Shared Flashcard Set

Details

Chapter 3 Cybercrime
Multiple Choice
20
Computer Science
Undergraduate 1
10/18/2014

Additional Computer Science Flashcards

 


 

Cards

Term

What can the exponential increase in online harassment, stock manipulation, and child pornography be attributed to?

 
the introduction of cloud computing
 
 
 
 
the increase in international guidelines for cyber activity
 
 
 
 
the increase in academic knowledge
 
 
 
Correct!
the increase in anonymous e-mail accounts and remailers
Definition

  

the increase in anonymous e-mail accounts and remailers

  

Term

Which of the following is a factor that leads many individual users of the Internet to assume that their identities are safely protected?

Correct!
 
the dearth of interjurisdictional communications
  
 
 
 
the difficulty in using modern communication technology
 
 
 
 
the lack of opportunity to engage in computer crime
 
  
the global acceptance of First Amendment rights
 
Definition

Correct!

  
the dearth of interjurisdictional communications
  
Term

________ are designed to strip the source-address information from e-mail messages.

 
Copper boxes
 
 
 
Correct!
 
Anonymizers
 
 
 
 
Ethercards
 
 
 
 
Integrated chips
Definition
Anonymizers
Term

Which of the following is NOT a general category of computer crime?

 
targets
 
 
 
 
means
 
 
 
Correct!
 
vicinage
 
 
 
 
incidentals
Definition
vicinage
Term

Which was the first event to signal the potential of computer crime?

 
the crash of AT&T
 
 
 
the destruction caused by the Morris worm
 
 
 
Correct!
 
the hacking of the MILNET system
 
 
 
 
the victimization of Michigan Bell
Definition
the hacking of the MILNET system

 

Term

________ hat hackers are individuals who identify and exploit system vulnerabilities for nefarious purposes.

 
White
 
 
 
 
Blue
 
 
 
 
Gray
 
 
 
Correct!
 
Black
Definition
Black
Term

Which of the following hacking-related developments occurred after the year 2000?

 
the release of the Morris worm
 
 
 
 
Kevin Poulsen’s exploitation of the telecom system to “win” a Porshe
 
 
 
 
the introduction of commercially available security products
 
 
 
Correct!
 
the emergence of identity theft as an issue for consumers
Definition
the emergence of identity theft as an issue for consumers
Term

What was the Illuminati?

Correct!
a board owned and operated by Steve Jackson Games
 
a destructive program that crippled over 6,000 computers in 1988
a military database containing sensitive information
 
 
 
 
an organization pointing out security flaws in institutional systems
Definition
a board owned and operated by Steve Jackson Games
Term

Which of the following hacking-related developments occurred during the 1990s?

 
Robert Morris releases his worm on the Internet, and is indicted under newly passed legislation.
 
 
Correct!
 
Commercially available security products are introduced.
 
 
 
Phreakers emerge, costing AT&T a fortune in uncollected long-distance charges.
 
 
 
A dramatic increase in hacktivism occurs.
Definition
Commercially available security products are introduced.
Term

<p><span style="font-size: 12pt;">________ was the most infamous of all hackers and has been the subject of numerous books and movies.</span></p>

________ was the most infamous of all hackers and has been the subject of numerous books and movies. 








Kevin Mitnick
 
 
Kevin Poulsen
 
 
 
Prophet
 
 
 
Urvile
Definition
Kevin Mitnick
Term

Which of the following is true of the infamous hacking board Plovernet?

 
It went online in March 1980.
 
 
 
Correct!
It was a breeding ground for hacking groups like LoD.
 
 
 
It was responsible for the hacking of the Los Alamos military computers in 1982.
 
It was originally formed in Bonn, Germany
Definition
It was a breeding ground for hacking groups like LoD.

 

Term

Which of the following does NOT accurately describe the Secret Service actions that prompted the seminal court caseSteve Jackson Games, Inc. v. U.S. Secret Service et al.?

Correct!
 
The Secret Service used a DDoS attack to infiltrate and sabotage the company’s operations.
 
 
 
 
Agents executed an unsigned search warrant.
 
 
Agents used Gestapo-like tactics by seizing virtually everything, including business records, private electronic mail, and the drafts of forthcoming games.
 
 
The Secret Service promoted the unfounded view that the bulletin board was a medium for the exchange of hacking information.
Definition
The Secret Service used a DDoS attack to infiltrate and sabotage the company’s operations.
Term

Which of the following qualifies as social engineering?

 
the illegal copying and distribution of a newly released theatrical film
 
 
 
 
a brute force search for an employee’s password
 
 
 
Correct!
 
befriending a company’s cleaning crew to gain access to rooms and buildings
 
 
 
using an anonymizer to conduct hard-to-track Internet searches
Definition
befriending a company’s cleaning crew to gain access to rooms and buildings
Term

Which of the following is the least destructive category of hackers?

 
technological thrill seekers
 
 
 
 
insiders
 
 
 
Correct!
 
informational voyeurs
 
 
 
 
hacktivists
Definition
informational voyeurs
Term

Which of the following is NOT one of the primary motivations for computer intrusion in contemporary society?

 
revenge
 
 
 
 
political motives
 
 
 
Correct!
 
to benefit others
 
 
 
 
boredom
Definition
 
to benefit others
 
 
 
 
Term

What motivates pure hackers to steal information?

 
political need
 
 
 
Correct!
 
intellectual challenge
 
 
 
 
sexual gratification
 
 
 
 
economic desire
Definition

 

intellectual challenge

Term

________ are the least sophisticated of all cybercriminals.

Correct!
 
Script kiddies
 
 
 
 
Cyberpunks
 
 
 
 
Cybercriminal organizations
 
 
 
 
Crackers
Definition

  

Script kiddies
Term

The theft and resale of which computer component has proven to be the most lucrative?

 
CPUs
 
 
 
 
motherboards
 
 
 
Correct!
 
integrated chips
 
 
 
 
serial ports
Definition
integrated chips

 

Term

________ can be defined as the reproduction, distribution, and use of software without the permission or authorization of the owner of copyright.

 
Signal theft
 
 
 
 
Theatrical print theft
 
 
 
Correct!
 
Data piracy
 
 
 
 
Paralle imports
Definition

 

Data piracy

Term

Which of the following groups does NOT figure in the multilateral film privacy strategy of the Chinese Triads?

 
privacy pressers
 
 
 
Correct!
 
hacktivits
 
 
 
 
piracy burners
 
 
 
 
runners
Definition

 

hacktivits
Supporting users have an ad free experience!