Deck 12: Computer Crime

ملء الشاشة (f)
exit full mode
سؤال
Hacking can include all of the following except:

A)a bank employee checking credit history of bank customers.
B)using the telephone book to target doctors and searching their credit records.
C)checking TRW records for credit ratings.
D)tapping into local credit bureau records.
استخدم زر المسافة أو
up arrow
down arrow
لقلب البطاقة.
سؤال
WAREZ sites encourage which of the following activities?

A)Violent acts
B)Contact with terrorist cells
C)Copying of copyrighted programs
D)Buying cheap foreign computers
سؤال
The acronym EFT stands for:

A)east fun target.
B)ending fund target.
C)earned from trust.
D)electronic funds transfer.
سؤال
Which of the following is unlikely to be classed as a computer crime?

A)Phony tax returns
B)Public intoxication
C)Blowing up toilets
D)Pedophilia
سؤال
Hackers first targeted:

A)the stock exchange.
B)the government.
C)schools.
D)banks.
سؤال
Toll fraud is:

A)avoiding a fee to use a road.
B)avoiding phone charges.
C)avoiding cable television fees.
D)avoiding internet services fees.
سؤال
According to Cressey, embezzlers go through a process that includes all of the following except:

A)opportunity.
B)secret financial problem.
C)remorse.
D)rationalizing.
سؤال
The Masters of Destruction (MOD) corrupted the databases of all of the following companies except:

A)ITT.
B)Sprint.
C)Pacific Bell.
D)Nynex.
سؤال
In 1996 the General Accounting Office said that hackers had targeted the Pentagon __________ times and gained entry 2 of every 3 times.

A)250,000
B)100,000
C)half a million
D)a million
سؤال
Showoffs have which of the following qualities?

A)Goal is to do the most damage
B)Goal is fun, not profit
C)Coasting along looking for doors to open
D)Goal is breaking in
سؤال
According to the text, the broad but somewhat more specific definition of computer crime can be described as:

A)destruction, theft, unauthorized or illegal use, modification or copying of information, programs, services, equipment, or communication networks.
B)a crime that could not be committed without a computer.
C)crimes using a computer to accomplish their ends.
D)a computer or its periphery used as a weapon.
سؤال
The term "hacker" can include all of the following except a(n):

A)norm-violating individual.
B)accidental tourist.
C)curious individual.
D)computer virtuoso.
سؤال
According to the text, all of the following have been invaded to get credit and debit card information except:

A)Western Union.
B)Yahoo.com.
C)America Online.
D)Egghead.com.
سؤال
Malicious hacking, affecting national security, has affected all of the following except:

A)White House computers.
B)Pacific Fleet computers.
C)Congressional committee files.
D)Boeing Corporation.
سؤال
The average bank robbery nets approximately:

A)$1,200.
B)$3,200.
C)$5,400.
D)$2,100.
سؤال
Crackers break which of the following?

A)Government security codes
B)Copy protection codes
C)Password codes
D)Access codes
سؤال
In the 1970s a Los Angeles-based insurance company programmed its computers to do all of the following except:

A)fail to pay legitimate claims.
B)sell fake policies to other companies.
C)issue policies on people who did not exist.
D)use reinsurance to disguise indebtedness.
سؤال
Computer crimes may have begun with the use of the blue box. The blue box involved which instrument?

A)Phones
B)Radios
C)Televisions
D)Stereos
سؤال
Which one of the following crimes could not be classified as a computer crime?

A)Espionage
B)Scams
C)Assault
D)Sabotage
سؤال
An authorized program planted on a computer is known as a(n):

A)Trojan Horse.
B)Achilles Heel.
C)Sword of Damocles.
D)Cyclops Eye.
سؤال
Computer crime has become increasingly globalized.
سؤال
Mafiaboy activities affected all of the following except:

A)eBay.
B)Buy.com.
C)Yahoo.com.
D)Amazon.com.
سؤال
Mafiaboy turned out to be a(n) ____________ Canadian.

A)25-year-old
B)12-year-old
C)15-year-old
D)18-year-old
سؤال
The Nigerian scam involved:

A)contributions to overthrow Communist Nigerian government.
B)a fake charity for Nigerian refugees.
C)a smuggling operation to get dissenters out of Nigeria.
D)a ploy using deceptive emails and stories of sequestered funds
سؤال
International cooperation in regards to stealing software has faltered because of minimal economic impact.
سؤال
Stealth programs:

A)hide from virus protection programs.
B)are triggered at some point in the future.
C)infect the host computer.
D)multiply.
سؤال
Playpen-mentality hackers have the goal of breaking in.
سؤال
Back door programs:

A)allow entry at will.
B)insert advertisements.
C)attack specific programs.
D)look for passwords.
سؤال
The most effective computer crimes are those perpetrated by experts.
سؤال
The broad but somewhat more specific definition of computer crime can be described as destruction, theft, unauthorized or illegal use, modification or copying of information, programs, services, equipment, or communication networks.
سؤال
Computers can be used to commit all of the following kinds of espionage except:

A)social.
B)international.
C)political.
D)industrial.
سؤال
The average computer crime nets $500,000.
سؤال
Trap doors or sleepers allow a technique known as salami slicing to loot accounts. This is taking small amounts from a lot of people.
سؤال
Viruses:

A)infect the host computer.
B)multiply.
C)are triggered at some point in the future.
D)hide from virus protection programs.
سؤال
Reasons for the Nigerian scam include all of the following except:

A)it has a well-educated populace.
B)it is an oil-rich country with a healthy economy.
C)it uses English as a first language.
D)it is a well-populated country.
سؤال
So-called first generation phone "phreaks" used their talents to steal from checking accounts.
سؤال
If you send out 30,000 e-mails and get only one response, but you get $40.00 per response and you send out a half a million e-mails, how much money can you make?

A)$750,000
B)$100,00
C)$1 million
D)$250,000
سؤال
The magnitude of Mafiaboy damage was estimated to exceed at least:

A)$1 billion.
B)$100 million.
C)$10 million.
D)$500 million.
سؤال
Coasting along looking for doors to open is a quality of cookbook hackers.
سؤال
A less formal definition of computer crime would be those crimes using a computer to accomplish its ends.
سؤال
Michael Bloomberg was the subject of a computer crime. He was asked to pay a sum of money in return for being advised as to the perpetrator's methods that were used to invade his system. In street crime terms this would be extortion.
سؤال
Shoulder surfers ________________ access codes at airports.
سؤال
Identify and describe the four phases of computer viruses. Practically speaking, how do these stages work and what are the implications in the context of computer crime?
سؤال
Explain what the "dark figure" of computer crime means.
سؤال
The dark figure of crime is crime that is ________________.
سؤال
The easiest way into a computer is through the ________________ door.
سؤال
A simple but effective form of electronic bank robbery used ________________ slips.
سؤال
Discuss why early computer hackers exhibited few characteristics of secondary deviance as defined by Lemert.
سؤال
The virus that overwrites the system, and whose data files download a password-thieving program, destroys files, and is sent to everyone on the contact list was called ________________ Letter.
سؤال
Describe the three state process defined by Cressey that characterized typical embezzlers.
سؤال
A denial of service ________________ shuts down a Web site.
سؤال
A reason for the Nigerian scam is that it has a well-educated populace.
سؤال
Logic bombs hide from virus protection programs.
سؤال
Worms infect the ________________ computer.
سؤال
The fastest-spreading virus is a variation of the________________ virus.
سؤال
Only the ________________ computer criminals are caught.
سؤال
Mafiaboy got caught because he was traced through emails.
سؤال
The motivation for the Masters of Destruction was money.
سؤال
Sniffer programs look for ________________.
سؤال
Examine both domestic and international computer espionage and give examples of each. Why do you think it is more difficult to determine the extent of international espionage?
سؤال
Evaluate and explain why you think it has become so much easier to commit identity theft.
سؤال
Distinguish between the following: Trojan Horse, sniffer, spyware, trap door, logic bomb, stealth virus, and phishing.
سؤال
Match between columns
Toll fraud
Avoid phone charges
Toll fraud
Steal access codes at airports
Toll fraud
Unreported crime
Toll fraud
Look for programs
Toll fraud
Allow reentry at will
Toll fraud
Multiplies
Toll fraud
Infect the host computer
Toll fraud
Hide from virus protection programs
Shoulder surfers
Avoid phone charges
Shoulder surfers
Steal access codes at airports
Shoulder surfers
Unreported crime
Shoulder surfers
Look for programs
Shoulder surfers
Allow reentry at will
Shoulder surfers
Multiplies
Shoulder surfers
Infect the host computer
Shoulder surfers
Hide from virus protection programs
Sniffer programs
Avoid phone charges
Sniffer programs
Steal access codes at airports
Sniffer programs
Unreported crime
Sniffer programs
Look for programs
Sniffer programs
Allow reentry at will
Sniffer programs
Multiplies
Sniffer programs
Infect the host computer
Sniffer programs
Hide from virus protection programs
Stealth programs
Avoid phone charges
Stealth programs
Steal access codes at airports
Stealth programs
Unreported crime
Stealth programs
Look for programs
Stealth programs
Allow reentry at will
Stealth programs
Multiplies
Stealth programs
Infect the host computer
Stealth programs
Hide from virus protection programs
Back-door programs
Avoid phone charges
Back-door programs
Steal access codes at airports
Back-door programs
Unreported crime
Back-door programs
Look for programs
Back-door programs
Allow reentry at will
Back-door programs
Multiplies
Back-door programs
Infect the host computer
Back-door programs
Hide from virus protection programs
Dark figure of crime
Avoid phone charges
Dark figure of crime
Steal access codes at airports
Dark figure of crime
Unreported crime
Dark figure of crime
Look for programs
Dark figure of crime
Allow reentry at will
Dark figure of crime
Multiplies
Dark figure of crime
Infect the host computer
Dark figure of crime
Hide from virus protection programs
Worm
Avoid phone charges
Worm
Steal access codes at airports
Worm
Unreported crime
Worm
Look for programs
Worm
Allow reentry at will
Worm
Multiplies
Worm
Infect the host computer
Worm
Hide from virus protection programs
Virus
Avoid phone charges
Virus
Steal access codes at airports
Virus
Unreported crime
Virus
Look for programs
Virus
Allow reentry at will
Virus
Multiplies
Virus
Infect the host computer
Virus
Hide from virus protection programs
فتح الحزمة
قم بالتسجيل لفتح البطاقات في هذه المجموعة!
Unlock Deck
Unlock Deck
1/63
auto play flashcards
العب
simple tutorial
ملء الشاشة (f)
exit full mode
Deck 12: Computer Crime
1
Hacking can include all of the following except:

A)a bank employee checking credit history of bank customers.
B)using the telephone book to target doctors and searching their credit records.
C)checking TRW records for credit ratings.
D)tapping into local credit bureau records.
A
2
WAREZ sites encourage which of the following activities?

A)Violent acts
B)Contact with terrorist cells
C)Copying of copyrighted programs
D)Buying cheap foreign computers
C
3
The acronym EFT stands for:

A)east fun target.
B)ending fund target.
C)earned from trust.
D)electronic funds transfer.
D
4
Which of the following is unlikely to be classed as a computer crime?

A)Phony tax returns
B)Public intoxication
C)Blowing up toilets
D)Pedophilia
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 63 في هذه المجموعة.
فتح الحزمة
k this deck
5
Hackers first targeted:

A)the stock exchange.
B)the government.
C)schools.
D)banks.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 63 في هذه المجموعة.
فتح الحزمة
k this deck
6
Toll fraud is:

A)avoiding a fee to use a road.
B)avoiding phone charges.
C)avoiding cable television fees.
D)avoiding internet services fees.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 63 في هذه المجموعة.
فتح الحزمة
k this deck
7
According to Cressey, embezzlers go through a process that includes all of the following except:

A)opportunity.
B)secret financial problem.
C)remorse.
D)rationalizing.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 63 في هذه المجموعة.
فتح الحزمة
k this deck
8
The Masters of Destruction (MOD) corrupted the databases of all of the following companies except:

A)ITT.
B)Sprint.
C)Pacific Bell.
D)Nynex.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 63 في هذه المجموعة.
فتح الحزمة
k this deck
9
In 1996 the General Accounting Office said that hackers had targeted the Pentagon __________ times and gained entry 2 of every 3 times.

A)250,000
B)100,000
C)half a million
D)a million
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 63 في هذه المجموعة.
فتح الحزمة
k this deck
10
Showoffs have which of the following qualities?

A)Goal is to do the most damage
B)Goal is fun, not profit
C)Coasting along looking for doors to open
D)Goal is breaking in
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 63 في هذه المجموعة.
فتح الحزمة
k this deck
11
According to the text, the broad but somewhat more specific definition of computer crime can be described as:

A)destruction, theft, unauthorized or illegal use, modification or copying of information, programs, services, equipment, or communication networks.
B)a crime that could not be committed without a computer.
C)crimes using a computer to accomplish their ends.
D)a computer or its periphery used as a weapon.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 63 في هذه المجموعة.
فتح الحزمة
k this deck
12
The term "hacker" can include all of the following except a(n):

A)norm-violating individual.
B)accidental tourist.
C)curious individual.
D)computer virtuoso.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 63 في هذه المجموعة.
فتح الحزمة
k this deck
13
According to the text, all of the following have been invaded to get credit and debit card information except:

A)Western Union.
B)Yahoo.com.
C)America Online.
D)Egghead.com.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 63 في هذه المجموعة.
فتح الحزمة
k this deck
14
Malicious hacking, affecting national security, has affected all of the following except:

A)White House computers.
B)Pacific Fleet computers.
C)Congressional committee files.
D)Boeing Corporation.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 63 في هذه المجموعة.
فتح الحزمة
k this deck
15
The average bank robbery nets approximately:

A)$1,200.
B)$3,200.
C)$5,400.
D)$2,100.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 63 في هذه المجموعة.
فتح الحزمة
k this deck
16
Crackers break which of the following?

A)Government security codes
B)Copy protection codes
C)Password codes
D)Access codes
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 63 في هذه المجموعة.
فتح الحزمة
k this deck
17
In the 1970s a Los Angeles-based insurance company programmed its computers to do all of the following except:

A)fail to pay legitimate claims.
B)sell fake policies to other companies.
C)issue policies on people who did not exist.
D)use reinsurance to disguise indebtedness.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 63 في هذه المجموعة.
فتح الحزمة
k this deck
18
Computer crimes may have begun with the use of the blue box. The blue box involved which instrument?

A)Phones
B)Radios
C)Televisions
D)Stereos
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 63 في هذه المجموعة.
فتح الحزمة
k this deck
19
Which one of the following crimes could not be classified as a computer crime?

A)Espionage
B)Scams
C)Assault
D)Sabotage
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 63 في هذه المجموعة.
فتح الحزمة
k this deck
20
An authorized program planted on a computer is known as a(n):

A)Trojan Horse.
B)Achilles Heel.
C)Sword of Damocles.
D)Cyclops Eye.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 63 في هذه المجموعة.
فتح الحزمة
k this deck
21
Computer crime has become increasingly globalized.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 63 في هذه المجموعة.
فتح الحزمة
k this deck
22
Mafiaboy activities affected all of the following except:

A)eBay.
B)Buy.com.
C)Yahoo.com.
D)Amazon.com.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 63 في هذه المجموعة.
فتح الحزمة
k this deck
23
Mafiaboy turned out to be a(n) ____________ Canadian.

A)25-year-old
B)12-year-old
C)15-year-old
D)18-year-old
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 63 في هذه المجموعة.
فتح الحزمة
k this deck
24
The Nigerian scam involved:

A)contributions to overthrow Communist Nigerian government.
B)a fake charity for Nigerian refugees.
C)a smuggling operation to get dissenters out of Nigeria.
D)a ploy using deceptive emails and stories of sequestered funds
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 63 في هذه المجموعة.
فتح الحزمة
k this deck
25
International cooperation in regards to stealing software has faltered because of minimal economic impact.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 63 في هذه المجموعة.
فتح الحزمة
k this deck
26
Stealth programs:

A)hide from virus protection programs.
B)are triggered at some point in the future.
C)infect the host computer.
D)multiply.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 63 في هذه المجموعة.
فتح الحزمة
k this deck
27
Playpen-mentality hackers have the goal of breaking in.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 63 في هذه المجموعة.
فتح الحزمة
k this deck
28
Back door programs:

A)allow entry at will.
B)insert advertisements.
C)attack specific programs.
D)look for passwords.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 63 في هذه المجموعة.
فتح الحزمة
k this deck
29
The most effective computer crimes are those perpetrated by experts.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 63 في هذه المجموعة.
فتح الحزمة
k this deck
30
The broad but somewhat more specific definition of computer crime can be described as destruction, theft, unauthorized or illegal use, modification or copying of information, programs, services, equipment, or communication networks.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 63 في هذه المجموعة.
فتح الحزمة
k this deck
31
Computers can be used to commit all of the following kinds of espionage except:

A)social.
B)international.
C)political.
D)industrial.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 63 في هذه المجموعة.
فتح الحزمة
k this deck
32
The average computer crime nets $500,000.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 63 في هذه المجموعة.
فتح الحزمة
k this deck
33
Trap doors or sleepers allow a technique known as salami slicing to loot accounts. This is taking small amounts from a lot of people.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 63 في هذه المجموعة.
فتح الحزمة
k this deck
34
Viruses:

A)infect the host computer.
B)multiply.
C)are triggered at some point in the future.
D)hide from virus protection programs.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 63 في هذه المجموعة.
فتح الحزمة
k this deck
35
Reasons for the Nigerian scam include all of the following except:

A)it has a well-educated populace.
B)it is an oil-rich country with a healthy economy.
C)it uses English as a first language.
D)it is a well-populated country.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 63 في هذه المجموعة.
فتح الحزمة
k this deck
36
So-called first generation phone "phreaks" used their talents to steal from checking accounts.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 63 في هذه المجموعة.
فتح الحزمة
k this deck
37
If you send out 30,000 e-mails and get only one response, but you get $40.00 per response and you send out a half a million e-mails, how much money can you make?

A)$750,000
B)$100,00
C)$1 million
D)$250,000
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 63 في هذه المجموعة.
فتح الحزمة
k this deck
38
The magnitude of Mafiaboy damage was estimated to exceed at least:

A)$1 billion.
B)$100 million.
C)$10 million.
D)$500 million.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 63 في هذه المجموعة.
فتح الحزمة
k this deck
39
Coasting along looking for doors to open is a quality of cookbook hackers.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 63 في هذه المجموعة.
فتح الحزمة
k this deck
40
A less formal definition of computer crime would be those crimes using a computer to accomplish its ends.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 63 في هذه المجموعة.
فتح الحزمة
k this deck
41
Michael Bloomberg was the subject of a computer crime. He was asked to pay a sum of money in return for being advised as to the perpetrator's methods that were used to invade his system. In street crime terms this would be extortion.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 63 في هذه المجموعة.
فتح الحزمة
k this deck
42
Shoulder surfers ________________ access codes at airports.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 63 في هذه المجموعة.
فتح الحزمة
k this deck
43
Identify and describe the four phases of computer viruses. Practically speaking, how do these stages work and what are the implications in the context of computer crime?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 63 في هذه المجموعة.
فتح الحزمة
k this deck
44
Explain what the "dark figure" of computer crime means.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 63 في هذه المجموعة.
فتح الحزمة
k this deck
45
The dark figure of crime is crime that is ________________.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 63 في هذه المجموعة.
فتح الحزمة
k this deck
46
The easiest way into a computer is through the ________________ door.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 63 في هذه المجموعة.
فتح الحزمة
k this deck
47
A simple but effective form of electronic bank robbery used ________________ slips.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 63 في هذه المجموعة.
فتح الحزمة
k this deck
48
Discuss why early computer hackers exhibited few characteristics of secondary deviance as defined by Lemert.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 63 في هذه المجموعة.
فتح الحزمة
k this deck
49
The virus that overwrites the system, and whose data files download a password-thieving program, destroys files, and is sent to everyone on the contact list was called ________________ Letter.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 63 في هذه المجموعة.
فتح الحزمة
k this deck
50
Describe the three state process defined by Cressey that characterized typical embezzlers.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 63 في هذه المجموعة.
فتح الحزمة
k this deck
51
A denial of service ________________ shuts down a Web site.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 63 في هذه المجموعة.
فتح الحزمة
k this deck
52
A reason for the Nigerian scam is that it has a well-educated populace.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 63 في هذه المجموعة.
فتح الحزمة
k this deck
53
Logic bombs hide from virus protection programs.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 63 في هذه المجموعة.
فتح الحزمة
k this deck
54
Worms infect the ________________ computer.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 63 في هذه المجموعة.
فتح الحزمة
k this deck
55
The fastest-spreading virus is a variation of the________________ virus.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 63 في هذه المجموعة.
فتح الحزمة
k this deck
56
Only the ________________ computer criminals are caught.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 63 في هذه المجموعة.
فتح الحزمة
k this deck
57
Mafiaboy got caught because he was traced through emails.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 63 في هذه المجموعة.
فتح الحزمة
k this deck
58
The motivation for the Masters of Destruction was money.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 63 في هذه المجموعة.
فتح الحزمة
k this deck
59
Sniffer programs look for ________________.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 63 في هذه المجموعة.
فتح الحزمة
k this deck
60
Examine both domestic and international computer espionage and give examples of each. Why do you think it is more difficult to determine the extent of international espionage?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 63 في هذه المجموعة.
فتح الحزمة
k this deck
61
Evaluate and explain why you think it has become so much easier to commit identity theft.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 63 في هذه المجموعة.
فتح الحزمة
k this deck
62
Distinguish between the following: Trojan Horse, sniffer, spyware, trap door, logic bomb, stealth virus, and phishing.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 63 في هذه المجموعة.
فتح الحزمة
k this deck
63
Match between columns
Toll fraud
Avoid phone charges
Toll fraud
Steal access codes at airports
Toll fraud
Unreported crime
Toll fraud
Look for programs
Toll fraud
Allow reentry at will
Toll fraud
Multiplies
Toll fraud
Infect the host computer
Toll fraud
Hide from virus protection programs
Shoulder surfers
Avoid phone charges
Shoulder surfers
Steal access codes at airports
Shoulder surfers
Unreported crime
Shoulder surfers
Look for programs
Shoulder surfers
Allow reentry at will
Shoulder surfers
Multiplies
Shoulder surfers
Infect the host computer
Shoulder surfers
Hide from virus protection programs
Sniffer programs
Avoid phone charges
Sniffer programs
Steal access codes at airports
Sniffer programs
Unreported crime
Sniffer programs
Look for programs
Sniffer programs
Allow reentry at will
Sniffer programs
Multiplies
Sniffer programs
Infect the host computer
Sniffer programs
Hide from virus protection programs
Stealth programs
Avoid phone charges
Stealth programs
Steal access codes at airports
Stealth programs
Unreported crime
Stealth programs
Look for programs
Stealth programs
Allow reentry at will
Stealth programs
Multiplies
Stealth programs
Infect the host computer
Stealth programs
Hide from virus protection programs
Back-door programs
Avoid phone charges
Back-door programs
Steal access codes at airports
Back-door programs
Unreported crime
Back-door programs
Look for programs
Back-door programs
Allow reentry at will
Back-door programs
Multiplies
Back-door programs
Infect the host computer
Back-door programs
Hide from virus protection programs
Dark figure of crime
Avoid phone charges
Dark figure of crime
Steal access codes at airports
Dark figure of crime
Unreported crime
Dark figure of crime
Look for programs
Dark figure of crime
Allow reentry at will
Dark figure of crime
Multiplies
Dark figure of crime
Infect the host computer
Dark figure of crime
Hide from virus protection programs
Worm
Avoid phone charges
Worm
Steal access codes at airports
Worm
Unreported crime
Worm
Look for programs
Worm
Allow reentry at will
Worm
Multiplies
Worm
Infect the host computer
Worm
Hide from virus protection programs
Virus
Avoid phone charges
Virus
Steal access codes at airports
Virus
Unreported crime
Virus
Look for programs
Virus
Allow reentry at will
Virus
Multiplies
Virus
Infect the host computer
Virus
Hide from virus protection programs
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 63 في هذه المجموعة.
فتح الحزمة
k this deck
locked card icon
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 63 في هذه المجموعة.