals who identify and exploit system vulnerabilities for nefarious purposes.

... D) Black

Which of the following is NOT a reason for the popularity of bulletin boards among subversive organizations?

... B) perception of Second Amendment protection

________ can be defined as the reproduction, distribution, and use of software without the permission or authorization of the owner of copyright.

... C) Data piracy

What is a collection of hyperlinked pages of information distributed over the Internet via a network protocol?

... C) World Wide Web

Which of the following is a valid reason why a corporation might welcome federal assistance to help catch a cyber criminal?

) Criminals access different services to disguise their location.

The issue of vicinage has been simplified by the lack of international guidelines for cyberactivity.

... B) False

What is the term used to refer to the method of cracking passwords by manually entering all possible key combinations?

... B) brute force

Who developed the Electronic Numerical Integrator and Computer (ENIAC)?

... C) John W. Mauchly and John Presper Eckert

Which of the following is a self-contained program that may spread functional copies of itself to other computer systems?

... C) worm

Which of the following hacking-related developments occurred after the year 2000?

... D) the emergence of identity theft as an issue for consumers

The theft and resale of which computer component has proven to be the most lucrative?

... A) CPUs

________ was the most infamous of all hackers and has been the subject of numerous books and movies.

... A) Kevin Mitnick

In which Mac OS did Apple introduce its first Unix-based operating system?

... A) Mac OS X

______ are the least sophisticated of all cybercriminals.

... A) Script kiddies

Which of the following does NOT accurately describe the Secret Service actions that prompted the seminal court case Steve Jackson Games, Inc. v. U.S. Secret Service et al.?

... A) The Secret Service used a DDoS attack to infiltrate and sabotage the company's operations.

Blue boxes were extremely popular among college dorms and were widely considered harmless by users.

... A) True

Traditional hacker culture was characterized by an antiestablishment rhetoric.

... A) True

Which Windows operating system paved the way for the development of peer-to-peer networks?

... A) Windows NT 3.1

What is Gopher?

... A) an information retrieval tool

Which of the following tells the computer in which order to access drives?

... A) boot sequence

Which of the following is structured to allow users to participate in real-time conversations?

... A) chat rooms

What does the term wetware refer to?

... A) humans operating computers

Which of the following is a factor that leads many individual users of the Internet to assume that their identities are safely protected?

... A) the dearth of interjurisdictional communications

________ are designed to strip the source-address information from e-mail messages.

... B) Anonymizers

Which of the following hacking-related developments occurred during the 1990s?

... B) Commercially available security products are introduced.

Like traditional communication carriers, Internet service providers are required to maintain transmission records.

... B) False

Who was the first person to successfully introduce a device exclusively designed for data processing?

... B) Herman Hollerith

Which of the following interprets program instructions and processes data in the computer?

... B) central processing unit

Which of the following groups does NOT figure in the multilateral film privacy strategy of the Chinese Triads?

... B) hacktivits

What motivates pure hackers to steal information?

... B) intellectual challenge

Traditionally, trial and appellate courts evaluated the constitutionality of computer crime statutes, searches, and investigations through the lens of the ________.

A) First and Fourth Amendments

For users, 24-hour accessibility equates to 24-hour vulnerability.

A) True

Intranets are small local networks connecting computers within one organization, controlled by a common system administrator.

A) True

Operating systems may be either single-user or multiple-user.

A) True

The smallest piece of data is called a bit.

A) True

Which of the following characteristics of new payment methods has facilitated money laundering and terrorist financing?

A) anonymity in transactions

Which of the following is NOT a reason why many businesses and corporations underreport computer crimes?

A) consumers don't care about confidentiality

One of the earliest examples of computer crime is ________, which consists of an activity in which telecommunications systems are manipulated and ultimately compromised.

A) phreaking

One of the earliest computers developed by Charles Babbage was created to tabulate the 1880 U.S. census.

B) False

Which of the following allows perpetrators to commit multinational cybercrime with little fear of judicial sanctions?

B) The lack of physical boundaries

What did the Fifth Circuit Court of Appeals rule in U.S. v. Finley?

B) The post-arrest search of a suspect's cell phone was constitutional.

Closed system cards and open system cards are two primary types of ________.

B) prepaid cards

Which of the following involves payments that rely on a bank account and a web-based transfer of funds to or from an established financial account?

C) Internet payment services

what according to a study conducted by the Department of Justice, were perceived as the number one target for computer crime?

C) businesses

Corporations and private entities that offer discounts on software or training to law enforcement agencies are called ________.

C) friendly vendors

Which of the following e-payment methods stores funds on an integrated circuit chip in the card?

C) stored value card

Which of the following is an example of computer-initiated criminal activity?

C) wire transfers

has traditionally encompassed abuses and misuses of computer systems or computers connected to the Internet, resulting in direct and concomitant losses.

Cybercrime

Which of the following is NOT a problem in the investigation of cybercrime?

D) a widespread perception of cybercrime as worse than "traditional" crime

All the following are categories into which computer crimes are traditionally divided EXCEPT ________.

D) computer as a weapon

For what purpose did British scientists build Colossus I?

D) cryptanalysis

Expenditures on which area represent a nonrecurring expense for a computer crime unit?

D) establishing a computer laboratory

Which payment method is typically associated with a card payment network such as Visa or MasterCard?

D) prepaid card

includes any criminal activity which involves the unauthorized access, dissemination, manipulation, destruction, or corruption of electronically stored data.

Digital crime

Law enforcement has been threatened and weakened by the advent of the Internet and has not been able to benefit from it.

False

Much computer-related crime involves specialist users.

False

The lack of physical boundaries and the removal of traditional jurisdictional demarcations allow perpetrators to commit multinational crime with little fear of judicial sanctions.

true


Ensembles d'études connexes

SIE: Analysis (Intro to Taxation)

View Set