1/19
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
An individual who doesn't have the skills to hack on his or her own so uses prewritten programs to do so is referred to as a dumpster diver.
false
Which of the following differential association theory points was not proposed by Edwin Sutherland?
Behavior is learned the best in larger social groups.
The ______ is primarily responsible for the protection of civilian computers.
Department of Homeland Security
Which of the following is not considered one of the responsibilities of the Department of Homeland Security?
ensure a fast, safe, and effective transportation system
The leading agency for investigating cyberattacks by criminals, overseas adversaries, and terrorists is known as the ______.
Federal Bureau of Investigation
Public-private partnerships are not necessary for the cybersecurity of our nation.
false
The U.S. government should cooperate not only with national jurisdiction of law enforcement at all levels but the international community and private sector organizations as well.
true
Cybercrimes operate in a virtual environment, with undefined and specific jurisdictions.
false
An ethnic, regional, economic, or social group exhibiting characteristic patterns of behavior sufficient to distinguish it from others within an embracing culture or society is referred to as a ______.
subculture
Systems utilized by many of the nation's critical infrastructures to provide automated control of the functions of the infrastructure are referred to as ______.
supervisory control and data acquisition systems
The role of local-level agencies in cybersecurity is constantly evolving.
true
The first responders to most catastrophic events are usually at the ______ level.
local
Albert K. Cohen's subculture theory propositions are based on ______.
delinquent boys
Maneuvering around, trying to access unprotected WiFi networks, is referred to as ______.
wardriving
According to the text, low socioeconomic status is a predominate marker for engaging in crime in ______.
subculture theory
Examining trends that are necessary for crime to occur is an element of ______.
routine activity theory
According to the differential association theory, criminal behavior is acquired through interactions with other persons via communication.
true
According to the routine activities theory, guardianship plays a major role in the prevalence of crime.
true
According to the routine activities theory, crime is more likely to occur if there is ______.
Absence of appropriate guardians
Entities that have resources to put toward security and may not be subjected to the scrutiny and restrictions are usually in the ______.
private sector