Cyber crime Midterm 1-5

Ace your homework & exams now with Quizwiz!

____ are software programs or pieces of hardware that help screen out hackers, viruses, and worms that try to reach computers via the Internet.

firewalls

The most serious insider cybercrimes include all of the following EXCEPT ______.

harassment

Which of the following is NOT a behavior/method that falls under the category of cyberbullying?

inclusion

Threats to cybersecurity originate from all of the following sources EXCEPT ______.

individual

The use of computer networks and technologies as a means for conducting attacks that target critical national infrastructures or governmental assets has a psychological, social, political, or religious motive, causes harm to individuals or groups, or physically damages infrastructures is referred to as ______.

cyberterroism

A ______ refers to persons who attempt unauthorized access to a control system device and/or network using a data communications pathway.

cyberthreat

Which of the following was NOT identified as one of the main forms of international threats?

hacking or spying on city and local governments

In 2015, the most common crime reported to the Federal Consumer Commission was ______.

identity theft

_____ refers to all types of crime in which someone wrongfully obtains and uses another person's personal data in some way that involves fraud or deception, typically for economic gain.

identity theft

Botnets use ______ architecture in which each workstation has the same capabilities and responsibilities.

peer to peer

it is the _____ who have to create, implement, and enforce cybersecurity policies.

people

a _______ is a weakness in a product that could allow an attacker to compromise the integrity, availability or confidentiality of a product.

Security Vulnerability

______ is a weakness in a product that could allow an attacker to compromise the integrity, availability, or confidentiality of that product.

Security vulnerability

______ is a reference or navigation element in a hypertext document that offers direct access to another section of the same document or to another hypertext document that is on or part of a (different) domain.

Hyperlink

Which of the following is comparable to the address you would put on a letter to tell the postal service to deliver a letter to?

URL

Botnets typically infect computers via ______ or drive-by-downloads.

USBs

Which of the following defines the acronym URL?

Uniform Resource Locator

Which of the following was NOT identified as a recommendation for increasing automotive cybersecurity?

aesthetic design

The ______ of the Internet might be a concern for parents regarding who their children may be talking to online.

anonymity/identity

______ is a bacterial disease, weaponized in powder form, which was sent to various television studios and congressional offices via mail in the early 2000s.

anthrax

The creation of ______ has led to the creation of new hacking/fraudster built-in malware techniques that can target users via smartphones and tablets.

apps

In 2001, the first malware attack that fell into phase 3 of convergence was known as ______.

code red

The opportunity to create new businesses and markets online best describes which aspect of Internet development?

commercialization

which of the following is not a dominant theme within the cybersecurity conceptualization literature?

communications

Which of the following countermeasures recommends that companies must complete regular data backups?

complete regular updates

Which of the following was not identified as a countermeasure for networks in text?

data backup

Cyber terrorism attacks often take the form of ______.

denial of service attacks

Cyberterrorism attacks usually take the form of

denial of service attacks

Hackers with their abilities to research vulnerabilities in software products and disclose them to companies that developed the software are known as ______.

ethical hackers

People who are "tricked" by others into giving up access information or information about themselves to an external party are known as ______ insiders.

exploited

Which of the following is NOT considered a main type of insider threat?

feared

Cascade is an example of which of the following types of virus?

file infector virus

Hackers who are motivated by financial gains and who conduct both bad and ethical hacking are referred to as ______.

gray hats

______ typically work independently to expose security vulnerabilities or practices that endanger individuals' private data

gray hats

Which of the following laws does NOT apply to hackers?

hackers are evil people

Which of the following countermeasures helps prevent e-mail spoofing, that is, the forgery of an e-mail header to make it appear as if it is coming from a friend or employee?

implement message authentication

Countries concerned with controlling the flow of information and goods online would be most concerned with which of the following aspects of the Internet?

lack of barriers to entry

name the three threats to cybersecurity

local , international, national.

According to the text, cyberthreats originate mainly from all of the following entities EXCEPT ______.

local governments

Threats that originate from inside the company or organization are referred to as ______.

local threats

The ______ layer of cyberspace is best described as where the platform nature of the Internet is defined and created.

logic

3 types of insider threats

malicious, careless, exploited

The ______ technique, also referred to as a banking Trojan, operates in the background of the computer by modifying banking transactions.

man in the browser

The ______ technique targets file-sharing tools, such as Google Drive.

man in the cloud

The ______ technique targets devices that can be connected, such as car alarms, thermostats, etc.

man-in-the-IoT

The interception of a message by a third party is also referred to as a ______ attack.

man-in-the-middle

According to the text, human trafficking consists of all of the following elements EXCEPT ______.

outcome

Which of the following is NOT considered one of the main targets in information technology?

people

E-mail-borne viruses took place in which of the following phases of convergence?

phase 2

Per the 1998 Assumption Deterrence Act, the text identified all of the following types of punishment EXCEPT ______.

probation

Profit, fame, and challenge are characteristics of the ______ in a traditional attack.

purpose

Work-for-hire hackers who work for private security corporations are also referred to as ______.

read teams

Which of the following best represents the contribution of IPS to the modern Internet?

smaller computers with greater capabilities

Phase 1 of convergence is also referred to as?

sneaker-ware

All of the following are layers of cyberspace EXCEPT ______.

social layer

what negative affects does cyberstalking have on the victim?

social, physical, psychological

In the ______ cluster, computers are the target of the cybercrimes.

technological

Which of the following was NOT identified as a phase of convergence in the evolution of cybercrime?

technology takes over the world

Which of the following was NOT identified as a type of personal information that is sought out by identity thieves?

telephone number

______ is a global system of interconnected computer networks that are set up to exchange various types of data.

the internet

what are the three phases of convergence

1. separate from people 2. leverage technology 3. replace people

Internet users generally struggle with identifying when their computer has been attacked. In order to quickly respond to a cyberattack on their system, a user would have to be able to overcome which of the following Internet threats?

1s and 0s

The Identity Theft Resource Center estimates that it takes on average ______ hours to repair the damage of identity theft.

600

more than __% of all american households were using the internet in 2013.

74

The ______ Computer Emergency Response Team (CERT) investigated the cyber intrusion that became known as Moonlight Maze.

Air Force's

Development of the ______ resolved issues with hierarchical host names making it easier for the average person to access the Internet.

DNS

in phase 2, fraudsters developed the first gmail born viruses such as what?

Iloveyou and the Melissa Virus

_____ became notorious for being the one of the first cybersecurity intrusions to illustrate how vulnerable our technology is to malicious infiltration.

Moonlight Maze

______ occur when a computer system is accessed without permission.

Network intrusions

One of the most persistent threats for the United States in terms of cyberattacks originates in ______.

China

the internet was born during the _______ era.

Cold War

Stealthy and evasive attack techniques that can stay undetected are characteristics of the ______ in an advanced persistent threat attack.

approach

Which of the following was NOT identified as a way that criminals get information from their victims?

Criminals directly ask the victim for their personal information.

which of the following is not an attack method associated with wireless attacks?

WiFi eavesdropping

______ is a service that can be accessed via the Internet.

World wide web

The Internet provides opportunities for criminals to cause significant damage with minimum resources. For example, in 2017, the WannaCry ransomware attack resulted in several billion dollars of damage. This best represents which vulnerability of the Internet?

asymmetries of cyberspace

______ is an encryption component that refers to a digital signature providing proof of authorship.

attribution

Which of the following are considered small programs or sections of a program triggered by some event such as a certain date or time, a certain percentage of disk space filled, or the removal of a file?

logic bombs

______ viruses infect data files.

macro

The Internal Revenue Service uses which of the following methods to contact a taxpayer?

mail

The least common but most costly is ______ insider threat.

malicious

All of the following are examples of social engineering EXCEPT ______.

spam

_____ is defined as unsolicited commercial e-mail that includes any commercial emails addressed to a recipient with whom the sender has no existing business or personal relationship and not sent with the consent of the recipient.

spam

usually hacker communities are male dominated

true

Which of the Internet gateways to vulnerability can be described as the computer code of the Internet?

1s and 0s

Which of the following has NOT contributed to the increase in threats to mobile devices

Apple Inc. technology

All of the following are considered public sector entities EXCEPT ______.

FusionX

Hacking cars or other means of transportation, such as airplanes, is an example of a security issue seen in which of the following techniques?

Man in the Internet of Things

____ is defined as a collection of infected machines worldwide that receive commands and perform some illegal actions such as distributed denial of service attacks, among others.

a botnet

In 1998 Congress passed the Assumption Deterrence Act making identity theft ______.

a felony crime

____ viruses attach to the original code, changing the start-up information of the program.

add-on

In 2001, the original Code Red malware initiated a ______ attack on the White House.

denial of service

Which of the following was identified as a software attack in the text?

drive by downloads

Consumer crimes that include identity theft, phishing scams, and spam fall within which of the following categories?

fraud and financial crimes

Which of the following themes within the cybersecurity conceptualization literature was NOT identified by Craigen and his team?

funding

Which of the following represents a complete URL?

https://www.fbi.gov

Making mistakes that can lead to security vulnerabilities is also referred to as ______.

human error

In the ______ cluster, computer infrastructure and vulnerabilities are the focus of attacks.

human machine

Which of the following can be described as unidirectional, or that a user can link from their content to another website's content without asking for approval from the owner of the destination page?

hyperlink

Which of the following is NOT a characteristic of a URL?

hypertext

Which layer of cyberspace includes the creation and distribution of information and interaction between users?

information layer

According to the text, dams, railways, and power plants are considered ______.

infrastructures

According to the text, phishing scams typically target ______.

personal information

______ refers to attacks where a mass email is sent to multiple computers, requesting personal information be sent to a specific location.

phishing

The ______ is responsible for collecting and decrypting threats both physical and cyber via the use of Signal Intelligence.

the national security agency

Whereas in the past criminals had to physically approach their victims to carry out a crime, the Internet allows offenders to be in other states, or even continents, and still carry out the same crime. This best represents which of the following vulnerabilities of the Internet?

time and space

in 1958, the advanced research projects agency was created by who?

President Dwight D Eisenhower

which type of malware locks the operating system of the computer, due to the violation of U.S. Federal law?

Ransomware

Groups with displeasure of government are often motivated by all of the following EXCEPT ______.

aristocracy

Criminal knowledge that their efforts will likely lead to success because there are so many potential victims and so few barriers or oversight online best describes which Internet gateway to vulnerability?

asymmetries of cyberspace

According to the text, which of the following entities are considered a special target for botnets?

banks and financial institutions

Hackers who are motivated by personal gain or a certain cause are often referred to as ______.

black hats

In 1987, the ______ strengthened the security measures for online systems.

computer security act

Submarine Network Policy is used to secure devices at the ______ level.

corporate

Which of the following is NOT considered one of the main issues with cybersecurity?

cost of data

The inventors of the Internet likely didn't consider ______ during its development.

criminal abuse of the Internet

three reasons people commit cybercrimes

curiosity, ideological reasons, financial gain

The intentional, aggressive behavior toward another person that is performed through electronic means is also known as ______.

cyber bullying

______ is an interdependent network of information technology infrastructures including the Internet, telecommunications networks, and computer systems.

cyberspace

critical _____ are extremely vulnerable to cyber attacks, making information sharing with the private sector imperative.

infrastructures

Human behavior that departs from compliance with established policies, regardless of whether it results from malice or a disregard for security policies, is the manifestation of a/an ______ threat.

insider

According to national surveys, ______ are the second greatest threat to a company's cybersecurity, only trumped by hackers.

insiders

logic bombs usually installed by

insiders

Which of the following risks is not created by Trojan horses?

internet slowdown

Multimedia message services viruses target ______.

mobile devices

Which of the following was NOT identified as a hardware device in the text?

modems

Which of the following types of attacks can also happen accidentally?

noisy neighbor

A ______ malware is disguised as, or embedded within, legitimate software

trojan horse

According to the Federal Trade Commission, all of the following are ways that consumers can prevent identity theft EXCEPT ______.

using easy passwords

A ______ is a small software program designed to spread from one computer to another and to interfere with computer operation.

virus

According to General Michael Hayden, a cybersecurity knowledge gap exists between ______.

youthful generation and older generation

the exchange of insults in a public setting, such as a bulletin board or chat room, is known as ______.

flaming

According to the text, virus files typically end in ______.

.exe

According to the text, by the year 2020, the economic cost of cybercrime is expected to go above ______ trillion.

3

In 1988, the Defense Advances Research Projects Agency (DARPA) created the ______ with the goal of striving for a safer and stronger Internet for all Americans.

Computer Emergency Readiness Team

What is the worm that originated from Russia that costed $38 billion?

My Doom

According to the text, the Internet was built to be a free and open access tool. Which of the following best represents this concept?

Napster

______ allowing individuals to access secured networks without the owners' knowledge is also known as a backdoor.

Rogue access points

The role of the ______ was extended in the Cybersecurity Enhancement Act of 2014.

Secretary of Commerce

Which of the following characteristics of hackers is NOT true?

The members meet each other quite often.

The "bad guy" hackers are known as ______.

black hats

The ______, an underground web, allows offenders to stay anonymous and undetected, as these are not traceable by police.

dark net

Edward Snowden, an American computer professional, provided all of the following tips for keeping data private EXCEPT ______.

decrypt your phone calls and text messages

All of the following were identified as vulnerable infrastructures EXCEPT ______.

education


Related study sets

Karch Focus on Pharmacology Chapter 26- Narcotics, Narcotic Antagonists, and Antimigraine Agents (Opioids & Analgesic Agents)

View Set

High School Placement Test Study

View Set

NSE 4 Security 6.2 - Firewall Policies

View Set

Chapter 11: Groups and Interests

View Set

Liza T. _ esl Have you met a new Dalle ?

View Set