CRJ233 Test 1 – Flashcards

Unlock all answers in this set

Unlock answers
question
________ has traditionally encompassed abuses and misuses of computer systems or computers connected to the Internet, resulting in direct and concomitant losses. Digital crime Computer-related crime Cybercrime Computer crime
answer
Cybercrime
question
Which of the following involves payments that rely on a bank account and a web-based transfer of funds to or from an established financial account? closed system cards digital precious metals Internet payment services stored value cards
answer
Internet payment services
question
Which of the following is NOT a reason why many businesses and corporations underreport computer crimes? consumers don't care about confidentiality exposure to financial losses data breach liabilities damage to brand
answer
consumers don't care about confidentiality
question
Closed system cards and open system cards are two primary types of ________. stored value cards prepaid cards digital precious metals mobile payments
answer
prepaid cards
question
What did the Fifth Circuit Court of Appeals rule in U.S. v. Finley? The post-arrest search of a suspect's cell phone was unconstitutional. The post-arrest search of a suspect's cell phone was constitutional. The pre-arrest search of a suspect's cell phone was unconstitutional. The pre-arrest search of a suspect's cell phone was constitutional.
answer
The post-arrest search of a suspect's cell phone was constitutional.
question
________ includes any criminal activity which involves the unauthorized access, dissemination, manipulation, destruction, or corruption of electronically stored data. Cybercrime Computer related crime Computer crime Digital crime
answer
Digital crime
question
Which of the following characteristics of new payment methods has facilitated money laundering and terrorist financing? anonymity in transactions increased competition lower cost lower interest rates
answer
anonymity in transactions
question
Corporations and private entities that offer discounts on software or training to law enforcement agencies are called ________. nerds or geeks forensic predators friendly vendors electronic purses
answer
friendly vendors
question
Traditionally, trial and appellate courts evaluated the constitutionality of computer crime statutes, searches, and investigations through the lens of the ________. First and Fourth Amendments First and Second Amendments Second and Third Amendments Third and Fourth Amendments
answer
First and Fourth Amendments
question
Which payment method is typically associated with a card payment network such as Visa or MasterCard? digital precious metals mobile payment electronic purse prepaid card
answer
prepaid card
question
Which is one of the earliest computer crimes to have been committed? software piracy DDoS attack phishing hacking
answer
software piracy
question
Which of the following is an example of computer-initiated criminal activity? spreading viruses stealing home addresses wire transfers spamming
answer
wire transfers
question
Expenditures on which area represent a nonrecurring expense for a computer crime unit? staffing training acquiring and updating equipment establishing a computer laboratory
answer
establishing a computer laboratory
question
The Electronic Frontier Foundation (EFF) was created by _______. John Edward Robinson and William Gibson John Barlow and John Gilmore John Barlow and William Gibson John Gilmore and John Edward Robinson
answer
John Barlow and John Gilmore
question
Which of the following is NOT a problem in the investigation of cybercrime? perceived insignificance of cybercrime prosecutorial reluctance to pursue cyber criminals untrained investigators a widespread perception of cybercrime as worse than "traditional" crime
answer
a widespread perception of cybercrime as worse than "traditional" crime
question
One of the earliest examples of computer crime is ________, which consists of an activity in which telecommunications systems are manipulated and ultimately compromised. phreaking spamming hacking cracking
answer
phreaking
question
PayPal is an example of a(n) ________. digital precious metal prepaid card stored value card Internet payment service
answer
Internet payment service
question
Which of the following is a valid reason why a corporation might welcome federal assistance to help catch a cyber criminal? Government investigations of corporate cybercrime can boost consumer/client confidence. Criminals access different services to disguise their location. The U.S. judicial system lets corporations hide the results of law enforcement investigations. Government agencies have the advantage of being able to ignore the chain of custody.
answer
Criminals access different services to disguise their location.
question
Which of the following e-payment methods stores funds on an integrated circuit chip in the card? mobile payment prepaid card stored value card Internet payment
answer
stored value card
question
Which of the following allows perpetrators to commit multinational cybercrime with little fear of judicial sanctions? the presence of traditional jurisdictional demarcations the lack of physical boundaries an extensive array of equipment or tools the widespread acceptance of world passports
answer
the lack of physical boundaries
question
Which of the following has been characterized as "a social networking site on steroids"? Second Life Love Bug CERT Electronic Frontier Foundation
answer
Second Life
question
All the following are categories into which computer crimes are traditionally divided EXCEPT ________. computer as an instrument computer as a target computer as an incidental computer as a weapon
answer
computer as a weapon
question
Which of the following is NOT a payment mechanism that poses a problem for law enforcement? prepaid cards banker's drafts mobile payments electronic purses
answer
banker's drafts
question
Which of the following is true of the Digital Revolution? It has prompted private citizens to embrace sophisticated measures of cyberprotection. It has eliminated vulnerabilities of government institutions and personal residences. It has resulted in decreased interconnectivity. It has created a new forum for both terrorist activity and criminal behavior.
answer
It has created a new forum for both terrorist activity and criminal behavior.
question
Which of the following, according to a study conducted by the Department of Justice, were perceived as the number one target for computer crime? financial institutions individuals businesses educational institutions
answer
businesses
question
Which of the following is known as the "baby" of computer operating systems and is freely distributed? Windows Macintosh UNIX Linux
answer
Linux
question
In which Mac OS did Apple introduce its first Unix-based operating system? Mac OS X System 7 Mac OS 8 System 2.1
answer
Mac OS X
question
What is the most important component of a computer? Incorrect Response CPU random access memory motherboard universal serial bus
answer
motherboard
question
How are websites identified? through post office protocol through domain name system through uniform resource locator through Internet message access protocol
answer
through uniform resource locator
question
What is the term used to describe the final destination of discarded, lost, or destroyed data? dead bit office back door bit bucket sneaker closet
answer
bit bucket
question
What is the purpose of random access memory in the computer system? to store easily accessible information permanently to transfer several bits of data simultaneously to monitor data usage to temporarily store information
answer
to temporarily store information
question
Which of the following refers to the keyboard combination that forces a soft-boot or jump to ROM monitor? Vulcan nerve pinch banner grabbing phreaking spoofing
answer
Vulcan nerve pinch
question
Who developed the Electronic Numerical Integrator and Computer (ENIAC)? John Atanasoff and Clifford Berry Charles Babbage and Herman Hollerith John W. Mauchly and John Presper Eckert Max Newman and Steve Wozniak
answer
John W. Mauchly and John Presper Eckert
question
Which of the following is a self-contained program that may spread functional copies of itself to other computer systems? Trojan horse malware worm logic bomb
answer
worm
question
Who was the first person to successfully introduce a device exclusively designed for data processing? Charles Babbage Herman Hollerith John Atanasoff Clifford Berry
answer
Herman Hollerith
question
Which Windows operating system paved the way for the development of peer-to-peer networks? Windows NT 3.1 Windows 95 Windows 2.0 Windows 98 SE
answer
Windows NT 3.1
question
Which of the following refers to the unauthorized attempt to gain access to information about a system? clickjacking baud banner grabbing probe
answer
probe
question
Which of the following is the first modern digital computer? ENIAC Colossus I ABC GUI
answer
ABC
question
What does the term wetware refer to? humans operating computers evil crackers "good" hackers a system vulnerability
answer
humans operating computers
question
Which of the following devices introduces commands and information to the computer? scanner modem printer keyboard
answer
keyboard
question
Who is hired by companies who want to test their security system by way of violations? cracker black hat hacker sneaker white hat hacker
answer
sneaker
question
Which of the following tells the computer in which order to access drives? boot sequence operating system random access memory application software
answer
boot sequence
question
What is Gopher? an information retrieval tool an Internet service provider an e-mail system a low-cost video conferencing facility
answer
an information retrieval tool
question
Which of the following is NOT a reason for the popularity of bulletin boards among subversive organizations? cheaper than printed publications perception of Second Amendment protection lack of regulations possibility of complete globalization
answer
perception of Second Amendment protection
question
For what purpose did British scientists build Colossus I? word processing forensic analysis census tabulation cryptanalysis
answer
cryptanalysis
question
What is the term used to refer to the method of cracking passwords by manually entering all possible key combinations? spoofing brute force phreaking Vulcan nerve pinch
answer
brute force
question
Which of the following is a collection of hyperlinked pages of information distributed over the Internet via a network protocol? hypertext transfer protocol shell World Wide Web packets
answer
World Wide Web
question
Which of the following is structured to allow users to participate in real-time conversations? chat rooms news services websites video feeds
answer
chat rooms
question
Which of the following interprets program instructions and processes data in the computer? universal serial bus central processing unit random access memory graphical user interface
answer
central processing unit
question
Which of the following computer components had its origin in the cathode ray tube? printer scanner mouse monitor
answer
monitor
question
Which of the following hacking-related developments occurred after the year 2000? the release of the Morris worm Kevin Poulsen's exploitation of the telecom system to "win" a Porsche the introduction of commercially available security products the emergence of identity theft as an issue for consumers
answer
the emergence of identity theft as an issue for consumers
question
________ can be defined as the reproduction, distribution, and use of software without the permission or authorization of the owner of copyright. Signal theft Theatrical print theft Data piracy Parallel imports
answer
Data piracy
question
Which of the following qualifies as social engineering? the illegal copying and distribution of a newly released theatrical film a brute force search for an employee's password befriending a company's cleaning crew to gain access to rooms and buildings using an anonymizer to conduct hard-to-track Internet searches
answer
befriending a company's cleaning crew to gain access to rooms and buildings
question
What was the Illuminati? a board owned and operated by Steve Jackson Games a destructive program that crippled over 6,000 computers in 1988 a military database containing sensitive information an organization pointing out security flaws in institutional systems
answer
a board owned and operated by Steve Jackson Games
question
Which of the following does NOT accurately describe the Secret Service actions that prompted the seminal court case Steve Jackson Games, Inc. v. U.S. Secret Service et al.? The Secret Service used a DDoS attack to infiltrate and sabotage the company's operations. Agents executed an unsigned search warrant. Agents used Gestapo-like tactics by seizing virtually everything, including business records, private electronic mail, and the drafts of forthcoming games. The Secret Service promoted the unfounded view that the bulletin board was a medium for the exchange of hacking information.
answer
The Secret Service used a DDoS attack to infiltrate and sabotage the company's operations.
question
Which of the following is NOT one of the primary motivations for computer intrusion in contemporary society? revenge political motives to benefit others boredom
answer
to benefit others
question
________ was the most infamous of all hackers and has been the subject of numerous books and movies. Kevin Mitnick Kevin Poulsen Prophet Urvile
answer
Kevin Mitnick
question
Who was directly responsible for the downfall of LoD? Control-C Fry Guy Robert Morris Silver Spy
answer
Fry Guy
question
The theft and resale of which computer component has proven to be the most lucrative? CPUs motherboards integrated chips serial ports
answer
integrated chips
question
Which of the following is NOT a method of film piracy? broadcast piracy public performances parallel imports software development
answer
software development
question
________ are the least sophisticated of all cybercriminals. Script kiddies Cyberpunks Cybercriminal organizations Crackers
answer
Script kiddies
question
Which of the following hacking-related developments occurred during the 1990s? Robert Morris releases his worm on the Internet, and is indicted under newly passed legislation. Commercially available security products are introduced. Phreakers emerge, costing AT&T a fortune in uncollected long-distance charges. A dramatic increase in hacktivism occurs.
answer
Commercially available security products are introduced.
question
Which of the following is the least destructive category of hackers? technological thrill seekers insiders informational voyeurs hacktivists
answer
informational voyeurs
question
________ hat hackers are individuals who identify and exploit system vulnerabilities for nefarious purposes. White Blue Gray Black
answer
Black
question
Which of the following is NOT a general category of computer crime? targets means vicinage incidentals
answer
vicinage
question
What can the exponential increase in online harassment, stock manipulation, and child pornography be attributed to? the introduction of cloud computing the increase in international guidelines for cyberactivity the increase in academic knowledge the increase in anonymous e-mail accounts and remailers
answer
the increase in anonymous e-mail accounts and remailers
question
______ are designed to strip the source-address information from e-mail messages. Copper boxes Anonymizers Ethercards Integrated chips
answer
Anonymizers
question
Which of the following is a factor that leads many individual users of the Internet to assume that their identities are safely protected? the dearth of interjurisdictional communication the difficulty in using modern communication technology the lack of opportunity to engage in computer crime the global acceptance of First Amendment rights
answer
the dearth of interjurisdictional communication
question
What is the primary reason that the resale of integrated chips is so lucrative? increase of legitimate global marketplaces ease in manipulation magnitude of computer transactions the basic law of supply and demand
answer
the basic law of supply and demand
question
Which of the following groups does NOT figure in the multilateral film privacy strategy of the Chinese Triads? privacy pressers hacktivists piracy burners runners
answer
hacktivists
question
Originally, members of the Legion of Doom (LoD) were ________. phreakers crackers cyberpunks hacktivists
answer
phreakers
question
What motivates pure hackers to steal information? political need intellectual challenge sexual gratification economic desire
answer
intellectual challenge
question
Which of the following is true of the infamous hacking board Plovernet? It went online in March 1980. It was a breeding ground for hacking groups like LoD. It was responsible for the hacking of the Los Alamos military computers in 1982. It was originally formed in Bonn, Germany.
answer
It was a breeding ground for hacking groups like LoD.
question
________ acknowledge(s) the futility of trying to stop people from copying software and instead relies on people's honesty. Shareware WareZ sites Parallel imports Broadcast piracy
answer
Shareware
question
Which was the first event to signal the potential of computer crime? the crash of AT&T the destruction caused by the Morris worm the hacking of the MILNET system the victimization of Michigan Bell
answer
the hacking of the MILNET system
Get an explanation on any task
Get unstuck with the help of our AI assistant in seconds
New