Deck 10: Investigative Security

ملء الشاشة (f)
exit full mode
سؤال
Although this crime is not new, the Internet is making it one of the signature crimes of the digital era.

A) fraud
B) identity theft
C) financial transaction fraud
D) credit card fraud
استخدم زر المسافة أو
up arrow
down arrow
لقلب البطاقة.
سؤال
In 2000, the FBI teamed with the U.S.Department of Justice and the National White Collar Center to establish the:

A) Internet/cybercrime Network
B) Internet Crime Research Center
C) Internet Crime Complaint Center
D) Internet Cybercrime Network
سؤال
What law made identity theft a federal crime and enabled law enforcement agencies to investigate identity theft crimes?

A) The Identity Theft and Fraud Statute of 1998
B) The Identity Theft Computer Act of 1999
C) The Identity Theft and Assumption Deterrence Act 1998
D) The Identity Theft and Fraudulent Appropriations Act 1998
سؤال
The unlawful misappropriation of money or other things of value by the person to whom it was entrusted (typically an employee) for his or her own use or purpose is called:

A) embezzlement
B) forgery
C) mala in se
D) in flagranti delicti
سؤال
An FBI computer crime and security survey revealed that virus attacks continue to be the source of:

A) proprietary information
B) financial losses
C) the greatest financial loss
D) intellectual property
سؤال
When a program can infect other programs by modifying them or inserting itself into the commands of legitimate programs to wreak havoc, we refer to this process as a:

A) virus
B) thread
C) hard-wire
D) scoop
سؤال
In 2006 it was reported that one of the most common forms of identity theft involved what group using fraudulent social security numbers?

A) illegal immigrants
B) terrorists
C) scam artist
D) miscreants
سؤال
The average victim of identity theft learns of the theft how many months after the theft?

A) Ten
B) Fourteen
C) Twelve
D) Three
سؤال
When computer hackers attempt to shut down a network operation by overloading a system, it is referred to as:

A) denial of service
B) denial of entry
C) log on denial
D) denial of system activation
سؤال
Another type of hacker commits DOS attacks, disseminates spam, and defaces websites, believing they are carrying out civil disobedience and to call attention to an issue by their crime.This type of hacker is called a/n:

A) cyberism
B) hacktivist
C) attack-divas
D) virtual attacks
سؤال
Which of the following is not a security tip given to protect computer users from becoming victims of crime?

A) don't accept cookies
B) do not continually use same password
C) keep anti-virus software updated
D) personally know everyone you exchange emails with
سؤال
Cybercriminals use ____________ names and images to lure internet users who surf the Web for the latest gossip.

A) political figures
B) cybercriminals
C) a-listers
D) mailing lists
سؤال
What has reshaped the way millions of Americans go online?

A) Internet
B) NTCP
C) Cyberlogon
D) Wi-Fi
سؤال
This technique in identity theft involves the sending of e-mail messages to online payment accounts to update their records with confidential information that is then used by the identity thieves:

A) viruses
B) worm holes
C) phishing
D) pooling
سؤال
What allows an internet user an opportunity to contact virtually anyone with internet access with little fear of being identified or arrested?

A) cyberhacker
B) anonymity
C) crunchers
D) ISP's
سؤال
Sophisticated criminals use ____________________ to cover up their actions and hack into systems of unsuspecting consumers.

A) unsecured computer terminals
B) unsecured Wi-Fi networks
C) unsecured computer systems
D) unsecured intranet systems
سؤال
Cybercrime falls into three categories: a computer is a target of criminal activity; a computer is an integral part of the crime, and

A) the computer is an incidental part of the crime
B) the computer system is used to commit the crime
C) the computer is not related to the crime
D) the computer hardware is the integral part of the crime
سؤال
One of the best methods to stop a virus by a file that arrives from the Internet is to:

A) never turn the computer on unless prompted by a known source
B) only use cable systems, not telephone systems
C) not open the file in the first place
D) save it first, and then open it
سؤال
The IC3 2004 Internet Fraud Crime Report indicated that _____________ is by far the most reported computer offense.

A) hacking
B) internet auction fraud
C) computer bilking
D) financial transaction fraud
سؤال
Any illegal behavior directed by means of electronic operations that targets the security of computer systems and the data processed by them is generally referred to as:

A) cybercrime
B) cyber chips
C) chipping
D) wormholes
سؤال
_______________ are the basic building blocks of restricting network traffic and providing audit trails.
سؤال
A full directory listing should be made to include:

A) GUI listing
B) graphology
C) ownership
D) folder structure
سؤال
_______________ puts information into algorithms to scramble information that is difficult to decipher until the changes are reversed.
سؤال
The Internet Crime Complaint Center's 2005 report indicated that Internet auction fraud was the most reported offense.
سؤال
One major new problem for security personnel and public policing is the use of the computer for cyberstalking.
سؤال
This interesting and very subliminal type of virus includes virus hoaxes and other types of chain letters, erroneous security alerts.It can be used to sway, influence or deter your actions.Even the military is researching its potential.

A) hooks
B) rubes
C) memetic
D) vulcan mind meld (VMM)
سؤال
The target of identity thieves is an often a consumer with poor credit because they will not notice a problem with their credit history.
سؤال
Companies continue to implement and improve various security measures, such as _____________, which restrict unlawful access and protect system integrity.
سؤال
According to the Bureau of Justice Statistics, a small percentage of companies have been a victim of cybercrime, but they continually review their software to prevent themselves from becoming victims anyways.
سؤال
In 2000, more than a quarter of the government's major agencies failed a computer security review.
سؤال
Banks have been pressured by government officials to improve their password protection for online banking.
سؤال
Establishing a pattern of ____________ is paramount to the investigation and success of prosecution in a sexual misconduct case.
سؤال
Computer hacking is the willful and malicious penetration of a computer system to achieve some purpose.
سؤال
_______________ use unique physical characteristics to identify an individual and give them access to a secure area.
سؤال
People with little technical knowledge can become computer hackers and system crackers just with the information available on the Internet.
سؤال
This virus, like the earlier 1999 Melissa virus, was activated when a user clicked on an e-mail attachment, and it was propagated automatically to all the e-mail addresses found on the user's computer.

A) The Love Bug
B) Borne Identity
C) Gotcha!
D) Spider's Web
سؤال
The typical ____________ investigation begins with a complaint from a citizen that they have been become a victim of a crime.
سؤال
Digital information electronically delivered from one computer system to another, known as "soft goods," has eliminated the temporal and geographic limitations of:

A) carnivores
B) drive transfer
C) sneakernets
D) cryptography
سؤال
Using algorithms to scramble the information on a computer so that the information is not usable unless the changes are reversed, is referred to as:

A) encryption
B) krypton
C) calligraphy
D) stenography
سؤال
Worms copy themselves across systems and networks without attaching to a host program and use the Internet to spread themselves.
سؤال
Describe the concept of phishing or spoofing and how it may be used in identity theft.
سؤال
Recent FCC (2007) rules make broadband Internet providers and voice-over Internet protocol companies subject to the 1994 federal law, the Communications Assistance for Law Enforcement Act, which requires telecom carriers to design their networks so they can quickly intercept communications and deliver them to the government when presented with a ________________________.
سؤال
Cybercrime fall into three categories.List the three categories and describe how they are utilized.
سؤال
The first investigative step in computer fraud, etc., is to find the ________ ______________ address of the individual that defrauded the complainant.
سؤال
What is the purpose of the Internet Crime Complaint Center and how should private security personnel utilize this?
سؤال
The most useful information is who __________ for various aspects of the spam operation.
سؤال
List and describe the top ten tips that can be utilized to improve your computer security.
سؤال
Discuss the concepts of CERT and CIRT teams.Why are these teams important to computer security?
سؤال
The FBI designed and developed a sophisticated electronic surveillance and monitoring device, now called DCS1000, which is a digital collector of data.This device provides the FBI with a "surgical" ability to intercept and collect communications that are the subject of a lawful court order while ignoring those which they are not authorized to intercept.Its original name was _____________.
فتح الحزمة
قم بالتسجيل لفتح البطاقات في هذه المجموعة!
Unlock Deck
Unlock Deck
1/49
auto play flashcards
العب
simple tutorial
ملء الشاشة (f)
exit full mode
Deck 10: Investigative Security
1
Although this crime is not new, the Internet is making it one of the signature crimes of the digital era.

A) fraud
B) identity theft
C) financial transaction fraud
D) credit card fraud
B
2
In 2000, the FBI teamed with the U.S.Department of Justice and the National White Collar Center to establish the:

A) Internet/cybercrime Network
B) Internet Crime Research Center
C) Internet Crime Complaint Center
D) Internet Cybercrime Network
C
3
What law made identity theft a federal crime and enabled law enforcement agencies to investigate identity theft crimes?

A) The Identity Theft and Fraud Statute of 1998
B) The Identity Theft Computer Act of 1999
C) The Identity Theft and Assumption Deterrence Act 1998
D) The Identity Theft and Fraudulent Appropriations Act 1998
C
4
The unlawful misappropriation of money or other things of value by the person to whom it was entrusted (typically an employee) for his or her own use or purpose is called:

A) embezzlement
B) forgery
C) mala in se
D) in flagranti delicti
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 49 في هذه المجموعة.
فتح الحزمة
k this deck
5
An FBI computer crime and security survey revealed that virus attacks continue to be the source of:

A) proprietary information
B) financial losses
C) the greatest financial loss
D) intellectual property
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 49 في هذه المجموعة.
فتح الحزمة
k this deck
6
When a program can infect other programs by modifying them or inserting itself into the commands of legitimate programs to wreak havoc, we refer to this process as a:

A) virus
B) thread
C) hard-wire
D) scoop
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 49 في هذه المجموعة.
فتح الحزمة
k this deck
7
In 2006 it was reported that one of the most common forms of identity theft involved what group using fraudulent social security numbers?

A) illegal immigrants
B) terrorists
C) scam artist
D) miscreants
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 49 في هذه المجموعة.
فتح الحزمة
k this deck
8
The average victim of identity theft learns of the theft how many months after the theft?

A) Ten
B) Fourteen
C) Twelve
D) Three
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 49 في هذه المجموعة.
فتح الحزمة
k this deck
9
When computer hackers attempt to shut down a network operation by overloading a system, it is referred to as:

A) denial of service
B) denial of entry
C) log on denial
D) denial of system activation
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 49 في هذه المجموعة.
فتح الحزمة
k this deck
10
Another type of hacker commits DOS attacks, disseminates spam, and defaces websites, believing they are carrying out civil disobedience and to call attention to an issue by their crime.This type of hacker is called a/n:

A) cyberism
B) hacktivist
C) attack-divas
D) virtual attacks
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 49 في هذه المجموعة.
فتح الحزمة
k this deck
11
Which of the following is not a security tip given to protect computer users from becoming victims of crime?

A) don't accept cookies
B) do not continually use same password
C) keep anti-virus software updated
D) personally know everyone you exchange emails with
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 49 في هذه المجموعة.
فتح الحزمة
k this deck
12
Cybercriminals use ____________ names and images to lure internet users who surf the Web for the latest gossip.

A) political figures
B) cybercriminals
C) a-listers
D) mailing lists
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 49 في هذه المجموعة.
فتح الحزمة
k this deck
13
What has reshaped the way millions of Americans go online?

A) Internet
B) NTCP
C) Cyberlogon
D) Wi-Fi
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 49 في هذه المجموعة.
فتح الحزمة
k this deck
14
This technique in identity theft involves the sending of e-mail messages to online payment accounts to update their records with confidential information that is then used by the identity thieves:

A) viruses
B) worm holes
C) phishing
D) pooling
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 49 في هذه المجموعة.
فتح الحزمة
k this deck
15
What allows an internet user an opportunity to contact virtually anyone with internet access with little fear of being identified or arrested?

A) cyberhacker
B) anonymity
C) crunchers
D) ISP's
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 49 في هذه المجموعة.
فتح الحزمة
k this deck
16
Sophisticated criminals use ____________________ to cover up their actions and hack into systems of unsuspecting consumers.

A) unsecured computer terminals
B) unsecured Wi-Fi networks
C) unsecured computer systems
D) unsecured intranet systems
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 49 في هذه المجموعة.
فتح الحزمة
k this deck
17
Cybercrime falls into three categories: a computer is a target of criminal activity; a computer is an integral part of the crime, and

A) the computer is an incidental part of the crime
B) the computer system is used to commit the crime
C) the computer is not related to the crime
D) the computer hardware is the integral part of the crime
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 49 في هذه المجموعة.
فتح الحزمة
k this deck
18
One of the best methods to stop a virus by a file that arrives from the Internet is to:

A) never turn the computer on unless prompted by a known source
B) only use cable systems, not telephone systems
C) not open the file in the first place
D) save it first, and then open it
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 49 في هذه المجموعة.
فتح الحزمة
k this deck
19
The IC3 2004 Internet Fraud Crime Report indicated that _____________ is by far the most reported computer offense.

A) hacking
B) internet auction fraud
C) computer bilking
D) financial transaction fraud
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 49 في هذه المجموعة.
فتح الحزمة
k this deck
20
Any illegal behavior directed by means of electronic operations that targets the security of computer systems and the data processed by them is generally referred to as:

A) cybercrime
B) cyber chips
C) chipping
D) wormholes
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 49 في هذه المجموعة.
فتح الحزمة
k this deck
21
_______________ are the basic building blocks of restricting network traffic and providing audit trails.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 49 في هذه المجموعة.
فتح الحزمة
k this deck
22
A full directory listing should be made to include:

A) GUI listing
B) graphology
C) ownership
D) folder structure
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 49 في هذه المجموعة.
فتح الحزمة
k this deck
23
_______________ puts information into algorithms to scramble information that is difficult to decipher until the changes are reversed.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 49 في هذه المجموعة.
فتح الحزمة
k this deck
24
The Internet Crime Complaint Center's 2005 report indicated that Internet auction fraud was the most reported offense.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 49 في هذه المجموعة.
فتح الحزمة
k this deck
25
One major new problem for security personnel and public policing is the use of the computer for cyberstalking.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 49 في هذه المجموعة.
فتح الحزمة
k this deck
26
This interesting and very subliminal type of virus includes virus hoaxes and other types of chain letters, erroneous security alerts.It can be used to sway, influence or deter your actions.Even the military is researching its potential.

A) hooks
B) rubes
C) memetic
D) vulcan mind meld (VMM)
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 49 في هذه المجموعة.
فتح الحزمة
k this deck
27
The target of identity thieves is an often a consumer with poor credit because they will not notice a problem with their credit history.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 49 في هذه المجموعة.
فتح الحزمة
k this deck
28
Companies continue to implement and improve various security measures, such as _____________, which restrict unlawful access and protect system integrity.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 49 في هذه المجموعة.
فتح الحزمة
k this deck
29
According to the Bureau of Justice Statistics, a small percentage of companies have been a victim of cybercrime, but they continually review their software to prevent themselves from becoming victims anyways.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 49 في هذه المجموعة.
فتح الحزمة
k this deck
30
In 2000, more than a quarter of the government's major agencies failed a computer security review.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 49 في هذه المجموعة.
فتح الحزمة
k this deck
31
Banks have been pressured by government officials to improve their password protection for online banking.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 49 في هذه المجموعة.
فتح الحزمة
k this deck
32
Establishing a pattern of ____________ is paramount to the investigation and success of prosecution in a sexual misconduct case.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 49 في هذه المجموعة.
فتح الحزمة
k this deck
33
Computer hacking is the willful and malicious penetration of a computer system to achieve some purpose.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 49 في هذه المجموعة.
فتح الحزمة
k this deck
34
_______________ use unique physical characteristics to identify an individual and give them access to a secure area.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 49 في هذه المجموعة.
فتح الحزمة
k this deck
35
People with little technical knowledge can become computer hackers and system crackers just with the information available on the Internet.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 49 في هذه المجموعة.
فتح الحزمة
k this deck
36
This virus, like the earlier 1999 Melissa virus, was activated when a user clicked on an e-mail attachment, and it was propagated automatically to all the e-mail addresses found on the user's computer.

A) The Love Bug
B) Borne Identity
C) Gotcha!
D) Spider's Web
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 49 في هذه المجموعة.
فتح الحزمة
k this deck
37
The typical ____________ investigation begins with a complaint from a citizen that they have been become a victim of a crime.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 49 في هذه المجموعة.
فتح الحزمة
k this deck
38
Digital information electronically delivered from one computer system to another, known as "soft goods," has eliminated the temporal and geographic limitations of:

A) carnivores
B) drive transfer
C) sneakernets
D) cryptography
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 49 في هذه المجموعة.
فتح الحزمة
k this deck
39
Using algorithms to scramble the information on a computer so that the information is not usable unless the changes are reversed, is referred to as:

A) encryption
B) krypton
C) calligraphy
D) stenography
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 49 في هذه المجموعة.
فتح الحزمة
k this deck
40
Worms copy themselves across systems and networks without attaching to a host program and use the Internet to spread themselves.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 49 في هذه المجموعة.
فتح الحزمة
k this deck
41
Describe the concept of phishing or spoofing and how it may be used in identity theft.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 49 في هذه المجموعة.
فتح الحزمة
k this deck
42
Recent FCC (2007) rules make broadband Internet providers and voice-over Internet protocol companies subject to the 1994 federal law, the Communications Assistance for Law Enforcement Act, which requires telecom carriers to design their networks so they can quickly intercept communications and deliver them to the government when presented with a ________________________.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 49 في هذه المجموعة.
فتح الحزمة
k this deck
43
Cybercrime fall into three categories.List the three categories and describe how they are utilized.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 49 في هذه المجموعة.
فتح الحزمة
k this deck
44
The first investigative step in computer fraud, etc., is to find the ________ ______________ address of the individual that defrauded the complainant.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 49 في هذه المجموعة.
فتح الحزمة
k this deck
45
What is the purpose of the Internet Crime Complaint Center and how should private security personnel utilize this?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 49 في هذه المجموعة.
فتح الحزمة
k this deck
46
The most useful information is who __________ for various aspects of the spam operation.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 49 في هذه المجموعة.
فتح الحزمة
k this deck
47
List and describe the top ten tips that can be utilized to improve your computer security.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 49 في هذه المجموعة.
فتح الحزمة
k this deck
48
Discuss the concepts of CERT and CIRT teams.Why are these teams important to computer security?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 49 في هذه المجموعة.
فتح الحزمة
k this deck
49
The FBI designed and developed a sophisticated electronic surveillance and monitoring device, now called DCS1000, which is a digital collector of data.This device provides the FBI with a "surgical" ability to intercept and collect communications that are the subject of a lawful court order while ignoring those which they are not authorized to intercept.Its original name was _____________.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 49 في هذه المجموعة.
فتح الحزمة
k this deck
locked card icon
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 49 في هذه المجموعة.