CRJ233 Test 1 – Flashcards
Unlock all answers in this set
Unlock answersquestion
________ has traditionally encompassed abuses and misuses of computer systems or computers connected to the Internet, resulting in direct and concomitant losses.
Digital crime
Computer-related crime
Cybercrime
Computer crime
answer
Cybercrime
question
Which of the following involves payments that rely on a bank account and a web-based transfer of funds to or from an established financial account?
closed system cards
digital precious metals
Internet payment services
stored value cards
answer
Internet payment services
question
Which of the following is NOT a reason why many businesses and corporations underreport computer crimes?
consumers don't care about confidentiality
exposure to financial losses
data breach liabilities
damage to brand
answer
consumers don't care about confidentiality
question
Closed system cards and open system cards are two primary types of ________.
stored value cards
prepaid cards
digital precious metals
mobile payments
answer
prepaid cards
question
What did the Fifth Circuit Court of Appeals rule in U.S. v. Finley?
The post-arrest search of a suspect's cell phone was unconstitutional.
The post-arrest search of a suspect's cell phone was constitutional.
The pre-arrest search of a suspect's cell phone was unconstitutional.
The pre-arrest search of a suspect's cell phone was constitutional.
answer
The post-arrest search of a suspect's cell phone was constitutional.
question
________ includes any criminal activity which involves the unauthorized access, dissemination, manipulation, destruction, or corruption of electronically stored data.
Cybercrime
Computer related crime
Computer crime
Digital crime
answer
Digital crime
question
Which of the following characteristics of new payment methods has facilitated money laundering and terrorist financing?
anonymity in transactions
increased competition
lower cost
lower interest rates
answer
anonymity in transactions
question
Corporations and private entities that offer discounts on software or training to law enforcement agencies are called ________.
nerds or geeks
forensic predators
friendly vendors
electronic purses
answer
friendly vendors
question
Traditionally, trial and appellate courts evaluated the constitutionality of computer crime statutes, searches, and investigations through the lens of the ________.
First and Fourth Amendments
First and Second Amendments
Second and Third Amendments
Third and Fourth Amendments
answer
First and Fourth Amendments
question
Which payment method is typically associated with a card payment network such as Visa or MasterCard?
digital precious metals
mobile payment
electronic purse
prepaid card
answer
prepaid card
question
Which is one of the earliest computer crimes to have been committed?
software piracy
DDoS attack
phishing
hacking
answer
software piracy
question
Which of the following is an example of computer-initiated criminal activity?
spreading viruses
stealing home addresses
wire transfers
spamming
answer
wire transfers
question
Expenditures on which area represent a nonrecurring expense for a computer crime unit?
staffing
training
acquiring and updating equipment
establishing a computer laboratory
answer
establishing a computer laboratory
question
The Electronic Frontier Foundation (EFF) was created by _______.
John Edward Robinson and William Gibson
John Barlow and John Gilmore
John Barlow and William Gibson
John Gilmore and John Edward Robinson
answer
John Barlow and John Gilmore
question
Which of the following is NOT a problem in the investigation of cybercrime?
perceived insignificance of cybercrime
prosecutorial reluctance to pursue cyber criminals
untrained investigators
a widespread perception of cybercrime as worse than "traditional" crime
answer
a widespread perception of cybercrime as worse than "traditional" crime
question
One of the earliest examples of computer crime is ________, which consists of an activity in which telecommunications systems are manipulated and ultimately compromised.
phreaking
spamming
hacking
cracking
answer
phreaking
question
PayPal is an example of a(n) ________.
digital precious metal
prepaid card
stored value card
Internet payment service
answer
Internet payment service
question
Which of the following is a valid reason why a corporation might welcome federal assistance to help catch a cyber criminal?
Government investigations of corporate cybercrime can boost consumer/client confidence.
Criminals access different services to disguise their location.
The U.S. judicial system lets corporations hide the results of law enforcement investigations.
Government agencies have the advantage of being able to ignore the chain of custody.
answer
Criminals access different services to disguise their location.
question
Which of the following e-payment methods stores funds on an integrated circuit chip in the card?
mobile payment
prepaid card
stored value card
Internet payment
answer
stored value card
question
Which of the following allows perpetrators to commit multinational cybercrime with little fear of judicial sanctions?
the presence of traditional jurisdictional demarcations
the lack of physical boundaries
an extensive array of equipment or tools
the widespread acceptance of world passports
answer
the lack of physical boundaries
question
Which of the following has been characterized as "a social networking site on steroids"?
Second Life
Love Bug
CERT
Electronic Frontier Foundation
answer
Second Life
question
All the following are categories into which computer crimes are traditionally divided EXCEPT ________.
computer as an instrument
computer as a target
computer as an incidental
computer as a weapon
answer
computer as a weapon
question
Which of the following is NOT a payment mechanism that poses a problem for law enforcement?
prepaid cards
banker's drafts
mobile payments
electronic purses
answer
banker's drafts
question
Which of the following is true of the Digital Revolution?
It has prompted private citizens to embrace sophisticated measures of cyberprotection.
It has eliminated vulnerabilities of government institutions and personal residences.
It has resulted in decreased interconnectivity.
It has created a new forum for both terrorist activity and criminal behavior.
answer
It has created a new forum for both terrorist activity and criminal behavior.
question
Which of the following, according to a study conducted by the Department of Justice, were perceived as the number one target for computer crime?
financial institutions
individuals
businesses
educational institutions
answer
businesses
question
Which of the following is known as the "baby" of computer operating systems and is freely distributed?
Windows
Macintosh
UNIX
Linux
answer
Linux
question
In which Mac OS did Apple introduce its first Unix-based operating system?
Mac OS X
System 7
Mac OS 8
System 2.1
answer
Mac OS X
question
What is the most important component of a computer?
Incorrect Response CPU
random access memory
motherboard
universal serial bus
answer
motherboard
question
How are websites identified?
through post office protocol
through domain name system
through uniform resource locator
through Internet message access protocol
answer
through uniform resource locator
question
What is the term used to describe the final destination of discarded, lost, or destroyed data?
dead bit office
back door
bit bucket
sneaker closet
answer
bit bucket
question
What is the purpose of random access memory in the computer system?
to store easily accessible information permanently
to transfer several bits of data simultaneously
to monitor data usage
to temporarily store information
answer
to temporarily store information
question
Which of the following refers to the keyboard combination that forces a soft-boot or jump to ROM monitor?
Vulcan nerve pinch
banner grabbing
phreaking
spoofing
answer
Vulcan nerve pinch
question
Who developed the Electronic Numerical Integrator and Computer (ENIAC)?
John Atanasoff and Clifford Berry
Charles Babbage and Herman Hollerith
John W. Mauchly and John Presper Eckert
Max Newman and Steve Wozniak
answer
John W. Mauchly and John Presper Eckert
question
Which of the following is a self-contained program that may spread functional copies of itself to other computer systems?
Trojan horse
malware
worm
logic bomb
answer
worm
question
Who was the first person to successfully introduce a device exclusively designed for data processing?
Charles Babbage
Herman Hollerith
John Atanasoff
Clifford Berry
answer
Herman Hollerith
question
Which Windows operating system paved the way for the development of peer-to-peer networks?
Windows NT 3.1
Windows 95
Windows 2.0
Windows 98 SE
answer
Windows NT 3.1
question
Which of the following refers to the unauthorized attempt to gain access to information about a system?
clickjacking
baud
banner grabbing
probe
answer
probe
question
Which of the following is the first modern digital computer?
ENIAC
Colossus I
ABC
GUI
answer
ABC
question
What does the term wetware refer to?
humans operating computers
evil crackers
"good" hackers
a system vulnerability
answer
humans operating computers
question
Which of the following devices introduces commands and information to the computer?
scanner
modem
printer
keyboard
answer
keyboard
question
Who is hired by companies who want to test their security system by way of violations?
cracker
black hat hacker
sneaker
white hat hacker
answer
sneaker
question
Which of the following tells the computer in which order to access drives?
boot sequence
operating system
random access memory
application software
answer
boot sequence
question
What is Gopher?
an information retrieval tool
an Internet service provider
an e-mail system
a low-cost video conferencing facility
answer
an information retrieval tool
question
Which of the following is NOT a reason for the popularity of bulletin boards among subversive organizations?
cheaper than printed publications
perception of Second Amendment protection
lack of regulations
possibility of complete globalization
answer
perception of Second Amendment protection
question
For what purpose did British scientists build Colossus I?
word processing
forensic analysis
census tabulation
cryptanalysis
answer
cryptanalysis
question
What is the term used to refer to the method of cracking passwords by manually entering all possible key combinations?
spoofing
brute force
phreaking
Vulcan nerve pinch
answer
brute force
question
Which of the following is a collection of hyperlinked pages of information distributed over the Internet via a network protocol?
hypertext transfer protocol
shell
World Wide Web
packets
answer
World Wide Web
question
Which of the following is structured to allow users to participate in real-time conversations?
chat rooms
news services
websites
video feeds
answer
chat rooms
question
Which of the following interprets program instructions and processes data in the computer?
universal serial bus
central processing unit
random access memory
graphical user interface
answer
central processing unit
question
Which of the following computer components had its origin in the cathode ray tube?
printer
scanner
mouse
monitor
answer
monitor
question
Which of the following hacking-related developments occurred after the year 2000?
the release of the Morris worm
Kevin Poulsen's exploitation of the telecom system to "win" a Porsche
the introduction of commercially available security products
the emergence of identity theft as an issue for consumers
answer
the emergence of identity theft as an issue for consumers
question
________ can be defined as the reproduction, distribution, and use of software without the permission or authorization of the owner of copyright.
Signal theft
Theatrical print theft
Data piracy
Parallel imports
answer
Data piracy
question
Which of the following qualifies as social engineering?
the illegal copying and distribution of a newly released theatrical film
a brute force search for an employee's password
befriending a company's cleaning crew to gain access to rooms and buildings
using an anonymizer to conduct hard-to-track Internet searches
answer
befriending a company's cleaning crew to gain access to rooms and buildings
question
What was the Illuminati?
a board owned and operated by Steve Jackson Games
a destructive program that crippled over 6,000 computers in 1988
a military database containing sensitive information
an organization pointing out security flaws in institutional systems
answer
a board owned and operated by Steve Jackson Games
question
Which of the following does NOT accurately describe the Secret Service actions that prompted the seminal court case Steve Jackson Games, Inc. v. U.S. Secret Service et al.?
The Secret Service used a DDoS attack to infiltrate and sabotage the company's operations.
Agents executed an unsigned search warrant.
Agents used Gestapo-like tactics by seizing virtually everything, including business records, private electronic mail, and the drafts of forthcoming games.
The Secret Service promoted the unfounded view that the bulletin board was a medium for the exchange of hacking information.
answer
The Secret Service used a DDoS attack to infiltrate and sabotage the company's operations.
question
Which of the following is NOT one of the primary motivations for computer intrusion in contemporary society?
revenge
political motives
to benefit others
boredom
answer
to benefit others
question
________ was the most infamous of all hackers and has been the subject of numerous books and movies.
Kevin Mitnick
Kevin Poulsen
Prophet
Urvile
answer
Kevin Mitnick
question
Who was directly responsible for the downfall of LoD?
Control-C
Fry Guy
Robert Morris
Silver Spy
answer
Fry Guy
question
The theft and resale of which computer component has proven to be the most lucrative?
CPUs
motherboards
integrated chips
serial ports
answer
integrated chips
question
Which of the following is NOT a method of film piracy?
broadcast piracy
public performances
parallel imports
software development
answer
software development
question
________ are the least sophisticated of all cybercriminals.
Script kiddies
Cyberpunks
Cybercriminal organizations
Crackers
answer
Script kiddies
question
Which of the following hacking-related developments occurred during the 1990s?
Robert Morris releases his worm on the Internet, and is indicted under newly passed legislation.
Commercially available security products are introduced.
Phreakers emerge, costing AT&T a fortune in uncollected long-distance charges.
A dramatic increase in hacktivism occurs.
answer
Commercially available security products are introduced.
question
Which of the following is the least destructive category of hackers?
technological thrill seekers
insiders
informational voyeurs
hacktivists
answer
informational voyeurs
question
________ hat hackers are individuals who identify and exploit system vulnerabilities for nefarious purposes.
White
Blue
Gray
Black
answer
Black
question
Which of the following is NOT a general category of computer crime?
targets
means
vicinage
incidentals
answer
vicinage
question
What can the exponential increase in online harassment, stock manipulation, and child pornography be attributed to?
the introduction of cloud computing
the increase in international guidelines for cyberactivity
the increase in academic knowledge
the increase in anonymous e-mail accounts and remailers
answer
the increase in anonymous e-mail accounts and remailers
question
______ are designed to strip the source-address information from e-mail messages.
Copper boxes
Anonymizers
Ethercards
Integrated chips
answer
Anonymizers
question
Which of the following is a factor that leads many individual users of the Internet to assume that their identities are safely protected?
the dearth of interjurisdictional communication
the difficulty in using modern communication technology
the lack of opportunity to engage in computer crime
the global acceptance of First Amendment rights
answer
the dearth of interjurisdictional communication
question
What is the primary reason that the resale of integrated chips is so lucrative?
increase of legitimate global marketplaces
ease in manipulation
magnitude of computer transactions
the basic law of supply and demand
answer
the basic law of supply and demand
question
Which of the following groups does NOT figure in the multilateral film privacy strategy of the Chinese Triads?
privacy pressers
hacktivists
piracy burners
runners
answer
hacktivists
question
Originally, members of the Legion of Doom (LoD) were ________.
phreakers
crackers
cyberpunks
hacktivists
answer
phreakers
question
What motivates pure hackers to steal information?
political need
intellectual challenge
sexual gratification
economic desire
answer
intellectual challenge
question
Which of the following is true of the infamous hacking board Plovernet?
It went online in March 1980.
It was a breeding ground for hacking groups like LoD.
It was responsible for the hacking of the Los Alamos military computers in 1982.
It was originally formed in Bonn, Germany.
answer
It was a breeding ground for hacking groups like LoD.
question
________ acknowledge(s) the futility of trying to stop people from copying software and instead relies on people's honesty.
Shareware
WareZ sites
Parallel imports
Broadcast piracy
answer
Shareware
question
Which was the first event to signal the potential of computer crime?
the crash of AT&T
the destruction caused by the Morris worm
the hacking of the MILNET system
the victimization of Michigan Bell
answer
the hacking of the MILNET system