Shared Flashcard Set

Details

Chapter 4 Cybercrime
Multiple Choice
20
Computer Science
Undergraduate 1
10/18/2014

Additional Computer Science Flashcards

 


 

Cards

Term

Cybervandalism and cyberterrorism are examples of which category of online crime?

 
theft of information and copyright infringement
 
 
 
Correct!
 
interference with lawful use of computers
 
 
 
 
threatening communications
 
 
 
 
dissemination of contraband or offensive materials
Definition

 

interference with lawful use of computers

Term

Which of the following refers to a computer that has been compromised by some form of malware, enabling the criminal to remotely control that computer?

 
Trojan
 
 
 
 
bundler
 
 
 
Correct!
 
zombie
     
  
rootkit
Definition

 

zombie
Term

Which of the following refers to a software program or hardware device that records everything you type into a compromised computer?

Correct!
 
keyloggers
 
 
 
 
salamis
 
 
 
 
worms
 
 
 
 
Trojans
Definition

 

keyloggers
Term

Which of the following refers to two distinct methods of distributed denial of service (DDoS) attacks?

 
spamming and fraggling
 
 
 
Correct!
 
smurfing and fraggling
 
 
 
 
stalking and spamming
 
 
 
 
freezing and stalking
Definition
smurfing and fraggling

 

Term

Which of the following refers to a malware program that encrypts or otherwise renders computer or digital resources inoperable or inaccessible in furtherance of the illegal compulsion of an action or exchange?

 
worm
 
 
 
 
social engineering
 
 
 
Correct!
 
ransomware
 
 
 
 
spyware
Definition

 

ransomware

Term

Which of the following best defines shoulder surfing?

 
using computers to remotely perform malicious or criminal tasks
 
 
 
using electronic messaging systems to randomly or indiscriminately send unsolicited bulk messages
 
 
 
rendering computers or digital resources inoperable in furtherance of the illegal compulsion of an action or exchange
 
 
 
Correct!
 
literally watching someone from behind, as he or she inputs a password
Definition
literally watching someone from behind, as he or she inputs a password
Term

A deliberate, politically or religiously motivated attack against data compilations, computer programs, and/or information systems that is intended to disrupt and/or deny service or acquire information that disrupts the social, physical, or political infrastructure of a target, is known as ________.

Correct!
 
cyberterrorism
 
 
 
 
salami technique
 
 
 
 
cyberstalking
 
 
 
 
cyberbullying
Definition
cyberterrorism

 

Term

According to the Office of Juvenile Justice and Delinquency Prevention (OJJDP) and the National Center for Missing and Exploited Children (NCMEC), almost all possessors of child pornography are ________.

 
black males who are younger than 25
 
 
 
 
white males who are younger than 25
 
 
 
 
homosexual males who are older than 25
 
 
 
Correct!
 
white males who are older than 25
Definition

 

white males who are older than 25
Term

Which of the following is NOT a primary motivation for the possession of child pornography?

Correct!
 
fight for legalizing man/boy sexual relationship
 
 
 
 
satisfaction of a desire for new and different sexual stimuli
 
 
 
 
satisfaction of a peculiar curiosity
 
 
 
 
possession and subsequent distribution designed for economic profict
Definition
fight for legalizing man/boy sexual relationship
Term

Which of the following launched the first online casino in 1995 with 18 games?

 
PokerStars
 
 
 
 
Rational Group US Holdings
 
 
 
Correct!
 
Internet Casinos, Inc.
 
 
 
 
Full Tilt Poker
Definition
Internet Casinos, Inc.
Term

The individuals who seek to re-establish a relationship with an unwilling partner and are considered the most dangerous of stalkers are known as ________.

Correct!
 
obsessional stalkers
 
 
 
 
love-obsession stalkers
 
 
 
 
erotomaniacs
 
 
 
 
vengence stalkers
Definition
obsessional stalkers

 

Term

Which of the following refers to stalkers who are delusional and believe that their victim is in love with them or has had a previous relationship with them?

obsessional stalkers
 
 
 
 
love-obsession stalkers
 
 
 
Correct!
 
erotomaniacs
 
 
 
 
vengence stalker
Definition

 

erotomaniacs

Term

Which of the following statements regarding online gaming is untrue?

 
The increase in e-banking allows users to access and add funds without even leaving their chair.
 
 
 
 
The continuous operation of online casinos makes them accessible 24 hours a day.
 
 
 
The lack of physicality and geographical location makes online casinos accessible to any user with a computer, PDA, or cell phone.
 
 
Correct!
 
Minors accessibility to online gaming is restricted, as age verification is mandatory.
Definition
Minors accessibility to online gaming is restricted, as age verification is mandatory.
Term

Which of the following types of fraud occurs when a fraudster adds hidden charges to the advertised price, perhaps in shipping or handling?

Correct!
 
fee stacking
 
 
 
 
misrepresentation
 
 
 
 
nondelivery
 
 
 
 
shill bidding
Definition

  

fee stacking

Term

To steal credit card information by installing devices on card readers located in ATMs, gas pumps, restaurants, grocery stores, retail establishments, or any other area where magnetic strip card readers are employed is known as ________.

 
spamming
 
 
 
Correct!
 
skimming
 
 
 
 
RFID
 
 
 
 
shill bidding
Definition

 

skimming

Term

Which of the following refers to the deliberate manipulation of an existing program to redirect or reroute data representing monies or economic exchanges?

 
ISP jacking
 
 
 
  
web cramming
 
 
 
Correct!
  
data diddling
 
 
 
  
IP spoofing
Definition

 

data diddling

Term

Which of the following refers to the sale of stolen goods through technological means?

 
day trading
 
 
 
 
insider trading
 
 
 
Correct!
 
e-Fencing
 
 
 
 
spoofing
Definition

 

e-Fencing

Term

Which of the following refers to redirecting thin slices of accounts into a designated location?

Correct!
 
salami technique
 
 
 
 
data diddling
 
 
 
 
spoofing
 
 
 
 
ISP-jacking
Definition

 

salami technique
Term

Which of the following refers to a seller in an auction driving up the cost of his or her own item by bidding on it?

 
fee stacking
 
 
 
Correct!
 
shill bidding
 
 
 
 
misrepresentation
 
 
 
 
nondelivery
Definition

 

shill bidding

Term

________ involves the use of radio waves to facilitate the transfer of information between an electronic tag (or label) and a reader.

Correct!
 
RFID
 
 
 
 
WiFi
 
 
 
 
Broadband
 
 
 
 
Bluetooth
Definition
RFID

 

Supporting users have an ad free experience!