Deck 7: Information Technology Crime

ملء الشاشة (f)
exit full mode
سؤال
What is the definition of the following word:
-Malware.
استخدم زر المسافة أو
up arrow
down arrow
لقلب البطاقة.
سؤال
What is the definition of the following word:
-Phishing.
سؤال
What is the definition of the following word:

-Worm
سؤال
What is the definition of the following word:

-Trojan
سؤال
What is the definition of the following word:
-Denial-of-service attack.
سؤال
This term defines hackers that break security to test their own systems, to test other systems and to gain knowledge about computer security for ethical and educational reasons.

A) White-hat hacker
B) Black-hat hacker
C) Gray-hat hacker
D) All of the above
سؤال
These hackers break into networks with malicious intent to perpetrate IT crime.

A) White-hat hackers
B) Black-hat hacker
C) Gray-hat hacker
D) All of the above
سؤال
These hackers break into computer networks not necessarily to do damage, but to seek out exploits.

A) White-hat hackers
B) Black-hat hackers
C) Gray-hat hackers
D) All of the above
سؤال
Which activities are considered IT crime?

A) Unauthorized access
B) Computer-mediated espionage
C) Illicit tampering with files or data
D) All of the above
سؤال
Symantec estimated that the global direct cost of IT crime per victim at what dollar amount?

A) 100
B) 138
C) 298
D) 456
سؤال
This term is a derogatory term for a person who uses pre-written software to break into networks.

A) Black-hat hackers
B) White-hat hackers
C) Gray-hat hackers
D) Script kiddie
سؤال
This is a program that inserts copies of itself into other computer programs, data files, or sectors of the hard drive.

A) Viruses
B) Worms
C) Trojans
D) Denial-of service attacks
سؤال
This is much like a virus in that it replicates itself but does not require a host file or human action.

A) Viruses
B) Worms
C) Trojans
D) Denial-of service attacks
سؤال
This is a dangerous piece of malware that appears to be useful software.

A) Viruses
B) Trojans
C) Worms
D) Denial-of service attacks
سؤال
In this attack a perpetrator attempts to prevent users from accessing a server's information or services such as e-mails.

A) Viruses
B) Worms
C) Trojans
D) Denial-of service
سؤال
This is an attempt to acquire personal information such as usernames and passwords.

A) Viruses
B) Worms
C) Phishing
D) Trojan
سؤال
These attacks are becoming more common in parts of the world such as Asia using applications.

A) Mobile device attacks
B) Worms
C) Viruses
D) Phishing
سؤال
Which of the following resources do developing countries lack to build against IT crime?

A) Human resources
B) Technical resources
C) Financial resources
D) All of the above
سؤال
What factor affects the availability of security products written for that market?

A) Financial resources
B) Market size
C) Technical resources
D) Human resources
سؤال
Which are examples of the concentration of IT crime in specific sectors?

A) Online gaming industry in China
B) Theft of banking passwords in Brazil
C) Employees of IT firms in India
D) All of the above
سؤال
Due to the tradition of high skill in mathematics, physics, and computing, many IT attacks originate from what area of the world?

A) China
B) India
C) Eastern Europe and Russia
D) United States
سؤال
Perpetrators with these motives target information that may be used or sold in order to enrich themselves.

A) Economic motives
B) Political motives
C) Personal motives
D) All of the above
سؤال
Perpetrators with these motives target a country's resources for reasons that have to do with differing political viewpoints or philosophies, or to neutralize a country's perceived threat.

A) Economic motives
B) Political motives
C) Personal motives
D) All of the above
سؤال
Perpetrators with these motives are often important only to an individual or a small group of people.

A) Economic motives
B) Political motives
C) Personal motives
D) All of the above
سؤال
Black-hat hackers may be contracted or employed to test security on a system.
سؤال
Black-hat hackers seek to make systems unusable or to steal data or other resources.
سؤال
Gray-hat hackers may alert the owner of a network and offer to correct the vulnerability for a fee.
سؤال
IT crime are criminal offenses that are committed with devices that communicate information to one another via networks.
سؤال
Mobile devices cannot be used for IT crime.
سؤال
IT crime costs the global economy an estimated $388 million in 2012.
سؤال
Industrialized countries, which depend heavily on information technology, are the most likely to have IT crime legislation.
سؤال
Lightly industrialized countries are more likely to have IT crime legislation.
سؤال
IT crime victims often do not realize they have been attacked.
سؤال
The most common devices used for IT crimes are computers and mobile phones.
سؤال
Mobile device attacks are typically imported through applications.
سؤال
The weak rule of law in developing countries makes the commission of IT crimes more difficult.
سؤال
Perpetrators in developing countries are more confident than those in developed countries.
سؤال
Many new Internet users in developing economies understand how the Internet works or how to secure their computers against attacks.
سؤال
If a security technology company cannot make a profit in a developing market, then it will not produce software for that market.
سؤال
Many IT attacks originate from Eastern Europe and Russia.
سؤال
In regions where IT jobs are plentiful, people skilled in math and science turn to IT crime.
سؤال
Political IT crime consists of criminal offenses that are committed on a computer-based network for political reasons.
سؤال
Trespassing on information networks without doing any damage or leaving any trace of the visit is the least serious IT crime.
سؤال
The Pirate Bay was a file-hosting site that operated from 2005 to 2012. The Pirate Bay had servers throughout the world, including 525 servers in the state of Virginia, United States, and 630 in the Netherlands.
سؤال
Megaupload was established in Sweeden in 2001, and is a website that provides BitTorrent files and links for peer-to-peer file sharing.
سؤال
What does a worm do to a computer?
سؤال
How can a Trojan be disguised?
سؤال
Explain the difference between phishing and a Trojan.
سؤال
What was decided upon in the Budapest Convention?
فتح الحزمة
قم بالتسجيل لفتح البطاقات في هذه المجموعة!
Unlock Deck
Unlock Deck
1/49
auto play flashcards
العب
simple tutorial
ملء الشاشة (f)
exit full mode
Deck 7: Information Technology Crime
1
What is the definition of the following word:
-Malware.
Software intended to damage or exploit computers and networks.
2
What is the definition of the following word:
-Phishing.
Posing as an established enterprise in an e-mail in order to trick the recipient into revealing information that may be used for identity theft.
3
What is the definition of the following word:

-Worm
Much like a virus in that it replicates itself, but unlike a virus, worms do not require a host file or human action to propagate.
4
What is the definition of the following word:

-Trojan
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 49 في هذه المجموعة.
فتح الحزمة
k this deck
5
What is the definition of the following word:
-Denial-of-service attack.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 49 في هذه المجموعة.
فتح الحزمة
k this deck
6
This term defines hackers that break security to test their own systems, to test other systems and to gain knowledge about computer security for ethical and educational reasons.

A) White-hat hacker
B) Black-hat hacker
C) Gray-hat hacker
D) All of the above
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 49 في هذه المجموعة.
فتح الحزمة
k this deck
7
These hackers break into networks with malicious intent to perpetrate IT crime.

A) White-hat hackers
B) Black-hat hacker
C) Gray-hat hacker
D) All of the above
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 49 في هذه المجموعة.
فتح الحزمة
k this deck
8
These hackers break into computer networks not necessarily to do damage, but to seek out exploits.

A) White-hat hackers
B) Black-hat hackers
C) Gray-hat hackers
D) All of the above
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 49 في هذه المجموعة.
فتح الحزمة
k this deck
9
Which activities are considered IT crime?

A) Unauthorized access
B) Computer-mediated espionage
C) Illicit tampering with files or data
D) All of the above
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 49 في هذه المجموعة.
فتح الحزمة
k this deck
10
Symantec estimated that the global direct cost of IT crime per victim at what dollar amount?

A) 100
B) 138
C) 298
D) 456
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 49 في هذه المجموعة.
فتح الحزمة
k this deck
11
This term is a derogatory term for a person who uses pre-written software to break into networks.

A) Black-hat hackers
B) White-hat hackers
C) Gray-hat hackers
D) Script kiddie
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 49 في هذه المجموعة.
فتح الحزمة
k this deck
12
This is a program that inserts copies of itself into other computer programs, data files, or sectors of the hard drive.

A) Viruses
B) Worms
C) Trojans
D) Denial-of service attacks
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 49 في هذه المجموعة.
فتح الحزمة
k this deck
13
This is much like a virus in that it replicates itself but does not require a host file or human action.

A) Viruses
B) Worms
C) Trojans
D) Denial-of service attacks
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 49 في هذه المجموعة.
فتح الحزمة
k this deck
14
This is a dangerous piece of malware that appears to be useful software.

A) Viruses
B) Trojans
C) Worms
D) Denial-of service attacks
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 49 في هذه المجموعة.
فتح الحزمة
k this deck
15
In this attack a perpetrator attempts to prevent users from accessing a server's information or services such as e-mails.

A) Viruses
B) Worms
C) Trojans
D) Denial-of service
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 49 في هذه المجموعة.
فتح الحزمة
k this deck
16
This is an attempt to acquire personal information such as usernames and passwords.

A) Viruses
B) Worms
C) Phishing
D) Trojan
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 49 في هذه المجموعة.
فتح الحزمة
k this deck
17
These attacks are becoming more common in parts of the world such as Asia using applications.

A) Mobile device attacks
B) Worms
C) Viruses
D) Phishing
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 49 في هذه المجموعة.
فتح الحزمة
k this deck
18
Which of the following resources do developing countries lack to build against IT crime?

A) Human resources
B) Technical resources
C) Financial resources
D) All of the above
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 49 في هذه المجموعة.
فتح الحزمة
k this deck
19
What factor affects the availability of security products written for that market?

A) Financial resources
B) Market size
C) Technical resources
D) Human resources
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 49 في هذه المجموعة.
فتح الحزمة
k this deck
20
Which are examples of the concentration of IT crime in specific sectors?

A) Online gaming industry in China
B) Theft of banking passwords in Brazil
C) Employees of IT firms in India
D) All of the above
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 49 في هذه المجموعة.
فتح الحزمة
k this deck
21
Due to the tradition of high skill in mathematics, physics, and computing, many IT attacks originate from what area of the world?

A) China
B) India
C) Eastern Europe and Russia
D) United States
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 49 في هذه المجموعة.
فتح الحزمة
k this deck
22
Perpetrators with these motives target information that may be used or sold in order to enrich themselves.

A) Economic motives
B) Political motives
C) Personal motives
D) All of the above
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 49 في هذه المجموعة.
فتح الحزمة
k this deck
23
Perpetrators with these motives target a country's resources for reasons that have to do with differing political viewpoints or philosophies, or to neutralize a country's perceived threat.

A) Economic motives
B) Political motives
C) Personal motives
D) All of the above
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 49 في هذه المجموعة.
فتح الحزمة
k this deck
24
Perpetrators with these motives are often important only to an individual or a small group of people.

A) Economic motives
B) Political motives
C) Personal motives
D) All of the above
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 49 في هذه المجموعة.
فتح الحزمة
k this deck
25
Black-hat hackers may be contracted or employed to test security on a system.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 49 في هذه المجموعة.
فتح الحزمة
k this deck
26
Black-hat hackers seek to make systems unusable or to steal data or other resources.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 49 في هذه المجموعة.
فتح الحزمة
k this deck
27
Gray-hat hackers may alert the owner of a network and offer to correct the vulnerability for a fee.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 49 في هذه المجموعة.
فتح الحزمة
k this deck
28
IT crime are criminal offenses that are committed with devices that communicate information to one another via networks.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 49 في هذه المجموعة.
فتح الحزمة
k this deck
29
Mobile devices cannot be used for IT crime.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 49 في هذه المجموعة.
فتح الحزمة
k this deck
30
IT crime costs the global economy an estimated $388 million in 2012.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 49 في هذه المجموعة.
فتح الحزمة
k this deck
31
Industrialized countries, which depend heavily on information technology, are the most likely to have IT crime legislation.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 49 في هذه المجموعة.
فتح الحزمة
k this deck
32
Lightly industrialized countries are more likely to have IT crime legislation.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 49 في هذه المجموعة.
فتح الحزمة
k this deck
33
IT crime victims often do not realize they have been attacked.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 49 في هذه المجموعة.
فتح الحزمة
k this deck
34
The most common devices used for IT crimes are computers and mobile phones.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 49 في هذه المجموعة.
فتح الحزمة
k this deck
35
Mobile device attacks are typically imported through applications.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 49 في هذه المجموعة.
فتح الحزمة
k this deck
36
The weak rule of law in developing countries makes the commission of IT crimes more difficult.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 49 في هذه المجموعة.
فتح الحزمة
k this deck
37
Perpetrators in developing countries are more confident than those in developed countries.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 49 في هذه المجموعة.
فتح الحزمة
k this deck
38
Many new Internet users in developing economies understand how the Internet works or how to secure their computers against attacks.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 49 في هذه المجموعة.
فتح الحزمة
k this deck
39
If a security technology company cannot make a profit in a developing market, then it will not produce software for that market.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 49 في هذه المجموعة.
فتح الحزمة
k this deck
40
Many IT attacks originate from Eastern Europe and Russia.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 49 في هذه المجموعة.
فتح الحزمة
k this deck
41
In regions where IT jobs are plentiful, people skilled in math and science turn to IT crime.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 49 في هذه المجموعة.
فتح الحزمة
k this deck
42
Political IT crime consists of criminal offenses that are committed on a computer-based network for political reasons.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 49 في هذه المجموعة.
فتح الحزمة
k this deck
43
Trespassing on information networks without doing any damage or leaving any trace of the visit is the least serious IT crime.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 49 في هذه المجموعة.
فتح الحزمة
k this deck
44
The Pirate Bay was a file-hosting site that operated from 2005 to 2012. The Pirate Bay had servers throughout the world, including 525 servers in the state of Virginia, United States, and 630 in the Netherlands.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 49 في هذه المجموعة.
فتح الحزمة
k this deck
45
Megaupload was established in Sweeden in 2001, and is a website that provides BitTorrent files and links for peer-to-peer file sharing.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 49 في هذه المجموعة.
فتح الحزمة
k this deck
46
What does a worm do to a computer?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 49 في هذه المجموعة.
فتح الحزمة
k this deck
47
How can a Trojan be disguised?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 49 في هذه المجموعة.
فتح الحزمة
k this deck
48
Explain the difference between phishing and a Trojan.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 49 في هذه المجموعة.
فتح الحزمة
k this deck
49
What was decided upon in the Budapest Convention?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 49 في هذه المجموعة.
فتح الحزمة
k this deck
locked card icon
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 49 في هذه المجموعة.