Tech & Cyber Crime Final Exam

Ace your homework & exams now with Quizwiz!

Home security systems, thermostats, and appliances that can be controlled via the web are examples of the _______

Internet of Things

What is the name of the US bill that failed to pass in 2012 in order to combat rates of piracy and counterfeiting?

Stop Online Piracy Act

What is the name of the malware used to compromise and harm uranium enrichment facilities in Iran?

Stuxnet

The Computer Fraud and Abuse Act was extended to apply to cyberterror and warfare acts through the creation of what act?

The PATRIOT act

What is the name of the downloadable program individuals can use to anonymize their online activity from others that has been a focus of law enforcement investigations over the last few years?

Tor

Which of the following anonymization tools have been targeted by law enforcement to better identify cybercriminals?

Tor

What is the name of the hacker who maintained propaganda websites and posted hacker training tutorials for the e-jihad?

Youni Tsoulis

Search warrants are not required in which of the following circumstances in the US?

all of the above

What is the name of the UK organization that informs critical infrastructure owners of emerging threats and coordinates incident responses?

centre for the Protection of National Infrastructure

What is the name for services that allow individuals to remotely access files stored on web servers via the Internet?

cloud storage

The term ________ references direct relationships between police and the general public to identify certain forms of crime that are viewed as a challenge and finding ways to work together to combat the issue.

community policing

Which of the following forms of attack are commonly used by groups to disable websites and online services?

denial of service

Generally speaking, if a criminal suggests that their victim was asking for it, they are applying which technique of neutralization?

denial of victim

What theory considers the decision-making processes of offenders and views the likelihood of offending as a judgement of risk relative to offending rewards?

deterrence theory

Akers' dynamic process of social learning begins with which of the following elements?

differential associations

Criminological researchers have found that individuals with low self-control are substantially more likely to be victims of cybercrime.

false

Cybercrime research suggests that differential associations to deviant peers have no association with individual involvement in cybercrimes.

false

Grabosky argued that cybercrimes are most likely an issue of 'new wine, but no bottles.'

false

Ideologically-driven cyberattacks will not increase over the next decade due to the relative stabilization of Internet use across the world.

false

In the US, computer files are considered in plain view since they must be opened in order to view them, and are considered legal under the plain view doctrine.

false

In the US, the Frye standard states that scientific evidence can be admissible so long as it was developed in a rigorous fashion.

false

It is relatively easy to predict the future of cybercrime due to the stability of technology and its use.

false

Law enforcement in the US can compel suspects to provide decryption keys in the event encrypted evidence is identified on their digital devices but there is no information present to suggest there is incriminating evidence present in those files.

false

Private industry and security vendors are not establishing working groups to deal with cybercrime.

false

The term e-jihad is often used to describe the range of groups who view that the white race has been sublimated by non-white racial and ethnic groups.

false

Under the Frye standard, the credentials of an expert witness can also be a part of the reliability test.

false

What standard recognizes that scientific evidence can only be admitted if it is generally viewed as reliable by the scientific community?

frye standard

Which of the following is not a part of the Daubert standard for the admissibility of scientific evidence?

grant funding

What is the term used to describe the use of hacking techniques to promote an activist agenda or express a political/social opinion?

hacktivism

Which of the following is not a way that extremist groups use the Internet?

humor

Which of the following is the source of low self-control in the general theory of crime?

ineffective parenting

What is the term used to refer to the use of information technology to gain advantage over an opponent, including the spread of false information?

information warefare

What is the term used for legislation that mandates an individual provide encryption keys or passwords to law enforcement in digital forensic investigations?

key disclosure laws

What theory has been integrated with routine activities theory to account for individual differences in the risk of victimization?

low self-control

Which of the following is not a component of routine activities theory?

low self-control

Which of the following types of media have not been used by extremist groups to promote their agenda?

none of the above

What is the name for the doctrine that allows police to search and seize evidence that may not be indicated in a search warrant but is in plain view of the officer and incriminating?

plain view

What is the name for a legal document signed by a judge or magistrate that authorizes law enforcement to conduct a search?

search warrant

What is the term used to refer to the process where individuals accept a radical ideology without directly engaging others as part of that movement?

self-radicalization

Which of the following is not a type of strain identified in Agnew's general strain theory?

strain from achieving positively valued goals

Which of the following is not a technique of neutralization?

support for social movements

Which of the following is not a part of the scientific method?

theory

A subculture provides its members with rationalizations for behavior, justifications for action, and unique ways to identify other members through verbal and non-verbal cues.

true

Agnew and other researchers have found that cyberbullying may be accounted for by strain, as individuals who feel anger and frustration can easily vent online.

true

At present, US courts do not have complete agreement over the legal use of warrantless searches of cellphones seized incident to an arrest.

true

At this time, there have been few real instances of a cyberterror attack against the US or UK.

true

Criminological theorists have yet to consider how socio-economic backgrounds affect the risk of cybercrime victimization and offending behaviors.

true

It is possible that wearable devices like FitBits will change the way we interact with the Internet, and our behaviors generally.

true

Nation-state-sponsored attackers tend to target critical infrastructure and intellectual property targets in order to gain economic or political advantage over another nation.

true

One advantage of the Internet is that it allows extremist groups to communicate their message directly to wide audiences without the need to interact with traditional media outlets.

true

Research suggests that cybercrime is not easily deterred through traditional methods or mechanisms of punishment.

true

Researchers have found a substantial link between low self-control and participation in simple forms of computer hacking.

true

Smart devices like thermostats and wearable technology constitute the Internet of Things.

true

The Internet is enabling the process of self-radicalization, where individuals gain access to radical messages and join movements without actually engaging with others in the real world.

true

The term fake news recently emerged to describe false news stories planted online in order to sway public opinion or divert attention away from real events.

true

Though there is no single definition of cyberterror, better definitions recognize the value of the Internet as a communications mechanism and target for attacks by extremist groups.

true


Related study sets

Clinical Informatics Chapter 3 with Pictures

View Set

BUS321 CH1- Environment and Theoretical Structure of Financial Accounting

View Set