Filters
Question type

Study Flashcards

Which of the following is NOT a general category of computer crime?


A) targets
B) means
C) vicinage
D) incidentals

E) B) and C)
F) C) and D)

Correct Answer

verifed

verified

Which of the following does NOT accurately describe the Secret Service actions that prompted the seminal court case Steve Jackson Games, Inc.v.U.S.Secret Service et al.?


A) The Secret Service used a DDoS attack to infiltrate and sabotage the company's operations.
B) Agents executed an unsigned search warrant.
C) Agents used Gestapo-like tactics by seizing virtually everything, including business records, private electronic mail, and the drafts of forthcoming games.
D) The Secret Service promoted the unfounded view that the bulletin board was a medium for the exchange of hacking information.

E) None of the above
F) B) and C)

Correct Answer

verifed

verified

________ are those individuals who have authorized or legitimate access to a computer system, but who exceed that authorization.

Correct Answer

verifed

verified

Discuss what can be done to apprehend/prevent computer-related crime.

Correct Answer

Answered by ExamLex AI

Answered by ExamLex AI

There are several measures that can be t...

View Answer

Computer thieves have traditionally been able to market their stolen goods as legitimate.

A) True
B) False

Correct Answer

verifed

verified

Hackers, irrespective of national origin, display startling similarities.

A) True
B) False

Correct Answer

verifed

verified

True

________ was the most infamous of all hackers and has been the subject of numerous books and movies.


A) Kevin Mitnick
B) Kevin Poulsen
C) Prophet
D) Urvile

E) None of the above
F) B) and C)

Correct Answer

verifed

verified

Not all crimes involving computers can be characterized as "computer crime."

A) True
B) False

Correct Answer

verifed

verified

What is the primary reason that the resale of integrated chips is so lucrative?


A) increase of legitimate global marketplaces
B) ease in manipulation
C) magnitude of computer transactions
D) the basic law of supply and demand

E) C) and D)
F) A) and D)

Correct Answer

verifed

verified

________ are designed to strip the source-address information from e-mail messages.


A) Copper boxes
B) Anonymizers
C) Ethercards
D) Integrated chips

E) A) and C)
F) B) and C)

Correct Answer

verifed

verified

Describe the five general categories of cybercriminals in today's society.

Correct Answer

Answered by ExamLex AI

Answered by ExamLex AI

1. Hacktivists: These cybercriminals are motivated by political or social causes and often target government or corporate websites to promote their agenda or protest against certain policies. 2. Cyberterrorists: These individuals or groups use cyber attacks to create fear and chaos for political or ideological reasons. Their goal is to disrupt critical infrastructure or cause harm to individuals or organizations. 3. State-sponsored hackers: These cybercriminals are backed by governments and engage in cyber espionage, sabotage, or warfare to gain a strategic advantage or undermine their adversaries. 4. Organized crime groups: These cybercriminals operate like traditional criminal organizations, using hacking and other cyber activities to steal sensitive information, commit fraud, or extort money from individuals and businesses. 5. Insider threats: These are individuals within an organization who misuse their access to sensitive data or systems for personal gain or to cause harm to their employer. They may be motivated by financial incentives, revenge, or coercion.

________ sites enable visitors to download software illegally in violation of copyright protections.

Correct Answer

verifed

verified

According to accomplished phreakers, the theft of telephone access codes requires great technical expertise.

A) True
B) False

Correct Answer

verifed

verified

False

What can the exponential increase in online harassment, stock manipulation, and child pornography be attributed to?


A) the introduction of cloud computing
B) the increase in international guidelines for cyberactivity
C) the increase in academic knowledge
D) the increase in anonymous e-mail accounts and remailers

E) B) and C)
F) A) and D)

Correct Answer

verifed

verified

________ were devices which "tricked" switching systems into granting free access to long-distance lines.

Correct Answer

verifed

verified

Differentiate between traditional crime and computer crime.

Correct Answer

Answered by ExamLex AI

Answered by ExamLex AI

Traditional crime refers to criminal act...

View Answer

Which of the following hacking-related developments occurred after the year 2000?


A) the release of the Morris worm
B) Kevin Poulsen's exploitation of the telecom system to "win" a Porsche
C) the introduction of commercially available security products
D) the emergence of identity theft as an issue for consumers

E) A) and B)
F) A) and C)

Correct Answer

verifed

verified

________ can be defined as the reproduction, distribution, and use of software without the permission or authorization of the owner of copyright.


A) Signal theft
B) Theatrical print theft
C) Data piracy
D) Parallel imports

E) None of the above
F) C) and D)

Correct Answer

verifed

verified

The issue of vicinage has been simplified by the lack of international guidelines for cyberactivity.

A) True
B) False

Correct Answer

verifed

verified

Shareware publishers encourage users to give copies of programs to friends and colleagues but ask everyone who uses a program regularly to pay a registration fee to the program's author directly.

A) True
B) False

Correct Answer

verifed

verified

Showing 1 - 20 of 62

Related Exams

Show Answer