Flashcards on Cybercrime

Unlock all answers in this set

Unlock answers
question
Law enforcement has been threatened and weakened by the advent of the Internet and has not been able to benefit from it.
answer
False
question
Increasing dependence on cyber information is one of the disadvantages of the Internet.
answer
true
question
Much computer-related crime involves specialist users.
answer
False
question
The lack of physical boundaries and the removal of traditional jurisdictional demarcations allow perpetrators to commit multinational crime with little fear of judicial sanctions.
answer
true
question
Electronic purses come in two primary types: limited or closed, and multipurpose or open.
answer
false
question
Which of the following is true of the Digital Revolution?
answer
) It has created a new forum for both terrorist activity and criminal behavior.
question
has traditionally encompassed abuses and misuses of computer systems or computers connected to the Internet, resulting in direct and concomitant losses.
answer
Cybercrime
question
includes any criminal activity which involves the unauthorized access, dissemination, manipulation, destruction, or corruption of electronically stored data.
answer
Digital crime
question
Which of the following allows perpetrators to commit multinational cybercrime with little fear of judicial sanctions?
answer
B) The lack of physical boundaries
question
what according to a study conducted by the Department of Justice, were perceived as the number one target for computer crime?
answer
C) businesses
question
Which of the following is NOT a problem in the investigation of cybercrime?
answer
D) a widespread perception of cybercrime as worse than "traditional" crime
question
Which of the following is NOT a reason why many businesses and corporations underreport computer crimes?
answer
A) consumers don't care about confidentiality
question
Which of the following is a valid reason why a corporation might welcome federal assistance to help catch a cyber criminal?
answer
) Criminals access different services to disguise their location.
question
Corporations and private entities that offer discounts on software or training to law enforcement agencies are called ________.
answer
C) friendly vendors
question
Expenditures on which area represent a nonrecurring expense for a computer crime unit?
answer
D) establishing a computer laboratory
question
Traditionally, trial and appellate courts evaluated the constitutionality of computer crime statutes, searches, and investigations through the lens of the ________.
answer
A) First and Fourth Amendments
question
What did the Fifth Circuit Court of Appeals rule in U.S. v. Finley?
answer
B) The post-arrest search of a suspect's cell phone was constitutional.
question
Which of the following is an example of computer-initiated criminal activity?
answer
C) wire transfers
question
All the following are categories into which computer crimes are traditionally divided EXCEPT ________.
answer
D) computer as a weapon
question
One of the earliest examples of computer crime is ________, which consists of an activity in which telecommunications systems are manipulated and ultimately compromised.
answer
A) phreaking
question
Which of the following involves payments that rely on a bank account and a web-based transfer of funds to or from an established financial account?
answer
C) Internet payment services
question
Which of the following characteristics of new payment methods has facilitated money laundering and terrorist financing?
answer
A) anonymity in transactions
question
Closed system cards and open system cards are two primary types of ________.
answer
B) prepaid cards
question
Which of the following e-payment methods stores funds on an integrated circuit chip in the card?
answer
C) stored value card
question
Which payment method is typically associated with a card payment network such as Visa or MasterCard?
answer
D) prepaid card
question
For users, 24-hour accessibility equates to 24-hour vulnerability.
answer
A) True
question
One of the earliest computers developed by Charles Babbage was created to tabulate the 1880 U.S. census.
answer
B) False
question
The smallest piece of data is called a bit.
answer
A) True
question
Operating systems may be either single-user or multiple-user.
answer
A) True
question
Intranets are small local networks connecting computers within one organization, controlled by a common system administrator.
answer
A) True
question
For what purpose did British scientists build Colossus I?
answer
D) cryptanalysis
question
What is the term used to describe the final destination of discarded, lost, or destroyed data?
answer
...C) bit bucket
question
What is the most important component of a computer?
answer
... C) motherboard
question
Which of the following tells the computer in which order to access drives?
answer
... A) boot sequence
question
What is the purpose of random access memory in the computer system?
answer
... D) to temporarily store information
question
Which Windows operating system paved the way for the development of peer-to-peer networks?
answer
... A) Windows NT 3.1
question
Which of the following is a self-contained program that may spread functional copies of itself to other computer systems?
answer
... C) worm
question
What is Gopher?
answer
... A) an information retrieval tool
question
What is a collection of hyperlinked pages of information distributed over the Internet via a network protocol?
answer
... C) World Wide Web
question
Which of the following is NOT a reason for the popularity of bulletin boards among subversive organizations?
answer
... B) perception of Second Amendment protection
question
Which of the following refers to the unauthorized attempt to gain access to information about a system?
answer
... D) probe
question
How are websites identified?
answer
... C) through uniform resource locator
question
Which of the following is structured to allow users to participate in real-time conversations?
answer
... A) chat rooms
question
Who developed the Electronic Numerical Integrator and Computer (ENIAC)?
answer
... C) John W. Mauchly and John Presper Eckert
question
In which Mac OS did Apple introduce its first Unix-based operating system?
answer
... A) Mac OS X
question
Which of the following interprets program instructions and processes data in the computer?
answer
... B) central processing unit
question
What is the term used to refer to the method of cracking passwords by manually entering all possible key combinations?
answer
... B) brute force
question
Which of the following devices introduces commands and information to the computer?
answer
... D) keyboard
question
What does the term wetware refer to?
answer
... A) humans operating computers
question
Who was the first person to successfully introduce a device exclusively designed for data processing?
answer
... B) Herman Hollerith
question
Like traditional communication carriers, Internet service providers are required to maintain transmission records.
answer
... B) False
question
The issue of vicinage has been simplified by the lack of international guidelines for cyberactivity.
answer
... B) False
question
Not all crimes involving computers can be characterized as "computer crime."
answer
...A) True
question
Blue boxes were extremely popular among college dorms and were widely considered harmless by users.
answer
... A) True
question
Traditional hacker culture was characterized by an antiestablishment rhetoric.
answer
... A) True
question
What can the exponential increase in online harassment, stock manipulation, and child pornography be attributed to?
answer
... D) the increase in anonymous e-mail accounts and remailers
question
Which of the following is a factor that leads many individual users of the Internet to assume that their identities are safely protected?
answer
... A) the dearth of interjurisdictional communications
question
________ are designed to strip the source-address information from e-mail messages.
answer
... B) Anonymizers
question
Which of the following is NOT a general category of computer crime?
answer
... C) vicinage
question
Which was the first event to signal the potential of computer crime?
answer
... C) the hacking of the MILNET system
question
________ hat hackers are individuals who identify and exploit system vulnerabilities for nefarious purposes.
answer
... D) Black
question
Which of the following hacking-related developments occurred after the year 2000?
answer
... D) the emergence of identity theft as an issue for consumers
question
What was the Illuminati?
answer
...A) a board owned and operated by Steve Jackson Games
question
Which of the following hacking-related developments occurred during the 1990s?
answer
... B) Commercially available security products are introduced.
question
________ was the most infamous of all hackers and has been the subject of numerous books and movies.
answer
... A) Kevin Mitnick
question
Which of the following is true of the infamous hacking board Plovernet?
answer
...B) It was a breeding ground for hacking groups like LoD.
question
Which of the following does NOT accurately describe the Secret Service actions that prompted the seminal court case Steve Jackson Games, Inc. v. U.S. Secret Service et al.?
answer
... A) The Secret Service used a DDoS attack to infiltrate and sabotage the company's operations.
question
Which of the following qualifies as social engineering?
answer
... C) befriending a company's cleaning crew to gain access to rooms and buildings
question
Which of the following is the least destructive category of hackers?
answer
... C) informational voyeurs
question
Which of the following is NOT one of the primary motivations for computer intrusion in contemporary society?
answer
... C) to benefit others
question
What motivates pure hackers to steal information?
answer
... B) intellectual challenge
question
______ are the least sophisticated of all cybercriminals.
answer
... A) Script kiddies
question
The theft and resale of which computer component has proven to be the most lucrative?
answer
... A) CPUs
question
________ can be defined as the reproduction, distribution, and use of software without the permission or authorization of the owner of copyright.
answer
... C) Data piracy
question
Which of the following groups does NOT figure in the multilateral film privacy strategy of the Chinese Triads?
answer
... B) hacktivits
question
At the dawn of the computer age, the term "computer crime" usually referred to the theft of computers or computer components.
answer
...A) True
question
Spamming refers to the abuse of electronic messaging systems to randomly or indiscriminately send unsolicited bulk messages.
answer
...A) True
question
Recent studies indicate that the emergence of cloud computing and removable media has effectively decreased theft of information or breaches in digital security.
answer
...B) False
question
According to the Office of Juvenile Justice and Delinquency Prevention (OJJDP) and the National Center for Missing and Exploited Children (NCMEC), almost all possessors of child pornography are black males who are under the age of 25. B
answer
...) False
question
Vengeance or terrorist stalkers are motivated by either economic gain or revenge.
answer
...A) True
question
Cybervandalism and cyberterrorism are examples of which category of online crime?
answer
...B) interference with lawful use of computers
question
Which of the following refers to a computer that has been compromised by some form of malware, enabling the criminal to remotely control that computer?
answer
...C) zombie
question
refers to a software program or hardware device that records everything you type into a compromised computer?
answer
...A) keyloggers
question
Which of the following refers to two distinct methods of distributed denial of service (DDoS) attacks?
answer
...B) smurfing and fraggling
question
Which of the following refers to a malware program that encrypts or otherwise renders computer or digital resources inoperable or inaccessible in furtherance of the illegal compulsion of an action or exchange?
answer
...C) ransomware
question
Which of the following best defines shoulder surfing?
answer
...D) literally watching someone from behind, as he or she inputs a password
question
A deliberate, politically or religiously motivated attack against data compilations, computer programs, and/or information systems that is intended to disrupt and/or deny service or acquire information that disrupts the social, physical, or political infrastructure of a target, is known as ________.
answer
...A) cyberterrorism
question
According to the Office of Juvenile Justice and Delinquency Prevention (OJJDP) and the National Center for Missing and Exploited Children (NCMEC), almost all possessors of child pornography are ________.
answer
...D) white males who are older than 25
question
Which of the following is NOT a primary motivation for the possession of child pornography?
answer
...A) fight for legalizing man/boy sexual relationship
question
Which of the following launched the first online casino in 1995 with 18 games?
answer
...C) Internet Casinos, Inc.
question
The individuals who seek to re-establish a relationship with an unwilling partner and are considered the most dangerous of stalkers are known as ________.
answer
...A) obsessional stalkers
question
Which of the following refers to stalkers who are delusional and believe that their victim is in love with them or has had a previous relationship with them?
answer
...C) erotomaniacs
question
Which of the following statements regarding online gaming is untrue?
answer
...D) Minors accessibility to online gaming is restricted, as age verification is mandatory.
question
Which of the following types of fraud occurs when a fraudster adds hidden charges to the advertised price, perhaps in shipping or handling?
answer
...A) fee stacking
question
To steal credit card information by installing devices on card readers located in ATMs, gas pumps, restaurants, grocery stores, retail establishments, or any other area where magnetic strip card readers are employed is known as ________.
answer
...B) skimming
question
Which of the following refers to the deliberate manipulation of an existing program to redirect or reroute data representing monies or economic exchanges?
answer
...C) data diddling
question
Which of the following refers to the sale of stolen goods through technological means?
answer
...C) e-Fencing
question
Which of the following refers to redirecting thin slices of accounts into a designated location?
answer
...A) salami technique
question
Which of the following refers to a seller in an auction driving up the cost of his or her own item by bidding on it?
answer
...B) shill bidding
question
________ involves the use of radio waves to facilitate the transfer of information between an electronic tag (or label) and a reader.
answer
...A) RFID
question
Identity fraud is committed when a credible identity is created by accessing others' credit cards, financial or employment records, or computer system.
answer
... A) True
question
An individual who creates a false virtual identity has automatically crossed the line into illegal activity.
answer
...B) False
question
An individual who has been a victim of reverse criminal record identity theft does not face legal obstacles to his or her identity rehabilitation.
answer
... B) False
question
A full accounting of the prevalence of identity theft has been confounded by the lack of mandatory reporting and inconsistent application by federal agencies.
answer
... A) True
question
To safeguard belongings and identity from dedicated criminals, it is important to develop alternate means of identity authentication.
answer
... A) True
question
Which of the following best distinguishes identity theft?
answer
... A) Identity theft is the illegal use or transfer of a third party's personal identification information with unlawful intent.
question
Which of the following is the most general problem faced by American law enforcement and government officials who want to eradicate identity fraud/theft?
answer
... D) the boundless nature of the Internet
question
Which of the following statements correctly distinguishes between identity theft and identity fraud?
answer
... B) Identity fraud may involve the fabrication of identity information based on a fictitious person.
question
Which of the following types of identity theft/fraud is a person engaged in if he created a fictitious profile on a social networking site so as to facilitate an extramarital affair?
answer
... D) virtual identity theft/fraud
question
Which of the following types of identity theft/fraud is defined as the use of stolen personal and financial information to facilitate the creation of fraudulent accounts?
answer
... D) credit identity theft/fraud
question
If someone found a lost driver's license and then used it to open multiple bank accounts and commit tax-related fraud, which type of identity theft/fraud was committed?
answer
... D) credit identity theft/fraud
question
Which of the following types of identity theft/fraud is by far the most common and also the most feared by the American public?
answer
... A) credit identity theft/fraud
question
An upstanding citizen with no police record, Jonathan discovers that a past acquaintance who's now a career criminal is claiming Jonathan's identity. What form of identity theft/threat is Jonathan a victim of?
answer
... C) reverse criminal record identity theft
question
Paper shredders and disk-wiping software are means to avoid which of the following physical methods of identity theft?
answer
... D) dumpster diving
question
"Popcorning" is a technique used in which of the following physical methods of identity theft? B
answer
...) mail theft
question
physical methods of identity theft involves the surreptitious entry into hotel rooms to steal, photograph, or photocopy documents?
answer
... A) bag operations
question
What is true regarding the theft of computers as a physical method of identity theft?
answer
... C) Areas particularly vulnerable to theft of computers include private residences and recreation centers.
question
Which of the following is true regarding bag operations as a physical method of identity theft?
answer
... B) They are typically conducted by the host government's security or intelligence services.
question
Which of the following is NOT a category of phishing attacks?
answer
... C) botnets
question
Which of the following is an example of a bag operation?
answer
... A) A person surreptitiously enters a suspect's hotel room to download information from the suspect's laptop computer.
question
Which of the following would NOT be classified under insurance and loan fraud?
answer
... B) creating multiple accounts with a bank to commit-tax related fraud
question
Today an identity thief is often remote from the victim. How does this pose a special problem to law enforcement?
answer
... B) Jurisdictional questions often confound local authorities.
question
What are most often used fraudulently to obtain immigration benefits?
answer
... C) documentation of residency
question
The Visa Waiver Pilot Program (VWPP) caused the most recent surge in which of the following fraudulent activities?
answer
... B) immigration benefit fraud
question
Theorists argue that terrorism may be characterized as theater in which the audience is far more important than the actors.
answer
... A) True
question
According to Tsfati and Weimann, a resurgence in terrorist rhetoric in Europe has led to a marked increase in both the development of European-based terrorist groups and their presence on the Web.
answer
... A) True
question
One drawback to the use of dead drops is that communications are not anonymous.
answer
... B) False
question
Directing conventional weapons against a computer facility is an example of a physical attack
answer
... A) True
question
A critical data threat involves the compromise of a critical computer system to alter, manipulate, or destroy critical data with the potential of death, destruction, and/or economic turmoil.
answer
... A) True
question
Who define(s) terrorism as an attempt to communicate messages through the use of orchestrated violence?
answer
... C) Tsfati and Weimann
question
What was the basis of the wide acceptance of tyrannicide during the Age of Absolutism?
answer
... A) the writings of Juan de Mariana
question
Which of the following types of justification is employed by terrorists who superficially proclaim an abhorrence of violence and stress the urgency for a diplomatic settlement?
answer
... B) peaceful, nonviolent rhetoric
question
What types of terrorists often openly embrace and promote human suffering, and glorify violence as divine ordination?
answer
... D) religious terrorists
question
Which of the following facilitated Muhammad Siddique Khan's coordination of the 2005 London bombings?
answer
... B) electronic dead drops
question
Which social network has become a popular site for online communities of al Qaeda sympathizers?
answer
... D) Orkut
question
What did a Western intelligence service seize from Kamel Daoudi, an al Qaeda computer engineer, during his arrest?
answer
... A) a codebook to decrypt e-mails and telephone conversations
question
Which of the following attacks involve directing conventional weapons against a computer facility for its transmission lines?
answer
... C) physical attacks
question
Which of the following was NOT a factor that made Estonia particularly vulnerable to a cyberattack in 2007? C
answer
...) The nation's nuclear facilities were run on a Windows operating system that was uniquely vulnerable to Stuxnet.
question
Which of the following has been described as a "military-grade cybermissle"?
answer
... D) Stuxnet
question
Which federal agencies and offices holds the database of information on potential terrorists and people suspected of narcotics trafficking or other law enforcement violations?
answer
Immigration and Customs Enforcement—Border Inspection System
question
Which of the following groups serve as the basis of the formation of organized crime groups?
answer
... B) criminal gangs
question
An early evaluation of criminal gangs in New York determined that groups coming together for the sole purpose of committing criminal activity didn't last long if they lacked what?
answer
... D) ethnic solidarity
question
Which of the following factors plays a role in the solidification of norms and expectations of the members of an organized crime group?
answer
... A) culture and tradition
question
refers to the illegal duplication of credit cards achieved by running the card through a reader that captures information stored in the magnetic strip on the back?
answer
... A) skimming
question
In which of the following points does a strong dissimilarity between terrorism and organized crime manifest?
answer
... B) beliefs and motivation
question
What is the nature of the criminal activity undertaken by groups such as Darkprofits and Shadowcrew?
answer
... A) selling or sharing information about stolen credit cards and bank account numbers
question
Which of the following refers to scams designed to delude a victim into thinking that he or she had been singled out to be the beneficiary of millions of dollars being given away by a company or government agency?
answer
... D) 4-1-9
question
________ is defined as the introduction of illegally obtained funds into the legitimate financial marketplace.
answer
... D) Money laundering
question
Which of the following, according to a recent report to Congress, has now surpassed international drug trafficking as a terrorist financing enterprise?
answer
... B) cybercrime
question
Which of the following is true regarding keyloggers?
answer
A) They are designed to capture passwords and other private information.
Get an explanation on any task
Get unstuck with the help of our AI assistant in seconds
New