cyber crime test 1

Ace your homework & exams now with Quizwiz!

What famous text introduced in 1986 railed against adults, law enforcement, and schools and evoked the angst of young hackers? <i>The Hacker Bible</i> <i>The Hacker Manifesto</i> <i>The Hacker Diaries</i> <i>The Hacker Encyclopedia</i>

<i>The Hacker Manifesto</i>

Data alteration, denial of service, network intrusions, thefts of information, and computer vandalism are examples of which type of computer crime? Computer as an instrument of a crime Computer as a target Crimes associated with the prevalence of computers Computer as incidental to crime

Computer as a target

The salami slice technique, pyramid schemes, and bunko schemes are examples of which type of computer crime? Computer as a target Computer as an instrument of a crime Crimes associated with the prevalence of computers Computer as incidental to crime

Computer as an instrument of a crime

Following the continuing changes and improvements in technology is an example of which type of hacker subculture norm? Technology Law Commitment Knowledge

commitment

Which of the following is defined as a malicious hacker? Script kiddie White hat Cracker Gray hat

cracker

According to Merton, the cultural goal of American society is economic success. False True

true

Many hackers acknowledge their activities are illegal, but legitimize and justify the actions using various rationales. False True

true

Which type of computer crime describes actions in which the computer is used only to further a criminal end? In other words, the computer or data contained therein is not the object of the crime. Computer as a target Computer as an instrument of a crime Crimes associated with the prevalence of computers Computer as incidental to crime

Computer as an instrument of a crime

Child pornography is an example of which type of computer crime? Computer as a target Crimes associated with the prevalence of computers Computer as an instrument of a crime Computer as incidental to crime

Computer as incidental to crime

Which of the following is not one of the four categories of computer crime? The computer as incidental to the crime Computer vandalism The computer as a target Crimes associated with the prevalence of computers

Computer vandalism

What major category of information warfare/cyberterror does "cryptography" fall into? Infrastructure attacks Promotion Information attacks Technological facilitation

technological facilitation

"Cyber" refers to almost anything "real" or "virtual" attached to a computer or network. False True

true

"Three strikes and you're out" is an example of policy based on choice theory. True False

true

A cryptographic key is necessary to read encoded material. False True

true

A ritualist rejects the cultural goal of economic success but accepts the institutionalized means to obtain the cultural goal. True False

true

A subculture is a set of values, norms, and beliefs that differ from those of the dominant culture. False True

true

A virus is a piece of code that attaches itself to other instructions within a computer. True False

true

A worm is a program that reproduces itself over a computer network by breaking into computers much like a virtual hacker. True False

true

According to Marxist thought, no government would willingly give up power and wealth; therefore, this power and wealth has to be taken violently. False True

true

According to the Russian perspective, cybercrime and cyberterrorism are acceptable techniques of information warfare. False True

true

Cohen and Felson argue that the motivation to commit crime and the supply of offenders are constant. True False

true

Computers may be used as both criminal instruments and instruments of warfare. False True

true

Data alteration and denial directly targets the computer by attacking the useful information stored or processed by the computer. False True

true

Despite its contention that modern technological advancements are incompatible with fundamentalist Islam culture, al Qaeda has become a primary foe in the digital terrorism area. True false

true

Deterrence theory assumes that individuals are rational actors. True False

true

Federal statute makes it a crime to illegally access or damage a "protected" computer. True False

true

From the 1950s through the 1970s, hackers never worried about breaking computer laws. True False

true

Hackers of the 1960s believed information should be free to all to understand how things work and can be improved. False True

true

Hollywood films have helped cement the notion that hackers are criminals. False True

true

In general, the threat of computer crime victimization increases with industrialization. True False

true

Infrastructure attacks are those attacks designed to destroy a system that includes critical data. True False

true

It is estimated that 100 million attacks against U.S. businesses and governments take place each day. False True

true

Most hackers claim to benefit the systems they intrude upon because they do not destroy data and they alert system administrators to security flaws. False True

true

One of the primary tenets of the "hacker code" as conceived by Levy is that information should be free to all users. False True

true

Rapid growth in the computer security industry has largely occurred without adequate research on the nature of cybercrimes and criminals. False True

true

Social control theory assumes that people will violate the law. True False

true

Sutherland's theory of differential association clearly explains how behavior is learned. True False

true

The 1980s were a pivotal decade in the trend toward defining hackers as criminals. False True

true

The Internet is the best tool for propaganda and recruitment among terrorists. False True

true

The United States is likely the nation that is most vulnerable to digital terrorism. True False

true

The distinction between hackers who commit crimes and other computer criminals rests upon the attitudes with which a hacker approaches the activity. False True

true

The expanded use of Social Security numbers is the primary reason for the ease of identity theft. False True

true

The full extent of computer theft is unknown because many thefts go unreported. True False

true

The majority of hack online actions are perfectly legal. True False

true

The propagation of a worm that does not actually damage anything and is more of a nuisance than anything else is a form of denial of injury according to Sykes and Matza's techniques of neutralization. True False

true

The text seeks to merge knowledge of criminal justice and knowledge of computer science. True False

true

The type of attack the hacker group "Anonymous" carried out against the private intelligence industry provider Stratfor is considered: propaganda. distributed denial-of-service attacks. website defacement. unauthorized intrusions.

unauthorized intrusions.

Criminal statistics/data on computer crime are submitted by all federal agencies and represent a fairly accurate picture of the problem. virtually nonexistent; there is no centralized source. collected by the FBI. very accurate and reliable.

virtually nonexistent; there is no centralized source.

Which 1983 film introduced the public to the unexplored world of computer hacking? The War Room Computer Wars War Games Computer Games

war games

Which technique of neutralization occurs when an individual believes his actions were beyond his control? Appeal to higher loyalties Denial of victim Denial of responsibility Denial of injury

Denial of responsibility

Which technique of neutralization occurs when an individual believes that the victim "had it coming"? Denial of victim Denial of responsibility Denial of injury Appeal to higher loyalties

Denial of victim

According to Hirschi, which of the following is NOT an element of the social bond? Belief Emotional Attachment Commitment

Emotional

What major category of information warfare/cyberterror does "data hiding" fall into? Technological facilitation Promotion Information attacks Infrastructure attacks

Technological facilitation

What major category of information warfare/cyberterror does "recruiting" fall into? Infrastructure attacks You Answered Promotion Information attacks Technological facilitation

Technological facilitation

Hackers appear to exhibit a subculture that includes: socialization processes. slang. group customs and norms. all of the above.

all of the above.

Using a cell phone to encourage a flash mob is a form of: infrastructure attack. propaganda and promotion. information attack. cyber and technological facilitation.

cyber and technological facilitation.

According to the authors of the text, another term for digital crime is: identity theft. Stuxnet. cybercrime. malicious software.

cybercrime.

Requesting funds for a terrorist organization through a chat room is an example of: charitable donations. e-commerce. direct solicitation. exploitation of online payment tools.

direct solicitation.

An unauthorized intrusion is easy to identify once it has occurred. True False

false

Case studies offer generalizations about trends in cybercriminality or patterns of offending. True False

false

Computer crime is not an international problem. True False

false

Computerized theft never deprives a legitimate owner of a tangible asset. False True

false

Critical infrastructure is not an attractive target to terrorists. True False

false

Data hiding is difficult to accomplish, but relatively easy to discover in Internet files. False True

false

Estimates on the cost of cybercrime are largely derived from criminal reports. True False

false

Experienced hackers make it a point to mentor inexperienced hackers. False True

false

Hackers only gain entry into websites through the use of advanced computer skills. False True

false

Hackers predominantly associate themselves with illegal acts. True False

false

Hackers routinely hack into hospitals and alter medical records. True False

false

Hackers were generally considered to be criminals as early as the 1960s. False True

false

Information attacks are the use of cyber communication to distribute or coordinate plans for a terrorist attack, incite an attack, or otherwise assist in the facilitation of terrorism. True False

false

Information warfare is always a component of cyberterrorism. True False

false

It is relatively easy to place a monetary value on the loss of intellectual property. False True

false

Psychological theory identifies the specific reasons a person becomes a pedophile. True False

false

Research has shown that most criminals fall into stage 3 or 4 of Kohlberg's stages of moral development. False True

false

Research has shown that most dangers of economic computer crimes come from outsiders. False True

false

Research has shown that the threat of arrest greatly deters would-be criminals. False True

false

Software testing by manufacturing is a form of gray hat hacking. True False

false

The Department of Justice systematically collects computer crime data. False True

false

The nation of Japan currently poses a larger threat to the United States in terms of information warfare than that posed by China. False True

false

White-collar crime cannot be applied to contemporary strain theory because of the assumption that only lower-class individuals commit crimes. True False

false

Which of the following is defined as a hacker who performs both legal and illegal hacker activities? Gray hat Cracker White hat Script kiddie

gray hat

The greatest threat to civil aviation security is: malicious insiders. hacking into communication systems. identity theft among employees. heavy reliance on other types of infrastructure.

heavy reliance on other types of infrastructure.

Website defacement is a form of: cyber and technological facilitation. infrastructure attack. information attack. propaganda and promotion.

information attack.

Distributed denial-of-service attacks are an example of: infrastructure attacks. cyber and technological facilitation. propaganda and promotion. information attacks.

information attacks.

According to Merton, a(n) ___________ accepts the goal of economic success but rejects the institutionalized means to obtain it. rebel innovator conformist ritualist

innovator

The primary difference between data alteration and network intrusion is the characteristics of the computer criminal who commits these offenses. punishment imposed for the offenses. intent of the intruder. sophistication of the action.

intent of the intruder.

Which hacker subculture norm is concerned with the potential criminal charges of information sharing in the real world and in cyberspace? Knowledge Technology Commitment Law

law

This group tends to define hackers and their activities in terms of the danger associated with hacking and its sometimes malicious intent. Law enforcement Hacker subculture None of the above Media

media

Which magazine has tried to establish credibility among important figures in computer culture by refusing to stigmatize the word "hacker"? <i>Science</i> <i>Consumer Reports</i> <i>Cyberpunk</i> <i>Wired</i>

<i>Wired</i>

Which of the following is most true? Most research of cybercrime focuses on behavioral approaches. Case studies offer generalizations on cybercriminals. A great deal of effort is dedicated to computer security. Early researchers felt that computer crime would be a large problem.

A great deal of effort is dedicated to computer security.

Which of the following is defined in terms of their activities related to denial of service attacks? White hat Cracker Gray hat Script kiddie

script kiddie

An insider using passwords stolen from coworkers in order to conceal changes he made to credit reporting data in exchange for money is an example of which form of attack method? Comprised accounts Social engineering Authorized use of an organization's systems Bypassing security and control processes

Comprised accounts

Which of the following is not true? Al Qaeda leaders have claimed to be actively planning a "cyber jihad" against the United States. U.S. officials have found evidence of al Qaeda using LOphtCrack. Al Qaeda produced the computer virus "Stuxnet." U.S. officials have found evidence of al Qaeda researching digital switches that run critical infrastructure.

Al Qaeda produced the computer virus "Stuxnet."

Which of the following forms of technology expanded the scope of hacker activities? Modems Personal computers All of the above Computer networks

All of the above

Which of the following is not considered in the calculation of costs associated with each type of computer crime? Anti-virus software All of the above are considered in the calculation of costs. Reputational damage Loss of revenue

All of the above are considered in the calculation of costs.

According to Cohen and Felson, crime occurs when there is a convergence in time and space of three factors. Which of the following is NOT one of those factors? A suitable target An adequate sight line from the location The absence of a capable guardian A motivated offender

An adequate sight line from the location

A call center with access to customer credit reports selling customer data to an outside organized crime organization for the purposes of identity theft is an example of which form of attack method? Social engineering Authorized use of an organization's systems Bypassing security and control processes Comprised accounts

Authorized use of an organization's systems

Which of following is not a common theme to emerge from the research on the problems of computer crime? Behavioral approaches of cybercriminals Computer fraud within government agencies Incidences of network incursion The work of hackers

Behavioral approaches of cybercriminals

A university enacts a policy in which any student that is caught illegally downloading media files will be automatically expelled from the university. The university hopes that students will be deterred from engaging in illegal downloading. This policy is an example of which theory? Strain Theory Routine Activities Theory Choice Theory Learning Theory

Choice Theory

Which of the following is not a reason that choice theory became popular among criminologists in the 1970s? The practice of rehabilitation came under attack after the "Nothing Works" article appeared. Crime-producing traits and factors were discovered. The public began to view punishment as the primary reason for incarceration. The reported crime rate in the 1960s and 1970s increased significantly.

Crime-producing traits and factors were discovered.

Intellectual property violations, component theft, counterfeiting, and identity theft are examples of which type of computer crime? Computer as a target Crimes associated with the prevalence of computers Computer as incidental to crime Computer as an instrument of a crime

Crimes associated with the prevalence of computers

Which of the following is not a characteristic noted by Anderson and colleagues in 2012? Traditional crimes that have changed with the advent of the Internet Traditional crimes that are now "cyber" because they are conducted online New crimes that have been originated since the advent of the Internet Crimes that facilitate other crimes through the proper use of computers

Crimes that facilitate other crimes through the proper use of computers

According to Agnew's General Strain Theory, which of the following is NOT a source of strain? Disjunction between expectations and achievements Presentation of negative stimuli Cultural goal of economic success Failure to achieve positively valued goals

Cultural goal of economic success

Which of the following is most true? Law enforcement was prepared to handle the newest threats of digital crime. Cybercrime is well researched. Cybercrime has significantly increased since the 1990s. Cybervictimization is likely leveling off.

Cybercrime has significantly increased since the 1990s.

Which of the following is least true? Cyberterrorism is a politically or ideologically motivated attack. Cyberterrorism may include prolonged loss of infrastructure. Cyberterrorism is defined by the group perpetrating it. Cyberterrorism is premeditated.

Cyberterrorism is defined by the group perpetrating it.

Which of the following is NOT a personality characteristic conducive to crime identified by the Gluecks? Impulsivity Resentment Lack of self-esteem Lack of self-control

Lack of self-esteem

A judge tells a defendant, "You are sentenced to prison not because of your crimes, but so that others will not engage in the same crimes." This is an example of which type of deterrence: Specific deterrence General deterrence Individual deterrence Group deterrence

General deterrence

Which of the following is not one of the five essential components of infrastructure? Government Information networks Communication networks People

Government

This group tends to define hackers and their activities in terms of creative problem solving and as a "pro-social" activity. Media Hacker subculture Law enforcement None of the above

Hacker subculture

Which of the following is not a characteristic of the "Hacker Ethic"? Computers can change your life for the better. Hackers should not be judged by their hacking. You can create art and beauty on a computer. All information should be free.

Hackers should not be judged by their hacking.

A hacker that uses his skills and attitudes to convey a political message is known as a: Hacktivist Black hat hacker White hat hacker Script kiddie

Hacktivist

According to Kohlberg, right corresponds to seeing one's own needs met, taking responsibility for oneself, and allowing others to do the same in which stage of moral development? Punishment and obedience orientation stage Hedonistic orientation stage Social contract, legalistic orientation stage Law and order orientation stage

Hedonistic orientation stage

Which of the following is NOT a social engineering tactic? Technical detail Bluster Identity theft Camaraderie

Identity theft

What major category of information warfare/cyberterror do "cyber-plagues" fall into? Information attacks Infrastructure attacks Promotion Technological facilitation

Information attacks

What major category of information warfare/cyberterror does "website defacement" fall into? Information attacks Infrastructure attacks Technological facilitation Promotion

Information attacks

An individual that engages in computer crime, fraud, and robbery in an effort to obtain financial success has adopted which form of Merton's modes of adaptation? Innovation Ritualism Conformity Retreatism

Innovation

Which of the following is most true? Employers always report computer crimes committed by employees. It can take months or even years to identify an actual monetary value for the loss of intellectual property. Estimates concerning the costs of cybercrime are derived from crime statistics. Estimates of costs are easy to calculate across different categories of computer crime.

It can take months or even years to identify an actual monetary value for the loss of intellectual property.

This group tends to define hackers and their activities in terms of the illegality of hacking. Hacker subculture None of the above Law enforcement Media

Law enforcement

Which of the following is not a characteristic of the hacker subculture norm technology? Eleet speek or k-rad Mentoring inexperienced hackers Using online resources to exchange information with other hackers The use of multiplayer computer games to help give hackers an interest in technology

Mentoring inexperienced hackers

Which of the following is NOT a finding of Holt and Bossler's empirical study of routine activities theory and online harassment? Computer software created specifically to decrease malware victimization had no impact. Routine computer use increased the odds of online harassment. Personal and peer involvement in deviance had no influence on the risk of online harassment. Individuals engaging in media piracy and viewing pornography were at increased risk of malware infection.

Personal and peer involvement in deviance had no influence on the risk of online harassment.

Which is not a category of cyberterrorism? Technological facilitation Promotion Information attacks Physical attacks

Physical attacks

Which of the following is NOT a characteristic of Marxist thought? Trust, order, and security maintained the ruling status of the wealthy elites. Political change can be achieved without conflict. Groups of people revolting against ruling elites have changed history. Successful revolutionary strategy began with a core group of leading individuals.

Political change can be achieved without conflict.

A terrorist group that hacks into an electrical power grid in order to cause a massive blackout and disrupt normalcy in the name of economic equality has subscribed to which theory? Political theory Learning theory Choice theory Social structure theory

Political theory

Which of the following is most true? The text focuses on mainly on Macintosh-based systems. Practitioners in both the criminal justice field and the computer science field typically have limited knowledge of each other's occupations. All forms of digital crimes are covered in the text. The authors of the text treat digital crime and digital terrorism as separate concepts.

Practitioners in both the criminal justice field and the computer science field typically have limited knowledge of each other's occupations.

Which of the following is one of the four categories that encompasses cyberterrorism and/or information warfare? Promotion Stenography Unauthorized intrusions Cryptography

Promotion

Which of the following is not a component of information warfare? Security measures Physical destruction Propaganda Psychological operations

Propaganda

According to Kohlberg, which two stages of moral development are completed by age 7? Hedonistic orientation stage and interpersonal concordance stage Punishment and obedience orientation stage and hedonistic orientation stage Law and order orientation stage and hedonistic orientation stage Social contract, legalistic orientation stage and punishment and obedience orientation stage

Punishment and obedience orientation stage and hedonistic orientation stage

Which of the following is not a wave in the development of warfare as identified by Alvin Toffler? Information wave Agrarian wave Industrial wave Renaissance wave

Renaissance wave

Which of the following is NOT a characteristic of the original phone phreaks? Restriction to the technology of the phone company Counterculture attitude of the 1960s and 1970s Blue boxing Paranoia

Restriction to the technology of the phone company

Which of the following is NOT an assumption of deterrence theory? Offenders must be aware of the penalty for particular crimes. Individuals are rational actors. Individuals view risks of particular crimes as unpleasant. Sanctions must be swift, severe, and absolute.

Sanctions must be swift, severe, and absolute.

_____________ is designed to impose a sanction on convicted offenders in order to prevent them from continuing to commit criminal acts in the future. Individual deterrence Group deterrence Specific deterrence General deterrence

Specific deterrence

Which of the following theorists developed a learning theory of crime? Kohlberg Sutherland Agnew Merton

Sutherland

Which of the following is not an example of Donn Parker's work as an early commentator on problems associated with computer crime? The "cyber" prefix to describe computer crimes. The observation that researchers felt that computer crime was not worthy of specific explicit research. The ease with which criminals could misuse information. The observation that losses increase substantially with intentional acts involving computers.

The "cyber" prefix to describe computer crimes.

Which of the following is least true? Cyber warfare is incorporated in military training in China. China views cyberspace as a way of compensating for its deficiency in conventional warfare. The Chinese government restricts the use of cyber warfare to the Chinese military. Information warfare is considered necessary to the Chinese government to support its objectives and strategy.

The Chinese government restricts the use of cyber warfare to the Chinese military.

Which of the following is not true? The Russians view cyber capabilities as tools of information warfare. The Russians carry out cyber operations alongside psychological operations. The Russians view military cyber operations differently than those cyber operations employed for hacktivism, cyber aggression, and cybercrime. The Russians view information warfare from a holistic approach.

The Russians view military cyber operations differently than those cyber operations employed for hacktivism, cyber aggression, and cybercrime.

Which of the following is most true? The processes and dynamics involved in the production of digital crime and digital terrorism are virtually the same. Digital crime and digital terrorism are not on parallel tracks. Digital terrorism does not pose as great a threat as digital crime. Digital crime is another term for digital terrorism.

The processes and dynamics involved in the production of digital crime and digital terrorism are virtually the same.

Which of the following is most true? The public relies on computers for a host of societal functions. Threats of cyberterrorism are grossly exaggerated. The public perception is that law enforcement and government officials are well-equipped to deal with cybercrime.

The public relies on computers for a host of societal functions.

Which of the following is not one of the three major credit reporting bureaus that control the information on all persons applying for credit in the United States? Trans Credit Experian Trans Union Equifax

Trans Credit

The contemporary warez scene has expanded to include which of the following? All of the above Console games Digitally compressed movies before they are actually released DVD decoding

all of the above


Related study sets

Ch 12: Public Policy Review 2305

View Set

5. N. Hypoglossus, A.lingualis, N.lingualis, N.sublingualis, N.mylohyoideus, N.alveolaris mandibularis, Mm. Pterygoideii

View Set

Ch 18 Caring for Clients with Cancer

View Set

Real Estate Practice Final - State

View Set

Maternal newborn nursing (concept map and practice quizzes)

View Set

Introduction to Pediatric Clinical Skills

View Set