Cyber Crime Final

Ace your homework & exams now with Quizwiz!

______________ is a type of scam in which the offender creates a Web site that looks identical to an authentic Web site. However, the mirror Web site carries a malicious payload. Vishers Phishers Pharmers Spammers None of the above

Pharmers

A ___ scheme requires new investors to become involved marketing a product and recruiting other investors. The fees provided by new entrants are used to pay those that previously entered this scheme. Pyramid Ponzi Pump and dump Cybersmear None of the above

Pyramid

This ___________________ field is intended for spam filtering. Received-SPF Message ID Return-Path MIME-Version none of the above

Received-spf

The ____________ field specifies the email system used to send the message. Received Message ID X-Originating-IP X-Mailer none of the above

X-mailer

The _______________ field reveals the real IP address of the computer from which the email was originally sent from. Received Message ID X-Originating-IP X-Mailer none of the above

x-originating IP

The ______________ includes enhanced penalties for cybercrimes. Cyber Security Enhancement Act of 2002 Homeland Security Act of 2002 a and b National Defense Authorization Act All of the above

A & B

__________________ is used to prevent anything from being written to the hard drive or other data source: imaging MD5 hash algorithm SHA hash algorithm A write blocker device all of the above

A write blocker device

______________ is responsible for assigning and registering IP addresses in the North American region. ARIN AfriNIC APNIC RIPE LACNIC

ARIN

A forensic toolkit should contain. antistatic bags tweezers pliers a and b all of the above

All of the above

Computer forensics investigators need to consider __________________ when packaging and transporting evidence: magnetic fields static electricity corrosive elements temperature all of the above

All of the above

Criminals can steal a person's identity by: hacking into a computer and obtain the individual's private data stealing their mail bribing an employee that has access to the victim's personal data a and c all of the above

All of the above

Cyber terrorists may seek unauthorized access to critical infrastructure computer systems to: Block communications systems Disrupt air traffic control Shut down electric utilities Contaminate water All of the above

All of the above

Cyberterrorists seek to __________________ provoke widespread panic and fear cause illness cause serious bodily harm a and c all of the above

All of the above

Electronic evidence should be kept in a forensic lab that is: climate controlled cool and dry protected from magnetic fields or radio frequency interference sources a and c all of the above

All of the above

Files that may be created by the computer user include: document image graphics a and b all of the above

All of the above

ICS-CERT seeks to reduce cyber risks by: ____________. Responding to and analyzing control systems incident Providing support for incident response and forensic analysis Coordinating efforts and sharing information among private agencies and local, state, federal, and tribal governments all of the above none of the above

All of the above

In a Nigerian scam: the victim is informed of an inheritance from a long-lost relative from Nigeria individuals fraudulently claiming to be government, business, or banking officials ask the victim to deposit money into their personal account for the criminal the victim is informed that he or she has been chosen for a monetary award of some kind a and c all of the above

All of the above

The ______________ is an example of critical infrastructure. communications industry banking and finance industry energy industry a and c all of the above

All of the above

The ______________ is an example of critical infrastructure. food and agriculture industry critical manufacturing industry dams industry postal and shipping all of the above

All of the above

The victims of work at home scams are usually: stay-at-home mothers disabled individuals persons who are unemployed individuals that are desperately seeking some form of income all of the above

All of the above

To communicate with each other, email systems use protocols, such as: Simple Mail Transfer Protocol Post Office Protocol 3 Internet Message Access Protocol a and c all of the above

All of the above

To protect yourself from becoming a victim of identity theft, you should take the following precautions: obtain a credit report and check your credit score check bank accounts frequently for unusual activity shred documents containing personal information before you discard them both b and c all of the above

All of the above

______________ logs contain the events that are logged by programs and applications. Errors of these applications and programs are also recorded in this log. security application setup system none of the above

Application

In the national sex offender registry, Tier 3 offenders are: Must be registered for 10 years and update their information annually. Must be registered for 15 years and update their information annually. Must be registered for 25 years and update their information biannually. Are the most dangerous offenders None of the above

Are the most dangerous offenders

The term used to describe a reproduction of someone else's recording marketed under a different label is ___. Bootleg Counterfeit Stolen Both A and B

Bootleg

Some crimes that fall under the personal crime category include: Death, assault, domestic violence, drug dealing, and illegal gambling Telecommunications fraud, auction fraud, and credit card fraud Cyberharassment, cyberstalking, cyberbullying, extortion Both a and c None of the above

Both A and C

______________ is the process by which investigators preserve the crime scene and evidence throughout the life cycle of a case. reporting chain of custody note taking videography none of the above

Chain of custody

________________ is essentially gibberish metadata plaintext ciphertext decryption all of the above

Ciphertext

_____________ are files created by Web sites that are stored on a user's computer hard drive when he or she visits that particular Web site. cookies history files event logs spooler files none of the above

Cookies

_____________. With this type of identity theft, an offender poses as the victim to commit a crime or claims to be the victim when apprehended for a crime. Financial identity theft Criminal identity theft Identity cloning Commercial identity theft None of the above

Criminal Identity Theft

_________________ refers to the politically, religiously, or ideologically motivated use of computers (or related technology) by an individual, group, or state targeting critical infrastructure with the intention of harming persons and/or damaging property in order to influence the population (or segment of the population) or cause a government to change its policies. Cyberterrorism Cyberwarfare Hacktivism All of the above None of the above

Cyberterrorism

________________ refers to a state-sponsored cyberattack against another state's computers or information networks. To be considered cyberwarfare, the cyberattacks must amount to an "armed attack" and be committed in conjunction with real-world, physical attacks. Cyberterrorism Cyberwarfare Hacktivism All of the above None of the above

Cyberwarfare

An individual may use ________________ to physically block third-party access to them, either by using a password or by rendering the file or aspects of the file unusable.. encryption steganography decryption spam none of the above

Encryption

Digital cameras contain a wealth of metadata in: graphical interchange format file tagged image file format exchangeable image file format image interchange format file all of the above

Exchangeable image file format

________________ are required to prevent messages from being sent or received by electronic devices (such as PDAs and mobile phones) Faraday bags antistatic bags static bags antisignal bags none of the above

Faraday Bags

_______________ occurs when an offender uses a victim's identity to obtain money, goods, or services. Financial identity theft Criminal identity theft Identity cloning Commercial identity theft None of the above

Financial Identity Theft

________________ refers to the intentional access to a computer system and/or website, without authorization or exceeding authorized access, in pursuit of a political goal. Cyberterrorism Cyberwarfare Hacktivism All of the above None of the above

Hacktivism

The ____________ required states to implement a sex offender registry. Jacob Wetterling Crimes Against Children and Sexually Violent Offender Act of 1994 Campus Sex Crimes Prevention Act of 2000 Child Pornography Protection Act of 1996 Keeping the Internet Devoid of Sexual Predators Act of 2008 None of the above

Jacob Wetterling Crimes Against Children and Sexually Violent Offender Act of 1994

The ______________ field consists of the name of the server and a unique string that the sending e-mail server assigned to the message: Received Message ID Content-type X-Mailer MIME-Version

Message ID

The ________________ field makes a recommendation to the user as to the validity of the origin of the message and the integrity of its content. Received-SPF Message ID Return-Path MIME-Version none of the above

None of the above

The most common hacking technique: Web Defacement Password Cracking DoS attack MitM attack none of the above

Password cracking

______________ are devices that are not essential parts of a computer system. handheld computing devices peripheral devices telecommunications devices a and c none of the above

Peripheral Devices

_______________ are known for posing as legitimate companies and government agencies and using misleading or disguised hyperlinks and fake e-mail return addresses to trick Internet users into revealing their personal information. Vishers Phishers Pharmers Spammers none of the above

Phishers

____ schemes involve soliciting investors to contribute to investment opportunities that promise high returns for little to no risk. The money provided by new investors is used to pay existing investors. The money provided by new investors is used to pay existing investors, but none of the money that an investor provides is actually invested anywhere Pyramid Ponzi Pump and dump Cybersmear None of the above

Ponzi

To determine the original address from which a message was sent, a user should also pay close attention to the ___________ field in the full header. Received Message ID Content-type X-Mailer MIME-Version

Received

___________ provide a narrative of what happened at the crime scene and how the investigation of the scene was conducted. notes videos reports sketches none of the above

Reports

______ occurs when a seller takes on various digital identities by opening up several email accounts and bids on his or her own items multiple times to prompt genuine bidders to provide a much higher bid for an item than they would have done otherwise Drive bidding Bid siphoning Bid rigging Shill Bidding None of the above

Shill Bidding

___________________ was designed to cripple industrial control systems. Stuxent Duqu Stars a and b all of the above

Stuxnet

___ are designed to protect commercial identities or brands Trade Secrets Copyright Trademarks Patents None of the above

Trademarks

The _____________ criminalized acts of cyberterrorism. USA Patriot Act National Defense Authorization Act Defense Authorization Act all of the above none of the above

USA Patriot Act

____________ is the space that is available because it was never used or because the information in it was deleted. a hidden partition a bad cluster unallocated space slack space none of the above

Unallocated space

An email address includes the: username and domain domain and header header and body username and body none of the above

Username and domain

_____________ are often used to document the overall crime scene; they complement the __________ of the crime scene and evidence. photographs; videos videos; photographs sketches; videos sketches; photographs none of the above

Videos; photographs

_______ is used to track users' online activities and deliver targeted pop-up ads to users adware spyware computer virus worm none of the above

adware

_______________ logs are new event logs in Windows 7. Instead of recording events that may affect the system as a whole, each log stores events from a single application or component. security application applications and services system

applications and services

There are five ways to document the crime scene: notes, sketches, audio, video, reports notes, sketches, photographs, video, reports notes, sketches, photographs, audio, video notes, photographs, audio, video, reports none of the above

notes, sketches, photographs, video, reports

The types of photographs taken at a crime scene should include: overall, medium-range, and close-range photographs overall and close-range photographs medium-range and close-range photographs only overall photographs only close-range photographs

overall, medium-range, and close-range photographs

The ____ scheme occurs when individuals falsely advertise favorable and misleading representations of stock to convince people to buy a specific stock Pyramid Ponzi Pump and dump Cybersmear

pump and dump

Basic fields of header information include. to, from, body and subject to, from, subject and date to, from, body and date to, from, body and return address none of the above

to, from, subject, and date

The sketch should contain the: case number location of crime type of crime a and c all of the above

All of the above


Related study sets

Chapter 5- Learning Notecards AP PSYCH

View Set

ATI Medication Administration Test

View Set

Mastering Biology Unit 3 Chapter 6 & 7

View Set

Unit 1: HUD's Role in America's Housing - Texas RE

View Set

4 - Life Insurance Policies - Provisions, Options and Riders Part 2

View Set