Deck 13: Cyberdeviance
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
فتح الحزمة
قم بالتسجيل لفتح البطاقات في هذه المجموعة!
Unlock Deck
Unlock Deck
1/50
العب
ملء الشاشة (f)
Deck 13: Cyberdeviance
1
Why is it challenging to enforce state and federal legislation against computer crimes?
A) Enforcement is financially prohibitive.
B) Corporations do not like admitting their systems were vulnerable.
C) Those who wrote the laws are not current with the latest technology.
D) Cybercriminals are innovative when committing computer crimes.
A) Enforcement is financially prohibitive.
B) Corporations do not like admitting their systems were vulnerable.
C) Those who wrote the laws are not current with the latest technology.
D) Cybercriminals are innovative when committing computer crimes.
B
2
What is a primary issue when drafting legislation against computer crime?
A) Laws must allow for technological innovation.
B) Laws must not be too broad.
C) Laws must not infringe on constitutionally protected rights.
D) Laws must cover a wide variety of possible crimes.
A) Laws must allow for technological innovation.
B) Laws must not be too broad.
C) Laws must not infringe on constitutionally protected rights.
D) Laws must cover a wide variety of possible crimes.
C
3
Why are corporations unwilling to admit they were the victim of cybercrime?
A) Consumer confidence may erode.
B) They will be targeted for additional crimes.
C) They will be charged in connection with any crime that affects consumers.
D) Corporations commit most computer crimes.
A) Consumer confidence may erode.
B) They will be targeted for additional crimes.
C) They will be charged in connection with any crime that affects consumers.
D) Corporations commit most computer crimes.
A
4
Which of the following statements about the cost of cybercrime is true?
A) The cost of cybercrime is decreasing.
B) The cost of cybercrime is increasing.
C) The cost of cybercrime is impossible to estimate.
D) Statistics on the costs of cybercrime vary wildly from year to year.
A) The cost of cybercrime is decreasing.
B) The cost of cybercrime is increasing.
C) The cost of cybercrime is impossible to estimate.
D) Statistics on the costs of cybercrime vary wildly from year to year.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
5
Grace walks into the offices of a major movie studio, downloads thousands of confidential files, and uses this information to blackmail several people. What kind of cybercrime is this?
A) computer as incidental to other crime
B) computers as instruments of crime
C) computer as a target
D) crime associated with the prevalence of computers
A) computer as incidental to other crime
B) computers as instruments of crime
C) computer as a target
D) crime associated with the prevalence of computers
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
6
What category of cybercrime is using a computer to store client lists for illegal gambling operations?
A) computer as incidental to other crime
B) computers as instruments of crime
C) computer as a target
D) crime associated with the prevalence of computers
A) computer as incidental to other crime
B) computers as instruments of crime
C) computer as a target
D) crime associated with the prevalence of computers
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
7
Phillipe sells counterfeit copies of popular computer programs, such as Adobe Acrobat. What kind of cybercrime is this?
A) computer as incidental to other crime
B) computers as instruments of crime
C) computer as a target
D) crime associated with the prevalence of computers
A) computer as incidental to other crime
B) computers as instruments of crime
C) computer as a target
D) crime associated with the prevalence of computers
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
8
Graciela is debugging a program for her company using installed computer software that allows her to make changes without going through complicated access procedures. What is this kind of software called?
A) workaround
B) logic bomb
C) Trojan horse
D) trap door
A) workaround
B) logic bomb
C) Trojan horse
D) trap door
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
9
What are salami attacks used for?
A) It clones cell phone numbers.
B) It erases someone's identity.
C) theft
D) spying
A) It clones cell phone numbers.
B) It erases someone's identity.
C) theft
D) spying
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
10
How can a virus infect a computer?
A) The victim downloads a file.
B) The victim buys an item from an unsecured website.
C) The victim leaves the log-in data on a public computer.
D) The victim sends personal information in an e-mail.
A) The victim downloads a file.
B) The victim buys an item from an unsecured website.
C) The victim leaves the log-in data on a public computer.
D) The victim sends personal information in an e-mail.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
11
A cyberdeviant named ScareBear systematically violates the security programs guarding a country's nuclear power plants. He intends to gain political concessions by threatening to initiate a nuclear meltdown. What category of cyberdeviant is ScareBear?
A) malicious hacker
B) career criminal
C) malcontent/addict
D) extreme advocate
A) malicious hacker
B) career criminal
C) malcontent/addict
D) extreme advocate
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
12
MotherofFlagons is driven to explore what computers can do. She is curious and will spend days at a time testing government security systems and designing work-arounds for accessing systems she is not supposed to access. She intends no harm, she just loves the challenge. What category of cyberdeviant is MotherofFlagons?
A) cracker
B) hacker
C) cyberpunk
D) coder
A) cracker
B) hacker
C) cyberpunk
D) coder
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
13
What is the primary difference between hackers and crackers?
A) Hackers break the law; crackers do not.
B) Crackers are driven by the quest for information; hackers want money.
C) Hackers do not intend harm; crackers do.
D) Hackers are Generation X; crackers are millennial.
A) Hackers break the law; crackers do not.
B) Crackers are driven by the quest for information; hackers want money.
C) Hackers do not intend harm; crackers do.
D) Hackers are Generation X; crackers are millennial.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
14
Why do elite hackers value disembodied anonymity?
A) It makes the subculture more egalitarian.
B) It makes it easier to violate the law.
C) It ensures they are protected from criminal hackers.
D) It disconnects them from a society that does not appreciate them.
A) It makes the subculture more egalitarian.
B) It makes it easier to violate the law.
C) It ensures they are protected from criminal hackers.
D) It disconnects them from a society that does not appreciate them.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
15
Jackalope4U is able to interact with message boards without revealing any clues of their social status, race, class, age, or gender. As an elite hacker, they value this ______, because it means they are judged on their accomplishments alone.
A) disembodied anonymity
B) ethical fluidity
C) antipathy gap
D) dialectical materialism
A) disembodied anonymity
B) ethical fluidity
C) antipathy gap
D) dialectical materialism
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
16
What makes cyberdeviant subculture possible?
A) the proliferation of smartphones
B) lack of government oversight
C) inadequate international laws
D) disembodied anonymity
A) the proliferation of smartphones
B) lack of government oversight
C) inadequate international laws
D) disembodied anonymity
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
17
Which of the following statements about elite hackers is true?
A) Elite hackers are strong individualists.
B) Elite hackers view themselves as part of an inner circle.
C) Elite hackers enforce a code of behavior for lesser hackers.
D) Elite hackers see themselves as elite spies.
A) Elite hackers are strong individualists.
B) Elite hackers view themselves as part of an inner circle.
C) Elite hackers enforce a code of behavior for lesser hackers.
D) Elite hackers see themselves as elite spies.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
18
What is a major ethical position of elite cyberdeviants?
A) sharing government secrets in public forums
B) collecting the private information of others
C) protecting the property of others against destruction
D) networking with other elite hackers
A) sharing government secrets in public forums
B) collecting the private information of others
C) protecting the property of others against destruction
D) networking with other elite hackers
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
19
Which of the following is an ethical standard of elite cyberdeviants?
A) leave no trace of security breaches
B) do not irreparably damage a legitimate user's information
C) report security vulnerabilities
D) leave a unique calling card to mark your successful breach of a target
A) leave no trace of security breaches
B) do not irreparably damage a legitimate user's information
C) report security vulnerabilities
D) leave a unique calling card to mark your successful breach of a target
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
20
According to Donn Parker, how do cyberdeviants justify what they do?
A) They argue the harm they do is limited to computers.
B) They argue the government is too restrictive.
C) They argue that they provide an important security service.
D) They argue that their targets commit more cybercrime than they do.
A) They argue the harm they do is limited to computers.
B) They argue the government is too restrictive.
C) They argue that they provide an important security service.
D) They argue that their targets commit more cybercrime than they do.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
21
What is the primary motivation of most cyberdeviants?
A) destroying corporations
B) creating disorder
C) a sense of accomplishment
D) anarchy
A) destroying corporations
B) creating disorder
C) a sense of accomplishment
D) anarchy
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
22
What is the "Robin Hood" syndrome?
A) a justification that cybercriminals use for stealing from large corporations
B) the idea that repressive governments actually create cybercriminals
C) the idea that cybercriminals are psychologically immature
D) a rationalization that cybercriminals are actually helping identify vulnerabilities in security systems
A) a justification that cybercriminals use for stealing from large corporations
B) the idea that repressive governments actually create cybercriminals
C) the idea that cybercriminals are psychologically immature
D) a rationalization that cybercriminals are actually helping identify vulnerabilities in security systems
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
23
Which theory of cyberdeviance would focus on the way that cyberdeviants can reject both the conventional goals and the conventional means of attaining those goals, replacing them with new, cyber-centric, means and goals?
A) social control
B) rational choice
C) differential association
D) anomie
A) social control
B) rational choice
C) differential association
D) anomie
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
24
A cracker with the handle DeathFromAbove rationalizes her cyberdeviance by explaining that she only steals from corporate bank accounts in order to donate money to public libraries. What technique of neutralization is she using?
A) denial of victim
B) appeal to higher loyalties
C) denial of injury
D) denial of responsibility
A) denial of victim
B) appeal to higher loyalties
C) denial of injury
D) denial of responsibility
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
25
A cracker with the handle MaxZoom rationalizes his cyberdeviance by explaining that he uploads pirated media files because it doesn't hurt people, just faceless corporations. What technique of neutralization is he using?
A) condemnation of the condemners
B) denial of injury
C) denial of victim
D) appeal to higher loyalties
A) condemnation of the condemners
B) denial of injury
C) denial of victim
D) appeal to higher loyalties
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
26
It is easy to draft cybercrime legislation that is both constitutionally defensible and legally enforceable.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
27
There is no legislation against cybercrime at the federal level.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
28
China is the most frequent point of origin for cybercrime offenses.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
29
The demographic category with the highest rate of loss to cybercrime is those aged 50-59.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
30
Trap doors have no purpose beyond allowing cybercriminal access to otherwise secure data.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
31
A Trojan horse is one kind of virus delivery system.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
32
Mae would be classified a hacker, because she has no intention of committing cybercrime, though she likes to test her skills by attempting to breach financial institutions' computer network.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
33
Crackers are a kind of cybercriminals.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
34
The cyberdeviant subculture is based on real-world commonalities.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
35
Cyberdeviant subculture is organized into a hierarchy along strict race and gender lines.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
36
The majority of members within the cyberdeviant subculture believe that information should be free.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
37
The majority of members within the cyberdeviant subculture believe that computers make life worse.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
38
A hacker's status, power, and prestige depend upon recognition from others within the hacker subculture.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
39
Most cyberdeviants are motivated by financial gain.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
40
According to rational choice theory, cyberdeviants commit their crimes impulsively.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
41
How is a worm different from a virus?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
42
Distinguish between a hacker and a cracker.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
43
Describe three primary forms of unauthorized computer use.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
44
Distinguish between technovandalism and technotrespass.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
45
Apply the rational choice theory to cybercrime.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
46
Distinguish between the four categories of computer crime.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
47
Compare and contrast the four types of computer hackers described by Marc Rogers.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
48
Apply techniques of neutralization that offenders may use to justify cyberdeviance.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
49
Summarize methods of cyberdeviance.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
50
Distinguish between the seven types of cybercriminals identified by Donn Parker.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck

