CS 6262 - L3 Cybercrime

0.0(0)
studied byStudied by 0 people
0.0(0)
full-widthCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/49

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

50 Terms

1
New cards

Which roles operate within the cybercrime ecosystem? A-Exploit developers B-Botnet masters C-Legitimate banks D-Spammers

A, B, D

2
New cards

Which activities are commonly handled by botnet masters? A-Managing compromised hosts B-Sending spam manually C-Running command-and-control servers D-Selling botnet access

A, C, D

3
New cards

Which services do bulletproof hosting providers typically offer? A-Ignoring abuse complaints B-Hosting malicious content C-Immediate takedowns of illegal sites D-Resisting law enforcement pressure

A, B, D

4
New cards

Which tasks are commonly outsourced in cybercrime operations? A-Traffic acquisition B-Exploit development C-Infrastructure hosting D-Legitimate advertising

A, B, C

5
New cards

Which actors participate in monetizing stolen financial data? A-Carders B-Money mules C-Exploit developers D-Payment processors in underground markets

A, B, D

6
New cards

Which characteristics define crowdturfers? A-Creating fake accounts B-Solving CAPTCHAs at scale C-Running DDoS attacks D-Automated human-like interactions

A, B, D

7
New cards

Underground forums commonly include which elements? A-Reputation systems B-Marketplace listings C-Formal government contracting D-Escrow services

A, B, D

8
New cards

Why are Exploits-as-a-Service effective? A-They allow specialization of roles B-They couple compromise and monetization tightly C-They lower entry barriers for attackers D-They automate exploitation

A, C, D

9
New cards

Traffic-PPI services generally include which features? A-Traffic redirection B-Exploit kit hosting C-Fraud chargeback processing D-Affiliate-based distribution

A, B, D

10
New cards

Doorway pages typically demonstrate which behaviors? A-Keyword stuffing B-Redirecting users C-Avoiding search engine manipulation D-Being used for blackhat SEO

A, B, D

11
New cards

Crypters provide which functions for malware? A-Hiding code from antivirus systems B-Packing and encryption C-Increasing malware detectability D-Obfuscation

A, B, D

12
New cards

Blackhat SEO relies on which techniques? A-Search result manipulation B-Traffic generation for malicious sites C-Using only legitimate optimization D-Compromising high-ranking sites

A, B, D

13
New cards

Trojan download managers perform which actions? A-Download malware B-Update malware payloads C-Remove all malicious software D-Execute new installation modules

A, B, D

14
New cards

Which weaknesses apply to centralized C2 systems? A-Single point of failure B-Easy to locate and block C-Fully anonymous by default D-Efficient control but fragile

A, B, D

15
New cards

P2P C2 infrastructures provide which advantages? A-Higher resilience B-Decentralization C-More predictable command delivery D-Harder to shut down

A, B, D

16
New cards

Which features describe fast-flux DNS operations? A-Rapidly changing IP addresses B-Load distribution across many bots C-Static DNS records D-Increased takedown resistance

A, B, D

17
New cards

Domain generation algorithms (DGAs) provide which benefits to botnets? A-Large sets of possible domains B-Harder domain blocking C-Guaranteed domain availability D-Ability to evade simple blacklists

A, B, D

18
New cards

Spam campaigns typically exhibit which characteristics? A-Mass sending B-Inappropriate or unsolicited content C-High explicit consent rates D-Botnet-assisted distribution

A, B, D

19
New cards

Spam affiliate programs commonly offer which compensation methods? A-Revenue sharing B-Per-sale commissions C-Guaranteed minimum monthly income D-Affiliate tracking systems

A, B, D

20
New cards

Pharma spam research found which trends? A-Low conversion rates B-Highly skewed affiliate productivity C-High legitimacy of products D-Global participation in purchases

A, B, D

21
New cards

Challenges for scam operations often include which factors? A-Payment processing constraints B-Traffic acquisition problems C-Excessive law enforcement support D-Maintaining infrastructure availability

A, B, D

22
New cards

Which behaviors characterize fraudulent payment operations? A-Use of money mules B-Use of stolen credit cards C-Full compliance with banking regulations D-Bypassing chargebacks

A, B, D

23
New cards

Which elements are part of cybercrime supply chains? A-Exploit kits B-Traffic sellers C-Academic peer review D-Bulletproof hosts

A, B, D

24
New cards

Cybercriminal monetization strategies often rely on: A-Affiliate programs B-Automation tools C-Transparent corporate reporting D-Stolen financial credentials

A, B, D

25
New cards

Which components contribute to resilience of cybercrime infrastructure? A-Distributed C2 B-Fast-flux networks C-Frequent domain rotation D-Exclusive use of a single server

A, B, C

26
New cards

Which actor develops exploits and sells them for profit? A-Botnet masters B-Exploit developers C-Spammers D-Mules

B

27
New cards

Botnet masters primarily: A-Sell credit card numbers B-Create and control compromised machines C-Process stolen payments D-Solve CAPTCHAs

B

28
New cards

Spammers typically: A-Use botnets to send bulk email B-Develop exploits C-Provide bulletproof hosting D-Create payment systems

A

29
New cards

Phishers rely on spammers to: A-Send stolen credit cards B-Send URLs to scam sites C-Deliver counterfeit goods D-Provide infrastructure

B

30
New cards

Bulletproof hosting providers: A-Operate in highly regulated regions B-Shut down sites quickly C-Ignore complaints and law enforcement D-Only host legitimate sites

C

31
New cards

Carders and mules mainly: A-Send spam B-Develop malware C-Turn stolen accounts into cash D-Operate DNS servers

C

32
New cards

Crowdturfers specialize in: A-Domain registration B-Creating fake accounts and solving CAPTCHAs C-DNS fast-flux D-Botnet C2

B

33
New cards

Underground forums are primarily used for: A-Legitimate e-commerce B-Advertising illicit goods and services C-Government communication D-Academic research

B

34
New cards

In Exploits-as-a-Service, compromise and monetization are: A-Coupled B-Decoupled C-Identical D-Not related

B

35
New cards

Traffic-PPI services bundle: A-Exploit hosting and payment B-Traffic acquisition and exploit hosting C-Botnet rental and spam D-Domain registration and DNS

B

36
New cards

A doorway page is: A-A malware packer B-A page with keyword stuffing that redirects users C-A spam filter D-A payment processor

B

37
New cards

A crypter is used to: A-Encrypt DNS records B-Hide malware from antivirus detection C-Boost SEO rankings D-Manage botnets

B

38
New cards

Blackhat SEO aims to: A-Decrease traffic B-Increase traffic using manipulation C-Perform encryption D-Shut down scam sites

B

39
New cards

Trojan Download Managers: A-Block user updates B-Install or update malware on victims C-Detect phishing D-Repair infected hosts

B

40
New cards

Centralized C2 is efficient but vulnerable due to: A-High cost B-Slow communication C-Single point of failure D-No DNS support

C

41
New cards

Peer-to-peer C2 improves robustness at the cost of: A-More synchronized control B-More reliable commands C-Less predictable command distribution D-Direct IRC usage

C

42
New cards

Fast-flux DNS helps botnets by: A-Using one static IP B-Rapidly rotating IPs C-Blocking DNS queries D-Using only IPv6

B

43
New cards

Random domain generation gives bots: A-Access to public domains B-A large set of algorithmically generated domains C-Only one domain to query D-Guaranteed stability

B

44
New cards

Two defining features of spam are: A-Encrypted and targeted B-Inappropriate and mass sent C-Signed and verified D-Always malware-bearing

B

45
New cards

Spam affiliate programs pay spammers: A-Nothing B-Flat fees only C-30–50% commissions D-Per-byte fees

C

46
New cards

Storm botnet research showed spam filter bypass rate of about: A-50% B-10% C-1% D-0.014%

D

47
New cards

Top countries adding items to cart from spam were: A-China, Russia, India B-US, Canada, Philippines C-Brazil, UK, Germany D-Japan, Mexico, Spain

B

48
New cards

A key weakness in scam operations is: A-Traffic acquisition B-Financial services/payment processing C-Botnet size D-Malware packers

B

49
New cards

Pharmaleaks data revealed affiliates: A-Are evenly productive B-Have skewed revenue distribution C-Never earn money D-Are impossible to track

B

50
New cards

Net profits for pharma scams are typically: A-Huge, >80% B-Moderate, under 20% C-Zero D-Unknown

B

Explore top flashcards

Medical terma quiz 4
Updated 409d ago
flashcards Flashcards (44)
Skull
Updated 5h ago
flashcards Flashcards (47)
Integrals
Updated 665d ago
flashcards Flashcards (41)
Ch13-14 Civics
Updated 1034d ago
flashcards Flashcards (45)
List 35
Updated 1098d ago
flashcards Flashcards (35)
Medical terma quiz 4
Updated 409d ago
flashcards Flashcards (44)
Skull
Updated 5h ago
flashcards Flashcards (47)
Integrals
Updated 665d ago
flashcards Flashcards (41)
Ch13-14 Civics
Updated 1034d ago
flashcards Flashcards (45)
List 35
Updated 1098d ago
flashcards Flashcards (35)