Cyber Crime
A. macro virus B. multipartite virus C. File infector virus D. boot sector virus
Cascade is an example of which of the following types of virus (m)
political information
China is know to prioritize ____ control over cyberdefense strategies
A. economic B. Political C. military D both economic and political
Cyberespionage can be classified into which of the following types? (m)
Phase 2
E-Mail borne viruses took place in which of the following phases of convergence
A. Decrypt your phone calls and text messages B. encrypt your hard drive C. Use a password manager D. Use two-factor identification
Edward Snowden, an American computer professional, provided all of the following tips for keeping data private EXCEPT (m)
A. Corporate B. individual C. political D. economic
Ghostnet was one of the most successful programs with regard to _____ cyberespionage (m)
A. Freedom B. Individuality C. aristocracy D Privacy
Groups with displeasure of government are often motivated by all of the following EXCEPT (m)
black hats
Hackers who are motivated by personal gain or a certain cause are often referred to as
Ethical hackers (white hats)
Hackers with their abilities to research vulnerabilities in software products and disclose them to companies that developed the software are known as ______
Insider
Human behavior that departs from compliance with established policies, regardless of whether it results fro malice or a disregard for security policies, is the manifestation of a/an _____ threat
Felony Crime
IN 1998 Congress passed the assumption Deterrence Act making identity theft a
Code Red
In 2001, the first malware attack fell into phase 3 of convergence known as
A. KillDisk B. Darkcomet C. Rbot D. Blackshades
In 2015, a cyberattack was launched against Ukraine by the Russians. The ____ attack to shut down the power grid based in Russia was possibly backed by the Russian government (m)
Identity theft
In 2015, the most common crime reported to the Federal Consumer commission was ________
Human machine
In the ____ cluster, computer infrastructure and vulnerabilities are the focus of attacks
Technological
In the ______ cluster, computers are the target of the cybercrime
Spam
Is defined as unsolicited commercial email that includes any commercial emails addressed to a recipient with whom the sender has no existing business or personal relationship and not sent with the consent of the recipient
A. major U.S. newspapers B. social media sites C. telecommunications providers D. all the above
The SEA (Syrian Electronic army) has been responsible for attacks against which of the following?
Dark web
The _____ , an underground web, allows offenders to stay anonymous and undetected, as these are not traceable by police
A. misdemeanor crime B. infraction C. federal crime D. a crime not punishable by law
The economic Espionage Act of 1996 makes it a ___ to steal or interfere with trade secrets (m)
A. email B. text message C. Mail D. phone call
The internal Revenue service uses which of the following methods to contact a taxpayer? (m)
A. malicious B. careless C. Exploited D. feared
The least common but most costly _____ insider threat (m)
A. denigration B. inclusion C. exclusion D. impersonation
The posting of harassing messages aiming to cause harm to the victim is also known as (m)
A. Keylogging B logic bombs C. botnets D. trojan horses
Which of the following are considered small programs or sections of a program triggered by some event such as a certain date or time, a certain percentage of disk space filled, or the removal of a file (m)
A. china B. Russia C. United States D. south korea
Which of the following countries is known to be the most advanced with regard to computers, hardware, and software? (m)
A. People B. Software C. Hardware. D. Network
Which of the following is Not considered the main targets of information technology? (m)
A. Deleting files B. Watching users through the webcam C. Internet shutdown D. using the computer to infect other computers
Which of the following risks is not created by Trojan Horses? (m)
A. modems B. network appliances C. Surveillance systems D. industrial control systems
Which of the following was NOT identified as a hardware device in the text? (m)
A. Nation-states hacking or spying on trade and other secret information B. Advanced hackers aiming at large corporations C. Hacking or spying on city and local governments D. terrorists looking to identify and exploit vulnerabilities in our infrastructures
Which of the following was NOT identified as one of the main forms of international threats? (m)
A. Host-based mitigation B. data backup C. Proactive measures D. Network-Based mitigation
Which of the following was not identified as a countermeasure for networks in text? (m)
A. Infinity B. Non-repudiation C. Scrambled Text D. Attribution
____ is an encryption component that refers to a digital signature providing proof of authorship (m)
A. Boot sector B. file infector C. Multipartile D. Macro
_____ virus infect data files (m)
A. Gray hats B. Black hats C. white hats D. green hats
________ typically work independently to expose security vulnerabilities or practices that endanger individuals' private data (m)
A. cyberthreat B. Cyberwarfare C. cybersecurity D. cyberattack
a _____ refers to persons who attempt unauthorized access to a control system device and/or network using a data communications pathway (m)
A. Foreign governments B. spies C. Insiders D. hacktivists
according to the national surveys, ____ are the second greatest threat to a company's cybersecurity, only trumped by hackers (m)
A. Act B. means C. Purpose D. outcome
according to the text, human trafficking consists of all of the following elements except (m)
firewalls
are software programs or pieces of hardware that help screen out hackers, viruses, and worms that try to reach computers via the internet
A. denial-of-service attacks B. worms C. phishing D. spamming
cyber-terrism attacks often take the form of ____ (m)
gray hats
hackers who are motivated by financial gains and who conduct both bad and ethical hacking are referred to as
A. Economic B. Educational C. Military D. leadership
historically, power has depended on which of the following strengths? (m)
Denial of Service
in 2001, the original code Red malware initiated a ____ attack on the white house
Botnet
is defined as a collection of infected machines worldwide that receive commands and perform some illegal actions such as distributed denial of service attacks, among others
Russia
one of the most persistent threats for the United States in terms of cyberattacks originates in
A. feared B. exploited C. malicious D. careless
people who are "tricked" by others into giving up access information or information about themselves to an external party known as ____ insiders (m)
Identity theft
refers to all types of crime in which someone wrongfully obtains and uses another person's personal data in some way that involves fraud or deception, typically for economic gain
a. Trojan horses B. Botnets C. worms D. spam
the Syrian Electronic Army has collected information using which of the following cyberattack techniques? (m)
Flaming
the exchange of insults in a public setting, such as a bulletin board or chat room, is known as
a. ciphers B. different flags c. dots and dashes
the first "software" was the Morse code developed by Samuel F. B. Morse. the morse code made telegraphing much easier by using ___ (m)
cyberbullying
the intentional, aggressive behavior toward another person that is performed through electronic means is also known as
A. extortion B. Terrorism C. embezzlement D. harassment
the most serious insider cybercrime include all of the following EXCPET (m)
local threats
threats that originate from inside the company or organization are referred to as
A. individual B. local C. national D. international
threats to cyberspace originate from all of the following sources expect ___ (m)
A. the members meet each other quite often B. It is male-dominated C. They work anonymously D. They have several public identities
which of the following characteristics of hackers is NOT true? (m)
A. Implement message authenticity B. update email policies C. Complete regular updates D. plan for ID theft after a data breach
which of the following countermeasures helps prevent e-mail spoofing, that is, the forgery of an email header to make it appear as if it is coming from a friend or employee? (m)
A. South Korea B. China C. Russia D. North Korea
which of the following countries is considered one of the most advance cyberespionage powers? (m)
A. Confidentiality of data B. Integrity of data C. Cost of data D. Availability of data
which of the following is NOT considered one of the main issues with cybersecurity? (m)
A. zapchast B. darkcomet C. Moonlight maze D. blackshades
which of the following is not an example of a cyberattack used by the Syrian Electronic Army? (m)
A. Naval flag system B. telegraph system C. box cypher D. raven system
which of the following systems led to the creation of the Morse Code? (m)
black hats
"bad guy" hackers are known as
Trojan Horse
A _____ malware is disguised as, or embedded within, legitimate software
Virus
A ______ is a small software program designed to spread from one computer to another and to interfere with computer operation
A. espionage B. sabotage C. terrorism D. treason
According to the text, China also engages in economic __ against the U.S. and other countries.
3
According to the text, by the year 2020, the economic cost of cybercrime is expected to go above __ trillion
A. Cyberespionage and cybersabotage B. Cyberterrorism and cyberespionage C. Cyberharassemt and cyberterrorism D. cybersabotage and cyberharassment
According to the text, cyberwarfare generally include which of the following? (m)
A. Personal Info B. Education Info C. Employment Info D. Demographic info
According to the text, phishing scams typically target ____ (m)
A. Fraud and identity theft B. theft of intellectual property C. Child pornography D. financial theft
According to the text, the most pervasive cyberthreat may be ___ (m)
A. Individuals B. government C. banks and financial institutions D. Educational institutions
According to the text, which of the following entities are considered a special target for botnets? (m)
A. Telecommunication B. Energy C. Education D. Transportation
All of the following were identified as vulnerable infrastructures EXCEPT (m)
A. corporate espionage B. political espionage C. economic espionage D. military espionage
An act that occurs when an actor, knowing that his or her actions with benefit any foreign government, instrumentality, or agent, steals, copies, or receives a ride secret is referred to as ___ (m)