cybercrime and digital forensics fall 2021 final exam
__ is the author of the 1986 work "the conscience of a hacker" also known as "the hackers manifesto"?
the mentor
what is 'recent porn'?
the online, non-consensual distribution of nude photographs or videos for retribution by a former intimate partner
which of the following is not one of the three components of routine activities theory?
a detailed plan
the subculture of piracy places great value and status on which of the following factors?
all of the above
which of the following types of content are NOT protected under the first amendment of the us constitution?
all of the above
which of the following is not a negative outcome of cyberbullying victimization?
anorexia
in 2001, bram cohen released this decentralized protocol for peer-to-peer file-sharing that was extraordinarily resilient to shutdown attempts?
bittorrent
what is the name of the peer-to-peer file-sharing program that became very poplar among pirates in the mid-2000s?
bittorrent
a skilled hacker who engages in hacks with malicious outcomes may be commonly referred to as what the of hacker?
black hat
what form of malware enables a network of infected computers to be commanded remotely after infection?
botnet
a __ attack attempts to break cryptographic protections by using a computer to run through all possible combinations of a key to break cipher?
brute force
which us state was the first to implement a data breach law?
california
early reports of stalking during 1989 and 1990 found that media coverage mostly causes on __?
celebrities
what is the name of the uk organization that informs critical infrastructure owners of emerging threats and coordinates incident responses?
centre for the protection of national infrastructure
many experts and commentators prefer to use the term __
child sexual abuse images
what is the name for services that allow individuals to remotely access files stored on web servers via the internet?
cloud storage
what is the term used to describe the stage in the forensic process where data is retrieved and preserved?
collection/acquisition
the term __ references direct relationships between police and the general public to identify certain forms of crime that are viewed as a challenge and finding ways to work together to combat the issue.
community policing
what is the name of the agency formed as a result of the morris worms spread?
computer emergency response team
within the us, this act made it a crime to knowingly access computers without authorization, obtain unauthorized information with intent to defraud, or cause damage to protected computers?
computer fraud and abuse act
which uk hacking law was created due to the schifreen and gold case of 1984?
computer misuse
what is the name of the legal statute used to pursue cases of intellectual property infringement in the us?
copyright act of 1976
any act that violates codified legal statues is considered what?
crime
which form of law is used to resolve disputed between private parties including individuals and businesses?
criminal
computer hacking would be placed under which category in walls typology of cybercrime?
cyber-trespass
according to wall, a legal category of cybercrime which posits individuals virtually crossing boundaries into other peoples property is known as __?
cyber-trespassing
this act is the persistent and targeted harassment of an individual via electronic communication such as email?
cyberstalking
generally speaking, if a criminal suggests that their victim was asking for it, they are applying which technique of neutralization?
denial of victim
what theory considered the decision-making processes of offenders and views the likelihood of offending as a judgement of risk relative to offending rewards?
deterrence theory
akers dynamic process of social learning begins with which of the following elements?
differential associations
__ involves the collecting analyzing and reporting on digital data in a way that is legally admissible?
digital forensics
this form of activism involves exposing collections of private information on an individual, often with the goal of shaming, silencing, or coercing the person?
doxxing and leaking
this process allows communications to be encoded priority to transmission so that they will be unreadable in intercepted?
encryption
what is the term used to describe a data storage device that is portable and located outside of a computer that can be connected via USB or other means?
external hard drive
in the us, laws which have attempted to curtail children's exposure to pornographic material have generally been struck down under this constitutional amendment?
first amendment
__ is something that can 'increase the striking potential of a unit without increasing its personnel.'?
force multiplier
what standard recognizes that scientific evidence can only be admitted if it is generally viewed as reliable by the scientific community?
frye standard
what is the term used to describe the use of hacking techniques to prose an activist agenda or express a political/social opinion?
hacktivism
what is the term used to describe the tangible or physical parts of a computer system?
hardware
when an examiner validates that the hard rive image they are working with in an authentic duplicate of the original, they use a unique algorithm to generate a:
hash value
what is the term used to refer to files that have been manipulated in order to conceal the contents of the original file?
hidden files
which of the following is not a way that extremist groups use the internet?
humor
what is the name of the us federal statue used to prosecute cases of possession or use of PII without the owners authorization?
identify theft and assumption deterrence act of 1998
when a computer or digital device is used as a storage device or in the facilitation of an offense, it is argued to be __ to the offense.
incidental
copyrights, patents, trade secrets, and trademarks are best classified as formed of __?
intellectual property
home security system, thermostats, and appliances that can be controlled via the web are examples of the __
internet of things
which of the following populations are largely considered the focus of research on cyberbullying?
juveniles
this hacker became infamous in the 1980s and 1990s for his various crimes involving phone phreaking, network intrusions, data exfiltration, and fleeing from authorities. he is perhaps best known for his social engineering exploits?
kevin mitnick
what is the term use for legislation that mandates an individual provide encryption keys or passwords to law enforcement in digital forensic investigations?
key disclosure laws
what is the general lifetime of copyright protections for intellectual property?
lifetime plus 50 years
gottfredson and hirschis (1990) general theory of crime states that crimes, simply put, are a product of __?
low self-control
which of the following is not a component of routine activities theory?
low self-control
what was the programming language use by virus writers to infect popular word processing software and other programs in the 1990s?
macro-programming languages
studies in hacking reveal it to be an overwhelmingly ____
male activity
this us court case provided a litmus test for obscene material: if the 'average' person finds that the work appeals to lustful interests in sex, or depicts sexual conduct as defined by state law, and lacks artistic value, then the state may consider the material 'obscene'.?
miller v california
what case established the legal definition for obscene content that is still in use in the us?
miller v. california
shawn fanning developed this peer-to-peer service in 1999 which lead to a massive increase in illegal music downloads?
napster
what us government agency operates the computer forensic tool testing project?
national institute of standards and technology (NIST)
what term refers to a hacker who operates with no connection to a military or government organization?
non-nation-state actor
which of the following is not a negative consequence associated with malware infections?
none of the above
what is the term used to describe an individual who is new to the hacker scene who wants to gain more skill?
noob
a software program that is freely available, and can be modified, used, or shared with anyone is called:
open source
Under Willard's typology of cyberbullying, what is the category that refers to posting real information about another person to embarrass them?
outing
what is the term used to refer to the organization of a hard drive into separate storage spaces?
partitioning
this type of online fraud takes the form of the mass distribution of emails distinguished as institutions such as banks, credit card companies, and e-sellers?
phishing and spoofing
what is the name for the doctrine that allows police to search and seize evidence that may not be indicated in a search warrant but is in plain view of the officer and incriminating?
plain view
which of the following is not a behavioral or attitudinal characteristic associated with cyberbullies?
positive affect
what term is used to refer to an individual who conducts investigations, including forensic examinations, own behalf of private citizens or businesses?
private investigator
what is the term used to describe spam email scams where the senders attempt to manipulate individuals into the purchase of penny stocks?
pump and ump schemes
this theory assumes that offenders conduct cost-benefit analyses before conducting criminal behavior?
rational choice theory
which of the following is not one of Robersons agnews three sources of strain?
removal of negating stimuli
in relation to cybercrime, what was the controversy that surrounded the 2016 us presidential campaign?
russian actors used the internet to interrupt and sow disordering during the election
what is the name for a legal document signed by a judge or magistrate that authorizes law enforcement to conduct a search?
search warrant
what is the term used to refer to the process where individuals accept a radical ideology without directly engaging others as part of that movement?
self-radicalization
this type of online fraud focuses on tricking people into handing over sensitive information like login credentials, social security numbers, and any other details that could compromise a persons security. sometimes described as "human hacking".?
social engineering
__ works by hiding data within the digital code used to construct images?
steganography
__ coined the term "the hacker ethnic" in his book hackers" heroes of the computer revolution.?
steven levy
__ was a "digital weapon" deployed to sabotage Iranian nuclear enrichment efforts?
stuxnet
what is the name of the malware used to compromise and harm uranium enrichment facilities in iran?
stuxnet
what was the name for a piece of malware created by mob that became popular among hackers?
sub7
which of the following is not a technique of neutralization?
support for social movements
the 418 scam gets its name from __
the Nigerian area code where most of these scammers were known to operate from in the early 2000s.
this act considerably strengthened penalties under the computer fraud and abuse act of 1986, including the provision for the life imprisionment of convicted 'cyberterrorists'.?
the US PATRIOT act of 2001
in the wake of 9/11, the bush administration created this federal agency to bolster the protection of critical information infrastructure?
the department of homeland security
what is the name of the trade association that brokers for the rights management concerns of recording artists?
the recording industry association of america (RIAA)
this type of computer intrusion is the stealing or copying of information, such as theft of software, business secrets, and personal information?
theft of proprietary/confidential information
which of the following is not a part of the scientific method?
theory
which of the following is not a specific criteria identified for imaging tools by NIST?
tools shall be affordable
what is the name of the downloadable program individuals can use to anonymize their online activity from others that has been a focus of law enforcement investigations over the last several years?
tor
which of the following anonymization tools have been targeted by law enforcement to better identify cybercriminals?
tor
this privacy-enhancing measure allows users to hide their IP addresses by rerouting network traffic, thereby bypassing attempts by regulatory bodies to block access to websites hosting or indexing pirated content?
virtual pirate networks
this form of hacktivism is the cyber-equivalent to the traditional protest method by which a particular site, associated with opposing or oppressive political interests, is physically occupied by activists?
virtual sit-ins and blockades
which of the following was the first form of malware identified in the wild?
virus
what is the term used to describe flaws in computer hardware or software that hackers exploit to affect system operations?
vulnerability
what is the term used to refer to individuals who broke software copyright protection in the 1980s to share files?
warez doodz
globally, __ are most likely to be victims of stalking?
women
what type of malware can autonomously spread on its own but does not necessarily have a payload?
worm
what is the name of the hacker who maintained propaganda websites and posted hacking training tutorials for the e-jihad?
younis tsouli
__ was a website operated by hunter moore which allowed offenders to not only post sexual photos of people but also disclose their identifying information. the website was shut down?
IsAnyoneUp.com
this was the name of the program that allowed the NSA to access the servers of companies and services like yahoo, google, facebook, and youtube for user data/
PRISM
