Deck 10: Cyber Crime and Terrorism

Full screen (f)
exit full mode
Question
Cyber intrusions by terrorist just add to the problem of:

A) constant hacking.
B) destruction.
C) casualties.
D) theft.
Use Space or
up arrow
down arrow
to flip the card.
Question
The National white Collar Crime Center operates and internet fraud - reporting center along with the:

A) internet crime unit.
B) FBI.
C) cyber-crime unit.
D) DHS.
Question
In the realm of cyber-attacks, terrorist have a wealth of resources, but, terrorist cannot compete in the area of:

A) development.
B) expertise.
C) science.
D) research.
Question
The primary responsibility for reconstructing the internet should there be a breach rests with the:

A) government.
B) military.
C) private sector.
D) cyber response group.
Question
The most significant problem in deterring cyber-attacks is that there is no agency responsible for:

A) tracking them.
B) combating them.
C) reporting them.
D) investigating them.
Question
What agency is charged with monitoring the cyber infrastructure?

A) DHS
B) FBI
C) DOD
D) CAT
Question
After the 9/11 attacks, cyber security quickly became a primary concern of:

A) Wall Street
B) homeland security
C) DOD
D) law enforcement
Question
Once an attack occurs, system operations immediately respond with:

A) system shut down.
B) countermeasures
C) re-attack
D) system protocol
Question
Which agency is also involved in cyber security from an international perspective?

A) FBI
B) DHS
C) DOD
D) CAT
Question
Consist of highly trained computer forensics and malicious code experts:

A) computer crime task force
B) cyber action team
C) internet complaint center
D) secure cyberspace team
Question
Which federal agency has the primary responsibility of investigating cyber crimes and terrorism?

A) DHS
B) FBI
C) DOD
D) US - Cert
Question
How many methods are there for attacking computers?

A) 3
B) 4
C) 2
D) 5
Question
The most common form of attack on cyber infrastructure and system is:

A) malicious code.
B) electronic attack.
C) physical attack.
D) conventional attack.
Question
Knowledge and skills required of hackers to break into systems have:

A) declined.
B) remained the same.
C) increased.
D) doubled.
Question
The National White Collar Crime Center operates an internet fraud reporting center with the:

A) DHS
B) CAT
C) FBI
D) DOD
Question
Who appointed Richard Clarke as the first special advisor on cyberspace security?

A) President Clinton
B) President Bush
C) Secretary of Defense Rumsfeld
D) Secretary of Defense Gates
Question
In preparing and conducting cyber warfare, the Air Force transferred troops to support the war fight:

A) 5,000
B) 10,000
C) 20,000
D) 30,000
Question
Terrorists used the internet to further their:

A) causes.
B) beliefs.
C) ideology.
D) purpose.
Question
On their website, terrorists do not discuss their:

A) campaigns.
B) finances.
C) deaths.
D) support.
Question
The National Cyber Security Division is responsible for communicating:

A) cyber breaches.
B) criminal activities.
C) cyber threats.
D) cyber-attacks.
Question
There are two methods for attacking computers and our cyber infrastructure.
Question
The most common form of attacks on cyber infrastructure and systems is malicious code.
Question
It is difficult to define cyber terrorism because it covers a wide spectrum of activities, victims and perpetrators.
Question
Most of our internet and cyber infrastructure is controlled by the private sector.
Question
Terrorist groups engage in public relations, their first audience is international public opinion.
Question
Terrorist justify their rhetoric by violence, they are freedom fighters forced in action, and mix rhetoric of peace and non-violence on their websites.
Question
The Internet Complaint Center is a joint operation between the FBI and the Department of Homeland Security.
Question
Cyber-crime, many crimes are non-sophisticated property crimes and other support terrorism.
Question
In addition to common crimes, most hackers attempt to break into systems to cause damage.
Question
More than 10 percent of the complaints are for spam, and in many cases spam is used to infect computers with a virus.
Question
Cyber terrorism is a constant threat, but there have not been any documented instances of significant cyber terrorism.
Question
To understand how terrorist use the internet one must keep in mind they attempt to create cyber fear, solicit support, recruitment, contact cells and coordinate attacks.
Question
One issue that the defense round table stated that our nation is not prepared to reconstitute the internet after a massive disruption.
Question
A terrorist organization could be totally impotent, but the internet allows a person or group to appear to be larger or more important than they really are.
Question
The U.S. realizes that we cannot control content on the internet, so we are fighting information with information, to counter the incorrect information that is being posted by the terrorist.
Question
Based on the U.S.A. Patriot Act, allows the FBI can conduct warrantless eavesdropping of internet traffic.
Question
Cyber Storm was the military first exercise testing responses across the private sector as well as from international, federal, and state.
Question
The FBI is charged with monitoring the cyber infrastructure and providing national and international law enforcement with information about cyber-attacks and prevention measures.
Question
Cyber space is vast, so vast that we have yet to harness or comprehend its future ______________________.
Question
All attackers of computers will use similar methods of ____________________.
Question
There is not a widespread disagreement relative to the threat posed by ________________________.
Question
Defensive ____________________ systems must be developed to deter hacking and intrusions of all sorts.
Question
One key issue concerning cyber terrorism is the fact that there are numerous targets and there are many avenues for _______________________.
Question
A variety of crimes are conducted or ____________________via the internet.
Question
The most common cyber-crime is called ____________________.
Question
In addition to common crimes, some hackers attempt to break into systems to cause _______________________.
Question
Cyber-attacks are now seen as a necessary part of _______________________.
Question
Conventional physical and electromagnetic attacks can disable or destroy software and ____________________
Question
Describe how the three units of the FBI perform their mission of combating cyber terrorism.
Question
Explain the three basic methods of attacking cyber infrastructure.
Question
Why is cyber terrorism important if there is no true definition of what cyber terrorism is?
Question
The thought is that the U.S. is engaged in the war on terrorism and has not devoted enough resources to counter terrorist use of the internet. What two things would you do to change this?
Question
How would you re-structure the FBI and DHS role in combating cyber terrorism?
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/53
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 10: Cyber Crime and Terrorism
1
Cyber intrusions by terrorist just add to the problem of:

A) constant hacking.
B) destruction.
C) casualties.
D) theft.
constant hacking.
2
The National white Collar Crime Center operates and internet fraud - reporting center along with the:

A) internet crime unit.
B) FBI.
C) cyber-crime unit.
D) DHS.
FBI.
3
In the realm of cyber-attacks, terrorist have a wealth of resources, but, terrorist cannot compete in the area of:

A) development.
B) expertise.
C) science.
D) research.
development.
4
The primary responsibility for reconstructing the internet should there be a breach rests with the:

A) government.
B) military.
C) private sector.
D) cyber response group.
Unlock Deck
Unlock for access to all 53 flashcards in this deck.
Unlock Deck
k this deck
5
The most significant problem in deterring cyber-attacks is that there is no agency responsible for:

A) tracking them.
B) combating them.
C) reporting them.
D) investigating them.
Unlock Deck
Unlock for access to all 53 flashcards in this deck.
Unlock Deck
k this deck
6
What agency is charged with monitoring the cyber infrastructure?

A) DHS
B) FBI
C) DOD
D) CAT
Unlock Deck
Unlock for access to all 53 flashcards in this deck.
Unlock Deck
k this deck
7
After the 9/11 attacks, cyber security quickly became a primary concern of:

A) Wall Street
B) homeland security
C) DOD
D) law enforcement
Unlock Deck
Unlock for access to all 53 flashcards in this deck.
Unlock Deck
k this deck
8
Once an attack occurs, system operations immediately respond with:

A) system shut down.
B) countermeasures
C) re-attack
D) system protocol
Unlock Deck
Unlock for access to all 53 flashcards in this deck.
Unlock Deck
k this deck
9
Which agency is also involved in cyber security from an international perspective?

A) FBI
B) DHS
C) DOD
D) CAT
Unlock Deck
Unlock for access to all 53 flashcards in this deck.
Unlock Deck
k this deck
10
Consist of highly trained computer forensics and malicious code experts:

A) computer crime task force
B) cyber action team
C) internet complaint center
D) secure cyberspace team
Unlock Deck
Unlock for access to all 53 flashcards in this deck.
Unlock Deck
k this deck
11
Which federal agency has the primary responsibility of investigating cyber crimes and terrorism?

A) DHS
B) FBI
C) DOD
D) US - Cert
Unlock Deck
Unlock for access to all 53 flashcards in this deck.
Unlock Deck
k this deck
12
How many methods are there for attacking computers?

A) 3
B) 4
C) 2
D) 5
Unlock Deck
Unlock for access to all 53 flashcards in this deck.
Unlock Deck
k this deck
13
The most common form of attack on cyber infrastructure and system is:

A) malicious code.
B) electronic attack.
C) physical attack.
D) conventional attack.
Unlock Deck
Unlock for access to all 53 flashcards in this deck.
Unlock Deck
k this deck
14
Knowledge and skills required of hackers to break into systems have:

A) declined.
B) remained the same.
C) increased.
D) doubled.
Unlock Deck
Unlock for access to all 53 flashcards in this deck.
Unlock Deck
k this deck
15
The National White Collar Crime Center operates an internet fraud reporting center with the:

A) DHS
B) CAT
C) FBI
D) DOD
Unlock Deck
Unlock for access to all 53 flashcards in this deck.
Unlock Deck
k this deck
16
Who appointed Richard Clarke as the first special advisor on cyberspace security?

A) President Clinton
B) President Bush
C) Secretary of Defense Rumsfeld
D) Secretary of Defense Gates
Unlock Deck
Unlock for access to all 53 flashcards in this deck.
Unlock Deck
k this deck
17
In preparing and conducting cyber warfare, the Air Force transferred troops to support the war fight:

A) 5,000
B) 10,000
C) 20,000
D) 30,000
Unlock Deck
Unlock for access to all 53 flashcards in this deck.
Unlock Deck
k this deck
18
Terrorists used the internet to further their:

A) causes.
B) beliefs.
C) ideology.
D) purpose.
Unlock Deck
Unlock for access to all 53 flashcards in this deck.
Unlock Deck
k this deck
19
On their website, terrorists do not discuss their:

A) campaigns.
B) finances.
C) deaths.
D) support.
Unlock Deck
Unlock for access to all 53 flashcards in this deck.
Unlock Deck
k this deck
20
The National Cyber Security Division is responsible for communicating:

A) cyber breaches.
B) criminal activities.
C) cyber threats.
D) cyber-attacks.
Unlock Deck
Unlock for access to all 53 flashcards in this deck.
Unlock Deck
k this deck
21
There are two methods for attacking computers and our cyber infrastructure.
Unlock Deck
Unlock for access to all 53 flashcards in this deck.
Unlock Deck
k this deck
22
The most common form of attacks on cyber infrastructure and systems is malicious code.
Unlock Deck
Unlock for access to all 53 flashcards in this deck.
Unlock Deck
k this deck
23
It is difficult to define cyber terrorism because it covers a wide spectrum of activities, victims and perpetrators.
Unlock Deck
Unlock for access to all 53 flashcards in this deck.
Unlock Deck
k this deck
24
Most of our internet and cyber infrastructure is controlled by the private sector.
Unlock Deck
Unlock for access to all 53 flashcards in this deck.
Unlock Deck
k this deck
25
Terrorist groups engage in public relations, their first audience is international public opinion.
Unlock Deck
Unlock for access to all 53 flashcards in this deck.
Unlock Deck
k this deck
26
Terrorist justify their rhetoric by violence, they are freedom fighters forced in action, and mix rhetoric of peace and non-violence on their websites.
Unlock Deck
Unlock for access to all 53 flashcards in this deck.
Unlock Deck
k this deck
27
The Internet Complaint Center is a joint operation between the FBI and the Department of Homeland Security.
Unlock Deck
Unlock for access to all 53 flashcards in this deck.
Unlock Deck
k this deck
28
Cyber-crime, many crimes are non-sophisticated property crimes and other support terrorism.
Unlock Deck
Unlock for access to all 53 flashcards in this deck.
Unlock Deck
k this deck
29
In addition to common crimes, most hackers attempt to break into systems to cause damage.
Unlock Deck
Unlock for access to all 53 flashcards in this deck.
Unlock Deck
k this deck
30
More than 10 percent of the complaints are for spam, and in many cases spam is used to infect computers with a virus.
Unlock Deck
Unlock for access to all 53 flashcards in this deck.
Unlock Deck
k this deck
31
Cyber terrorism is a constant threat, but there have not been any documented instances of significant cyber terrorism.
Unlock Deck
Unlock for access to all 53 flashcards in this deck.
Unlock Deck
k this deck
32
To understand how terrorist use the internet one must keep in mind they attempt to create cyber fear, solicit support, recruitment, contact cells and coordinate attacks.
Unlock Deck
Unlock for access to all 53 flashcards in this deck.
Unlock Deck
k this deck
33
One issue that the defense round table stated that our nation is not prepared to reconstitute the internet after a massive disruption.
Unlock Deck
Unlock for access to all 53 flashcards in this deck.
Unlock Deck
k this deck
34
A terrorist organization could be totally impotent, but the internet allows a person or group to appear to be larger or more important than they really are.
Unlock Deck
Unlock for access to all 53 flashcards in this deck.
Unlock Deck
k this deck
35
The U.S. realizes that we cannot control content on the internet, so we are fighting information with information, to counter the incorrect information that is being posted by the terrorist.
Unlock Deck
Unlock for access to all 53 flashcards in this deck.
Unlock Deck
k this deck
36
Based on the U.S.A. Patriot Act, allows the FBI can conduct warrantless eavesdropping of internet traffic.
Unlock Deck
Unlock for access to all 53 flashcards in this deck.
Unlock Deck
k this deck
37
Cyber Storm was the military first exercise testing responses across the private sector as well as from international, federal, and state.
Unlock Deck
Unlock for access to all 53 flashcards in this deck.
Unlock Deck
k this deck
38
The FBI is charged with monitoring the cyber infrastructure and providing national and international law enforcement with information about cyber-attacks and prevention measures.
Unlock Deck
Unlock for access to all 53 flashcards in this deck.
Unlock Deck
k this deck
39
Cyber space is vast, so vast that we have yet to harness or comprehend its future ______________________.
Unlock Deck
Unlock for access to all 53 flashcards in this deck.
Unlock Deck
k this deck
40
All attackers of computers will use similar methods of ____________________.
Unlock Deck
Unlock for access to all 53 flashcards in this deck.
Unlock Deck
k this deck
41
There is not a widespread disagreement relative to the threat posed by ________________________.
Unlock Deck
Unlock for access to all 53 flashcards in this deck.
Unlock Deck
k this deck
42
Defensive ____________________ systems must be developed to deter hacking and intrusions of all sorts.
Unlock Deck
Unlock for access to all 53 flashcards in this deck.
Unlock Deck
k this deck
43
One key issue concerning cyber terrorism is the fact that there are numerous targets and there are many avenues for _______________________.
Unlock Deck
Unlock for access to all 53 flashcards in this deck.
Unlock Deck
k this deck
44
A variety of crimes are conducted or ____________________via the internet.
Unlock Deck
Unlock for access to all 53 flashcards in this deck.
Unlock Deck
k this deck
45
The most common cyber-crime is called ____________________.
Unlock Deck
Unlock for access to all 53 flashcards in this deck.
Unlock Deck
k this deck
46
In addition to common crimes, some hackers attempt to break into systems to cause _______________________.
Unlock Deck
Unlock for access to all 53 flashcards in this deck.
Unlock Deck
k this deck
47
Cyber-attacks are now seen as a necessary part of _______________________.
Unlock Deck
Unlock for access to all 53 flashcards in this deck.
Unlock Deck
k this deck
48
Conventional physical and electromagnetic attacks can disable or destroy software and ____________________
Unlock Deck
Unlock for access to all 53 flashcards in this deck.
Unlock Deck
k this deck
49
Describe how the three units of the FBI perform their mission of combating cyber terrorism.
Unlock Deck
Unlock for access to all 53 flashcards in this deck.
Unlock Deck
k this deck
50
Explain the three basic methods of attacking cyber infrastructure.
Unlock Deck
Unlock for access to all 53 flashcards in this deck.
Unlock Deck
k this deck
51
Why is cyber terrorism important if there is no true definition of what cyber terrorism is?
Unlock Deck
Unlock for access to all 53 flashcards in this deck.
Unlock Deck
k this deck
52
The thought is that the U.S. is engaged in the war on terrorism and has not devoted enough resources to counter terrorist use of the internet. What two things would you do to change this?
Unlock Deck
Unlock for access to all 53 flashcards in this deck.
Unlock Deck
k this deck
53
How would you re-structure the FBI and DHS role in combating cyber terrorism?
Unlock Deck
Unlock for access to all 53 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 53 flashcards in this deck.