cyber crime test 1
What famous text introduced in 1986 railed against adults, law enforcement, and schools and evoked the angst of young hackers? <i>The Hacker Bible</i> <i>The Hacker Manifesto</i> <i>The Hacker Diaries</i> <i>The Hacker Encyclopedia</i>
<i>The Hacker Manifesto</i>
Data alteration, denial of service, network intrusions, thefts of information, and computer vandalism are examples of which type of computer crime? Computer as an instrument of a crime Computer as a target Crimes associated with the prevalence of computers Computer as incidental to crime
Computer as a target
The salami slice technique, pyramid schemes, and bunko schemes are examples of which type of computer crime? Computer as a target Computer as an instrument of a crime Crimes associated with the prevalence of computers Computer as incidental to crime
Computer as an instrument of a crime
Following the continuing changes and improvements in technology is an example of which type of hacker subculture norm? Technology Law Commitment Knowledge
commitment
Which of the following is defined as a malicious hacker? Script kiddie White hat Cracker Gray hat
cracker
According to Merton, the cultural goal of American society is economic success. False True
true
Many hackers acknowledge their activities are illegal, but legitimize and justify the actions using various rationales. False True
true
Which type of computer crime describes actions in which the computer is used only to further a criminal end? In other words, the computer or data contained therein is not the object of the crime. Computer as a target Computer as an instrument of a crime Crimes associated with the prevalence of computers Computer as incidental to crime
Computer as an instrument of a crime
Child pornography is an example of which type of computer crime? Computer as a target Crimes associated with the prevalence of computers Computer as an instrument of a crime Computer as incidental to crime
Computer as incidental to crime
Which of the following is not one of the four categories of computer crime? The computer as incidental to the crime Computer vandalism The computer as a target Crimes associated with the prevalence of computers
Computer vandalism
What major category of information warfare/cyberterror does "cryptography" fall into? Infrastructure attacks Promotion Information attacks Technological facilitation
technological facilitation
"Cyber" refers to almost anything "real" or "virtual" attached to a computer or network. False True
true
"Three strikes and you're out" is an example of policy based on choice theory. True False
true
A cryptographic key is necessary to read encoded material. False True
true
A ritualist rejects the cultural goal of economic success but accepts the institutionalized means to obtain the cultural goal. True False
true
A subculture is a set of values, norms, and beliefs that differ from those of the dominant culture. False True
true
A virus is a piece of code that attaches itself to other instructions within a computer. True False
true
A worm is a program that reproduces itself over a computer network by breaking into computers much like a virtual hacker. True False
true
According to Marxist thought, no government would willingly give up power and wealth; therefore, this power and wealth has to be taken violently. False True
true
According to the Russian perspective, cybercrime and cyberterrorism are acceptable techniques of information warfare. False True
true
Cohen and Felson argue that the motivation to commit crime and the supply of offenders are constant. True False
true
Computers may be used as both criminal instruments and instruments of warfare. False True
true
Data alteration and denial directly targets the computer by attacking the useful information stored or processed by the computer. False True
true
Despite its contention that modern technological advancements are incompatible with fundamentalist Islam culture, al Qaeda has become a primary foe in the digital terrorism area. True false
true
Deterrence theory assumes that individuals are rational actors. True False
true
Federal statute makes it a crime to illegally access or damage a "protected" computer. True False
true
From the 1950s through the 1970s, hackers never worried about breaking computer laws. True False
true
Hackers of the 1960s believed information should be free to all to understand how things work and can be improved. False True
true
Hollywood films have helped cement the notion that hackers are criminals. False True
true
In general, the threat of computer crime victimization increases with industrialization. True False
true
Infrastructure attacks are those attacks designed to destroy a system that includes critical data. True False
true
It is estimated that 100 million attacks against U.S. businesses and governments take place each day. False True
true
Most hackers claim to benefit the systems they intrude upon because they do not destroy data and they alert system administrators to security flaws. False True
true
One of the primary tenets of the "hacker code" as conceived by Levy is that information should be free to all users. False True
true
Rapid growth in the computer security industry has largely occurred without adequate research on the nature of cybercrimes and criminals. False True
true
Social control theory assumes that people will violate the law. True False
true
Sutherland's theory of differential association clearly explains how behavior is learned. True False
true
The 1980s were a pivotal decade in the trend toward defining hackers as criminals. False True
true
The Internet is the best tool for propaganda and recruitment among terrorists. False True
true
The United States is likely the nation that is most vulnerable to digital terrorism. True False
true
The distinction between hackers who commit crimes and other computer criminals rests upon the attitudes with which a hacker approaches the activity. False True
true
The expanded use of Social Security numbers is the primary reason for the ease of identity theft. False True
true
The full extent of computer theft is unknown because many thefts go unreported. True False
true
The majority of hack online actions are perfectly legal. True False
true
The propagation of a worm that does not actually damage anything and is more of a nuisance than anything else is a form of denial of injury according to Sykes and Matza's techniques of neutralization. True False
true
The text seeks to merge knowledge of criminal justice and knowledge of computer science. True False
true
The type of attack the hacker group "Anonymous" carried out against the private intelligence industry provider Stratfor is considered: propaganda. distributed denial-of-service attacks. website defacement. unauthorized intrusions.
unauthorized intrusions.
Criminal statistics/data on computer crime are submitted by all federal agencies and represent a fairly accurate picture of the problem. virtually nonexistent; there is no centralized source. collected by the FBI. very accurate and reliable.
virtually nonexistent; there is no centralized source.
Which 1983 film introduced the public to the unexplored world of computer hacking? The War Room Computer Wars War Games Computer Games
war games
Which technique of neutralization occurs when an individual believes his actions were beyond his control? Appeal to higher loyalties Denial of victim Denial of responsibility Denial of injury
Denial of responsibility
Which technique of neutralization occurs when an individual believes that the victim "had it coming"? Denial of victim Denial of responsibility Denial of injury Appeal to higher loyalties
Denial of victim
According to Hirschi, which of the following is NOT an element of the social bond? Belief Emotional Attachment Commitment
Emotional
What major category of information warfare/cyberterror does "data hiding" fall into? Technological facilitation Promotion Information attacks Infrastructure attacks
Technological facilitation
What major category of information warfare/cyberterror does "recruiting" fall into? Infrastructure attacks You Answered Promotion Information attacks Technological facilitation
Technological facilitation
Hackers appear to exhibit a subculture that includes: socialization processes. slang. group customs and norms. all of the above.
all of the above.
Using a cell phone to encourage a flash mob is a form of: infrastructure attack. propaganda and promotion. information attack. cyber and technological facilitation.
cyber and technological facilitation.
According to the authors of the text, another term for digital crime is: identity theft. Stuxnet. cybercrime. malicious software.
cybercrime.
Requesting funds for a terrorist organization through a chat room is an example of: charitable donations. e-commerce. direct solicitation. exploitation of online payment tools.
direct solicitation.
An unauthorized intrusion is easy to identify once it has occurred. True False
false
Case studies offer generalizations about trends in cybercriminality or patterns of offending. True False
false
Computer crime is not an international problem. True False
false
Computerized theft never deprives a legitimate owner of a tangible asset. False True
false
Critical infrastructure is not an attractive target to terrorists. True False
false
Data hiding is difficult to accomplish, but relatively easy to discover in Internet files. False True
false
Estimates on the cost of cybercrime are largely derived from criminal reports. True False
false
Experienced hackers make it a point to mentor inexperienced hackers. False True
false
Hackers only gain entry into websites through the use of advanced computer skills. False True
false
Hackers predominantly associate themselves with illegal acts. True False
false
Hackers routinely hack into hospitals and alter medical records. True False
false
Hackers were generally considered to be criminals as early as the 1960s. False True
false
Information attacks are the use of cyber communication to distribute or coordinate plans for a terrorist attack, incite an attack, or otherwise assist in the facilitation of terrorism. True False
false
Information warfare is always a component of cyberterrorism. True False
false
It is relatively easy to place a monetary value on the loss of intellectual property. False True
false
Psychological theory identifies the specific reasons a person becomes a pedophile. True False
false
Research has shown that most criminals fall into stage 3 or 4 of Kohlberg's stages of moral development. False True
false
Research has shown that most dangers of economic computer crimes come from outsiders. False True
false
Research has shown that the threat of arrest greatly deters would-be criminals. False True
false
Software testing by manufacturing is a form of gray hat hacking. True False
false
The Department of Justice systematically collects computer crime data. False True
false
The nation of Japan currently poses a larger threat to the United States in terms of information warfare than that posed by China. False True
false
White-collar crime cannot be applied to contemporary strain theory because of the assumption that only lower-class individuals commit crimes. True False
false
Which of the following is defined as a hacker who performs both legal and illegal hacker activities? Gray hat Cracker White hat Script kiddie
gray hat
The greatest threat to civil aviation security is: malicious insiders. hacking into communication systems. identity theft among employees. heavy reliance on other types of infrastructure.
heavy reliance on other types of infrastructure.
Website defacement is a form of: cyber and technological facilitation. infrastructure attack. information attack. propaganda and promotion.
information attack.
Distributed denial-of-service attacks are an example of: infrastructure attacks. cyber and technological facilitation. propaganda and promotion. information attacks.
information attacks.
According to Merton, a(n) ___________ accepts the goal of economic success but rejects the institutionalized means to obtain it. rebel innovator conformist ritualist
innovator
The primary difference between data alteration and network intrusion is the characteristics of the computer criminal who commits these offenses. punishment imposed for the offenses. intent of the intruder. sophistication of the action.
intent of the intruder.
Which hacker subculture norm is concerned with the potential criminal charges of information sharing in the real world and in cyberspace? Knowledge Technology Commitment Law
law
This group tends to define hackers and their activities in terms of the danger associated with hacking and its sometimes malicious intent. Law enforcement Hacker subculture None of the above Media
media
Which magazine has tried to establish credibility among important figures in computer culture by refusing to stigmatize the word "hacker"? <i>Science</i> <i>Consumer Reports</i> <i>Cyberpunk</i> <i>Wired</i>
<i>Wired</i>
Which of the following is most true? Most research of cybercrime focuses on behavioral approaches. Case studies offer generalizations on cybercriminals. A great deal of effort is dedicated to computer security. Early researchers felt that computer crime would be a large problem.
A great deal of effort is dedicated to computer security.
Which of the following is defined in terms of their activities related to denial of service attacks? White hat Cracker Gray hat Script kiddie
script kiddie
An insider using passwords stolen from coworkers in order to conceal changes he made to credit reporting data in exchange for money is an example of which form of attack method? Comprised accounts Social engineering Authorized use of an organization's systems Bypassing security and control processes
Comprised accounts
Which of the following is not true? Al Qaeda leaders have claimed to be actively planning a "cyber jihad" against the United States. U.S. officials have found evidence of al Qaeda using LOphtCrack. Al Qaeda produced the computer virus "Stuxnet." U.S. officials have found evidence of al Qaeda researching digital switches that run critical infrastructure.
Al Qaeda produced the computer virus "Stuxnet."
Which of the following forms of technology expanded the scope of hacker activities? Modems Personal computers All of the above Computer networks
All of the above
Which of the following is not considered in the calculation of costs associated with each type of computer crime? Anti-virus software All of the above are considered in the calculation of costs. Reputational damage Loss of revenue
All of the above are considered in the calculation of costs.
According to Cohen and Felson, crime occurs when there is a convergence in time and space of three factors. Which of the following is NOT one of those factors? A suitable target An adequate sight line from the location The absence of a capable guardian A motivated offender
An adequate sight line from the location
A call center with access to customer credit reports selling customer data to an outside organized crime organization for the purposes of identity theft is an example of which form of attack method? Social engineering Authorized use of an organization's systems Bypassing security and control processes Comprised accounts
Authorized use of an organization's systems
Which of following is not a common theme to emerge from the research on the problems of computer crime? Behavioral approaches of cybercriminals Computer fraud within government agencies Incidences of network incursion The work of hackers
Behavioral approaches of cybercriminals
A university enacts a policy in which any student that is caught illegally downloading media files will be automatically expelled from the university. The university hopes that students will be deterred from engaging in illegal downloading. This policy is an example of which theory? Strain Theory Routine Activities Theory Choice Theory Learning Theory
Choice Theory
Which of the following is not a reason that choice theory became popular among criminologists in the 1970s? The practice of rehabilitation came under attack after the "Nothing Works" article appeared. Crime-producing traits and factors were discovered. The public began to view punishment as the primary reason for incarceration. The reported crime rate in the 1960s and 1970s increased significantly.
Crime-producing traits and factors were discovered.
Intellectual property violations, component theft, counterfeiting, and identity theft are examples of which type of computer crime? Computer as a target Crimes associated with the prevalence of computers Computer as incidental to crime Computer as an instrument of a crime
Crimes associated with the prevalence of computers
Which of the following is not a characteristic noted by Anderson and colleagues in 2012? Traditional crimes that have changed with the advent of the Internet Traditional crimes that are now "cyber" because they are conducted online New crimes that have been originated since the advent of the Internet Crimes that facilitate other crimes through the proper use of computers
Crimes that facilitate other crimes through the proper use of computers
According to Agnew's General Strain Theory, which of the following is NOT a source of strain? Disjunction between expectations and achievements Presentation of negative stimuli Cultural goal of economic success Failure to achieve positively valued goals
Cultural goal of economic success
Which of the following is most true? Law enforcement was prepared to handle the newest threats of digital crime. Cybercrime is well researched. Cybercrime has significantly increased since the 1990s. Cybervictimization is likely leveling off.
Cybercrime has significantly increased since the 1990s.
Which of the following is least true? Cyberterrorism is a politically or ideologically motivated attack. Cyberterrorism may include prolonged loss of infrastructure. Cyberterrorism is defined by the group perpetrating it. Cyberterrorism is premeditated.
Cyberterrorism is defined by the group perpetrating it.
Which of the following is NOT a personality characteristic conducive to crime identified by the Gluecks? Impulsivity Resentment Lack of self-esteem Lack of self-control
Lack of self-esteem
A judge tells a defendant, "You are sentenced to prison not because of your crimes, but so that others will not engage in the same crimes." This is an example of which type of deterrence: Specific deterrence General deterrence Individual deterrence Group deterrence
General deterrence
Which of the following is not one of the five essential components of infrastructure? Government Information networks Communication networks People
Government
This group tends to define hackers and their activities in terms of creative problem solving and as a "pro-social" activity. Media Hacker subculture Law enforcement None of the above
Hacker subculture
Which of the following is not a characteristic of the "Hacker Ethic"? Computers can change your life for the better. Hackers should not be judged by their hacking. You can create art and beauty on a computer. All information should be free.
Hackers should not be judged by their hacking.
A hacker that uses his skills and attitudes to convey a political message is known as a: Hacktivist Black hat hacker White hat hacker Script kiddie
Hacktivist
According to Kohlberg, right corresponds to seeing one's own needs met, taking responsibility for oneself, and allowing others to do the same in which stage of moral development? Punishment and obedience orientation stage Hedonistic orientation stage Social contract, legalistic orientation stage Law and order orientation stage
Hedonistic orientation stage
Which of the following is NOT a social engineering tactic? Technical detail Bluster Identity theft Camaraderie
Identity theft
What major category of information warfare/cyberterror do "cyber-plagues" fall into? Information attacks Infrastructure attacks Promotion Technological facilitation
Information attacks
What major category of information warfare/cyberterror does "website defacement" fall into? Information attacks Infrastructure attacks Technological facilitation Promotion
Information attacks
An individual that engages in computer crime, fraud, and robbery in an effort to obtain financial success has adopted which form of Merton's modes of adaptation? Innovation Ritualism Conformity Retreatism
Innovation
Which of the following is most true? Employers always report computer crimes committed by employees. It can take months or even years to identify an actual monetary value for the loss of intellectual property. Estimates concerning the costs of cybercrime are derived from crime statistics. Estimates of costs are easy to calculate across different categories of computer crime.
It can take months or even years to identify an actual monetary value for the loss of intellectual property.
This group tends to define hackers and their activities in terms of the illegality of hacking. Hacker subculture None of the above Law enforcement Media
Law enforcement
Which of the following is not a characteristic of the hacker subculture norm technology? Eleet speek or k-rad Mentoring inexperienced hackers Using online resources to exchange information with other hackers The use of multiplayer computer games to help give hackers an interest in technology
Mentoring inexperienced hackers
Which of the following is NOT a finding of Holt and Bossler's empirical study of routine activities theory and online harassment? Computer software created specifically to decrease malware victimization had no impact. Routine computer use increased the odds of online harassment. Personal and peer involvement in deviance had no influence on the risk of online harassment. Individuals engaging in media piracy and viewing pornography were at increased risk of malware infection.
Personal and peer involvement in deviance had no influence on the risk of online harassment.
Which is not a category of cyberterrorism? Technological facilitation Promotion Information attacks Physical attacks
Physical attacks
Which of the following is NOT a characteristic of Marxist thought? Trust, order, and security maintained the ruling status of the wealthy elites. Political change can be achieved without conflict. Groups of people revolting against ruling elites have changed history. Successful revolutionary strategy began with a core group of leading individuals.
Political change can be achieved without conflict.
A terrorist group that hacks into an electrical power grid in order to cause a massive blackout and disrupt normalcy in the name of economic equality has subscribed to which theory? Political theory Learning theory Choice theory Social structure theory
Political theory
Which of the following is most true? The text focuses on mainly on Macintosh-based systems. Practitioners in both the criminal justice field and the computer science field typically have limited knowledge of each other's occupations. All forms of digital crimes are covered in the text. The authors of the text treat digital crime and digital terrorism as separate concepts.
Practitioners in both the criminal justice field and the computer science field typically have limited knowledge of each other's occupations.
Which of the following is one of the four categories that encompasses cyberterrorism and/or information warfare? Promotion Stenography Unauthorized intrusions Cryptography
Promotion
Which of the following is not a component of information warfare? Security measures Physical destruction Propaganda Psychological operations
Propaganda
According to Kohlberg, which two stages of moral development are completed by age 7? Hedonistic orientation stage and interpersonal concordance stage Punishment and obedience orientation stage and hedonistic orientation stage Law and order orientation stage and hedonistic orientation stage Social contract, legalistic orientation stage and punishment and obedience orientation stage
Punishment and obedience orientation stage and hedonistic orientation stage
Which of the following is not a wave in the development of warfare as identified by Alvin Toffler? Information wave Agrarian wave Industrial wave Renaissance wave
Renaissance wave
Which of the following is NOT a characteristic of the original phone phreaks? Restriction to the technology of the phone company Counterculture attitude of the 1960s and 1970s Blue boxing Paranoia
Restriction to the technology of the phone company
Which of the following is NOT an assumption of deterrence theory? Offenders must be aware of the penalty for particular crimes. Individuals are rational actors. Individuals view risks of particular crimes as unpleasant. Sanctions must be swift, severe, and absolute.
Sanctions must be swift, severe, and absolute.
_____________ is designed to impose a sanction on convicted offenders in order to prevent them from continuing to commit criminal acts in the future. Individual deterrence Group deterrence Specific deterrence General deterrence
Specific deterrence
Which of the following theorists developed a learning theory of crime? Kohlberg Sutherland Agnew Merton
Sutherland
Which of the following is not an example of Donn Parker's work as an early commentator on problems associated with computer crime? The "cyber" prefix to describe computer crimes. The observation that researchers felt that computer crime was not worthy of specific explicit research. The ease with which criminals could misuse information. The observation that losses increase substantially with intentional acts involving computers.
The "cyber" prefix to describe computer crimes.
Which of the following is least true? Cyber warfare is incorporated in military training in China. China views cyberspace as a way of compensating for its deficiency in conventional warfare. The Chinese government restricts the use of cyber warfare to the Chinese military. Information warfare is considered necessary to the Chinese government to support its objectives and strategy.
The Chinese government restricts the use of cyber warfare to the Chinese military.
Which of the following is not true? The Russians view cyber capabilities as tools of information warfare. The Russians carry out cyber operations alongside psychological operations. The Russians view military cyber operations differently than those cyber operations employed for hacktivism, cyber aggression, and cybercrime. The Russians view information warfare from a holistic approach.
The Russians view military cyber operations differently than those cyber operations employed for hacktivism, cyber aggression, and cybercrime.
Which of the following is most true? The processes and dynamics involved in the production of digital crime and digital terrorism are virtually the same. Digital crime and digital terrorism are not on parallel tracks. Digital terrorism does not pose as great a threat as digital crime. Digital crime is another term for digital terrorism.
The processes and dynamics involved in the production of digital crime and digital terrorism are virtually the same.
Which of the following is most true? The public relies on computers for a host of societal functions. Threats of cyberterrorism are grossly exaggerated. The public perception is that law enforcement and government officials are well-equipped to deal with cybercrime.
The public relies on computers for a host of societal functions.
Which of the following is not one of the three major credit reporting bureaus that control the information on all persons applying for credit in the United States? Trans Credit Experian Trans Union Equifax
Trans Credit
The contemporary warez scene has expanded to include which of the following? All of the above Console games Digitally compressed movies before they are actually released DVD decoding
all of the above