Technology & Cybercrime Final

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

What is the name of the US bill that failed to pass in 2012 in order to combat rates of piracy and counterfeiting?

Child Online Protection Act The Megan Meier Act ---> Stop Online Piracy Act none of the above

Digital evidence only has a role in the analysis and prosecution of cybercrime.

False

What is the term used to refer to the organization of a hard drive into separate storage spaces?

extracting ---> partitioning wiping carving

What is the name of the malware used to compromise and harm uranium enrichment facilities in Iran?

Code-Red ---> Stuxnet Cryptolocker LOIC

Criminological theorists have yet to consider how socio-economic backgrounds affect the risk of cybercrime victimization and offending behaviors.

True

What is the term used to refer to files that have been manipulated in order to conceal the contents of the original file?

cleaned files wiped files deleted files ---> hidden files

What standard recognizes that scientific evidence can only be admitted if it is generally viewed as reliable by the scientific community?

---> Frye standard Daubert standard Evening standard none of the above

What US government agency operates the Computer Forensic Tool Testing Project?

---> National Institute of Standards and Technology (NIST) National Security Agency (NSA) Internet Crime Complaint Center (IC3) Action Fraud

Which of the following anonymization tools have been targeted by law enforcement to better identify cybercriminals?

---> Tor Proxify Spotify Hushmail

What is the term used to describe the stage in the forensic process where data is retrieved and preserved?

---> collection/acquisition report/presentation survey/identification examination/analysis

Which of the following forms of attack are commonly used by groups to disable websites and online services?

---> denial of service web defacements malware phishing

Akers' dynamic process of social learning begins with which of the following elements?

---> differential associations differential definitions differential reinforcement imitation

Which of the following is not a part of the Daubert standard for the admissibility of scientific evidence?

---> grant funding testing publication error rate

Which of the following is not a way that extremist groups use the Internet?

---> humor recruitment indoctrination communications

Which of the following is the source of low self-control in the general theory of crime?

---> ineffective parenting school instructors peer groups neighbors

Which of the following populations are largely considered the focus of research on cyberbullying?

---> juveniles adults the elderly toddlers

A software program that is freely available, and can be modified, used, or shared with anyone is called:

---> open source closed source proprietary malware

Under Willard's typology of cyberbullying, what is the category that refers to posting real information about another person to embarrass them?

---> outing flaming denigration stalking

What is the term used to refer to the copy and capture of original data files in a way that makes them available for analyses that minimizes the likelihood of error?

---> preservation instant process carving wiping

What is the name for a legal document signed by a judge or magistrate that authorizes law enforcement to conduct a search?

---> search warrant arrest warrant stop-and-frisk none of the above

What is the term used to refer to the process where individuals accept a radical ideology without directly engaging others as part of that movement?

---> self-radicalization scary practices revolutionary acceptance none of the above

What term is used to describe the period of time when forensic procedures and computer crime legislation began to harmonize?

---> structured phase Ad Hoc phase Golden Age none of the above

Cyberbullying, online harassment, and stalking are all forms of cyber-trespass under Wall's cybercrime typology.

False

Cybercrime research suggests that differential associations to deviant peers have no association with individual involvement in cybercrimes.

False

Grabosky argued that cybercrimes are most likely an issue of 'new wine, but no bottles.'

False

Ideologically-driven cyberattacks will not increase over the next decade due to the relative stabilization of Internet use across the world.

False

In the US, computer files are considered in plain view since they must be opened in order to view them, and are considered legal under the plain view doctrine.

False

In the US, the Frye standard states that scientific evidence can be admissible so long as it was developed in a rigorous fashion.

False

The NTFS system is used in older versions of windows operating systems, like Windows 98.

False

The process of logical extraction involves the use of file carving and keyword searches to identify evidence.

False

The term computer forensics refers to the analysis of digital evidence, including network traffic, computer forensics, and mobile device forensics.

False

The term e-jihad is often used to describe the range of groups who view that the white race has been sublimated by non-white racial and ethnic groups.

False

Under the Frye standard, the credentials of an expert witness can also be a part of the reliability test.

False

What is the name of the downloadable program individuals can use to anonymize their online activity from others that has been a focus of law enforcement investigations over the last few years?

Pingbox Slingbox GCHQ ---> Tor

The Computer Fraud and Abuse Act was extended to apply to cyberterror and warfare acts through the creation of what act?

The Copyright Act The Digital Millenium Copyright Act The Identity Theft Assumption and Deterrence Act ---> The PATRIOT Act

It is imperative that forensic technicians and examiners keep the preservation of evidence as transparent as possible to determine the validity of the process.

True

It is possible that wearable devices like FitBits will change the way we interact with the Internet, and our behaviors generally.

True

Many social networking platforms provide resources for victims of stalking, bullying, and harassment to report their experiences to the site.

True

One advantage of the Internet is that it allows extremist groups to communicate their message directly to wide audiences without the need to interact with traditional media outlets.

True

Outing is a form of cyberbullying where bullies reveal sensitive information about their target online without their permission or, in some cases, their knowledge.

True

Research suggests that the activities individuals engage in and the quantity of information they post online may increase their risk of victimization.

True

Researchers have found a substantial link between low self-control and participation in simple forms of computer hacking.

True

There is some concern that a hashing collision may take place where two separate drives are hashed, but have the same value.

True

Though there is no single definition of cyberterror, better definitions recognize the value of the Internet as a communications mechanism and target for attacks by extremist groups.

True

Which of the following is not a technique of neutralization?

appeal to higher loyalties denial of injury denial of victim ---> support for social movements

What is the term used to describe the use of hacking techniques to promote an activist agenda or express a political/social opinion?

black hat hacking noobing ---> hacktivism flash mob

The term ________ references direct relationships between police and the general public to identify certain forms of crime that are viewed as a challenge and finding ways to work together to combat the issue.

centralized response ---> community policing problem oriented policing none of the above

Home security systems, thermostats, and appliances that can be controlled via the web are examples of the _______

cybercrime devices serious technology platform ---> Internet of Things new Internet

What is the term used to refer to the use of information technology to gain advantage over an opponent, including the spread of false information?

cyberwar ---> information warfare physical attacks none of these

Generally speaking, if a criminal suggests that their victim was asking for it, they are applying which technique of neutralization?

denial of responsibility denial of injury condemnation of the condemners ---> denial of victim

Which of the following is not a negative outcome of cyberbullying victimization?

depression --->anorexia suicidal ideation anxiety

Which of the following is not a behavioral or attitudinal characteristic associated with cyberbullies?

easily frustrated impulsive ---> positive affect behavioral problems at school

Which of the following is not a type of strain identified in Agnew's general strain theory?

failure to achieve positively valued goals presence of negative stimuli ---> strain from achieving positively valued goals the removal of positively valued stimuli

What phrase references the process of searching for files and extracting that data without considering the larger file systems?

file signature wiping partitioning ---> file carving

What theory considers the decision-making processes of offenders and views the likelihood of offending as a judgement of risk relative to offending rewards?

general strain theory social learning subucultural theory ---> deterrence theory

What is the term used for legislation that mandates an individual provide encryption keys or passwords to law enforcement in digital forensic investigations?

information disclosure rules ---> key disclosure laws information abstention rights none of the above

What is the term used to describe a data storage device that is portable and located outside of a computer that can be connected via USB or other means?

internal hard drive ---> external hard drive software wetware

What is the name for services that allow individuals to remotely access files stored on web servers via the Internet?

mobile phones ---> cloud storage wearable devices none of the above

Which of the following is not a component of routine activities theory?

motivated offender ---> low self-control suitable target absence of capable guardian

Which of the following is not a part of the scientific method?

observation hypothesis ---> theory conclusion

What is the term used to describe a threat against a person or property evident in US laws against stalking?

serious complaint ---> true threat negative consequence false flag

What is the term used to describe the tangible or physical parts of a computer system?

software peripheral devices wetware ---> hardware

What is the name for the doctrine that allows police to search and seize evidence that may not be indicated in a search warrant but is in plain view of the officer and incriminating?

stop-and-frisk main road concern public exception ---> plain view

Search warrants are not required in which of the following circumstances in the US?

stop-and-frisk when evidence is being destroyed when consent is provided ---> all of the above

Which phrase is used to describe the period prior to the development of a formal structure, protocol, training, and tools for forensic analyses?

structured phase Golden Age ---> Ad Hoc phase none of the above

Which of the following is not a step in the process of digital forensic investigation?

survey/identification report/presentation ---> consumption/assessment examination/analysis

Which of the following is not a specific criteria identified for imaging tools by NIST?

the tool shall log I/O errors tools shall not alter the original disk ---> tools shall be affordable tools shall make a duplicate or image of an original disk

Which of the following elements is not typically included in definitions of cyberstalking?

victim reports fear of bodily harm offender willfully engages in repeated contact ---> victim had a previous relationship contact takes place through some electronic medium

Which of the following types of media have not been used by extremist groups to promote their agenda?

video games music magazines ---> none of the above

What is the name for the device that allows read-only access to all accessible data on a drive and keeps anything from being written to an original drive?

wiping tool ---> write-blocker EnCase Cell-brite


Ensembles d'études connexes

Transition to Modern Times UNIT REVIEW

View Set

Principles of management chapter 6 quiz

View Set

Chapter 11: Parenteral and Enteral Nutrition

View Set

TNC Case Study: Apple Global systems and global governance

View Set

BUAD 302- Chapter #7: Positive Organizational Behavior

View Set

Psychology B - Unit 2 Learning and Language

View Set

Geometry Practice Test Vocab Unit 2

View Set