Cybercrime Midterm

Ace your homework & exams now with Quizwiz!

Criminal knowledge thata thier efforts will likely lead to success because there are so many potential victims and so few barriers or oversight online best describes which internet gateway to vulnerability

Asymmetries of cyberspace

___________ is an encryption component that refers to a digital signature providing proof of authorship

Attribution

Which of the following was NOT identified as a recommendation for increasing automotive cybersecurity? A. third-party testing B. Aesthetic design C. Internal monitoring system D. Segmented architecture

B

Which of the following was not identified as a countermeasure for networks in text? A. Host-based mitigation B. Data backup C. Proactive measures D. Network-based mitigation

B

According to the text, which of the following entities are considered a special target for botnets?

Banks and financial institutions

Hackers who are motivated by personal gain or a certain cause are often referred to as __________

Black hats

The "bad guy" hackers are known as _____________

Black hats

_____ is defined as a collection of infected machines worldwide that receive commands and perform some illegal actions such as distributed denial of service attacks, among others.

Botnet

All of the following are considered public sector entities except... A. NSA B. CIA C. FusionX D. DHS

C

All of the following were identified as vulnerable infrastructures EXCEPT A. Telecommunications B. Energy C. Education D. Transportation

C

Groups with displeasure of government are often motivated by all of the following EXCEPT A. Freedom B. Individuality C. Aristocracy D. Privacy

C

Which of the following was not considered one of the main issues with cybersecurity A. confidentiality of data B. Integrity of data C. Cost of data D. Availability of data

C

One of the most persistent threats for the US in terms of cyberattacks originates in _________

China

In 2001, the first malware attack that fell into phase 3 of convergence was known as ___________

Code Red

The opportunity to create new businesses and markets online best describes which aspect of internet development?

Commercialization aspect has been used because the internet allows for businesses and markets to be created and utilized on a broader scale due to the internet.

In 1988, the Defense Advances Research Projects Agency (DARPA) created the ___________ with the goal o striving for a safer and stronger internet for all Americans

Computer Emergency Readiness Team

In 1987, the ___________ Act strengthened the security measures for online systems

Computer security

Submarine network policy is used to secure services at the ___________ level

Corporate

The inventors of the internet likely did not consider ____________ during its development

Criminal abuse

The intentional aggressive behavior toward another person that is performed through electronic means is also known as __________

Cyberbullying

_________ is an interdependent network of information technology infrastructures including the internet, telecommunications networks, and computer systems

Cyberspace

Use of computer networks and technologies as a means for conducting attacks that target critical national infrastructures or governmental assets has a psychological, social, political or religious motive, causes harm to individuals or groups, or physically damages infrastructures is referred to as __________

Cyberterrorism

A ___________ refers to a persons who attempt to unauthorized access to a control system device and/or network using a data communications pathway.

Cyberthreat

The most serious cybercrimes include all of the following EXCEPT A. Extortion B. Terrorism C. Embezzlement D. Harassment

D

Development of the ________ resolved the issues with hierarchical host names making it easier for the average person to access the internet.

DNS

The __________, an underground web, allows offenders to stay anonymous and undetected, as these are not traceable by police.

Dark net

In 2001, the original Code Red malware initiated a ___________ attack on the White House

Denial of Service

Cyberterrorism attacks often take the form of

Denial-of-service

The posting of harassing messages aiming to cause harm to the victim is also known as _________

Denigration

The first "software" was the Morse Code developed by Samuel F. B. Morse. The Morse Code made telegraphing much easier by using

Dots and dashes

According to the text, China also engages in economic __________ against the US and other countries

Espionage

Hackers with their abilities to research vulnerabilities in software products and disclose them to companies that developed the software are known as ____________

Ethical hackers

People who are "tricked" into giving up access information or information about themselves to an external party are known as ___________

Exploited insiders

In 1998 Congress passed the Assumption Deterrence Act making identity theft a _________

Felony

Cascade is an eample of which type of virus

File Infector

__________ are software programs or pieces of hardware that help screen out hackers, viruses and worms that try to reach computers via the internet

Firewalls

The exchange of insults in a public setting, such as a bulletin board or chat room, is known as ___________

Flaming

Consumer crimes that include identity theft, phishing scams, and spam fall within which of the following categories?

Fraud and financial crimes

Hackers who are motivated by financial gains and who conduct both bad and ethical hacking are referred to as __________

Gray hats

___________ typically work independently to expose security vulnerabilities or practices that endanger individuals' private data

Gray hats

Which of the following was not identified as one of the main forms of international threats?

Hacking or spying on city and local governments

Making mistakes that can lead to security vulnerabilities is also referred to as __________

Human error

In the _____________ cluster, computer infrastructure and vulnerabilities are the focus of attacks

Human machine

In 2015, the most common crime reported to the Federal Consumer Commission was ___________

Identity theft

____________ refers to all types of crime in which someone wrongfully obtains and uses another person's personal data in some way that involves fraud or deception, typically for economic gain

Identity theft

Which of the following countermeasures helps prevent email spoofing, that is, the forgery of email headers to make it appear as if it is coming from a friend or employee?

Implement message authentification

Which layer of cyberspace includes the creation and distribution of information and interaction between users.

Information layer

Human behavior that departs from compliance with established policies, regardless of whether it results from malice or a disregard for security policies, is the manifestation of an ________________

Insider threat

According to national surveys, __________ are the second greatest threat to a company's cybersecurity, only trumped by hackers

Insiders

What risk is not created by Trojan Horses

Internet slowdown

In 2015, a cyberattack was launched against Ukraine by the Russians. The ___________ attack to shut down the power grid based in Russia was possibly backed by the Russian government

KillDisk

Threats that originate from inside the company or organization are referred to as ______________

Local threats

__________ viruses infect data files

Macro

The Internal Revenue Service uses which of the following methods to contact a taxpayer?

Mail

The Syrian Electronic Army has been responsible for attacks against.....

Major US newspapers, social media sites and telecommunications providers

The least common by most costly is __________ insider threat

Malicious

The ___________ technique targets devices that can be connected, such as car alarms, thermostats etc.

Man in the IOT (internet of things)

The _________ technique targets file-sharing tools, such as Google Drive

Man in the cloud

The interception of a message by a third party is also referred to as a ____________ attack

Man in the middle

Which of the following countries was not identified as being one of the strong actors in world politics?

Mexico

Historically, power has depended on what type of strength?

Military

Which of the following is not an example of a cyberattack by the Syrian Electronic Army?

Moonlight Maze

The ________ Agency is responsible for collecting and decrypting threats both physical and cyber via the use of Signal Intelligence

National Security

__________ occur when a computer system is accessed without permission

Network Intrusions

Email-borne viruses took place in which phase of convergence?

Phase 2

________ refers to attacks where a mass email is sent to multiple computers, requesting personal information being sent to a specific location

Phishing

Work-for-hire hackers who work for private security corporations are also referred to as ____________

Read Teams

Which of the following countries is considered one of the most advanced cyberespionage powers

Russia

The role of the _______________ was extended in the Cybersecurity Enhancement Act of 2014

Secretary of Commerce

________________ is a weakness in a product that could allow an attacker to compromise the integrity, availability or confidentiality of that produce

Security vulnerability

________ is defined as unsolicited commercial email that includes any commercial emails addressed to a recipient with whom the sender has no existing business or personal relationship and not sent with consent of the recipient.

Spam

In the ____________ cluster, computers are the target of the cybercrimes

Technological

Which of the following systems led to the creation of the Morse Code

Telegraph system

_____________ is a global system of interconnected computer networks that are set up to exchange various types of data

The internet

Whereas in the past criminals had to physically approach their victims to carry out a crime, the internet allows defenders to be in other states, or even continents and still carry out the same crime. This best represents which of the following vulnerabilities of the internet?

Time and space

A _____________ malware is disguised as, or embedded within, legitimate software

Trojan Horse

The Syrian Electronic Army has collected information using which of the following cyberattack techniques?

Trojan Horses

Which of the following is comparable to the address you would put on a letter to tell the postal service to deliver a letter to

URL

Which of the following defines the acronym URL

Uniform Resource Locator

A ______________ is a small software programs designed to spread from one computer to another and to interfere with computer operation

Virus

___________ is a service that can be accessed via the internet

World Wide Web

According to General Michael Hayden, a cybersecurity knowledge gap exists between __________

Youthful and older generations

According to the text, cyberwarfare generally includes ____________

cyberespionage and cbersabotage

Which of the following represents a complete URL

https://www.fbi.gov

Which of the following are considered small programs or sections of a program triggered by some event such as a certain date or time, a certain percentage of disk space filled or the removal of a file

logic bombs

According to the text, phishing scams typically target ________

personal information

China is known to prioritize __________ control over cyberdefense strategies

political information

According to the text, the most pervasive cyberthreat may be __________

theft of intellectual property

Threats to cybersecurity originate from all of the following sources EXCEPT 1. Individual 2. Local 3. National 4. International

1

Countries concerned with controlling the flow of information and goods online would be most concerned with which of the following aspects of the internet?

1s and 0s

Which internet gateways to vulnerability can be described as the computer code of the internet

1s and 0s

According to the text by the year 2020, economic cost of cybercrime is expected to go above _____________ dollers

3 trillion

According to the text, human trafficking consists of all of the following elements EXCEPT __________ 1. Act 2. Means 3. Purpose 4. Outcome

4

According to the text, virus files typically end in ____________ A. .exe B. .doc C. .mp4 D. .jpg

A

Edward Snowden, an American computer professional, provided all of the following tips for keeping data private EXCEPT A. Decrypt your phone calls and text messages B. Encrypt your hard drive C. Use a password manager D. Use two-factor ID

A

Which of the following characteristics of hackers is NOT true A. The members meet with each other quite often B. It is male-dominated C. They work anonymously D. The have several public identities

A

Which of the following is not considered one of the main targets in information technology A. People B. Software C. Hardware D. Network

A

Which of the following was not identified as a hardware device in the text A. Modems B. Network appliances C. Surveillance systems D. Industrial control systems

A

The ___________ of the internet might be a concern for parents regarding who their children may be talking to online

Anonymity

The creation of _____________ has led to the creation of new hacking/fraudster built-in malware techniques that can target users via smartphones and tablets

Apps


Related study sets

Science Terms (all of 1, 2, 9, but only 1-3 in 10 and 1-4 in 11)

View Set

MGMT 3370 TTU Exam 2 Review Questions

View Set

GI & Hepatobilary Practice Questions

View Set

Sociology - Chapter 5 Study Questions

View Set

Intro to Computers - Technology Chp 4, Intro to Computers - Technology Ch3, Chapter 2 Computer Concepts, Tech Quiz 3, SIMnet LetMeTry Q&A Chapter 1

View Set

World Food Programme: Hunger Stats

View Set