Deck 10: Tracking Down Those Who Intend to Do Harm on a Large Scale

ملء الشاشة (f)
exit full mode
سؤال
________ refers to the digital coordination of an integrated plan stretching across geographical boundaries that may or may not result in bloodshed.
استخدم زر المسافة أو
up arrow
down arrow
لقلب البطاقة.
سؤال
Detecting and investigating criminal hacker cases require investigators to

A)Take steps to stop attacks
B)Understand the vocabulary
C)Have the latest hacker tools
D)All are necessary
سؤال
Adversaries unable to counter the U.S.military on the battlefield instead exploit military ________.
سؤال
Some military experts suggest that our future defense will rely more on __________ officers than on tanks and artillery.
سؤال
What is considered to be the first step in cyber investigations?

A)Shutting down all infected machines
B)Finding out as much as possible about the attacker
C)Calling in the authorities
D)Trying to contact the attacker
سؤال
Cybercriminals are using hijacked computers to perform which of the following feats?

A)Spy on people
B)Spam people
C)Steal identities
D)All are being performed
سؤال
In 2005,authorities described an assault as the heaviest ever perpetrated on another nations computer systems from overseas.What country was being attacked?

A)South Korea
B)China
C)Japan
D)Thailand
سؤال
Studying examples of attacks and malicious applications will NOT help forensics investigators

A)To better understand hacker methodologies
B)To be able to profile hackers
C)To better understand terrorist methodologies
D)To recognize where and what to look for
سؤال
From May through June of 2002,the al Qaeda Web site appeared at a Web location in

A)Malaysia
B)Texas
C)Michigan
D)All of the above
سؤال
Based on verified e-evidence,it was concluded that Aaron Caffrey

A)Did indeed launch an attack against the Port of Houston
B)Did not launch an attack against the Port of Houston
C)Was able to prove he was an unwilling accomplice
D)Was exonerated of all charges
سؤال
Which of the following was NOT e-evidence used to track the creator of the Melissa virus?

A)Hardware ID
B)Operating system event log
C)AOL return address
D)Key signature in e-mails from the perpetrator
سؤال
Anonymity,control resources,and many other features make the ________ the criminals' conduit for coordinating and carrying out an agenda.
سؤال
One of the original motives of many hackers was

A)Stealing bandwidth
B)Political activism
C)Creating bot networks
D)Organized criminal activities
سؤال
Which of the following is NOT considered a cyberplanning tool for coordinating and carrying out an agenda?

A)Internet
B)E-mail
C)VoIP
D)Mail
سؤال
What bank was found to be hosting an attack unknowingly against another?

A)Unipol Internationale
B)Chase Manhattan
C)China Construction Bank
D)Thailand First
سؤال
Investigations into hackers can be difficult because even with a full audit trail showing that a user came from a particular account on a particular ISP,

A)ISPs almost never release the necessary information
B)The hacker may use more than one ISP
C)Often only billing information is available,which does not prove identity
D)All of the above
سؤال
Which of the following is NOT considered a tactic used by hackers to hijack a computer?

A)DoS attacks
B)Spamming activities
C)Phishing scams
D)Breaking and entering
سؤال
What is one way to track criminals who use IRC?

A)Use bounce programs
B)Other users can report suspicious behavior
C)ISPs can track hacker behavior
D)IRC administrators can monitor hackers' actions
سؤال
________ kits were used by identity thieves to convince Chase Bank customers to supply financial information.
سؤال
How many computers was the bot-herder 0x80 said to control?

A)20,000 in 13 countries
B)20,000 in more than 13 countries
C)13,000 in more than 20 countries
D)20,000 in more than 20 countries
سؤال
Another way to track criminals is in IRC ________.
سؤال
________ control these computer networks that often are the source of DoS attacks.
سؤال
A(n)________ program reads from one port and writes to another.
سؤال
David Smith and VicodinES both signed off using the word ________.
سؤال
________ are large groupings of hacked,remote-controlled computers used to distribute and install software.
سؤال
________ logs help track down criminals because they hold evidence that a crime has been committed and where the intrusion occurred.
سؤال
Instrumental in tracing the Melissa virus's origins were unique hardware numbers,known as ________,that were stored in Office 97 document files.
سؤال
Christopher Maxwell began the process of building his network by signing on as an affiliate with several ________ companies who paid him to install their programs on computers.
سؤال
Match between columns
الفرضيات:
الردود:
فتح الحزمة
قم بالتسجيل لفتح البطاقات في هذه المجموعة!
Unlock Deck
Unlock Deck
1/29
auto play flashcards
العب
simple tutorial
ملء الشاشة (f)
exit full mode
Deck 10: Tracking Down Those Who Intend to Do Harm on a Large Scale
1
________ refers to the digital coordination of an integrated plan stretching across geographical boundaries that may or may not result in bloodshed.
Cyberplanning
2
Detecting and investigating criminal hacker cases require investigators to

A)Take steps to stop attacks
B)Understand the vocabulary
C)Have the latest hacker tools
D)All are necessary
B
3
Adversaries unable to counter the U.S.military on the battlefield instead exploit military ________.
networks
4
Some military experts suggest that our future defense will rely more on __________ officers than on tanks and artillery.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 29 في هذه المجموعة.
فتح الحزمة
k this deck
5
What is considered to be the first step in cyber investigations?

A)Shutting down all infected machines
B)Finding out as much as possible about the attacker
C)Calling in the authorities
D)Trying to contact the attacker
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 29 في هذه المجموعة.
فتح الحزمة
k this deck
6
Cybercriminals are using hijacked computers to perform which of the following feats?

A)Spy on people
B)Spam people
C)Steal identities
D)All are being performed
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 29 في هذه المجموعة.
فتح الحزمة
k this deck
7
In 2005,authorities described an assault as the heaviest ever perpetrated on another nations computer systems from overseas.What country was being attacked?

A)South Korea
B)China
C)Japan
D)Thailand
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 29 في هذه المجموعة.
فتح الحزمة
k this deck
8
Studying examples of attacks and malicious applications will NOT help forensics investigators

A)To better understand hacker methodologies
B)To be able to profile hackers
C)To better understand terrorist methodologies
D)To recognize where and what to look for
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 29 في هذه المجموعة.
فتح الحزمة
k this deck
9
From May through June of 2002,the al Qaeda Web site appeared at a Web location in

A)Malaysia
B)Texas
C)Michigan
D)All of the above
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 29 في هذه المجموعة.
فتح الحزمة
k this deck
10
Based on verified e-evidence,it was concluded that Aaron Caffrey

A)Did indeed launch an attack against the Port of Houston
B)Did not launch an attack against the Port of Houston
C)Was able to prove he was an unwilling accomplice
D)Was exonerated of all charges
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 29 في هذه المجموعة.
فتح الحزمة
k this deck
11
Which of the following was NOT e-evidence used to track the creator of the Melissa virus?

A)Hardware ID
B)Operating system event log
C)AOL return address
D)Key signature in e-mails from the perpetrator
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 29 في هذه المجموعة.
فتح الحزمة
k this deck
12
Anonymity,control resources,and many other features make the ________ the criminals' conduit for coordinating and carrying out an agenda.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 29 في هذه المجموعة.
فتح الحزمة
k this deck
13
One of the original motives of many hackers was

A)Stealing bandwidth
B)Political activism
C)Creating bot networks
D)Organized criminal activities
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 29 في هذه المجموعة.
فتح الحزمة
k this deck
14
Which of the following is NOT considered a cyberplanning tool for coordinating and carrying out an agenda?

A)Internet
B)E-mail
C)VoIP
D)Mail
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 29 في هذه المجموعة.
فتح الحزمة
k this deck
15
What bank was found to be hosting an attack unknowingly against another?

A)Unipol Internationale
B)Chase Manhattan
C)China Construction Bank
D)Thailand First
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 29 في هذه المجموعة.
فتح الحزمة
k this deck
16
Investigations into hackers can be difficult because even with a full audit trail showing that a user came from a particular account on a particular ISP,

A)ISPs almost never release the necessary information
B)The hacker may use more than one ISP
C)Often only billing information is available,which does not prove identity
D)All of the above
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 29 في هذه المجموعة.
فتح الحزمة
k this deck
17
Which of the following is NOT considered a tactic used by hackers to hijack a computer?

A)DoS attacks
B)Spamming activities
C)Phishing scams
D)Breaking and entering
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 29 في هذه المجموعة.
فتح الحزمة
k this deck
18
What is one way to track criminals who use IRC?

A)Use bounce programs
B)Other users can report suspicious behavior
C)ISPs can track hacker behavior
D)IRC administrators can monitor hackers' actions
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 29 في هذه المجموعة.
فتح الحزمة
k this deck
19
________ kits were used by identity thieves to convince Chase Bank customers to supply financial information.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 29 في هذه المجموعة.
فتح الحزمة
k this deck
20
How many computers was the bot-herder 0x80 said to control?

A)20,000 in 13 countries
B)20,000 in more than 13 countries
C)13,000 in more than 20 countries
D)20,000 in more than 20 countries
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 29 في هذه المجموعة.
فتح الحزمة
k this deck
21
Another way to track criminals is in IRC ________.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 29 في هذه المجموعة.
فتح الحزمة
k this deck
22
________ control these computer networks that often are the source of DoS attacks.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 29 في هذه المجموعة.
فتح الحزمة
k this deck
23
A(n)________ program reads from one port and writes to another.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 29 في هذه المجموعة.
فتح الحزمة
k this deck
24
David Smith and VicodinES both signed off using the word ________.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 29 في هذه المجموعة.
فتح الحزمة
k this deck
25
________ are large groupings of hacked,remote-controlled computers used to distribute and install software.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 29 في هذه المجموعة.
فتح الحزمة
k this deck
26
________ logs help track down criminals because they hold evidence that a crime has been committed and where the intrusion occurred.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 29 في هذه المجموعة.
فتح الحزمة
k this deck
27
Instrumental in tracing the Melissa virus's origins were unique hardware numbers,known as ________,that were stored in Office 97 document files.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 29 في هذه المجموعة.
فتح الحزمة
k this deck
28
Christopher Maxwell began the process of building his network by signing on as an affiliate with several ________ companies who paid him to install their programs on computers.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 29 في هذه المجموعة.
فتح الحزمة
k this deck
29
Match between columns
الفرضيات:
الردود:
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 29 في هذه المجموعة.
فتح الحزمة
k this deck
locked card icon
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 29 في هذه المجموعة.