Deck 17: Cybercrime

ملء الشاشة (f)
exit full mode
سؤال
The primary purpose of a virus is to

A) replicate itself as many times as possible
B) cause mischief or damage to the infected computer
C) make the computer "sick"
D) Both A and B
استخدم زر المسافة أو
up arrow
down arrow
لقلب البطاقة.
سؤال
A small program that sends itself to other computers,rather than relying on user actions,is a

A) virus.
B) Malicious Mobile Code.
C) Trojan horse.
D) worm.
سؤال
Email was created by

A) Al Gore
B) Ray Tomlinson
C) Bill Gates
D) Steve Jobs
سؤال
If person(s)of interest are located at a computer-assisted or cybercrime scene,the investigator should

A) use them to help locate all of the possible evidence
B) allow them to access the computer so that the officers can examine its contents
C) keep them in separate rooms
D) none of the above
سؤال
If no destructive processes are running and no items of evidentiary value on the screen,one step in seizing computer crime evidence is to

A) type c:.
B) boot the computer.
C) unplug the computer.
D) record the serial number of all equipment.
سؤال
Cybercrime tools and services are being mass marketed on the Internet.They are found on publically accessible web forums,such as Internet Relay Chat (IRC); the major vendors are principally located in

A) Russia
B) Eastern Europe
C) Malaysia.
D) All of the above are correct
سؤال
Which of the following is not a type of computer intrusion?

A) virus
B) Trojan Horse
C) shlumping
D) spyware
سؤال
Which of the following types of cybercriminal is not listed in the taxonomy of cybercriminals?

A) Phisherman
B) Novice
C) Cyberpunk
D) Old guard hacker
سؤال
The two prerequisites for the emergence of cybercrime were:

A) computers had to be commonplace, and had to be linked in a network.
B) large corporations had to use them for business and financial transactions
C) government had to create laws and business had to create the software
D) none of the above are correct
سؤال
The first personal computer was the

A) IBM PC
B) Kenbak-1
C) Apple MacIntosh
D) Radio Shack/Tandy TRS-80
سؤال
The first online service provider for consumers was

A) America Online (AOL)
B) Time Warner Cable
C) Netzero
D) Delphi
سؤال
This type of evidence does not need to be seized at the scene of a computer-assisted or cybercrime.

A) computers
B) peripherials
C) copiers
D) compact discs
سؤال
An attack that is intended to overwhelm a person's e-mail account by surreptitiously subscribing it to dozens or even hundreds of mailing lists is called

A) buffer overflow attack.
B) email bomb attack.
C) malware attack.
D) Trojan horse attack.
سؤال
When searching the scene of a computer crime,the best method is with

A) a warrant
B) consent of whoever is there at the time
C) consent of the owner of the computer
D) none of the above are correct
سؤال
Which of the following does not rely on infecting a host program which allows it to be programmed to act faster?

A) Virus.
B) Worm.
C) Trojan horse.
D) Malware.
سؤال
One name for a computer that has been hijacked or taken over by another is

A) jacked computer
B) RAT (remote accessed terminal)
C) zombie
D) none of the above
سؤال
Transportation hazards when transporting digital evidence that the investigator should be aware of include

A) magnetic fields
B) heat
C) static electricity
D) all of the above
سؤال
A parent's ability to give consent to search the room of their child may not be valid if

A) the child in question is 18 year old or older
B) pays rent
C) have asserted their right to deny access to their room
D) All of the above are correct
سؤال
The most profitable type of crime is

A) cybercrime
B) drug trafficking
C) bank robbery
D) all of the above
سؤال
Which of the following type of cybercriminal is more likely to cause the greatest losses?

A) Phisherman
B) Internal/Insider
C) Petty crook
D) None of the above are correct
سؤال
The investigator should put digital evidence in regular plastic bags to protect it from moisture.
سؤال
A __________is a network of zombies or bots.
سؤال
The first modern electronic computer was completed in 1942.
سؤال
Whereas computer assisted crimes are may be thought of as any crime that uses a computer,in cybercrime,the computer itself is the target.
سؤال
When conducting the preliminary interview about a computer-assisted or cybercrime,the investigators should establish

A) who owns the computers
B) whether they prefer broadband, DSL or T1 connection
C) how often they visit illicit/illegal websites
D) All of the above
سؤال
There were two prerequisites for the emergence of cybercrime: (1)computers had to be commonplace,and (2)they had to be ________in a network.
سؤال
Which statement about the typical computer hacker is not correct?

A) Hackers are typically male.
B) Hackers tend to be very socially active.
C) Hackers are usually between the ages of 14 and 30.
D) All of the above are correct
سؤال
The FBI and the United States Attorney General play the most prominent roles in investigating computer - assisted and cybercrime.
سؤال
A virus is a small program that sends itself to other computers,rather than relying on user actions,as a virus does.
سؤال
The best reason for the careful packaging of digital evidence is to protect it from

A) remote attacks from other computers
B) attempts by the suspect to damage or destroy it
C) shock and vibration
D) clumsy evidence technicians
سؤال
This type of hacker may work for a national government to destroy the operational capabilities of the target.

A) Novice
B) Information/Espionage Warfare
C) Cyberpunks
D) All of the above are correct
سؤال
This organized crime group is sending its members to get degrees in computer science,software engineering and information systems so that they can commit cybercrimes.

A) Hong Kong Triads
B) Italian-American Mafia
C) Russian Mafiya
D) N'dragheta
سؤال
The presence of a/an __________________ may indicate that other evidence may be located on devices away from the primary crime scene.
سؤال
The first online service provider for consumers was America Online (AOL).
سؤال
Oftentimes the would-be buyers of cybercrime tools are themselves scammed out of their money.
سؤال
The denial-of-service (DOS)attack occurs when the service provider suspends service after the subscriber's email account is flooded by thousands of emails in a short period of time.
سؤال
________ refers to the unauthorized entry into a computer system.
سؤال
A/an _______________,may be the most common form of spyware.
سؤال
One motivation for the activities of an old guard hacker is the need for a challenge.
سؤال
When asking for consent to search for computer-related evidence,the investigator is required by law to have the person giving the consent sign a "Consent to Search" waiver.
سؤال
Discuss the creation of the cybercriminal,a new breed of criminal and how they differed from past criminals.
سؤال
Discuss polymorphic and metamorphic viruses.
سؤال
________ is "detonated" when a specific event occurs-for example,all personnel records are erased when an electronic notation is made that a particular person was fired.
سؤال
Discuss the professional criminal typology of cybercriminal,including their characteristics,motivations and skill level
سؤال
A/an __________ is a type of computer intrusion programmed to execute at a particular time or on a particular date.
سؤال
Discuss the differences between "black hatters" and "white hatters."
سؤال
What are the eight steps in documenting the computer crime scene?
سؤال
A ________________ occurs when a botnet herder uses all of his/her zombies to overwhelm even the largest servers.
سؤال
Discuss the physical evidence that an investigator should consider when investigating computer and/or cybercrime.
سؤال
The consent to search must be freely and _______________ given.
سؤال
A specially designed malware package with tools that give the intruder "superpowers" over computers,which allows them,for example,to steal personal information is a ________.
سؤال
Discuss the various types of computer intrusions.
سؤال
Name the types of cybercriminals described in the taxonomy of cybercriminals.
سؤال
Discuss the issues relating to cybercrime/computer/high technology/electronic crime units at the state and local level.
سؤال
Discuss how scareware attacks are executed.
فتح الحزمة
قم بالتسجيل لفتح البطاقات في هذه المجموعة!
Unlock Deck
Unlock Deck
1/55
auto play flashcards
العب
simple tutorial
ملء الشاشة (f)
exit full mode
Deck 17: Cybercrime
1
The primary purpose of a virus is to

A) replicate itself as many times as possible
B) cause mischief or damage to the infected computer
C) make the computer "sick"
D) Both A and B
D
2
A small program that sends itself to other computers,rather than relying on user actions,is a

A) virus.
B) Malicious Mobile Code.
C) Trojan horse.
D) worm.
D
3
Email was created by

A) Al Gore
B) Ray Tomlinson
C) Bill Gates
D) Steve Jobs
B
4
If person(s)of interest are located at a computer-assisted or cybercrime scene,the investigator should

A) use them to help locate all of the possible evidence
B) allow them to access the computer so that the officers can examine its contents
C) keep them in separate rooms
D) none of the above
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 55 في هذه المجموعة.
فتح الحزمة
k this deck
5
If no destructive processes are running and no items of evidentiary value on the screen,one step in seizing computer crime evidence is to

A) type c:.
B) boot the computer.
C) unplug the computer.
D) record the serial number of all equipment.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 55 في هذه المجموعة.
فتح الحزمة
k this deck
6
Cybercrime tools and services are being mass marketed on the Internet.They are found on publically accessible web forums,such as Internet Relay Chat (IRC); the major vendors are principally located in

A) Russia
B) Eastern Europe
C) Malaysia.
D) All of the above are correct
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 55 في هذه المجموعة.
فتح الحزمة
k this deck
7
Which of the following is not a type of computer intrusion?

A) virus
B) Trojan Horse
C) shlumping
D) spyware
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 55 في هذه المجموعة.
فتح الحزمة
k this deck
8
Which of the following types of cybercriminal is not listed in the taxonomy of cybercriminals?

A) Phisherman
B) Novice
C) Cyberpunk
D) Old guard hacker
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 55 في هذه المجموعة.
فتح الحزمة
k this deck
9
The two prerequisites for the emergence of cybercrime were:

A) computers had to be commonplace, and had to be linked in a network.
B) large corporations had to use them for business and financial transactions
C) government had to create laws and business had to create the software
D) none of the above are correct
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 55 في هذه المجموعة.
فتح الحزمة
k this deck
10
The first personal computer was the

A) IBM PC
B) Kenbak-1
C) Apple MacIntosh
D) Radio Shack/Tandy TRS-80
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 55 في هذه المجموعة.
فتح الحزمة
k this deck
11
The first online service provider for consumers was

A) America Online (AOL)
B) Time Warner Cable
C) Netzero
D) Delphi
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 55 في هذه المجموعة.
فتح الحزمة
k this deck
12
This type of evidence does not need to be seized at the scene of a computer-assisted or cybercrime.

A) computers
B) peripherials
C) copiers
D) compact discs
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 55 في هذه المجموعة.
فتح الحزمة
k this deck
13
An attack that is intended to overwhelm a person's e-mail account by surreptitiously subscribing it to dozens or even hundreds of mailing lists is called

A) buffer overflow attack.
B) email bomb attack.
C) malware attack.
D) Trojan horse attack.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 55 في هذه المجموعة.
فتح الحزمة
k this deck
14
When searching the scene of a computer crime,the best method is with

A) a warrant
B) consent of whoever is there at the time
C) consent of the owner of the computer
D) none of the above are correct
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 55 في هذه المجموعة.
فتح الحزمة
k this deck
15
Which of the following does not rely on infecting a host program which allows it to be programmed to act faster?

A) Virus.
B) Worm.
C) Trojan horse.
D) Malware.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 55 في هذه المجموعة.
فتح الحزمة
k this deck
16
One name for a computer that has been hijacked or taken over by another is

A) jacked computer
B) RAT (remote accessed terminal)
C) zombie
D) none of the above
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 55 في هذه المجموعة.
فتح الحزمة
k this deck
17
Transportation hazards when transporting digital evidence that the investigator should be aware of include

A) magnetic fields
B) heat
C) static electricity
D) all of the above
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 55 في هذه المجموعة.
فتح الحزمة
k this deck
18
A parent's ability to give consent to search the room of their child may not be valid if

A) the child in question is 18 year old or older
B) pays rent
C) have asserted their right to deny access to their room
D) All of the above are correct
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 55 في هذه المجموعة.
فتح الحزمة
k this deck
19
The most profitable type of crime is

A) cybercrime
B) drug trafficking
C) bank robbery
D) all of the above
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 55 في هذه المجموعة.
فتح الحزمة
k this deck
20
Which of the following type of cybercriminal is more likely to cause the greatest losses?

A) Phisherman
B) Internal/Insider
C) Petty crook
D) None of the above are correct
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 55 في هذه المجموعة.
فتح الحزمة
k this deck
21
The investigator should put digital evidence in regular plastic bags to protect it from moisture.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 55 في هذه المجموعة.
فتح الحزمة
k this deck
22
A __________is a network of zombies or bots.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 55 في هذه المجموعة.
فتح الحزمة
k this deck
23
The first modern electronic computer was completed in 1942.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 55 في هذه المجموعة.
فتح الحزمة
k this deck
24
Whereas computer assisted crimes are may be thought of as any crime that uses a computer,in cybercrime,the computer itself is the target.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 55 في هذه المجموعة.
فتح الحزمة
k this deck
25
When conducting the preliminary interview about a computer-assisted or cybercrime,the investigators should establish

A) who owns the computers
B) whether they prefer broadband, DSL or T1 connection
C) how often they visit illicit/illegal websites
D) All of the above
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 55 في هذه المجموعة.
فتح الحزمة
k this deck
26
There were two prerequisites for the emergence of cybercrime: (1)computers had to be commonplace,and (2)they had to be ________in a network.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 55 في هذه المجموعة.
فتح الحزمة
k this deck
27
Which statement about the typical computer hacker is not correct?

A) Hackers are typically male.
B) Hackers tend to be very socially active.
C) Hackers are usually between the ages of 14 and 30.
D) All of the above are correct
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 55 في هذه المجموعة.
فتح الحزمة
k this deck
28
The FBI and the United States Attorney General play the most prominent roles in investigating computer - assisted and cybercrime.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 55 في هذه المجموعة.
فتح الحزمة
k this deck
29
A virus is a small program that sends itself to other computers,rather than relying on user actions,as a virus does.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 55 في هذه المجموعة.
فتح الحزمة
k this deck
30
The best reason for the careful packaging of digital evidence is to protect it from

A) remote attacks from other computers
B) attempts by the suspect to damage or destroy it
C) shock and vibration
D) clumsy evidence technicians
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 55 في هذه المجموعة.
فتح الحزمة
k this deck
31
This type of hacker may work for a national government to destroy the operational capabilities of the target.

A) Novice
B) Information/Espionage Warfare
C) Cyberpunks
D) All of the above are correct
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 55 في هذه المجموعة.
فتح الحزمة
k this deck
32
This organized crime group is sending its members to get degrees in computer science,software engineering and information systems so that they can commit cybercrimes.

A) Hong Kong Triads
B) Italian-American Mafia
C) Russian Mafiya
D) N'dragheta
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 55 في هذه المجموعة.
فتح الحزمة
k this deck
33
The presence of a/an __________________ may indicate that other evidence may be located on devices away from the primary crime scene.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 55 في هذه المجموعة.
فتح الحزمة
k this deck
34
The first online service provider for consumers was America Online (AOL).
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 55 في هذه المجموعة.
فتح الحزمة
k this deck
35
Oftentimes the would-be buyers of cybercrime tools are themselves scammed out of their money.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 55 في هذه المجموعة.
فتح الحزمة
k this deck
36
The denial-of-service (DOS)attack occurs when the service provider suspends service after the subscriber's email account is flooded by thousands of emails in a short period of time.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 55 في هذه المجموعة.
فتح الحزمة
k this deck
37
________ refers to the unauthorized entry into a computer system.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 55 في هذه المجموعة.
فتح الحزمة
k this deck
38
A/an _______________,may be the most common form of spyware.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 55 في هذه المجموعة.
فتح الحزمة
k this deck
39
One motivation for the activities of an old guard hacker is the need for a challenge.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 55 في هذه المجموعة.
فتح الحزمة
k this deck
40
When asking for consent to search for computer-related evidence,the investigator is required by law to have the person giving the consent sign a "Consent to Search" waiver.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 55 في هذه المجموعة.
فتح الحزمة
k this deck
41
Discuss the creation of the cybercriminal,a new breed of criminal and how they differed from past criminals.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 55 في هذه المجموعة.
فتح الحزمة
k this deck
42
Discuss polymorphic and metamorphic viruses.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 55 في هذه المجموعة.
فتح الحزمة
k this deck
43
________ is "detonated" when a specific event occurs-for example,all personnel records are erased when an electronic notation is made that a particular person was fired.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 55 في هذه المجموعة.
فتح الحزمة
k this deck
44
Discuss the professional criminal typology of cybercriminal,including their characteristics,motivations and skill level
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 55 في هذه المجموعة.
فتح الحزمة
k this deck
45
A/an __________ is a type of computer intrusion programmed to execute at a particular time or on a particular date.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 55 في هذه المجموعة.
فتح الحزمة
k this deck
46
Discuss the differences between "black hatters" and "white hatters."
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 55 في هذه المجموعة.
فتح الحزمة
k this deck
47
What are the eight steps in documenting the computer crime scene?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 55 في هذه المجموعة.
فتح الحزمة
k this deck
48
A ________________ occurs when a botnet herder uses all of his/her zombies to overwhelm even the largest servers.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 55 في هذه المجموعة.
فتح الحزمة
k this deck
49
Discuss the physical evidence that an investigator should consider when investigating computer and/or cybercrime.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 55 في هذه المجموعة.
فتح الحزمة
k this deck
50
The consent to search must be freely and _______________ given.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 55 في هذه المجموعة.
فتح الحزمة
k this deck
51
A specially designed malware package with tools that give the intruder "superpowers" over computers,which allows them,for example,to steal personal information is a ________.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 55 في هذه المجموعة.
فتح الحزمة
k this deck
52
Discuss the various types of computer intrusions.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 55 في هذه المجموعة.
فتح الحزمة
k this deck
53
Name the types of cybercriminals described in the taxonomy of cybercriminals.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 55 في هذه المجموعة.
فتح الحزمة
k this deck
54
Discuss the issues relating to cybercrime/computer/high technology/electronic crime units at the state and local level.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 55 في هذه المجموعة.
فتح الحزمة
k this deck
55
Discuss how scareware attacks are executed.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 55 في هذه المجموعة.
فتح الحزمة
k this deck
locked card icon
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 55 في هذه المجموعة.