Cyber Crime Midterm Review

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/209

flashcard set

Earn XP

Description and Tags

this includes all quiz questions and answers for modules 1-6 of CJE4694 (Cyber Crime) in preparation for the midterm

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

210 Terms

1
New cards

Rapid growth in the computer security industry has largely occurred without adequate research on the nature of cybercrimes and criminals.

true

2
New cards

Which of following is not a common theme to emerge from the research on the problems of computer crime?

behavioral approaches of cybercriminals

3
New cards

Computers may be used as both criminal instruments and instruments of warfare.

true

4
New cards

Case studies offer generalizations about trends in cybercriminality or patterns of offending.

false

5
New cards

The expanded use of Social Security numbers is the primary reason for the ease of identity theft.

true

6
New cards

Intellectual property violations, component theft, counterfeiting, and identity theft are examples of which type of computer crime?

crimes associated with the prevalence of computers

7
New cards

The text seeks to merge knowledge of criminal justice and knowledge of computer science.

true

8
New cards

Which of the following is not a characteristic noted by Anderson and colleagues in 2012?

crimes that facilitate other crimes through the proper use of computers

9
New cards

Which of the following is most true?

Practitioners in both the criminal justice field and the computer science field typically have limited knowledge of each other's occupations.

10
New cards

It is relatively easy to place a monetary value on the loss of intellectual property.

false

11
New cards

The Department of Justice systematically collects computer crime data.

false

12
New cards

Which of the following is not one of the three major credit reporting bureaus that control the information on all persons applying for credit in the United States?

Trans Credit

13
New cards

The full extent of computer theft is unknown because many thefts go unreported.

true

14
New cards

Child pornography is an example of which type of computer crime?

computer as incidental to crime

15
New cards

Which type of computer crime describes actions in which the computer is used only to further a criminal end? In other words, the computer or data contained therein is not the object of the crime.

computer as an instrument of a crime

16
New cards

Research has shown that most dangers of economic computer crimes come from outsiders.

false

17
New cards

"Cyber" refers to almost anything "real" or "virtual" attached to a computer or network.

true

18
New cards

Computerized theft never deprives a legitimate owner of a tangible asset.

false

19
New cards

According to the authors of the text, another term for digital crime is:

cybercrime

20
New cards

The salami slice technique, pyramid schemes, and bunko schemes are examples of which type of computer crime?

computer as an instrument of a crime

21
New cards

Criminal statistics/data on computer crime are

virtually nonexistent; there is no centralized source.

22
New cards

In general, the threat of computer crime victimization increases with industrialization.

true

23
New cards

Which of the following is most true?

The processes and dynamics involved in the production of digital crime and digital terrorism are virtually the same.

24
New cards

Which of the following is most true?

Cybercrime has significantly increased since the 1990s.

25
New cards

Which of the following is most true?

It can take months or even years to identify an actual monetary value for the loss of intellectual property.

26
New cards

Computer crime is not an international problem.

false

27
New cards

Data alteration and denial directly targets the computer by attacking the useful information stored or processed by the computer.

true

28
New cards

Which of the following is most true?

A great deal of effort is dedicated to computer security.

29
New cards

Which of the following is not considered in the calculation of costs associated with each type of computer crime?

All of the above are considered in the calculation of costs.

30
New cards

Data alteration, denial of service, network intrusions, thefts of information, and computer vandalism are examples of which type of computer crime?

Computer as a target

31
New cards

Estimates on the cost of cybercrime are largely derived from criminal reports.

false

32
New cards

The primary difference between data alteration and network intrusion is the

intent of the intruder.

33
New cards

Which of the following is not one of the four categories of computer crime?

computer vandalism

34
New cards

Which of the following is most true?

The public relies on computers for a host of societal functions.

35
New cards

Which of the following is not an example of Donn Parker's work as an early commentator on problems associated with computer crime?

The "cyber" prefix to describe computer crimes.

36
New cards

Website defacement is a form of:

information attack

37
New cards

Which of the following is one of the four categories that encompasses cyberterrorism and/or information warfare?

promotion

38
New cards

Which of the following is not true?

The Russians view military cyber operations differently than those cyber operations employed for hacktivism, cyber aggression, and cybercrime.

39
New cards

Critical infrastructure is not an attractive target to terrorists.

false

40
New cards

What major category of information warfare/cyberterror do "cyber-plagues" fall into?

Information attacks

41
New cards

Which of the following is not a wave in the development of warfare as identified by Alvin Toffler?

Renaissance wave

42
New cards

An unauthorized intrusion is easy to identify once it has occurred.

false

43
New cards

What major category of information warfare/cyberterror does "cryptography" fall into?

Technological facilitation

44
New cards

According to the Russian perspective, cybercrime and cyberterrorism are acceptable techniques of information warfare.

true

45
New cards

The nation of Japan currently poses a larger threat to the United States in terms of information warfare than that posed by China.

false

46
New cards

The greatest threat to civil aviation security is:

heavy reliance on other types of infrastructure.

47
New cards

Which of the following is least true?

Cyberterrorism is defined by the group perpetrating it.

48
New cards

Which is not a category of cyberterrorism?

Physical attacks

49
New cards

A virus is a piece of code that attaches itself to other instructions within a computer.

true

50
New cards

A worm is a program that reproduces itself over a computer network by breaking into computers much like a virtual hacker.

true

51
New cards

Using a cell phone to encourage a flash mob is a form of:

cyber and technological facilitation.

52
New cards

The type of attack the hacker group "Anonymous" carried out against the private intelligence industry provider Stratfor is considered:

unauthorized intrusions

53
New cards

It is estimated that 100 million attacks against U.S. businesses and governments take place each day.

true

54
New cards

Distributed denial-of-service attacks are an example of:

information attacks.

55
New cards

Which of the following is not true?

Al Qaeda produced the computer virus "Stuxnet."

56
New cards

Which of the following is not a component of information warfare?

Propaganda

57
New cards

Requesting funds for a terrorist organization through a chat room is an example of:

direct solicitation

58
New cards

What major category of information warfare/cyberterror does "recruiting" fall into?

Promotion

59
New cards

Information warfare is always a component of cyberterrorism.

false

60
New cards

Which of the following is not one of the five essential components of infrastructure?

Government

61
New cards

A cryptographic key is necessary to read encoded material.

true

62
New cards

Data hiding is difficult to accomplish, but relatively easy to discover in Internet files.

False

63
New cards

The United States is likely the nation that is most vulnerable to digital terrorism.

True

64
New cards

Infrastructure attacks are those attacks designed to destroy a system that includes critical data.

true

65
New cards

The Internet is the best tool for propaganda and recruitment among terrorists.

true

66
New cards

What major category of information warfare/cyberterror does "data hiding" fall into?

Technological facilitation

67
New cards

Despite its contention that modern technological advancements are incompatible with fundamentalist Islam culture, al Qaeda has become a primary foe in the digital terrorism area.

true

68
New cards

Which of the following is least true?

The Chinese government restricts the use of cyber warfare to the Chinese military.

69
New cards

Information attacks are the use of cyber communication to distribute or coordinate plans for a terrorist attack, incite an attack, or otherwise assist in the facilitation of terrorism.

false

70
New cards

What major category of information warfare/cyberterror does "website defacement" fall into?

Information attacks

71
New cards

The propagation of a worm that does not actually damage anything and is more of a nuisance than anything else is a form of denial of injury according to Sykes and Matza's techniques of neutralization.

true

72
New cards

Psychological theory identifies the specific reasons a person becomes a pedophile.

false

73
New cards

Deterrence theory assumes that individuals are rational actors.

true

74
New cards

Which of the following is not a reason that choice theory became popular among criminologists in the 1970s?

Crime-producing traits and factors were discovered.

75
New cards

An individual that engages in computer crime, fraud, and robbery in an effort to obtain financial success has adopted which form of Merton's modes of adaptation?

Innovation

76
New cards

According to Agnew's General Strain Theory, which of the following is NOT a source of strain?

Cultural goal of economic success

77
New cards

A ritualist rejects the cultural goal of economic success but accepts the institutionalized means to obtain the cultural goal.

true

78
New cards

According to Merton, a(n) __________ accepts the goal of economic success but rejects the institutionalized means to obtain it.

innovator

79
New cards

A subculture is a set of values, norms, and beliefs that differ from those of the dominant culture.

true

80
New cards

"Three strikes and you're out" is an example of policy based on choice theory.

true

81
New cards

White-collar crime cannot be applied to contemporary strain theory because of the assumption that only lower-class individuals commit crimes.

false

82
New cards

According to Hirschi, which of the following is NOT an element of the social bond?

Emotional

83
New cards

According to Cohen and Felson, crime occurs when there is a convergence in time and space of three factors. Which of the following is NOT one of those factors?

An adequate sight line from the location

84
New cards

A university enacts a policy in which any student that is caught illegally downloading media files will be automatically expelled from the university. The university hopes that students will be deterred from engaging in illegal downloading. This policy is an example of which theory?

Choice Theory

85
New cards

Social control theory assumes that people will violate the law.

true

86
New cards

Many hackers acknowledge their activities are illegal, but legitimize and justify the actions using various rationales.

true

87
New cards

Which technique of neutralization occurs when an individual believes his actions were beyond his control?

Denial of responsibility

88
New cards

Sutherland's theory of differential association clearly explains how behavior is learned.

false

89
New cards

__________ is designed to impose a sanction on convicted offenders in order to prevent them from continuing to commit criminal acts in the future.

Specific deterrence

90
New cards

A judge tells a defendant, "You are sentenced to prison not because of your crimes, but so that others will not engage in the same crimes." This is an example of which type of deterrence:

General deterrence

91
New cards

Which of the following is NOT a personality characteristic conducive to crime identified by the Gluecks?

Lack of self-esteem

92
New cards

According to Kohlberg, right corresponds to seeing one's own needs met, taking responsibility for oneself, and allowing others to do the same in which stage of moral development?

Hedonistic orientation stage

93
New cards

A terrorist group that hacks into an electrical power grid in order to cause a massive blackout and disrupt normalcy in the name of economic equality has subscribed to which theory?

Political theory

94
New cards

Which of the following is NOT a characteristic of Marxist thought?

Political change can be achieved without conflict.

95
New cards

Hackers appear to exhibit a subculture that includes:

all of the above

96
New cards

Cohen and Felson argue that the motivation to commit crime and the supply of offenders are constant.

true

97
New cards

Research has shown that the threat of arrest greatly deters would-be criminals.

false

98
New cards

Which of the following theorists developed a learning theory of crime?

Sutherland

99
New cards

Which of the following is NOT a finding of Holt and Bossler's empirical study of routine activities theory and online harassment?

Personal and peer involvement in deviance had no influence on the risk of online harassment.

100
New cards

According to Kohlberg, which two stages of moral development are completed by age 7?

Punishment and obedience orientation stage and hedonistic orientation stage