Intro Cyber Crime 7,8,9,11,14,15

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

T/F The FBI conducted the first National Computer Security Survey.

False

Which federal agency houses the Customs Cyber Smuggling Center (3C)? DOE ICE US Postal Inspectors The Secret Service

ICE

Which federal agency is known as the nation's preeminent "cryptological organization"? NSA Secret Service DOJ DOE

NSA

T/F Wireless networks can allow individuals inside a network boundary if they are not secured.

True

T/F In the past, firewalls were not widely used.

true

According to a recent survey, what percentage of local police agencies has experienced a "measurable increase" in the reporting of computer and electronic crimes?

80%

Which of the following basic steps in risk analysis should be performed last? Determine cost-effective strategy Implement firewalls Identify threats Assessment and evaluation

Determine cost-effective strategy

T/F Risk analysis plans are static. Once developed, they do not change.

False

________________ is the largest and primary investigative arm of the U.S. DHS. CES FBI DOJ ICE

ICE

Which of the following basic steps in risk analysis should be performed second? Assessment and evaluation Identify threats Implement firewalls Determine cost-effective strategy

Identify threats

T/F During the first era of computer security, the primary problem was the technology itself.

True

T/F The most essential feature of encryption is that the data's intended user can return scrambled data to a useful form.

True

The National Computer Security Survey found that ____% of the businesses sampled experience at least one cybercrime in 2005.

67

Which of the following is a characteristic of the black market? All of the above Market driven Has a payroll Distribution network

All of the above

Which classic element of computer security is generally not required for an encryption scheme?

Availability

___________________ are the most important security measure a company or individual can take.

Backup

ELF emerged from a group called:

Earth First!

T/F The FBI does not have any public sector partners.

FAlse

T/F A worm cannot spread without active intervention by the user.

False

T/F Formal risk analysis only focuses on internal threats.

False

T/F Police officers have been adequately trained in how to handle hate crimes.

False

T/F Threats to integrity are limited to malicious actions.

False

Which of the following is not a division of the Bureau of Consumer Protection within the FTC?

Fraud

___________ allows a firewall to block traffic from a known bad location.

Packet Filtering

T/F Most security threats come from inside an organization

True

T/F White power groups in the United States became more active in 2008 and 2009.

True

A virus can be categorized based on: the type of environment it operates in. the operating system it targets. all of the above. the type of encryption and operating algorithms used.

all of the above.

According to the Sans Institute, the number-one cyber threat is:

increasingly sophisticated website attacks that exploit browser vulnerabilities.

The unique feature of a worm is that it:

is self-replicating.

The most effective tool for dealing with Internet fraud is:

prevention.

The FBI has estimated that over a five-year period, ALF and ELF have committed more than 600 criminal acts in the United States, which have resulted in damages that exceeded:

$43 million.

The National Cyber Response Coordination Group is composed of how many federal agencies that respond to cyber-attacks?

13

Approximately ___% of the population is covered by NIBRS reporting.

29

According to surveys, what percentage of local law enforcement agencies do not have adequate capabilities to read encrypted evidence:

50%

The Supreme Court decided that two sections of the Child Pornography Prevention Act were unconstitutional in:

<i>Ashcroft v. Free Speech Coalition</i>

Which of the following is NOT part of Finkelhor's four-part model that enunciates how a sex offense occurs between an offender and a child victim? Any internal inhibitions against acting on the motivation to engage in sexual assault must be overcome. Any external impediments to acting on the impulse to abuse must be overcome. A potential offender must have some motivation to sexually abuse a child. A potential offender must avoid detection from law enforcement.

A potential offender must avoid detection from law enforcement.

_____________ manifest(s) in several ways, including changes to the browser, redirecting startup pages on Internet browsers, replacing the search function within the browser, and generating pop-up ads and frames that can be difficult to delete or shut down.

Adware

Child pornography is used by a pedophile to: All of the above Blackmail a child into remaining silent Feed and create sexual fantasies Lower the inhibitions of the child whom they are planning to molest

All of the above

The original U.S. Patriot Act had effectively increased law enforcement power in which of the following areas? Trap and trace orders Court orders and subpoenas Wiretaps All of the above

All of the above

What factors have limited the ability of local law enforcement agencies to respond to the growing threat of computer crime? Lack of diagnostic equipment Lack of specialized personnel All of the above Lack of training

All of the above

What factors make some groups more vulnerable than others to online victimization? People who actively participate in chat rooms All of the above Troubled or rebellious teens seeking emancipation from parental authority Regular use and access to a computer with Internet capability

All of the above

Which of the following is a form of new technology of user identification? Retinal identification Voice recognition Digital fingerprint identification All of the above

All of the above

Which of the following is a trigger for a virus? All of the above Downloading a peer-to-peer file Opening an e-mail attachment Self-execution on a certain date

All of the above

Which of the following is a weakness in counterterrorism efforts that was identified after September 11, 2001? Outdated and obsolete computer systems Failure to provide timely, accurate, and specific intelligence information to law enforcement agencies All of the above are weaknesses that were identified after September 11, 2001. Failure to place an emphasis on traditional human intelligence gathering and analysis

All of the above are weaknesses that were identified after September 11, 2001.

Which of the following would NOT be considered part of a formal risk analysis? Sabotage Terrorism threats All of the above would be considered part of a formal risk analysis. Natural disasters

All of the above would be considered part of a formal risk analysis.

Which of the following was NOT a limitation in risk analysis for early computing? Rudimentary networking Lack of operating memory Storage and processing speed All were limitations to risk analysis for early computing.

All were limitations to risk analysis for early computing.

Which of the following basic steps in risk analysis should be performed first? Assessment and evaluation Determine cost-effective strategy Identify threats Implement firewalls

Assessment and evaluation

___________________ can reach very large sizes and may include thousands of machines.

Botnets

Which of the following best describes the link between child pornography and pedophilia?

Child pornography serves as a primary facilitator for pedophilia.

Which federal agency collaborates with the Computer Incident Advisory Capability (CIAC)? DOE FBI DOJ Secret Service

DOE

Which federal agency houses CCIPS? DOE Secret Service DOJ FBI

DOJ

_________________________ is an evolution in IT technology sometimes referred to as the "next generation of firewall technology."

Deep Packet Inspection

Which of the following is not an offense or definition of offense created by the Protection of Children from Sexual Predators Act?

Definition of sex tourism

A ________________ uses multiple systems to attack one or more victim systems or websites with the intent of denying service to legitimate users wishing to log on or utilize the attacked server.

Denial-of-Service attacks

The "Monkey Wrench Gang," a 1975 book written by Edward Abbey inspired the development of what group:

Earth/Environmental Liberation Front

This type of security technology works to "scramble" computer messages and/or data.

Encryption

The category of stalkers that believe the victim is in love with him or her is called:

Erotomaniacs

T/F All states define computer crimes as felonies.

FAlse

T/F CCIPS attorneys conduct hundreds of training seminars every year for other federal attorneys.

FAlse

T/F Cyber-based attacks and high technology crimes are of low priority for the FBI.

FAlse

T/F Most local agencies provide training in computer crime to patrol personnel.

FAlse

T/F State laws have kept up with the pace of technology relatively well.

FAlse

T/F The NSA has been providing the nation with "code-breaking" capabilities since the Civil War.

FAlse

T/F The U.S. Postal Service rarely conducts joint investigations with other federal agencies.

FAlse

T/F The chief law enforcement officer of the federal government is the director of Homeland Security.

FAlse

Which federal agency is primarily responsible for protecting consumers against computer-generated commercial fraud? FTC FBI DOJ DOE

FTC

T/F ALF was originally organized in Arizona during the 1980s.

False

T/F Activist websites are legally prohibited from posting specific information about people on their websites.

False

T/F Adware typically takes advantage of the fact that many software users do not read the end user license agreement (EULA) or the fine print during installation.

False

T/F An air-gapped machine is only 95% immune to network attacks.

False

T/F Anarchist International can be characterized as a conglomerate of right-wing extremist groups.

False

T/F Apple computers are immune to viruses.

False

T/F Biometrics provide absolute security.

False

T/F Boot viruses do not change infected files, but instead close the target file so that when run they "force" the OS to execute their code.

False

T/F During the first era of computer security, more harm was caused from intrusion or malicious intent than from failure to properly maintain systems and backup schedules.

False

T/F It is relatively easy to identify and track crimes of child exploitation and abuse.

False

T/F Law enforcement is currently well trained in issues of cyber crime and investigation.

False

T/F Most child molesters are caught before they have the chance to molest numerous children.

False

T/F Most child pornography offenses are covered by state law.

False

T/F Most law enforcement agencies are trained to recognize the serious nature of stalking crimes.

False

T/F One of the most widely distributed cartoons on the right is called Border Patrol.

False

T/F Organized crime groups do not keep computerized records in a manner similar to businesses.

False

T/F Research has shown that children are not increasingly engaging in harassing behaviors online.

False

T/F Resistance Records is a well-known distributor of racist video games.

False

T/F Risk analysis reports are typically short, with few recommendations.

False

T/F Since the creation of DHS, the Postal Service is no longer in the business of fighting computer-generated crimes such as child pornography.

False

T/F The framework for U.S. intelligence was created to deal with the problem of terrorism.

False

T/F The main operating principle of a macrovirus is its capability to transfer its code to a remote service or workstation on its own.

False

T/F The motives for many writers of malicious software have changed from profit to curiosity and revenge.

False

T/F There have been several violent acts attributed to newly formed anarchist groups.

False

T/F There is a central database that collects information on the damage that viruses cause.

False

T/F There is no federal law that imposes the death penalty if the death of a child results from a sexual offense.

False

T/F Those living in higher-income households were more likely to be stalked than those in lower-income brackets.

False

T/F Virtual workplace violence is not expected to increase in the future.

False

T/F Virus writers generally write viruses to steal information and destroy data.

False

T/F Viruses are always written for criminal purposes.

False

T/F Viruses of today are easy to detect as compared to early viruses.

False

This type of security technology is devices or software that act as a checkpoint between the network and individual users.

Firewalls

Which of the following is NOT a way that viruses and other types of malicious code are primarily and currently spread? Digital pictures Floppy disks Peer-to-peer file transfers Web pages

Floppy disks

Which of the following is not a critical infrastructure component? Food supply Public health services Transportation Information and communications

Food supply

Which offense is most likely to touch the largest number of community members in the near future? Hacking Espionage Fraud Cyber bullying

Fraud

Which of the following is NOT a method to security wireless networks? MAC WEP WPA HTTPS

HTTPS

Which of the following is NOT a lawful limitation on speech? Obscenity Hate Libel/Slander Incitement

Hate

The ___________________________ provides victims of Internet fraud of mechanism to report suspicious activities online.

ICCC or IC3

Pedophiles use the Internet for all of the following purposes, EXCEPT: Identity theft Engaging in inappropriate sexual communication with children Trafficking child pornography Communicating with other pedophiles

Identity theft

Threats to ______________ are threats that actually alter data.

Integrity

_____________ can be defined as information, which has been identified as relevant, collected, verified, and interpreted within the context of specific objectives.

Intelligence

The largest computer crime problem affecting local law enforcement with the largest number of victims is:

Internet fraud.

Which of the following is NOT a characteristic of spyware? Spyware typically is installed in addition to some other functional software. Spyware can lead to annoying pop-up ads. Internet users are rarely warned about spyware in EULAs. Spyware sends information via the Internet to publishers and programmers for marking purposes.

Internet users are rarely warned about spyware in EULAs.

Which country is NOT traditionally connected with child sex tourism? Japan Sri Lanka Thailand Philippines

Japan

All of the following are typical characteristics of stalkers, except: White Between the ages of 18 and 35 Male Low income

Low income

Which of the following is NOT one of the four primary environments viruses operate in? Macroviruses Microviruses Boot viruses Network viruses

Microviruses

Which of the following is NOT a typical victim of online exploitation? Children Women Adolescents Middle class males

Middle class males

Which of the following is NOT a characteristic of intruders during the first era of computer security? Most intruders engaged in recreational intrusion. The intruders were usually insiders. Only a few people had access and the appropriate skills to intrude into computer systems. Intruders sought knowledge and resources to continue their use of computers.

Most intruders engaged in recreational intrusion.

Which of the following is NOT true regarding the type of youths targeted for sexual solicitations and approaches? Most youths targeted met the aggressor online. Most report the incidents to local law enforcement. Girls are targeted at almost twice the rate of boys. Most youths targeted were 14 or older.

Most report the incidents to local law enforcement.

Which is the lead agency responsible for monitoring and protecting all of the federal government's computer networks from acts of cyberterrorism?

NSA

he greatest number of Internet users are in:

North America, Asia, and Europe.

Which government passed a law called "The new Personal Information International Disclosure Protection Act" to protect their citizens from having any information provided through PATRIOT Act investigations?

Nova Scotia

The most famous instance of an organization placing specific, personal information on a website is the _________________ Files case.

Nuremberg

The CSSS arrests and prosecutes the sale and distribution of counterfeit pharmaceuticals and controlled substances over the Internet through: Operation Apothecary. Operation Pharmacy. Operation Doctor. Operation Medicine.

Operation Apothecary.

A liberal mainstream site, operated by PETA, that is youth oriented is called:

PETA 2.

The single greatest problem in computer security is:

Password protection

This type of security technology can involve biometrics.

Passwords

Which of the following is NOT a form of telecommunications fraud? Theft of telephone credit card numbers Wireless phone theft and fraud Hacking into telecommunications "switches" Phone phreaking

Phone phreaking

A __________________ has no constant section of code.

Polymorphic virus

Which of the following would not be an example of cyberbullying? Sending nasty e-mail messages constantly Using Facebook to spread rumors about someone Posting embarrassing photos of someone in a school bathroom Sending hurtful text messages

Posting embarrassing photos of someone in a school bathroom

Which of the following is not a role of the FBI in fighting computer crime? Stop online sexual predators who produce or share child pornography Prosecute crimes related to encryption, e-commerce, and intellectual property crimes Dismantle national and transnational organized crime groups engaging in Internet fraud Capture criminals behind serious computer intrusions and the spread of malicious code

Prosecute crimes related to encryption, e-commerce, and intellectual property crimes

Which of the following type of Trojan horse turns a victim's computer into a zombie server available to the whole world or to the attacker only?

Proxy/Wingate Trojans

The most popular password generator is:

RSA SecurID

Which subtype of child molester typically leads the most stable life?

Regressed child molester

Which of the following is NOT a characteristic of investigation? Reports are generally open. Arrests are made based on evidence and facts. Sources are known and open. Proactive

Reports are generally open.

Unless a computer system holds a particular interest, the most likely threat comes from:

Script kiddies

Which agency has primary jurisdiction in cases involving access device fraud? DHS FBI NSA Secret Service

Secret Service

What is NOT a category of threats to information systems?

Security

Traveling abroad to have sex with underage children is known as:

Sex tourism

Which of the following is NOT a primary category of stalker? Vengeance Sexual sadist Love obsession Simple obsession

Sexual sadist

Which of the following is NOT a characteristic of intelligence? Proactive Arrests are rarely made. Reports are closed. Sources are known and open

Sources are known and open

Which of the following is NOT a type of Trojan horse discussed in the text? Spyware Trojans Software Detection Killers Destructive Trojans Remote access Trojans

Spyware Trojans

Which of the following is a major obstacle for law enforcement in investigating Internet exploitation?

The Internet offers relative anonymity

Which of the following is NOT a primary federal agency that combats Internet exploitation, cyber stalking, and obscenity? The Postal Inspective Service FBI The Secret Service ICE

The Secret Service

Which of the following statements is true regarding current organized crime groups? The entrepreneurial groups will increasingly adopt technology as a criminal instrument. They do not, and probably will not use computers to facilitate their crimes. The current groups will use computers only to keep criminal records. They will likely only be involved in stealing and reselling technology.

The entrepreneurial groups will increasingly adopt technology as a criminal instrument.

Which of the following is MOST true? The Middle East has not experienced significant growth in the number of Internet connections. Hackers do not share techniques. The globalization of hacking will become a significant threat to networks around the world. Hackers are only as dangerous as the programs they create on their own.

The globalization of hacking will become a significant threat to networks around the world.

Which of the following is true? There is a centralized record keeping source monitoring all of the trends in cyber crime. The number of reported cyber crimes is decreasing. The number of reported cyber crimes is likely to increase substantially. Cyber crime is not currently a large problem.

The number of reported cyber crimes is likely to increase substantially

What provides law enforcement agencies the incoming numbers to a subject's phone?

Trap and trace

An unauthorized program typically contained within a legitimate program is known as a: macro. worm. Sparta. Trojan.

Trojan.

T/F Attack tools are increasingly being distributed through "zombie" machines that are compromised on university campuses.

True

T/F Black markets operate much like any business.

True

T/F E-commerce generates hundreds of billions of dollars in revenue annually, making the Internet economy comparable in size to the energy, automobile, and telecommunications industry.

True

T/F Law enforcement's primary focus is to collect evidence after a crime is committed in order to support prosecution in a court trial.

True

T/F Many computers and individuals can be victimized despite the presence and use of antivirus and other protective programs.

True

T/F Most people using electronic forms of communication are much more brazen than they would be face to face.

True

T/F Ninety-five percent of all cases of child exploitation involve both computers and physical mail.

True

T/F No murders have been directly attributed to environmental activities.

True

T/F Older children are more at risk of being victimized online than younger children.

True

T/F Online banking and shopping sites have created more attractive targets for criminals to engage in identity theft, fraud, and espionage.

True

T/F Pedophiles use the Internet to troll for victims, to exchange pornography, and to network with other pedophiles.

True

T/F Posting child pornography via Web pages has been curtailed substantially over the past decade.

True

T/F Reports have shown that there were billions of cyber-attacks against U.S. interests in 2012.

True

T/F Research has shown that males are the aggressors in the majority of sexual solicitations and approaches.

True

T/F Some hacker groups are predicted to evolve into organized, criminal enterprises.

True

T/F The DHS subsumed the Federal Emergency Management Agency.

True

T/F The FBI and other police agencies are restricted in sharing information with the CIA.

True

T/F The Internet allows individuals to self-publish cartoons and videos.

True

T/F The Internet has made the recruitment of members easier than prior to the dawn of the information age.

True

T/F The Internet is the primary facilitator of the sex tourism industry.

True

T/F The Sub Seven Trojan allows a remote attack virtual control over an infected machine.

True

T/F The cybercriminal of today is often likely to be operating in a jurisdiction outside the United States.

True

T/F The disparity in equipment between federal and local cyber cops can most clearly be seen in the inability of most local agencies to decipher encrypted computer evidence.

True

T/F The growth of sexual tourism is often attributed to a Western military presence that has increased the demand for sex workers.

True

T/F The primary purpose of risk analysis is to identify threats and then to provide recommendations on these threats.

True

T/F The reauthorized PATRIOT Act provides for judicial review and approval and a more detailed application process to specify law enforcement targets and actions.

True

T/F The threat to national security is significantly increased as we move to digital economies.

True

T/F There is evidence that hacker groups from Muslim majority nations are hacking to facilitate a religious or political agenda.

True

T/F There is no accurate statistical source that reports the extent or number of arrests involving child pornography.

True

T/F There is no comprehensive source of information containing a list of federal contact persons who could aid local investigators.

True

T/F Viruses and malicious code are graded based on the potential damage they can cause and their overall impact on computer operations at the individual level and across the world.

True

T/F Viruses are operating system and software system specific.

True

___________________, a form of racist propaganda, was found in the automobile of Timothy McVeigh when he was arrested after the bombing of the Murrah Federal Building in Oklahoma City, Oklahoma.

Turner Diaries

Which of the following is MOST true? Hate crimes affect only the direct victim. All states define a "hate crime" in the same manner. Victims of hate crimes are hurt physically and emotionally. Police officers are adequately trained in investigating hate crimes.

Victims of hate crimes are hurt physically and emotionally.

Which of the following is LEAST true? There is an increasing loss of privacy occurring through online sources. There is likely to be an increase in "virtual workplace violence." Children are experiencing greater levels of online harassment. Virtual crimes against persons always result in physical harm.

Virtual crimes against persons always result in physical harm.

Which of the following is NOT one of the ways a person can be cyber stalked? Virus attacks Chat room threats Hacking into a computer for personal information E-mail harassment

Virus attacks

Which of the following is true? Virus hoaxes are not as prevalent today as they were in the last decade. Virus hoaxes are annoying, but cost little in terms or time or resources. Virus hoaxes can cause no real damage. Virus hoaxes are just as potentially costly as the real thing.

Virus hoaxes can cause no real damage.

According to the 2013 Symantec Internet Security Threat Report, the majority of computer users are being compromised through their:

Web browsers.

High-tech games, heavy metal music, black cults, and links to other social youth movements are techniques used on the Internet by what types of groups?

White supremacy and hate groups

Which of the following is MOST true regarding victims of cyberbullying? Victims are often bullied by their current or former friends. Whites are less likely to be bullied than minorities. Victims do not often report their experiences. Most victims will talk about their experiences with friends.

Whites are less likely to be bullied than minorities.

According to federal law, a criminal offense is a hate crime when such crime is motivated by: all of the above. sexual orientation. race. religion.

all of the above.

Experts believe that computer hackers in developing countries will be increasingly motivated by: money. all of the above. politics. religion.

all of the above.

The character of espionage is expected to broaden into the arena of: information warfare. all of the above. economic espionage. theft of intellectual property.

all of the above.

Historically, the missing dimension in quality intelligence has been: analysis. the lack of reliable sources. the proper equipment. the lack of proper training for officers.

analysis.

In the future, terrorists will likely use all of the following tactics, except: malicious software and broad virus attacks. EMP. attacking personal computers to instill fear. HERF.

attacking personal computers to instill fear.

Malicious code attacks that combine elements of worms, Trojans, and viruses are known as:

blended threats.

A __________________ is a court document signed by a judge that instructs the police to perform a specific task.

court order

The disparity in equipment between federal and local cyber cops can most clearly be seen in the inability of most local agencies to:

decipher encrypted computer evidence.

A U.S. Department of Defense study on emerging threats to national security observed that the field of battle is increasingly moving toward:

economic issues.

The groups ALF and ELF can best be described as:

environmental-special interests groups.

The increasing inability of federal law enforcement agencies to effectively collect evidence derived from electronic communications via the Web is referred as:

going dark

The most pressing computer crimes enforced by local law enforcement agencies appear to be those related to:

harmful computer content.

The facets of the hacker culture are likely to: have little effect on their ability to become organized criminal enterprises. decrease the odds that some groups will become organized criminal enterprises. increase the odds that some groups will become organized criminal enterprises. increase the chances that they will be caught.

increase the odds that some groups will become organized criminal enterprises.

Terrorist groups will likely use computers and networks for all of the following except: intricate record keeping. attacks on financial institutions to create fear. communication and coordination of subgroups and terrorist cells. direct attacks on the information infrastructure.

intricate record keeping.

The greatest cost of a virus or malicious code attack is:

loss of work hours and time spent patching systems.

The largest group of attackers, comprising over 95% of the attacker population, is referred to as:

script kiddies.

Virtual crimes against persons such as stalking and harassment are facilitated by: the willingness of offenders for direct, in-person confrontation. the lack of attention being paid to these crimes by law enforcement. the anonymity and distance offered by the Internet. the ability to wipe hard drives.

the anonymity and distance offered by the Internet.

The most important critical need among local law enforcement agencies is: equipment. training. funding. updated criminal codes.

training.

T/F Intellectual property has merit because it is a valuable commodity.

true

T/F Organized crime groups are increasingly using computers to produce counterfeit goods.

true

T/F The increase in identity theft from 2005 to 2010 was largely attributed to an increase in the misuse of existing credit card accounts.

true

T/F The model used to investigate and forensically analyze evidence for physical crimes should also be used for virtual crimes.

true

T/F The number of police agencies with high tech or computer crime units has increased significantly over the last few years.

true

T/F There is evidence of hacker groups in emerging nations forming and connecting with others in developed nations.

true

Macro viruses are most commonly associated with:

typical business software applications.


Set pelajaran terkait

Lecture Exam 3-Tissue Integrity/Wound Healing/Pressure Ulcers/ Contact Dermatitis QARs

View Set

History 2053 Chapter 6 Study Guide

View Set

ATI Maternal Newborn Proctored Exam

View Set