Deck 9: Cybersecurity Operations

ملء الشاشة (f)
exit full mode
سؤال
The leading agency for investigating cyberattacks by criminals, overseas adversaries, and terrorists is known as the ______.

A) Central Intelligence Agency
B) National Security Agency
C) Federal Bureau of Investigation
D) Defense Intelligence Agency
استخدم زر المسافة أو
up arrow
down arrow
لقلب البطاقة.
سؤال
An ethnic, regional, economic, or social group exhibiting characteristic patterns of behavior sufficient to distinguish it from others within an embracing culture or society is referred to as a ______.

A) group
B) subculture
C) faction
D) division
سؤال
Undocumented, nonmalicious, surprises installed on a program by the creator are referred to as ______.

A) payloads
B) rootkits
C) Easter eggs
D) dumpster dives
سؤال
Outsiders in the hacker subculture who do not have the skills and use prewritten programs are referred to as ______.

A) dumpster divers
B) Easter eggs
C) script kiddies
D) rootkids
سؤال
Asserting that criminal behavior is learned via intimate personal groups is a premise for ______.

A) subculture theory
B) routine activity theory
C) differential association theory
D) social disorganization theory
سؤال
Examining trends that are necessary for crime to occur is an element of ______.

A) subculture theory
B) routine activity theory
C) differential association theory
D) social disorganization theory
سؤال
Maneuvering around, trying to access unprotected WiFi networks, is referred to as ______.

A) dumpster diving
B) rootkits
C) script kiddies
D) wardriving
سؤال
Which of the following is not considered one of the responsibilities of the Department of Homeland Security?

A) prevent terrorism and enhance security
B) secure and manage our borders
C) enforce and administer our immigration laws
D) ensure a fast, safe, and effective transportation system
سؤال
Systems utilized by many of the nation's critical infrastructures to provide automated control of the functions of the infrastructure are referred to as ______.

A) firewalls
B) honeypots
C) supervisory control and data acquisition systems
D) intrusion detection systems
سؤال
The ______ is primarily responsible for intelligence interception and interpretation/decryption.

A) Federal Bureau of Investigation
B) National Security Agency
C) Central Intelligence Agency
D) Defense Intelligence Agency
سؤال
According to the text, low socioeconomic status is a predominate marker for engaging in crime in ______.

A) subculture theory
B) routine activity theory
C) differential association theory
D) labeling theory
سؤال
In conjunction with local and tribal agencies, the Department of Homeland Security works to do all of the following except ______.

A) analyze cyberthreats and vulnerabilities
B) prevent threat warnings from becoming public knowledge
C) reduce cyberthreats and vulnerabilities
D) coordinate the response to cyberincidents
سؤال
One of the oldest and largest hacker conventions is known as ______.

A) Comicon
B) DEFCON
C) Black Hat
D) ShmooCOn
سؤال
According to the routine activities theory, crime is more likely to occur if there is ______.

A) a motivated offender
B) appropriate guardianship
C) a suitable target
D) a predetermined location
سؤال
Although multiple agencies play a role in our nation's cybersecurity, leading the way is the ______.

A) Federal Bureau of Investigation
B) National Security Agency
C) Central Intelligence Agency
D) Defense Intelligence Agency
سؤال
Which of the following differential association theory points was not proposed by Edwin Sutherland?

A) Criminal behavior is acquired through interactions with other persons via communication.
B) Learning includes techniques, rationalizations, and attitudes.
C) The process of learning criminal behavior parallels those of any other learning process.
D) Behavior is learned the best in larger social groups.
سؤال
The ______ is primarily responsible for the protection of civilian computers.

A) Department of Defense
B) Department of State
C) Department of Homeland Security
D) Department of Transportation
سؤال
Hacker subcultures may consist of various identifying factors. Which of the following is NOT likely to be one of those factors?

A) like-minded individuals
B) works common within the subculture
C) a dislike for information technology
D) a like for computer programming
سؤال
Albert K. Cohen's subculture theory propositions are based on ______.

A) delinquent adult males
B) delinquent adult females
C) delinquent boys
D) delinquent girls
سؤال
In the 1950s and 1960s, subculture theories began to examine the prevalence of ______.

A) incarcerated females
B) drug abuse among inmates
C) youth gangs
D) racial profiling
سؤال
Cybercrimes operate in a virtual environment, with undefined and specific jurisdictions.
سؤال
What role does guardianship have in crime, according to the routine activities theory? Provide examples of types of guardianship.
سؤال
The idea that people learn to behave in certain ways based on imitating the behavior of those they are close to applies to only conventional behaviors.
سؤال
According to Deputy Attorney General Mark R. Filip, there are three main challenges to policing cybercrimes. What are these? Are there any others that you can think of?
سؤال
The most recent era of local-level policing is known as the ______.

A) Political Era
B) Reform Era
C) Homeland Security Era
D) Community Era
سؤال
Traditional crimes occur in a specific location/jurisdiction(s) and are thus subjected to the rule of law of that specific jurisdiction.
سؤال
An individual who doesn't have the skills to hack on his or her own so uses prewritten programs to do so is referred to as a dumpster diver.
سؤال
The role of local-level agencies in cybersecurity is constantly evolving.
سؤال
Within criminal justice and criminology, subcultures may include the prison subculture, the criminal subculture, the courtroom working group, etc.
سؤال
Public-private partnerships are not necessary for the cybersecurity of our nation.
سؤال
According to the differential association theory, criminal behavior is acquired through interactions with other persons via communication.
سؤال
The first responders to most catastrophic events are usually at the ______ level.

A) local
B) state
C) federal
D) tribal
سؤال
Entities that have resources to put toward security and may not be subjected to the scrutiny and restrictions are usually in the ______.

A) private sector
B) government sector
C) international sector
D) public sector
سؤال
The U.S. government should cooperate not only with national jurisdiction of law enforcement at all levels but the international community and private sector organizations as well.
سؤال
Explain the routine activities theory. What are the three factors associated with this theory? Why is motivation an important component? What role does guardianship have in crime, according to the routine activities theory?
سؤال
The role of ______ hackers in the collaborator effort of cybersecurity is vital.

A) black hat
B) white hat
C) gray hat
D) red hat
سؤال
Explain the differential association theory. Why is it difficult to apply this theory to cybercrime?
سؤال
According to the routine activities theory, guardianship plays a major role in the prevalence of crime.
سؤال
Which of the following was NOT identified as an entity that must collaborate and cooperate in order to enhance cyberterrorism deterrence?

A) citizens
B) hackers
C) international community
D) free Internet service providers
سؤال
Explain the hacker subculture. What is it? Is it comparable to a criminal subculture?
فتح الحزمة
قم بالتسجيل لفتح البطاقات في هذه المجموعة!
Unlock Deck
Unlock Deck
1/40
auto play flashcards
العب
simple tutorial
ملء الشاشة (f)
exit full mode
Deck 9: Cybersecurity Operations
1
The leading agency for investigating cyberattacks by criminals, overseas adversaries, and terrorists is known as the ______.

A) Central Intelligence Agency
B) National Security Agency
C) Federal Bureau of Investigation
D) Defense Intelligence Agency
C
2
An ethnic, regional, economic, or social group exhibiting characteristic patterns of behavior sufficient to distinguish it from others within an embracing culture or society is referred to as a ______.

A) group
B) subculture
C) faction
D) division
B
3
Undocumented, nonmalicious, surprises installed on a program by the creator are referred to as ______.

A) payloads
B) rootkits
C) Easter eggs
D) dumpster dives
C
4
Outsiders in the hacker subculture who do not have the skills and use prewritten programs are referred to as ______.

A) dumpster divers
B) Easter eggs
C) script kiddies
D) rootkids
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 40 في هذه المجموعة.
فتح الحزمة
k this deck
5
Asserting that criminal behavior is learned via intimate personal groups is a premise for ______.

A) subculture theory
B) routine activity theory
C) differential association theory
D) social disorganization theory
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 40 في هذه المجموعة.
فتح الحزمة
k this deck
6
Examining trends that are necessary for crime to occur is an element of ______.

A) subculture theory
B) routine activity theory
C) differential association theory
D) social disorganization theory
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 40 في هذه المجموعة.
فتح الحزمة
k this deck
7
Maneuvering around, trying to access unprotected WiFi networks, is referred to as ______.

A) dumpster diving
B) rootkits
C) script kiddies
D) wardriving
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 40 في هذه المجموعة.
فتح الحزمة
k this deck
8
Which of the following is not considered one of the responsibilities of the Department of Homeland Security?

A) prevent terrorism and enhance security
B) secure and manage our borders
C) enforce and administer our immigration laws
D) ensure a fast, safe, and effective transportation system
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 40 في هذه المجموعة.
فتح الحزمة
k this deck
9
Systems utilized by many of the nation's critical infrastructures to provide automated control of the functions of the infrastructure are referred to as ______.

A) firewalls
B) honeypots
C) supervisory control and data acquisition systems
D) intrusion detection systems
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 40 في هذه المجموعة.
فتح الحزمة
k this deck
10
The ______ is primarily responsible for intelligence interception and interpretation/decryption.

A) Federal Bureau of Investigation
B) National Security Agency
C) Central Intelligence Agency
D) Defense Intelligence Agency
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 40 في هذه المجموعة.
فتح الحزمة
k this deck
11
According to the text, low socioeconomic status is a predominate marker for engaging in crime in ______.

A) subculture theory
B) routine activity theory
C) differential association theory
D) labeling theory
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 40 في هذه المجموعة.
فتح الحزمة
k this deck
12
In conjunction with local and tribal agencies, the Department of Homeland Security works to do all of the following except ______.

A) analyze cyberthreats and vulnerabilities
B) prevent threat warnings from becoming public knowledge
C) reduce cyberthreats and vulnerabilities
D) coordinate the response to cyberincidents
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 40 في هذه المجموعة.
فتح الحزمة
k this deck
13
One of the oldest and largest hacker conventions is known as ______.

A) Comicon
B) DEFCON
C) Black Hat
D) ShmooCOn
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 40 في هذه المجموعة.
فتح الحزمة
k this deck
14
According to the routine activities theory, crime is more likely to occur if there is ______.

A) a motivated offender
B) appropriate guardianship
C) a suitable target
D) a predetermined location
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 40 في هذه المجموعة.
فتح الحزمة
k this deck
15
Although multiple agencies play a role in our nation's cybersecurity, leading the way is the ______.

A) Federal Bureau of Investigation
B) National Security Agency
C) Central Intelligence Agency
D) Defense Intelligence Agency
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 40 في هذه المجموعة.
فتح الحزمة
k this deck
16
Which of the following differential association theory points was not proposed by Edwin Sutherland?

A) Criminal behavior is acquired through interactions with other persons via communication.
B) Learning includes techniques, rationalizations, and attitudes.
C) The process of learning criminal behavior parallels those of any other learning process.
D) Behavior is learned the best in larger social groups.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 40 في هذه المجموعة.
فتح الحزمة
k this deck
17
The ______ is primarily responsible for the protection of civilian computers.

A) Department of Defense
B) Department of State
C) Department of Homeland Security
D) Department of Transportation
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 40 في هذه المجموعة.
فتح الحزمة
k this deck
18
Hacker subcultures may consist of various identifying factors. Which of the following is NOT likely to be one of those factors?

A) like-minded individuals
B) works common within the subculture
C) a dislike for information technology
D) a like for computer programming
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 40 في هذه المجموعة.
فتح الحزمة
k this deck
19
Albert K. Cohen's subculture theory propositions are based on ______.

A) delinquent adult males
B) delinquent adult females
C) delinquent boys
D) delinquent girls
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 40 في هذه المجموعة.
فتح الحزمة
k this deck
20
In the 1950s and 1960s, subculture theories began to examine the prevalence of ______.

A) incarcerated females
B) drug abuse among inmates
C) youth gangs
D) racial profiling
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 40 في هذه المجموعة.
فتح الحزمة
k this deck
21
Cybercrimes operate in a virtual environment, with undefined and specific jurisdictions.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 40 في هذه المجموعة.
فتح الحزمة
k this deck
22
What role does guardianship have in crime, according to the routine activities theory? Provide examples of types of guardianship.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 40 في هذه المجموعة.
فتح الحزمة
k this deck
23
The idea that people learn to behave in certain ways based on imitating the behavior of those they are close to applies to only conventional behaviors.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 40 في هذه المجموعة.
فتح الحزمة
k this deck
24
According to Deputy Attorney General Mark R. Filip, there are three main challenges to policing cybercrimes. What are these? Are there any others that you can think of?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 40 في هذه المجموعة.
فتح الحزمة
k this deck
25
The most recent era of local-level policing is known as the ______.

A) Political Era
B) Reform Era
C) Homeland Security Era
D) Community Era
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 40 في هذه المجموعة.
فتح الحزمة
k this deck
26
Traditional crimes occur in a specific location/jurisdiction(s) and are thus subjected to the rule of law of that specific jurisdiction.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 40 في هذه المجموعة.
فتح الحزمة
k this deck
27
An individual who doesn't have the skills to hack on his or her own so uses prewritten programs to do so is referred to as a dumpster diver.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 40 في هذه المجموعة.
فتح الحزمة
k this deck
28
The role of local-level agencies in cybersecurity is constantly evolving.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 40 في هذه المجموعة.
فتح الحزمة
k this deck
29
Within criminal justice and criminology, subcultures may include the prison subculture, the criminal subculture, the courtroom working group, etc.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 40 في هذه المجموعة.
فتح الحزمة
k this deck
30
Public-private partnerships are not necessary for the cybersecurity of our nation.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 40 في هذه المجموعة.
فتح الحزمة
k this deck
31
According to the differential association theory, criminal behavior is acquired through interactions with other persons via communication.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 40 في هذه المجموعة.
فتح الحزمة
k this deck
32
The first responders to most catastrophic events are usually at the ______ level.

A) local
B) state
C) federal
D) tribal
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 40 في هذه المجموعة.
فتح الحزمة
k this deck
33
Entities that have resources to put toward security and may not be subjected to the scrutiny and restrictions are usually in the ______.

A) private sector
B) government sector
C) international sector
D) public sector
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 40 في هذه المجموعة.
فتح الحزمة
k this deck
34
The U.S. government should cooperate not only with national jurisdiction of law enforcement at all levels but the international community and private sector organizations as well.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 40 في هذه المجموعة.
فتح الحزمة
k this deck
35
Explain the routine activities theory. What are the three factors associated with this theory? Why is motivation an important component? What role does guardianship have in crime, according to the routine activities theory?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 40 في هذه المجموعة.
فتح الحزمة
k this deck
36
The role of ______ hackers in the collaborator effort of cybersecurity is vital.

A) black hat
B) white hat
C) gray hat
D) red hat
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 40 في هذه المجموعة.
فتح الحزمة
k this deck
37
Explain the differential association theory. Why is it difficult to apply this theory to cybercrime?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 40 في هذه المجموعة.
فتح الحزمة
k this deck
38
According to the routine activities theory, guardianship plays a major role in the prevalence of crime.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 40 في هذه المجموعة.
فتح الحزمة
k this deck
39
Which of the following was NOT identified as an entity that must collaborate and cooperate in order to enhance cyberterrorism deterrence?

A) citizens
B) hackers
C) international community
D) free Internet service providers
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 40 في هذه المجموعة.
فتح الحزمة
k this deck
40
Explain the hacker subculture. What is it? Is it comparable to a criminal subculture?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 40 في هذه المجموعة.
فتح الحزمة
k this deck
locked card icon
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 40 في هذه المجموعة.