What can the exponential increase in online harassment, stock manipulation, and child pornography be attributed to?
the introduction of cloud computing
the increase in international guidelines for cyber activity
the increase in academic knowledge
Correct!
the increase in anonymous e-mail accounts and remailers
Definition
the increase in anonymous e-mail accounts and remailers
Term
Which of the following is a factor that leads many individual users of the Internet to assume that their identities are safely protected?
Correct!
the dearth of interjurisdictional communications
the difficulty in using modern communication technology
the lack of opportunity to engage in computer crime
the global acceptance of First Amendment rights
Definition
Correct!
the dearth of interjurisdictional communications
Term
________ are designed to strip the source-address information from e-mail messages.
Copper boxes
Correct!
Anonymizers
Ethercards
Integrated chips
Definition
Anonymizers
Term
Which of the following is NOT a general category of computer crime?
targets
means
Correct!
vicinage
incidentals
Definition
vicinage
Term
Which was the first event to signal the potential of computer crime?
the crash of AT&T
the destruction caused by the Morris worm
Correct!
the hacking of the MILNET system
the victimization of Michigan Bell
Definition
the hacking of the MILNET system
Term
________ hat hackers are individuals who identify and exploit system vulnerabilities for nefarious purposes.
White
Blue
Gray
Correct!
Black
Definition
Black
Term
Which of the following hacking-related developments occurred after the year 2000?
the release of the Morris worm
Kevin Poulsen’s exploitation of the telecom system to “win” a Porshe
the introduction of commercially available security products
Correct!
the emergence of identity theft as an issue for consumers
Definition
the emergence of identity theft as an issue for consumers
Term
What was the Illuminati?
Correct!
a board owned and operated by Steve Jackson Games
a destructive program that crippled over 6,000 computers in 1988
a military database containing sensitive information
an organization pointing out security flaws in institutional systems
Definition
a board owned and operated by Steve Jackson Games
Term
Which of the following hacking-related developments occurred during the 1990s?
Robert Morris releases his worm on the Internet, and is indicted under newly passed legislation.
Correct!
Commercially available security products are introduced.
Phreakers emerge, costing AT&T a fortune in uncollected long-distance charges.
A dramatic increase in hacktivism occurs.
Definition
Commercially available security products are introduced.
Term
<p><span style="font-size: 12pt;">________ was the most infamous of all hackers and has been the subject of numerous books and movies.</span></p>
________ was the most infamous of all hackers and has been the subject of numerous books and movies.
Kevin Mitnick
Kevin Poulsen
Prophet
Urvile
Definition
Kevin Mitnick
Term
Which of the following is true of the infamous hacking board Plovernet?
It went online in March 1980.
Correct!
It was a breeding ground for hacking groups like LoD.
It was responsible for the hacking of the Los Alamos military computers in 1982.
It was originally formed in Bonn, Germany
Definition
It was a breeding ground for hacking groups like LoD.
Term
Which of the following does NOT accurately describe the Secret Service actions that prompted the seminal court caseSteve Jackson Games, Inc. v. U.S. Secret Service et al.?
Correct!
The Secret Service used a DDoS attack to infiltrate and sabotage the company’s operations.
Agents executed an unsigned search warrant.
Agents used Gestapo-like tactics by seizing virtually everything, including business records, private electronic mail, and the drafts of forthcoming games.
The Secret Service promoted the unfounded view that the bulletin board was a medium for the exchange of hacking information.
Definition
The Secret Service used a DDoS attack to infiltrate and sabotage the company’s operations.
Term
Which of the following qualifies as social engineering?
the illegal copying and distribution of a newly released theatrical film
a brute force search for an employee’s password
Correct!
befriending a company’s cleaning crew to gain access to rooms and buildings
using an anonymizer to conduct hard-to-track Internet searches
Definition
befriending a company’s cleaning crew to gain access to rooms and buildings
Term
Which of the following is the least destructive category of hackers?
technological thrill seekers
insiders
Correct!
informational voyeurs
hacktivists
Definition
informational voyeurs
Term
Which of the following is NOT one of the primary motivations for computer intrusion in contemporary society?
revenge
political motives
Correct!
to benefit others
boredom
Definition
to benefit others
Term
What motivates pure hackers to steal information?
political need
Correct!
intellectual challenge
sexual gratification
economic desire
Definition
intellectual challenge
Term
________ are the least sophisticated of all cybercriminals.
Correct!
Script kiddies
Cyberpunks
Cybercriminal organizations
Crackers
Definition
Script kiddies
Term
The theft and resale of which computer component has proven to be the most lucrative?
CPUs
motherboards
Correct!
integrated chips
serial ports
Definition
integrated chips
Term
________ can be defined as the reproduction, distribution, and use of software without the permission or authorization of the owner of copyright.
Signal theft
Theatrical print theft
Correct!
Data piracy
Paralle imports
Definition
Data piracy
Term
Which of the following groups does NOT figure in the multilateral film privacy strategy of the Chinese Triads?