1/136
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
According to the conceptual framework of cybercrime, the method of action is _______
unlawful means
Which of the following groups was NOT highlighted in this chapter (chapter 7)
People's liberation army
Which of the following cyber terror attack targets was NOT identified by the national association of Regulatory Utility Commissioners?
sports arenas
Which of the following cyber terror attack targets was NOT identified by the National association of regular utility commissioners?
education
Efforts to identify threats, determine vulnerabilities, and identify required resources is known as ____
preparedness
Helping people and the community return to normal, if possible is part of _____
recovery
According to the text three aspects must be taken into account to determine risk: the threat, the asset and the____
vulnerability
The conceptual framework that encompasses the definition of cyberterrorism includes all of the following elements EXCEPT _______
results
The conceptual framework that encompasses the definition of cyberterrorism includes all of the following elements under target EXCEPT____
civilian homes
which of the following was NOT identified as one of the components of the motivation element?
economical
All of the following are components of the impact element EXCEPT_____
Economic gain
According to the text, deep web sites can include all of the following EXCEPT_____
Websites that are searchable
Which of the following is NOT considered a portal to the dark net
safari
________ was originally developed by the U.S. Naval Research Labatory as a method of anonymous communication.
Onion Router (ToR)
Sites on the ToR network end in ______, but if you were to type the web address into Google, the website would not be found.
.onion
______ may use ToR to protect sources, resources, and report from areas where it is dangerous.
Media
According to the text, some of the most popular products advertised on the hidden wiki are
drugs
On the darknet, prices are listed in ______ and are shipped to remote addresses or P.O. boxes.
bitcoins
The deep web, which is not accessible through traditional search engines, is sometimes referred to as the ______
deep net
The surface web, which is available via regular search engines, is hosted by all the following browsers EXCEPT _____
Onion Router
On average, Google accesses _______ percent of the surface web.
16
The surface web is often compared to the tip of the iceberg of the internet, as the deep web is ______ bigger than the surface web.
400-500
Surface websites use _____ to browse the web in systematic and automated manner.
crawlers
According to the text, chin also engages in economic ____ against the United States and other countries.
espionage
Which of the following countries is also considered one of the most advanced cyberespionage powers?
Russia
Cyberespionage can be classified into which of the following types?
both economic and political
An act that occurs when an actor, knowing that his or her actions will benefit any foreign government, instrumentality, or agent, steals, copies, or receives a trade secret is referred to as_____
economic espionage
Economic cyberespionage is typically carried out by all the following EXCEPT _____
individual actors
The collection and analysis of information that produces timely reporting, with context and relevance to a supported decision maker is referred to as ____
cyber intelligence
Which of the following countries was not identified as being as one of the strong actors in world politics?
Mexico
According to the text, cyberwarfare generally includes which of the following?
cyberespionage and cybersabotage
Historically, power has depended on which of the following strengths?
military
According to the text, the most pervasive cyber threat may be______
theft of intellectual property
The Syrian Electronic Army has been responsible for attacks against which of the following?
all of these
The interception of a message by a third party is also referred to as a _____ attack.
man-in-the-middle
The creation of _____ has led to the creation of new hack/fraudster built in malware techniques that can target users via smartphones and tablets.
apps
The _____ is responsible for collecting and decrypting threats both physical and cyber via the use of signal intelligence.
National security Agency
The role of the _____ was extended in the Cybersecurity Enhancement Act of 2014.
Secretary of Labor
Hacking cars or other means of transportation, such as airplanes, is an example of a security issue seen in which of the following techniques?
Man in the internet of things
According to General Michael Hayden, a cybersecurity knowledge gap exists between ______.
youthful generation and older generation
the ____ computer emergency team (CERT) investigated the cyber institution that became known as Moonlight Maze.
Air Force's
According to the text dams, railways, and power plants are considered ______
infrastructures
work for hire hackers who work for private security corporations are also referred to as _____
red teams
______ became notorious for being the one of the first cybersecurity intrusions to illustrate how vulnerable our technology is to malicious infiltration.
Moonlight Maze
______ occur when a computer system is accessed without permission.
network intrusions.
______ refers to attacks where a mass email is sent to multiple computers, requesting personal information be sent to a specific location.
phishing
allowing individuals to access secured networks without the owners' knowledge is also known as a backdoor.
Rogue access points.
________ is a global system of interconnected computer networks that are set up to exchange various types of data
the internet
______ is a service that can be accesses via the internet.
world wide web
____ is an interdependent network of information technology infrastructures including the internet, telecommunications networks, and computer systems.
cyberspace
Criminal knowledge that their efforts will likely lead to success because there are so many potential victims and so few barriers or oversight online best describes which Internet gateway to vulnerability?
asymmetries of cyberspace
internet users generally struggle with identifying when their computer has been attacked. In order to quickly respond to cyberattack on their system, a user would have to be able to overcome which of the following internet threats?
1s an 0s
Countries concerned with controlling the flow of information and goods online would be most concerned with which of the following aspects of the internet?
lack of barriers to entry
the internet provides opportunities for criminals to cause significant damage with minimum resources. For example, in 2017 the WannaCry ransomware attack resulted in several billion dollars of damage. This best represents which vulnerability of the internet?
asymmetries of cyberspace
the ____ of the internet might be a concern for parents regarding who their children may be talking to online.
anonymity/ identity
Whereas in the past criminals had to physically approach their victims to carry out a crime, the Internet allows offenders to be in other states, or even continents, and still carry out the same crime. This best represents which of the following vulnerabilities of the Internet?
time and space
The inventors of the Internet likely didn't consider ______ during its development.
criminal abuse of the internet
The opportunity to create new businesses and markets online best describes which aspect of internet development?
commercialization
Development of the _____ resolved issues with hierarchical host names making it easier for the average person to access the internet.
DNS
Which of the following countermeasures helps prevent e-mail spoofing, that is, the forgery of an email header to make it appear as if it is coming from a friend or employee?
implement message authentication
Which of the following countermeasures recommends that companies must complete regular data backups?
complete regular updates
The internet Revenue Service uses which of the following methods to contact a taxpayer.
according to the text, phishing scams typically target ____
personal information
According to the federal trade commission, all of the following are ways that consumers can prevent identity theft EXCEPT ______
using easy passwords
Per the 1998 Assumption Deterrence Act, the text identified all of the following types of punishment EXCEPT______
probation
According to the text, which of the following entities are considered a special target for botnets?
banks and financial institutions
Botnets typically infect computers via ______ or drive-by-downloads.
USBs
______ is defined as a collection of infected machines worldwide that receive commands and perform some illegal actions such as distributed denial of service attacks, among others.
A botnet
_____ is defined as unsolicited commercial e-mail that includes any commercial emails addressed to a recipient with whom the sender has no existing business or personal relationship and not sent with the consent of the recipient.
spam
Threats to cybersecurity originate from all of the following sources EXCEPT ______.
individual
A ______ refers to persons who attempt unauthorized access to a control system device and/or network using data communications pathway.
cyberthreat
According to the text, cyberthreats originate mainly from all of the following entities EXCEPT_____
Local governments
Threats that originate from inside the company or organization are referred to as _____
local threats
Human behavior that departs from compliance with established policies, regardless of whether it results from malice or a disregard for security policies, is the manifestation of a/an ______ threat.
insider
According to national surveys, ________ are the second greatest threat to a company's cybersecurity, only trumped by hackers.
insiders
the most serious insider cybercrimes include all of the following EXCEPT________
Harassment
which of the following is NOT considered a main type of insider threat?
Feared
The least common but most costly is ______ insider threat.
malicious
People who are "tricked" by others into giving up access information or information about themselves to an external party are known as _____ insiders.
exploited
Groups with displeasure of government are often motivated by all of the following EXCEPT_____
aristocracy
Edward Snowden, an American computer professional, provided all of the following tips for keeping data private EXCEPT_____
decrypt your phone calls and text messages.
Which of the following was NOT identified as one of the main forms of international threats?
hacking or spying on city and local governments.
One of the most persistent threats for the United States in terms of cyberattacks originates in ______.
China
The use of computer networks and technologies as a means for conducting attacks that target critical national infrastructures or governmental assets has a psychological, social, political, or religious motive, causes harm to individuals or groups, or physically damages infrastructures is referred to as ______.
cyberterrorism
all of the following were identified as vulnerable infrastructures EXCEPT_____
Education
Which of the following characteristics of hackers is NOT true?
The members meet each other quite often
The "bad guy" hackers are known as ______.
black hats
Hackers with their abilities to research vulnerabilities in software products and disclose them to companies that developed the software are known as ______.
ethical hackers
All of the following are examples of social engineering EXCEPT______
Spam
Consumer crimes that include identity theft, phishing scams, and spam fall within which of the following categories?
fraud and financial crimes
In 2015, the most common crime reported to the Federal Consumer Commission was ______.
identity theft
Which of the following was NOT identified as a type of personal information that is sought out by identity thieves?
telephone number
Which of the following was NOT identified as a way that criminals get information from their victims?
criminals directly as the victim for their personal information
in 1998 congress passed the assumption deterrence act making identity theft _______
a felony crime
which of the following has NOT contributed to the increase in threats to mobile devices?
Apple INC. technology
According to the text, virus files typically end in _____
.exe
_______ viruses attach to the original code, changing the start-up information of the program.
Add-On
Multimedia message services viruses target _____
mobile devices
A ______ malware is disguised as, or embedded within, legitimate software.
Trojan Horse
Which of the following risks is not created by Trojan Horses
internet slowdown