cyber crime test 1

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/136

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

137 Terms

1
New cards

According to the conceptual framework of cybercrime, the method of action is _______

unlawful means

2
New cards

Which of the following groups was NOT highlighted in this chapter (chapter 7)

People's liberation army

3
New cards

Which of the following cyber terror attack targets was NOT identified by the national association of Regulatory Utility Commissioners?

sports arenas

4
New cards

Which of the following cyber terror attack targets was NOT identified by the National association of regular utility commissioners?

education

5
New cards

Efforts to identify threats, determine vulnerabilities, and identify required resources is known as ____

preparedness

6
New cards

Helping people and the community return to normal, if possible is part of _____

recovery

7
New cards

According to the text three aspects must be taken into account to determine risk: the threat, the asset and the____

vulnerability

8
New cards

The conceptual framework that encompasses the definition of cyberterrorism includes all of the following elements EXCEPT _______

results

9
New cards

The conceptual framework that encompasses the definition of cyberterrorism includes all of the following elements under target EXCEPT____

civilian homes

10
New cards

which of the following was NOT identified as one of the components of the motivation element?

economical

11
New cards

All of the following are components of the impact element EXCEPT_____

Economic gain

12
New cards

According to the text, deep web sites can include all of the following EXCEPT_____

Websites that are searchable

13
New cards

Which of the following is NOT considered a portal to the dark net

safari

14
New cards

________ was originally developed by the U.S. Naval Research Labatory as a method of anonymous communication.

Onion Router (ToR)

15
New cards

Sites on the ToR network end in ______, but if you were to type the web address into Google, the website would not be found.

.onion

16
New cards

______ may use ToR to protect sources, resources, and report from areas where it is dangerous.

Media

17
New cards

According to the text, some of the most popular products advertised on the hidden wiki are

drugs

18
New cards

On the darknet, prices are listed in ______ and are shipped to remote addresses or P.O. boxes.

bitcoins

19
New cards

The deep web, which is not accessible through traditional search engines, is sometimes referred to as the ______

deep net

20
New cards

The surface web, which is available via regular search engines, is hosted by all the following browsers EXCEPT _____

Onion Router

21
New cards

On average, Google accesses _______ percent of the surface web.

16

22
New cards

The surface web is often compared to the tip of the iceberg of the internet, as the deep web is ______ bigger than the surface web.

400-500

23
New cards

Surface websites use _____ to browse the web in systematic and automated manner.

crawlers

24
New cards

According to the text, chin also engages in economic ____ against the United States and other countries.

espionage

25
New cards

Which of the following countries is also considered one of the most advanced cyberespionage powers?

Russia

26
New cards

Cyberespionage can be classified into which of the following types?

both economic and political

27
New cards

An act that occurs when an actor, knowing that his or her actions will benefit any foreign government, instrumentality, or agent, steals, copies, or receives a trade secret is referred to as_____

economic espionage

28
New cards

Economic cyberespionage is typically carried out by all the following EXCEPT _____

individual actors

29
New cards

The collection and analysis of information that produces timely reporting, with context and relevance to a supported decision maker is referred to as ____

cyber intelligence

30
New cards

Which of the following countries was not identified as being as one of the strong actors in world politics?

Mexico

31
New cards

According to the text, cyberwarfare generally includes which of the following?

cyberespionage and cybersabotage

32
New cards

Historically, power has depended on which of the following strengths?

military

33
New cards

According to the text, the most pervasive cyber threat may be______

theft of intellectual property

34
New cards

The Syrian Electronic Army has been responsible for attacks against which of the following?

all of these

35
New cards

The interception of a message by a third party is also referred to as a _____ attack.

man-in-the-middle

36
New cards

The creation of _____ has led to the creation of new hack/fraudster built in malware techniques that can target users via smartphones and tablets.

apps

37
New cards

The _____ is responsible for collecting and decrypting threats both physical and cyber via the use of signal intelligence.

National security Agency

38
New cards

The role of the _____ was extended in the Cybersecurity Enhancement Act of 2014.

Secretary of Labor

39
New cards

Hacking cars or other means of transportation, such as airplanes, is an example of a security issue seen in which of the following techniques?

Man in the internet of things

40
New cards

According to General Michael Hayden, a cybersecurity knowledge gap exists between ______.

youthful generation and older generation

41
New cards

the ____ computer emergency team (CERT) investigated the cyber institution that became known as Moonlight Maze.

Air Force's

42
New cards

According to the text dams, railways, and power plants are considered ______

infrastructures

43
New cards

work for hire hackers who work for private security corporations are also referred to as _____

red teams

44
New cards

______ became notorious for being the one of the first cybersecurity intrusions to illustrate how vulnerable our technology is to malicious infiltration.

Moonlight Maze

45
New cards

______ occur when a computer system is accessed without permission.

network intrusions.

46
New cards

______ refers to attacks where a mass email is sent to multiple computers, requesting personal information be sent to a specific location.

phishing

47
New cards

allowing individuals to access secured networks without the owners' knowledge is also known as a backdoor.

Rogue access points.

48
New cards

________ is a global system of interconnected computer networks that are set up to exchange various types of data

the internet

49
New cards

______ is a service that can be accesses via the internet.

world wide web

50
New cards

____ is an interdependent network of information technology infrastructures including the internet, telecommunications networks, and computer systems.

cyberspace

51
New cards

Criminal knowledge that their efforts will likely lead to success because there are so many potential victims and so few barriers or oversight online best describes which Internet gateway to vulnerability?

asymmetries of cyberspace

52
New cards

internet users generally struggle with identifying when their computer has been attacked. In order to quickly respond to cyberattack on their system, a user would have to be able to overcome which of the following internet threats?

1s an 0s

53
New cards

Countries concerned with controlling the flow of information and goods online would be most concerned with which of the following aspects of the internet?

lack of barriers to entry

54
New cards

the internet provides opportunities for criminals to cause significant damage with minimum resources. For example, in 2017 the WannaCry ransomware attack resulted in several billion dollars of damage. This best represents which vulnerability of the internet?

asymmetries of cyberspace

55
New cards

the ____ of the internet might be a concern for parents regarding who their children may be talking to online.

anonymity/ identity

56
New cards

Whereas in the past criminals had to physically approach their victims to carry out a crime, the Internet allows offenders to be in other states, or even continents, and still carry out the same crime. This best represents which of the following vulnerabilities of the Internet?

time and space

57
New cards

The inventors of the Internet likely didn't consider ______ during its development.

criminal abuse of the internet

58
New cards

The opportunity to create new businesses and markets online best describes which aspect of internet development?

commercialization

59
New cards

Development of the _____ resolved issues with hierarchical host names making it easier for the average person to access the internet.

DNS

60
New cards

Which of the following countermeasures helps prevent e-mail spoofing, that is, the forgery of an email header to make it appear as if it is coming from a friend or employee?

implement message authentication

61
New cards

Which of the following countermeasures recommends that companies must complete regular data backups?

complete regular updates

62
New cards

The internet Revenue Service uses which of the following methods to contact a taxpayer.

mail

63
New cards

according to the text, phishing scams typically target ____

personal information

64
New cards

According to the federal trade commission, all of the following are ways that consumers can prevent identity theft EXCEPT ______

using easy passwords

65
New cards

Per the 1998 Assumption Deterrence Act, the text identified all of the following types of punishment EXCEPT______

probation

66
New cards

According to the text, which of the following entities are considered a special target for botnets?

banks and financial institutions

67
New cards

Botnets typically infect computers via ______ or drive-by-downloads.

USBs

68
New cards

______ is defined as a collection of infected machines worldwide that receive commands and perform some illegal actions such as distributed denial of service attacks, among others.

A botnet

69
New cards

_____ is defined as unsolicited commercial e-mail that includes any commercial emails addressed to a recipient with whom the sender has no existing business or personal relationship and not sent with the consent of the recipient.

spam

70
New cards

Threats to cybersecurity originate from all of the following sources EXCEPT ______.

individual

71
New cards

A ______ refers to persons who attempt unauthorized access to a control system device and/or network using data communications pathway.

cyberthreat

72
New cards

According to the text, cyberthreats originate mainly from all of the following entities EXCEPT_____

Local governments

73
New cards

Threats that originate from inside the company or organization are referred to as _____

local threats

74
New cards

Human behavior that departs from compliance with established policies, regardless of whether it results from malice or a disregard for security policies, is the manifestation of a/an ______ threat.

insider

75
New cards

According to national surveys, ________ are the second greatest threat to a company's cybersecurity, only trumped by hackers.

insiders

76
New cards

the most serious insider cybercrimes include all of the following EXCEPT________

Harassment

77
New cards

which of the following is NOT considered a main type of insider threat?

Feared

78
New cards

The least common but most costly is ______ insider threat.

malicious

79
New cards

People who are "tricked" by others into giving up access information or information about themselves to an external party are known as _____ insiders.

exploited

80
New cards

Groups with displeasure of government are often motivated by all of the following EXCEPT_____

aristocracy

81
New cards

Edward Snowden, an American computer professional, provided all of the following tips for keeping data private EXCEPT_____

decrypt your phone calls and text messages.

82
New cards

Which of the following was NOT identified as one of the main forms of international threats?

hacking or spying on city and local governments.

83
New cards

One of the most persistent threats for the United States in terms of cyberattacks originates in ______.

China

84
New cards

The use of computer networks and technologies as a means for conducting attacks that target critical national infrastructures or governmental assets has a psychological, social, political, or religious motive, causes harm to individuals or groups, or physically damages infrastructures is referred to as ______.

cyberterrorism

85
New cards

all of the following were identified as vulnerable infrastructures EXCEPT_____

Education

86
New cards

Which of the following characteristics of hackers is NOT true?

The members meet each other quite often

87
New cards

The "bad guy" hackers are known as ______.

black hats

88
New cards

Hackers with their abilities to research vulnerabilities in software products and disclose them to companies that developed the software are known as ______.

ethical hackers

89
New cards

All of the following are examples of social engineering EXCEPT______

Spam

90
New cards

Consumer crimes that include identity theft, phishing scams, and spam fall within which of the following categories?

fraud and financial crimes

91
New cards

In 2015, the most common crime reported to the Federal Consumer Commission was ______.

identity theft

92
New cards

Which of the following was NOT identified as a type of personal information that is sought out by identity thieves?

telephone number

93
New cards

Which of the following was NOT identified as a way that criminals get information from their victims?

criminals directly as the victim for their personal information

94
New cards

in 1998 congress passed the assumption deterrence act making identity theft _______

a felony crime

95
New cards

which of the following has NOT contributed to the increase in threats to mobile devices?

Apple INC. technology

96
New cards

According to the text, virus files typically end in _____

.exe

97
New cards

_______ viruses attach to the original code, changing the start-up information of the program.

Add-On

98
New cards

Multimedia message services viruses target _____

mobile devices

99
New cards

A ______ malware is disguised as, or embedded within, legitimate software.

Trojan Horse

100
New cards

Which of the following risks is not created by Trojan Horses

internet slowdown