cybercrime and digital forensics fall 2021 final exam

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

__ is the author of the 1986 work "the conscience of a hacker" also known as "the hackers manifesto"?

the mentor

what is 'recent porn'?

the online, non-consensual distribution of nude photographs or videos for retribution by a former intimate partner

which of the following is not one of the three components of routine activities theory?

a detailed plan

the subculture of piracy places great value and status on which of the following factors?

all of the above

which of the following types of content are NOT protected under the first amendment of the us constitution?

all of the above

which of the following is not a negative outcome of cyberbullying victimization?

anorexia

in 2001, bram cohen released this decentralized protocol for peer-to-peer file-sharing that was extraordinarily resilient to shutdown attempts?

bittorrent

what is the name of the peer-to-peer file-sharing program that became very poplar among pirates in the mid-2000s?

bittorrent

a skilled hacker who engages in hacks with malicious outcomes may be commonly referred to as what the of hacker?

black hat

what form of malware enables a network of infected computers to be commanded remotely after infection?

botnet

a __ attack attempts to break cryptographic protections by using a computer to run through all possible combinations of a key to break cipher?

brute force

which us state was the first to implement a data breach law?

california

early reports of stalking during 1989 and 1990 found that media coverage mostly causes on __?

celebrities

what is the name of the uk organization that informs critical infrastructure owners of emerging threats and coordinates incident responses?

centre for the protection of national infrastructure

many experts and commentators prefer to use the term __

child sexual abuse images

what is the name for services that allow individuals to remotely access files stored on web servers via the internet?

cloud storage

what is the term used to describe the stage in the forensic process where data is retrieved and preserved?

collection/acquisition

the term __ references direct relationships between police and the general public to identify certain forms of crime that are viewed as a challenge and finding ways to work together to combat the issue.

community policing

what is the name of the agency formed as a result of the morris worms spread?

computer emergency response team

within the us, this act made it a crime to knowingly access computers without authorization, obtain unauthorized information with intent to defraud, or cause damage to protected computers?

computer fraud and abuse act

which uk hacking law was created due to the schifreen and gold case of 1984?

computer misuse

what is the name of the legal statute used to pursue cases of intellectual property infringement in the us?

copyright act of 1976

any act that violates codified legal statues is considered what?

crime

which form of law is used to resolve disputed between private parties including individuals and businesses?

criminal

computer hacking would be placed under which category in walls typology of cybercrime?

cyber-trespass

according to wall, a legal category of cybercrime which posits individuals virtually crossing boundaries into other peoples property is known as __?

cyber-trespassing

this act is the persistent and targeted harassment of an individual via electronic communication such as email?

cyberstalking

generally speaking, if a criminal suggests that their victim was asking for it, they are applying which technique of neutralization?

denial of victim

what theory considered the decision-making processes of offenders and views the likelihood of offending as a judgement of risk relative to offending rewards?

deterrence theory

akers dynamic process of social learning begins with which of the following elements?

differential associations

__ involves the collecting analyzing and reporting on digital data in a way that is legally admissible?

digital forensics

this form of activism involves exposing collections of private information on an individual, often with the goal of shaming, silencing, or coercing the person?

doxxing and leaking

this process allows communications to be encoded priority to transmission so that they will be unreadable in intercepted?

encryption

what is the term used to describe a data storage device that is portable and located outside of a computer that can be connected via USB or other means?

external hard drive

in the us, laws which have attempted to curtail children's exposure to pornographic material have generally been struck down under this constitutional amendment?

first amendment

__ is something that can 'increase the striking potential of a unit without increasing its personnel.'?

force multiplier

what standard recognizes that scientific evidence can only be admitted if it is generally viewed as reliable by the scientific community?

frye standard

what is the term used to describe the use of hacking techniques to prose an activist agenda or express a political/social opinion?

hacktivism

what is the term used to describe the tangible or physical parts of a computer system?

hardware

when an examiner validates that the hard rive image they are working with in an authentic duplicate of the original, they use a unique algorithm to generate a:

hash value

what is the term used to refer to files that have been manipulated in order to conceal the contents of the original file?

hidden files

which of the following is not a way that extremist groups use the internet?

humor

what is the name of the us federal statue used to prosecute cases of possession or use of PII without the owners authorization?

identify theft and assumption deterrence act of 1998

when a computer or digital device is used as a storage device or in the facilitation of an offense, it is argued to be __ to the offense.

incidental

copyrights, patents, trade secrets, and trademarks are best classified as formed of __?

intellectual property

home security system, thermostats, and appliances that can be controlled via the web are examples of the __

internet of things

which of the following populations are largely considered the focus of research on cyberbullying?

juveniles

this hacker became infamous in the 1980s and 1990s for his various crimes involving phone phreaking, network intrusions, data exfiltration, and fleeing from authorities. he is perhaps best known for his social engineering exploits?

kevin mitnick

what is the term use for legislation that mandates an individual provide encryption keys or passwords to law enforcement in digital forensic investigations?

key disclosure laws

what is the general lifetime of copyright protections for intellectual property?

lifetime plus 50 years

gottfredson and hirschis (1990) general theory of crime states that crimes, simply put, are a product of __?

low self-control

which of the following is not a component of routine activities theory?

low self-control

what was the programming language use by virus writers to infect popular word processing software and other programs in the 1990s?

macro-programming languages

studies in hacking reveal it to be an overwhelmingly ____

male activity

this us court case provided a litmus test for obscene material: if the 'average' person finds that the work appeals to lustful interests in sex, or depicts sexual conduct as defined by state law, and lacks artistic value, then the state may consider the material 'obscene'.?

miller v california

what case established the legal definition for obscene content that is still in use in the us?

miller v. california

shawn fanning developed this peer-to-peer service in 1999 which lead to a massive increase in illegal music downloads?

napster

what us government agency operates the computer forensic tool testing project?

national institute of standards and technology (NIST)

what term refers to a hacker who operates with no connection to a military or government organization?

non-nation-state actor

which of the following is not a negative consequence associated with malware infections?

none of the above

what is the term used to describe an individual who is new to the hacker scene who wants to gain more skill?

noob

a software program that is freely available, and can be modified, used, or shared with anyone is called:

open source

Under Willard's typology of cyberbullying, what is the category that refers to posting real information about another person to embarrass them?

outing

what is the term used to refer to the organization of a hard drive into separate storage spaces?

partitioning

this type of online fraud takes the form of the mass distribution of emails distinguished as institutions such as banks, credit card companies, and e-sellers?

phishing and spoofing

what is the name for the doctrine that allows police to search and seize evidence that may not be indicated in a search warrant but is in plain view of the officer and incriminating?

plain view

which of the following is not a behavioral or attitudinal characteristic associated with cyberbullies?

positive affect

what term is used to refer to an individual who conducts investigations, including forensic examinations, own behalf of private citizens or businesses?

private investigator

what is the term used to describe spam email scams where the senders attempt to manipulate individuals into the purchase of penny stocks?

pump and ump schemes

this theory assumes that offenders conduct cost-benefit analyses before conducting criminal behavior?

rational choice theory

which of the following is not one of Robersons agnews three sources of strain?

removal of negating stimuli

in relation to cybercrime, what was the controversy that surrounded the 2016 us presidential campaign?

russian actors used the internet to interrupt and sow disordering during the election

what is the name for a legal document signed by a judge or magistrate that authorizes law enforcement to conduct a search?

search warrant

what is the term used to refer to the process where individuals accept a radical ideology without directly engaging others as part of that movement?

self-radicalization

this type of online fraud focuses on tricking people into handing over sensitive information like login credentials, social security numbers, and any other details that could compromise a persons security. sometimes described as "human hacking".?

social engineering

__ works by hiding data within the digital code used to construct images?

steganography

__ coined the term "the hacker ethnic" in his book hackers" heroes of the computer revolution.?

steven levy

__ was a "digital weapon" deployed to sabotage Iranian nuclear enrichment efforts?

stuxnet

what is the name of the malware used to compromise and harm uranium enrichment facilities in iran?

stuxnet

what was the name for a piece of malware created by mob that became popular among hackers?

sub7

which of the following is not a technique of neutralization?

support for social movements

the 418 scam gets its name from __

the Nigerian area code where most of these scammers were known to operate from in the early 2000s.

this act considerably strengthened penalties under the computer fraud and abuse act of 1986, including the provision for the life imprisionment of convicted 'cyberterrorists'.?

the US PATRIOT act of 2001

in the wake of 9/11, the bush administration created this federal agency to bolster the protection of critical information infrastructure?

the department of homeland security

what is the name of the trade association that brokers for the rights management concerns of recording artists?

the recording industry association of america (RIAA)

this type of computer intrusion is the stealing or copying of information, such as theft of software, business secrets, and personal information?

theft of proprietary/confidential information

which of the following is not a part of the scientific method?

theory

which of the following is not a specific criteria identified for imaging tools by NIST?

tools shall be affordable

what is the name of the downloadable program individuals can use to anonymize their online activity from others that has been a focus of law enforcement investigations over the last several years?

tor

which of the following anonymization tools have been targeted by law enforcement to better identify cybercriminals?

tor

this privacy-enhancing measure allows users to hide their IP addresses by rerouting network traffic, thereby bypassing attempts by regulatory bodies to block access to websites hosting or indexing pirated content?

virtual pirate networks

this form of hacktivism is the cyber-equivalent to the traditional protest method by which a particular site, associated with opposing or oppressive political interests, is physically occupied by activists?

virtual sit-ins and blockades

which of the following was the first form of malware identified in the wild?

virus

what is the term used to describe flaws in computer hardware or software that hackers exploit to affect system operations?

vulnerability

what is the term used to refer to individuals who broke software copyright protection in the 1980s to share files?

warez doodz

globally, __ are most likely to be victims of stalking?

women

what type of malware can autonomously spread on its own but does not necessarily have a payload?

worm

what is the name of the hacker who maintained propaganda websites and posted hacking training tutorials for the e-jihad?

younis tsouli

__ was a website operated by hunter moore which allowed offenders to not only post sexual photos of people but also disclose their identifying information. the website was shut down?

IsAnyoneUp.com

this was the name of the program that allowed the NSA to access the servers of companies and services like yahoo, google, facebook, and youtube for user data/

PRISM


Ensembles d'études connexes

Chapter 10 Math Formulas and example problems

View Set

FCS 202 Chapter 1 Quiz questions

View Set

Accounting- Final Exam, Master Exam One - ACC201

View Set

Factoring Polynomials Completely

View Set

State Laws, Rules, and Regulations

View Set

ATI - Medication Administration 4

View Set

Fundamentals Learning System Final

View Set