Cyber Crime

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

A. macro virus B. multipartite virus C. File infector virus D. boot sector virus

Cascade is an example of which of the following types of virus (m)

political information

China is know to prioritize ____ control over cyberdefense strategies

A. economic B. Political C. military D both economic and political

Cyberespionage can be classified into which of the following types? (m)

Phase 2

E-Mail borne viruses took place in which of the following phases of convergence

A. Decrypt your phone calls and text messages B. encrypt your hard drive C. Use a password manager D. Use two-factor identification

Edward Snowden, an American computer professional, provided all of the following tips for keeping data private EXCEPT (m)

A. Corporate B. individual C. political D. economic

Ghostnet was one of the most successful programs with regard to _____ cyberespionage (m)

A. Freedom B. Individuality C. aristocracy D Privacy

Groups with displeasure of government are often motivated by all of the following EXCEPT (m)

black hats

Hackers who are motivated by personal gain or a certain cause are often referred to as

Ethical hackers (white hats)

Hackers with their abilities to research vulnerabilities in software products and disclose them to companies that developed the software are known as ______

Insider

Human behavior that departs from compliance with established policies, regardless of whether it results fro malice or a disregard for security policies, is the manifestation of a/an _____ threat

Felony Crime

IN 1998 Congress passed the assumption Deterrence Act making identity theft a

Code Red

In 2001, the first malware attack fell into phase 3 of convergence known as

A. KillDisk B. Darkcomet C. Rbot D. Blackshades

In 2015, a cyberattack was launched against Ukraine by the Russians. The ____ attack to shut down the power grid based in Russia was possibly backed by the Russian government (m)

Identity theft

In 2015, the most common crime reported to the Federal Consumer commission was ________

Human machine

In the ____ cluster, computer infrastructure and vulnerabilities are the focus of attacks

Technological

In the ______ cluster, computers are the target of the cybercrime

Spam

Is defined as unsolicited commercial email that includes any commercial emails addressed to a recipient with whom the sender has no existing business or personal relationship and not sent with the consent of the recipient

A. major U.S. newspapers B. social media sites C. telecommunications providers D. all the above

The SEA (Syrian Electronic army) has been responsible for attacks against which of the following?

Dark web

The _____ , an underground web, allows offenders to stay anonymous and undetected, as these are not traceable by police

A. misdemeanor crime B. infraction C. federal crime D. a crime not punishable by law

The economic Espionage Act of 1996 makes it a ___ to steal or interfere with trade secrets (m)

A. email B. text message C. Mail D. phone call

The internal Revenue service uses which of the following methods to contact a taxpayer? (m)

A. malicious B. careless C. Exploited D. feared

The least common but most costly _____ insider threat (m)

A. denigration B. inclusion C. exclusion D. impersonation

The posting of harassing messages aiming to cause harm to the victim is also known as (m)

A. Keylogging B logic bombs C. botnets D. trojan horses

Which of the following are considered small programs or sections of a program triggered by some event such as a certain date or time, a certain percentage of disk space filled, or the removal of a file (m)

A. china B. Russia C. United States D. south korea

Which of the following countries is known to be the most advanced with regard to computers, hardware, and software? (m)

A. People B. Software C. Hardware. D. Network

Which of the following is Not considered the main targets of information technology? (m)

A. Deleting files B. Watching users through the webcam C. Internet shutdown D. using the computer to infect other computers

Which of the following risks is not created by Trojan Horses? (m)

A. modems B. network appliances C. Surveillance systems D. industrial control systems

Which of the following was NOT identified as a hardware device in the text? (m)

A. Nation-states hacking or spying on trade and other secret information B. Advanced hackers aiming at large corporations C. Hacking or spying on city and local governments D. terrorists looking to identify and exploit vulnerabilities in our infrastructures

Which of the following was NOT identified as one of the main forms of international threats? (m)

A. Host-based mitigation B. data backup C. Proactive measures D. Network-Based mitigation

Which of the following was not identified as a countermeasure for networks in text? (m)

A. Infinity B. Non-repudiation C. Scrambled Text D. Attribution

____ is an encryption component that refers to a digital signature providing proof of authorship (m)

A. Boot sector B. file infector C. Multipartile D. Macro

_____ virus infect data files (m)

A. Gray hats B. Black hats C. white hats D. green hats

________ typically work independently to expose security vulnerabilities or practices that endanger individuals' private data (m)

A. cyberthreat B. Cyberwarfare C. cybersecurity D. cyberattack

a _____ refers to persons who attempt unauthorized access to a control system device and/or network using a data communications pathway (m)

A. Foreign governments B. spies C. Insiders D. hacktivists

according to the national surveys, ____ are the second greatest threat to a company's cybersecurity, only trumped by hackers (m)

A. Act B. means C. Purpose D. outcome

according to the text, human trafficking consists of all of the following elements except (m)

firewalls

are software programs or pieces of hardware that help screen out hackers, viruses, and worms that try to reach computers via the internet

A. denial-of-service attacks B. worms C. phishing D. spamming

cyber-terrism attacks often take the form of ____ (m)

gray hats

hackers who are motivated by financial gains and who conduct both bad and ethical hacking are referred to as

A. Economic B. Educational C. Military D. leadership

historically, power has depended on which of the following strengths? (m)

Denial of Service

in 2001, the original code Red malware initiated a ____ attack on the white house

Botnet

is defined as a collection of infected machines worldwide that receive commands and perform some illegal actions such as distributed denial of service attacks, among others

Russia

one of the most persistent threats for the United States in terms of cyberattacks originates in

A. feared B. exploited C. malicious D. careless

people who are "tricked" by others into giving up access information or information about themselves to an external party known as ____ insiders (m)

Identity theft

refers to all types of crime in which someone wrongfully obtains and uses another person's personal data in some way that involves fraud or deception, typically for economic gain

a. Trojan horses B. Botnets C. worms D. spam

the Syrian Electronic Army has collected information using which of the following cyberattack techniques? (m)

Flaming

the exchange of insults in a public setting, such as a bulletin board or chat room, is known as

a. ciphers B. different flags c. dots and dashes

the first "software" was the Morse code developed by Samuel F. B. Morse. the morse code made telegraphing much easier by using ___ (m)

cyberbullying

the intentional, aggressive behavior toward another person that is performed through electronic means is also known as

A. extortion B. Terrorism C. embezzlement D. harassment

the most serious insider cybercrime include all of the following EXCPET (m)

local threats

threats that originate from inside the company or organization are referred to as

A. individual B. local C. national D. international

threats to cyberspace originate from all of the following sources expect ___ (m)

A. the members meet each other quite often B. It is male-dominated C. They work anonymously D. They have several public identities

which of the following characteristics of hackers is NOT true? (m)

A. Implement message authenticity B. update email policies C. Complete regular updates D. plan for ID theft after a data breach

which of the following countermeasures helps prevent e-mail spoofing, that is, the forgery of an email header to make it appear as if it is coming from a friend or employee? (m)

A. South Korea B. China C. Russia D. North Korea

which of the following countries is considered one of the most advance cyberespionage powers? (m)

A. Confidentiality of data B. Integrity of data C. Cost of data D. Availability of data

which of the following is NOT considered one of the main issues with cybersecurity? (m)

A. zapchast B. darkcomet C. Moonlight maze D. blackshades

which of the following is not an example of a cyberattack used by the Syrian Electronic Army? (m)

A. Naval flag system B. telegraph system C. box cypher D. raven system

which of the following systems led to the creation of the Morse Code? (m)

black hats

"bad guy" hackers are known as

Trojan Horse

A _____ malware is disguised as, or embedded within, legitimate software

Virus

A ______ is a small software program designed to spread from one computer to another and to interfere with computer operation

A. espionage B. sabotage C. terrorism D. treason

According to the text, China also engages in economic __ against the U.S. and other countries.

3

According to the text, by the year 2020, the economic cost of cybercrime is expected to go above __ trillion

A. Cyberespionage and cybersabotage B. Cyberterrorism and cyberespionage C. Cyberharassemt and cyberterrorism D. cybersabotage and cyberharassment

According to the text, cyberwarfare generally include which of the following? (m)

A. Personal Info B. Education Info C. Employment Info D. Demographic info

According to the text, phishing scams typically target ____ (m)

A. Fraud and identity theft B. theft of intellectual property C. Child pornography D. financial theft

According to the text, the most pervasive cyberthreat may be ___ (m)

A. Individuals B. government C. banks and financial institutions D. Educational institutions

According to the text, which of the following entities are considered a special target for botnets? (m)

A. Telecommunication B. Energy C. Education D. Transportation

All of the following were identified as vulnerable infrastructures EXCEPT (m)

A. corporate espionage B. political espionage C. economic espionage D. military espionage

An act that occurs when an actor, knowing that his or her actions with benefit any foreign government, instrumentality, or agent, steals, copies, or receives a ride secret is referred to as ___ (m)


Set pelajaran terkait

Chapter 3 - Nevada Real Estate Education Quiz

View Set

Muscles that move the wrist hand and digits FLEXORS

View Set

Three Inventories, Three Households

View Set

Micro chapter 19 (FINAL VERSION)

View Set

Econ 200 Chapter 7 - Consumers, Producers, and the Efficiency of Markets

View Set

The Middle Ages Warm Period -- New Agricultural Technologies

View Set

Human Nutrition Unit 3 (Chapter 12)

View Set

please based eco god let these be on the final

View Set

econ 2302 unit 4 ch 8 cost of taxation test

View Set