Cybercrime Midterm
Criminal knowledge thata thier efforts will likely lead to success because there are so many potential victims and so few barriers or oversight online best describes which internet gateway to vulnerability
Asymmetries of cyberspace
___________ is an encryption component that refers to a digital signature providing proof of authorship
Attribution
Which of the following was NOT identified as a recommendation for increasing automotive cybersecurity? A. third-party testing B. Aesthetic design C. Internal monitoring system D. Segmented architecture
B
Which of the following was not identified as a countermeasure for networks in text? A. Host-based mitigation B. Data backup C. Proactive measures D. Network-based mitigation
B
According to the text, which of the following entities are considered a special target for botnets?
Banks and financial institutions
Hackers who are motivated by personal gain or a certain cause are often referred to as __________
Black hats
The "bad guy" hackers are known as _____________
Black hats
_____ is defined as a collection of infected machines worldwide that receive commands and perform some illegal actions such as distributed denial of service attacks, among others.
Botnet
All of the following are considered public sector entities except... A. NSA B. CIA C. FusionX D. DHS
C
All of the following were identified as vulnerable infrastructures EXCEPT A. Telecommunications B. Energy C. Education D. Transportation
C
Groups with displeasure of government are often motivated by all of the following EXCEPT A. Freedom B. Individuality C. Aristocracy D. Privacy
C
Which of the following was not considered one of the main issues with cybersecurity A. confidentiality of data B. Integrity of data C. Cost of data D. Availability of data
C
One of the most persistent threats for the US in terms of cyberattacks originates in _________
China
In 2001, the first malware attack that fell into phase 3 of convergence was known as ___________
Code Red
The opportunity to create new businesses and markets online best describes which aspect of internet development?
Commercialization aspect has been used because the internet allows for businesses and markets to be created and utilized on a broader scale due to the internet.
In 1988, the Defense Advances Research Projects Agency (DARPA) created the ___________ with the goal o striving for a safer and stronger internet for all Americans
Computer Emergency Readiness Team
In 1987, the ___________ Act strengthened the security measures for online systems
Computer security
Submarine network policy is used to secure services at the ___________ level
Corporate
The inventors of the internet likely did not consider ____________ during its development
Criminal abuse
The intentional aggressive behavior toward another person that is performed through electronic means is also known as __________
Cyberbullying
_________ is an interdependent network of information technology infrastructures including the internet, telecommunications networks, and computer systems
Cyberspace
Use of computer networks and technologies as a means for conducting attacks that target critical national infrastructures or governmental assets has a psychological, social, political or religious motive, causes harm to individuals or groups, or physically damages infrastructures is referred to as __________
Cyberterrorism
A ___________ refers to a persons who attempt to unauthorized access to a control system device and/or network using a data communications pathway.
Cyberthreat
The most serious cybercrimes include all of the following EXCEPT A. Extortion B. Terrorism C. Embezzlement D. Harassment
D
Development of the ________ resolved the issues with hierarchical host names making it easier for the average person to access the internet.
DNS
The __________, an underground web, allows offenders to stay anonymous and undetected, as these are not traceable by police.
Dark net
In 2001, the original Code Red malware initiated a ___________ attack on the White House
Denial of Service
Cyberterrorism attacks often take the form of
Denial-of-service
The posting of harassing messages aiming to cause harm to the victim is also known as _________
Denigration
The first "software" was the Morse Code developed by Samuel F. B. Morse. The Morse Code made telegraphing much easier by using
Dots and dashes
According to the text, China also engages in economic __________ against the US and other countries
Espionage
Hackers with their abilities to research vulnerabilities in software products and disclose them to companies that developed the software are known as ____________
Ethical hackers
People who are "tricked" into giving up access information or information about themselves to an external party are known as ___________
Exploited insiders
In 1998 Congress passed the Assumption Deterrence Act making identity theft a _________
Felony
Cascade is an eample of which type of virus
File Infector
__________ are software programs or pieces of hardware that help screen out hackers, viruses and worms that try to reach computers via the internet
Firewalls
The exchange of insults in a public setting, such as a bulletin board or chat room, is known as ___________
Flaming
Consumer crimes that include identity theft, phishing scams, and spam fall within which of the following categories?
Fraud and financial crimes
Hackers who are motivated by financial gains and who conduct both bad and ethical hacking are referred to as __________
Gray hats
___________ typically work independently to expose security vulnerabilities or practices that endanger individuals' private data
Gray hats
Which of the following was not identified as one of the main forms of international threats?
Hacking or spying on city and local governments
Making mistakes that can lead to security vulnerabilities is also referred to as __________
Human error
In the _____________ cluster, computer infrastructure and vulnerabilities are the focus of attacks
Human machine
In 2015, the most common crime reported to the Federal Consumer Commission was ___________
Identity theft
____________ refers to all types of crime in which someone wrongfully obtains and uses another person's personal data in some way that involves fraud or deception, typically for economic gain
Identity theft
Which of the following countermeasures helps prevent email spoofing, that is, the forgery of email headers to make it appear as if it is coming from a friend or employee?
Implement message authentification
Which layer of cyberspace includes the creation and distribution of information and interaction between users.
Information layer
Human behavior that departs from compliance with established policies, regardless of whether it results from malice or a disregard for security policies, is the manifestation of an ________________
Insider threat
According to national surveys, __________ are the second greatest threat to a company's cybersecurity, only trumped by hackers
Insiders
What risk is not created by Trojan Horses
Internet slowdown
In 2015, a cyberattack was launched against Ukraine by the Russians. The ___________ attack to shut down the power grid based in Russia was possibly backed by the Russian government
KillDisk
Threats that originate from inside the company or organization are referred to as ______________
Local threats
__________ viruses infect data files
Macro
The Internal Revenue Service uses which of the following methods to contact a taxpayer?
The Syrian Electronic Army has been responsible for attacks against.....
Major US newspapers, social media sites and telecommunications providers
The least common by most costly is __________ insider threat
Malicious
The ___________ technique targets devices that can be connected, such as car alarms, thermostats etc.
Man in the IOT (internet of things)
The _________ technique targets file-sharing tools, such as Google Drive
Man in the cloud
The interception of a message by a third party is also referred to as a ____________ attack
Man in the middle
Which of the following countries was not identified as being one of the strong actors in world politics?
Mexico
Historically, power has depended on what type of strength?
Military
Which of the following is not an example of a cyberattack by the Syrian Electronic Army?
Moonlight Maze
The ________ Agency is responsible for collecting and decrypting threats both physical and cyber via the use of Signal Intelligence
National Security
__________ occur when a computer system is accessed without permission
Network Intrusions
Email-borne viruses took place in which phase of convergence?
Phase 2
________ refers to attacks where a mass email is sent to multiple computers, requesting personal information being sent to a specific location
Phishing
Work-for-hire hackers who work for private security corporations are also referred to as ____________
Read Teams
Which of the following countries is considered one of the most advanced cyberespionage powers
Russia
The role of the _______________ was extended in the Cybersecurity Enhancement Act of 2014
Secretary of Commerce
________________ is a weakness in a product that could allow an attacker to compromise the integrity, availability or confidentiality of that produce
Security vulnerability
________ is defined as unsolicited commercial email that includes any commercial emails addressed to a recipient with whom the sender has no existing business or personal relationship and not sent with consent of the recipient.
Spam
In the ____________ cluster, computers are the target of the cybercrimes
Technological
Which of the following systems led to the creation of the Morse Code
Telegraph system
_____________ is a global system of interconnected computer networks that are set up to exchange various types of data
The internet
Whereas in the past criminals had to physically approach their victims to carry out a crime, the internet allows defenders to be in other states, or even continents and still carry out the same crime. This best represents which of the following vulnerabilities of the internet?
Time and space
A _____________ malware is disguised as, or embedded within, legitimate software
Trojan Horse
The Syrian Electronic Army has collected information using which of the following cyberattack techniques?
Trojan Horses
Which of the following is comparable to the address you would put on a letter to tell the postal service to deliver a letter to
URL
Which of the following defines the acronym URL
Uniform Resource Locator
A ______________ is a small software programs designed to spread from one computer to another and to interfere with computer operation
Virus
___________ is a service that can be accessed via the internet
World Wide Web
According to General Michael Hayden, a cybersecurity knowledge gap exists between __________
Youthful and older generations
According to the text, cyberwarfare generally includes ____________
cyberespionage and cbersabotage
Which of the following represents a complete URL
https://www.fbi.gov
Which of the following are considered small programs or sections of a program triggered by some event such as a certain date or time, a certain percentage of disk space filled or the removal of a file
logic bombs
According to the text, phishing scams typically target ________
personal information
China is known to prioritize __________ control over cyberdefense strategies
political information
According to the text, the most pervasive cyberthreat may be __________
theft of intellectual property
Threats to cybersecurity originate from all of the following sources EXCEPT 1. Individual 2. Local 3. National 4. International
1
Countries concerned with controlling the flow of information and goods online would be most concerned with which of the following aspects of the internet?
1s and 0s
Which internet gateways to vulnerability can be described as the computer code of the internet
1s and 0s
According to the text by the year 2020, economic cost of cybercrime is expected to go above _____________ dollers
3 trillion
According to the text, human trafficking consists of all of the following elements EXCEPT __________ 1. Act 2. Means 3. Purpose 4. Outcome
4
According to the text, virus files typically end in ____________ A. .exe B. .doc C. .mp4 D. .jpg
A
Edward Snowden, an American computer professional, provided all of the following tips for keeping data private EXCEPT A. Decrypt your phone calls and text messages B. Encrypt your hard drive C. Use a password manager D. Use two-factor ID
A
Which of the following characteristics of hackers is NOT true A. The members meet with each other quite often B. It is male-dominated C. They work anonymously D. The have several public identities
A
Which of the following is not considered one of the main targets in information technology A. People B. Software C. Hardware D. Network
A
Which of the following was not identified as a hardware device in the text A. Modems B. Network appliances C. Surveillance systems D. Industrial control systems
A
The ___________ of the internet might be a concern for parents regarding who their children may be talking to online
Anonymity
The creation of _____________ has led to the creation of new hacking/fraudster built-in malware techniques that can target users via smartphones and tablets
Apps