Cyber Crime Final
______________ is a type of scam in which the offender creates a Web site that looks identical to an authentic Web site. However, the mirror Web site carries a malicious payload. Vishers Phishers Pharmers Spammers None of the above
Pharmers
A ___ scheme requires new investors to become involved marketing a product and recruiting other investors. The fees provided by new entrants are used to pay those that previously entered this scheme. Pyramid Ponzi Pump and dump Cybersmear None of the above
Pyramid
This ___________________ field is intended for spam filtering. Received-SPF Message ID Return-Path MIME-Version none of the above
Received-spf
The ____________ field specifies the email system used to send the message. Received Message ID X-Originating-IP X-Mailer none of the above
X-mailer
The _______________ field reveals the real IP address of the computer from which the email was originally sent from. Received Message ID X-Originating-IP X-Mailer none of the above
x-originating IP
The ______________ includes enhanced penalties for cybercrimes. Cyber Security Enhancement Act of 2002 Homeland Security Act of 2002 a and b National Defense Authorization Act All of the above
A & B
__________________ is used to prevent anything from being written to the hard drive or other data source: imaging MD5 hash algorithm SHA hash algorithm A write blocker device all of the above
A write blocker device
______________ is responsible for assigning and registering IP addresses in the North American region. ARIN AfriNIC APNIC RIPE LACNIC
ARIN
A forensic toolkit should contain. antistatic bags tweezers pliers a and b all of the above
All of the above
Computer forensics investigators need to consider __________________ when packaging and transporting evidence: magnetic fields static electricity corrosive elements temperature all of the above
All of the above
Criminals can steal a person's identity by: hacking into a computer and obtain the individual's private data stealing their mail bribing an employee that has access to the victim's personal data a and c all of the above
All of the above
Cyber terrorists may seek unauthorized access to critical infrastructure computer systems to: Block communications systems Disrupt air traffic control Shut down electric utilities Contaminate water All of the above
All of the above
Cyberterrorists seek to __________________ provoke widespread panic and fear cause illness cause serious bodily harm a and c all of the above
All of the above
Electronic evidence should be kept in a forensic lab that is: climate controlled cool and dry protected from magnetic fields or radio frequency interference sources a and c all of the above
All of the above
Files that may be created by the computer user include: document image graphics a and b all of the above
All of the above
ICS-CERT seeks to reduce cyber risks by: ____________. Responding to and analyzing control systems incident Providing support for incident response and forensic analysis Coordinating efforts and sharing information among private agencies and local, state, federal, and tribal governments all of the above none of the above
All of the above
In a Nigerian scam: the victim is informed of an inheritance from a long-lost relative from Nigeria individuals fraudulently claiming to be government, business, or banking officials ask the victim to deposit money into their personal account for the criminal the victim is informed that he or she has been chosen for a monetary award of some kind a and c all of the above
All of the above
The ______________ is an example of critical infrastructure. communications industry banking and finance industry energy industry a and c all of the above
All of the above
The ______________ is an example of critical infrastructure. food and agriculture industry critical manufacturing industry dams industry postal and shipping all of the above
All of the above
The victims of work at home scams are usually: stay-at-home mothers disabled individuals persons who are unemployed individuals that are desperately seeking some form of income all of the above
All of the above
To communicate with each other, email systems use protocols, such as: Simple Mail Transfer Protocol Post Office Protocol 3 Internet Message Access Protocol a and c all of the above
All of the above
To protect yourself from becoming a victim of identity theft, you should take the following precautions: obtain a credit report and check your credit score check bank accounts frequently for unusual activity shred documents containing personal information before you discard them both b and c all of the above
All of the above
______________ logs contain the events that are logged by programs and applications. Errors of these applications and programs are also recorded in this log. security application setup system none of the above
Application
In the national sex offender registry, Tier 3 offenders are: Must be registered for 10 years and update their information annually. Must be registered for 15 years and update their information annually. Must be registered for 25 years and update their information biannually. Are the most dangerous offenders None of the above
Are the most dangerous offenders
The term used to describe a reproduction of someone else's recording marketed under a different label is ___. Bootleg Counterfeit Stolen Both A and B
Bootleg
Some crimes that fall under the personal crime category include: Death, assault, domestic violence, drug dealing, and illegal gambling Telecommunications fraud, auction fraud, and credit card fraud Cyberharassment, cyberstalking, cyberbullying, extortion Both a and c None of the above
Both A and C
______________ is the process by which investigators preserve the crime scene and evidence throughout the life cycle of a case. reporting chain of custody note taking videography none of the above
Chain of custody
________________ is essentially gibberish metadata plaintext ciphertext decryption all of the above
Ciphertext
_____________ are files created by Web sites that are stored on a user's computer hard drive when he or she visits that particular Web site. cookies history files event logs spooler files none of the above
Cookies
_____________. With this type of identity theft, an offender poses as the victim to commit a crime or claims to be the victim when apprehended for a crime. Financial identity theft Criminal identity theft Identity cloning Commercial identity theft None of the above
Criminal Identity Theft
_________________ refers to the politically, religiously, or ideologically motivated use of computers (or related technology) by an individual, group, or state targeting critical infrastructure with the intention of harming persons and/or damaging property in order to influence the population (or segment of the population) or cause a government to change its policies. Cyberterrorism Cyberwarfare Hacktivism All of the above None of the above
Cyberterrorism
________________ refers to a state-sponsored cyberattack against another state's computers or information networks. To be considered cyberwarfare, the cyberattacks must amount to an "armed attack" and be committed in conjunction with real-world, physical attacks. Cyberterrorism Cyberwarfare Hacktivism All of the above None of the above
Cyberwarfare
An individual may use ________________ to physically block third-party access to them, either by using a password or by rendering the file or aspects of the file unusable.. encryption steganography decryption spam none of the above
Encryption
Digital cameras contain a wealth of metadata in: graphical interchange format file tagged image file format exchangeable image file format image interchange format file all of the above
Exchangeable image file format
________________ are required to prevent messages from being sent or received by electronic devices (such as PDAs and mobile phones) Faraday bags antistatic bags static bags antisignal bags none of the above
Faraday Bags
_______________ occurs when an offender uses a victim's identity to obtain money, goods, or services. Financial identity theft Criminal identity theft Identity cloning Commercial identity theft None of the above
Financial Identity Theft
________________ refers to the intentional access to a computer system and/or website, without authorization or exceeding authorized access, in pursuit of a political goal. Cyberterrorism Cyberwarfare Hacktivism All of the above None of the above
Hacktivism
The ____________ required states to implement a sex offender registry. Jacob Wetterling Crimes Against Children and Sexually Violent Offender Act of 1994 Campus Sex Crimes Prevention Act of 2000 Child Pornography Protection Act of 1996 Keeping the Internet Devoid of Sexual Predators Act of 2008 None of the above
Jacob Wetterling Crimes Against Children and Sexually Violent Offender Act of 1994
The ______________ field consists of the name of the server and a unique string that the sending e-mail server assigned to the message: Received Message ID Content-type X-Mailer MIME-Version
Message ID
The ________________ field makes a recommendation to the user as to the validity of the origin of the message and the integrity of its content. Received-SPF Message ID Return-Path MIME-Version none of the above
None of the above
The most common hacking technique: Web Defacement Password Cracking DoS attack MitM attack none of the above
Password cracking
______________ are devices that are not essential parts of a computer system. handheld computing devices peripheral devices telecommunications devices a and c none of the above
Peripheral Devices
_______________ are known for posing as legitimate companies and government agencies and using misleading or disguised hyperlinks and fake e-mail return addresses to trick Internet users into revealing their personal information. Vishers Phishers Pharmers Spammers none of the above
Phishers
____ schemes involve soliciting investors to contribute to investment opportunities that promise high returns for little to no risk. The money provided by new investors is used to pay existing investors. The money provided by new investors is used to pay existing investors, but none of the money that an investor provides is actually invested anywhere Pyramid Ponzi Pump and dump Cybersmear None of the above
Ponzi
To determine the original address from which a message was sent, a user should also pay close attention to the ___________ field in the full header. Received Message ID Content-type X-Mailer MIME-Version
Received
___________ provide a narrative of what happened at the crime scene and how the investigation of the scene was conducted. notes videos reports sketches none of the above
Reports
______ occurs when a seller takes on various digital identities by opening up several email accounts and bids on his or her own items multiple times to prompt genuine bidders to provide a much higher bid for an item than they would have done otherwise Drive bidding Bid siphoning Bid rigging Shill Bidding None of the above
Shill Bidding
___________________ was designed to cripple industrial control systems. Stuxent Duqu Stars a and b all of the above
Stuxnet
___ are designed to protect commercial identities or brands Trade Secrets Copyright Trademarks Patents None of the above
Trademarks
The _____________ criminalized acts of cyberterrorism. USA Patriot Act National Defense Authorization Act Defense Authorization Act all of the above none of the above
USA Patriot Act
____________ is the space that is available because it was never used or because the information in it was deleted. a hidden partition a bad cluster unallocated space slack space none of the above
Unallocated space
An email address includes the: username and domain domain and header header and body username and body none of the above
Username and domain
_____________ are often used to document the overall crime scene; they complement the __________ of the crime scene and evidence. photographs; videos videos; photographs sketches; videos sketches; photographs none of the above
Videos; photographs
_______ is used to track users' online activities and deliver targeted pop-up ads to users adware spyware computer virus worm none of the above
adware
_______________ logs are new event logs in Windows 7. Instead of recording events that may affect the system as a whole, each log stores events from a single application or component. security application applications and services system
applications and services
There are five ways to document the crime scene: notes, sketches, audio, video, reports notes, sketches, photographs, video, reports notes, sketches, photographs, audio, video notes, photographs, audio, video, reports none of the above
notes, sketches, photographs, video, reports
The types of photographs taken at a crime scene should include: overall, medium-range, and close-range photographs overall and close-range photographs medium-range and close-range photographs only overall photographs only close-range photographs
overall, medium-range, and close-range photographs
The ____ scheme occurs when individuals falsely advertise favorable and misleading representations of stock to convince people to buy a specific stock Pyramid Ponzi Pump and dump Cybersmear
pump and dump
Basic fields of header information include. to, from, body and subject to, from, subject and date to, from, body and date to, from, body and return address none of the above
to, from, subject, and date
The sketch should contain the: case number location of crime type of crime a and c all of the above
All of the above