Deck 4: Contemporary Computer Crime
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Match between columns
Question
Match between columns
Question
Match between columns
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/63
Play
Full screen (f)
Deck 4: Contemporary Computer Crime
1
Which of the following refers to a computer that has been compromised by some form of malware, enabling the criminal to remotely control that computer?
A) Trojan
B) bundler
C) zombie
D) rootkit
A) Trojan
B) bundler
C) zombie
D) rootkit
C
2
Which of the following launched the first online casino in 1995 with 18 games?
A) PokerStars
B) Rational Group US Holdings
C) Internet Casinos, Inc.
D) Full Tilt Poker
A) PokerStars
B) Rational Group US Holdings
C) Internet Casinos, Inc.
D) Full Tilt Poker
C
3
Which of the following best defines shoulder surfing?
A) using computers to remotely perform malicious or criminal tasks
B) using electronic messaging systems to randomly or indiscriminately send unsolicited bulk messages
C) rendering computers or digital resources inoperable in furtherance of the illegal compulsion of an action or exchange
D) literally watching someone from behind, as he or she inputs a password
A) using computers to remotely perform malicious or criminal tasks
B) using electronic messaging systems to randomly or indiscriminately send unsolicited bulk messages
C) rendering computers or digital resources inoperable in furtherance of the illegal compulsion of an action or exchange
D) literally watching someone from behind, as he or she inputs a password
D
4
According to the Office of Juvenile Justice and Delinquency Prevention (OJJDP) and the National Center for Missing and Exploited Children (NCMEC), almost all possessors of child pornography are ________.
A) black males who are younger than 25
B) white males who are younger than 25
C) homosexual males who are older than 25
D) white males who are older than 25
A) black males who are younger than 25
B) white males who are younger than 25
C) homosexual males who are older than 25
D) white males who are older than 25
Unlock Deck
Unlock for access to all 63 flashcards in this deck.
Unlock Deck
k this deck
5
Which of the following refers to a software program or hardware device that records everything you type into a compromised computer?
A) keyloggers
B) salamis
C) worms
D) Trojans
A) keyloggers
B) salamis
C) worms
D) Trojans
Unlock Deck
Unlock for access to all 63 flashcards in this deck.
Unlock Deck
k this deck
6
Cybervandalism and cyberterrorism are examples of which category of online crime?
A) theft of information and copyright infringement
B) interference with lawful use of computers
C) threatening communications
D) dissemination of contraband or offensive materials
A) theft of information and copyright infringement
B) interference with lawful use of computers
C) threatening communications
D) dissemination of contraband or offensive materials
Unlock Deck
Unlock for access to all 63 flashcards in this deck.
Unlock Deck
k this deck
7
Which of the following refers to stalkers who are delusional and believe that their victim is in love with them or has had a previous relationship with them?
A) obsessional stalkers
B) love-obsession stalkers
C) erotomaniacs
D) vengeance stalker
A) obsessional stalkers
B) love-obsession stalkers
C) erotomaniacs
D) vengeance stalker
Unlock Deck
Unlock for access to all 63 flashcards in this deck.
Unlock Deck
k this deck
8
Which of the following statements regarding online gaming is untrue?
A) The increase in e-banking allows users to access and add funds without even leaving their chair.
B) The continuous operation of online casinos makes them accessible 24 hours a day.
C) The lack of physicality and geographical location makes online casinos accessible to any user with a computer, PDA, or cell phone.
D) Minors' accessibility to online gaming is restricted, as age verification is mandatory.
A) The increase in e-banking allows users to access and add funds without even leaving their chair.
B) The continuous operation of online casinos makes them accessible 24 hours a day.
C) The lack of physicality and geographical location makes online casinos accessible to any user with a computer, PDA, or cell phone.
D) Minors' accessibility to online gaming is restricted, as age verification is mandatory.
Unlock Deck
Unlock for access to all 63 flashcards in this deck.
Unlock Deck
k this deck
9
Which of the following is true regarding child pornography in the United States?
A) NAMBLA is an organization created by the federal government and operated by the National Center for Missing and Exploited Children.
B) The PROTECT Act has not been successful in withstanding constitutional challenges regarding child pornography.
C) The possession or distribution of child pornography is jurisdictionally illegal in just 32 states and all territories.
D) The Supreme Court ruled that the Child Pornography Prevention Act was unconstitutional.
A) NAMBLA is an organization created by the federal government and operated by the National Center for Missing and Exploited Children.
B) The PROTECT Act has not been successful in withstanding constitutional challenges regarding child pornography.
C) The possession or distribution of child pornography is jurisdictionally illegal in just 32 states and all territories.
D) The Supreme Court ruled that the Child Pornography Prevention Act was unconstitutional.
Unlock Deck
Unlock for access to all 63 flashcards in this deck.
Unlock Deck
k this deck
10
Which of the following types of fraud occurs when a fraudster adds hidden charges to the advertised price, perhaps in shipping or handling?
A) fee stacking
B) misrepresentation
C) nondelivery
D) shill bidding
A) fee stacking
B) misrepresentation
C) nondelivery
D) shill bidding
Unlock Deck
Unlock for access to all 63 flashcards in this deck.
Unlock Deck
k this deck
11
Which of the following is NOT a primary motivation for the possession of child pornography?
A) fight for legalizing man/boy sexual relationship
B) satisfaction of a desire for new and different sexual stimuli
C) satisfaction of a peculiar curiosity
D) possession and subsequent distribution designed for economic profit
A) fight for legalizing man/boy sexual relationship
B) satisfaction of a desire for new and different sexual stimuli
C) satisfaction of a peculiar curiosity
D) possession and subsequent distribution designed for economic profit
Unlock Deck
Unlock for access to all 63 flashcards in this deck.
Unlock Deck
k this deck
12
Which of the following refers to a malware program that encrypts or otherwise renders computer or digital resources inoperable or inaccessible in furtherance of the illegal compulsion of an action or exchange?
A) worm
B) social engineering
C) ransomware
D) spyware
A) worm
B) social engineering
C) ransomware
D) spyware
Unlock Deck
Unlock for access to all 63 flashcards in this deck.
Unlock Deck
k this deck
13
Which of the following refers to the abuse of electronic messaging systems to randomly or indiscriminately send unsolicited bulk messages?
A) phishing
B) spamming
C) phreaking
D) shoulder surfing
A) phishing
B) spamming
C) phreaking
D) shoulder surfing
Unlock Deck
Unlock for access to all 63 flashcards in this deck.
Unlock Deck
k this deck
14
Which of the following eras of computer viruses is largely characterized by infection of DOS machines spread by removable media?
A) Classical era
B) Internet era
C) Macro era
D) Floppy era
A) Classical era
B) Internet era
C) Macro era
D) Floppy era
Unlock Deck
Unlock for access to all 63 flashcards in this deck.
Unlock Deck
k this deck
15
The individuals who seek to re-establish a relationship with an unwilling partner and are considered the most dangerous of stalkers are known as ________.
A) obsessional stalkers
B) love-obsession stalkers
C) erotomaniacs
D) vengeance stalkers
A) obsessional stalkers
B) love-obsession stalkers
C) erotomaniacs
D) vengeance stalkers
Unlock Deck
Unlock for access to all 63 flashcards in this deck.
Unlock Deck
k this deck
16
A deliberate, politically or religiously motivated attack against data compilations, computer programs, and/or information systems that is intended to disrupt and/or deny service or acquire information that disrupts the social, physical, or political infrastructure of a target, is known as ________.
A) cyberterrorism
B) salami technique
C) cyberstalking
D) cyberbullying
A) cyberterrorism
B) salami technique
C) cyberstalking
D) cyberbullying
Unlock Deck
Unlock for access to all 63 flashcards in this deck.
Unlock Deck
k this deck
17
Which of the following is atypical of both physical stalkers and cyberstalkers?
A) They are usually known to their victims.
B) They are motivated by economic gain.
C) They are usually male.
D) They usually focus their attentions on women.
A) They are usually known to their victims.
B) They are motivated by economic gain.
C) They are usually male.
D) They usually focus their attentions on women.
Unlock Deck
Unlock for access to all 63 flashcards in this deck.
Unlock Deck
k this deck
18
Which of the following is NOT true regarding child pornography and child exploitation?
A) Almost 40 percent of arrested offenders who met victims online possessed child pornography materials.
B) Usually, youngsters who enjoy access to unsupervised computer communications are not victims.
C) Child pornography is used as both a tool for sexual gratification and as a means to seduce or groom potential victims.
D) Typical prey of child exploitation includes those individuals who express frustration with parental controls or who appear particularly naïve or vulnerable.
A) Almost 40 percent of arrested offenders who met victims online possessed child pornography materials.
B) Usually, youngsters who enjoy access to unsupervised computer communications are not victims.
C) Child pornography is used as both a tool for sexual gratification and as a means to seduce or groom potential victims.
D) Typical prey of child exploitation includes those individuals who express frustration with parental controls or who appear particularly naïve or vulnerable.
Unlock Deck
Unlock for access to all 63 flashcards in this deck.
Unlock Deck
k this deck
19
Which of the following refers to two distinct methods of distributed denial of service (DDoS) attacks?
A) spamming and fraggling
B) smurfing and fraggling
C) stalking and spamming
D) freezing and stalking
A) spamming and fraggling
B) smurfing and fraggling
C) stalking and spamming
D) freezing and stalking
Unlock Deck
Unlock for access to all 63 flashcards in this deck.
Unlock Deck
k this deck
20
Which of the following is NOT true regarding the success of ransomwares?
A) Ransomware is most successful when the applicable victim lacks knowledge of or is apathetic to system security.
B) Ransomware succeeds when the level of data destruction caused by sabotage cannot be recovered using commercially available software.
C) Ransomware payments are typically made in hard cash directly to the perpetrator.
D) In order for ransomware to be successful, the compromised data must have some worth to the victim.
A) Ransomware is most successful when the applicable victim lacks knowledge of or is apathetic to system security.
B) Ransomware succeeds when the level of data destruction caused by sabotage cannot be recovered using commercially available software.
C) Ransomware payments are typically made in hard cash directly to the perpetrator.
D) In order for ransomware to be successful, the compromised data must have some worth to the victim.
Unlock Deck
Unlock for access to all 63 flashcards in this deck.
Unlock Deck
k this deck
21
The Macro Era of computer viruses was largely characterized by infection of DOS machines spread by removable media.
Unlock Deck
Unlock for access to all 63 flashcards in this deck.
Unlock Deck
k this deck
22
Which of the following refers to redirecting thin slices of accounts into a designated location?
A) salami technique
B) data diddling
C) spoofing
D) ISP-jacking
A) salami technique
B) data diddling
C) spoofing
D) ISP-jacking
Unlock Deck
Unlock for access to all 63 flashcards in this deck.
Unlock Deck
k this deck
23
Recent studies indicate that the emergence of cloud computing and removable media has effectively decreased theft of information or breaches in digital security.
Unlock Deck
Unlock for access to all 63 flashcards in this deck.
Unlock Deck
k this deck
24
At the dawn of the computer age, the term "computer crime" usually referred to the theft of computers or computer components.
Unlock Deck
Unlock for access to all 63 flashcards in this deck.
Unlock Deck
k this deck
25
The ultimate goal of ransomware can be realized only when a secure method of payment is available.
Unlock Deck
Unlock for access to all 63 flashcards in this deck.
Unlock Deck
k this deck
26
Which of the following refers to the sale of stolen goods through technological means?
A) day trading
B) insider trading
C) e-Fencing
D) spoofing
A) day trading
B) insider trading
C) e-Fencing
D) spoofing
Unlock Deck
Unlock for access to all 63 flashcards in this deck.
Unlock Deck
k this deck
27
Spamming refers to the abuse of electronic messaging systems to randomly or indiscriminately send unsolicited bulk messages.
Unlock Deck
Unlock for access to all 63 flashcards in this deck.
Unlock Deck
k this deck
28
The SAFE DOSES Act targets computer malware attacks.
Unlock Deck
Unlock for access to all 63 flashcards in this deck.
Unlock Deck
k this deck
29
The possession or distribution of child pornography is jurisdictionally illegal in all 50 states and in all territories under the umbrella of the United States.
Unlock Deck
Unlock for access to all 63 flashcards in this deck.
Unlock Deck
k this deck
30
Victims of harassment and stalking are overwhelmingly females or children.
Unlock Deck
Unlock for access to all 63 flashcards in this deck.
Unlock Deck
k this deck
31
Vengeance or terrorist stalkers are motivated by either economic gain or revenge.
Unlock Deck
Unlock for access to all 63 flashcards in this deck.
Unlock Deck
k this deck
32
To steal credit card information by installing devices on card readers located in ATMs, gas pumps, restaurants, grocery stores, retail establishments, or any other area where magnetic strip card readers are employed is known as ________.
A) spamming
B) skimming
C) RFID
D) shill bidding
A) spamming
B) skimming
C) RFID
D) shill bidding
Unlock Deck
Unlock for access to all 63 flashcards in this deck.
Unlock Deck
k this deck
33
Which of the following refers to the deliberate manipulation of an existing program to redirect or reroute data representing monies or economic exchanges?
A) ISP jacking
B) web cramming
C) data diddling
D) IP spoofing
A) ISP jacking
B) web cramming
C) data diddling
D) IP spoofing
Unlock Deck
Unlock for access to all 63 flashcards in this deck.
Unlock Deck
k this deck
34
Which of the following refers to a seller in an auction driving up the cost of his or her own item by bidding on it?
A) fee stacking
B) shill bidding
C) misrepresentation
D) nondelivery
A) fee stacking
B) shill bidding
C) misrepresentation
D) nondelivery
Unlock Deck
Unlock for access to all 63 flashcards in this deck.
Unlock Deck
k this deck
35
Shill bidding at an auction occurs when a fraudster accepts payment for an item and then fails to deliver it.
Unlock Deck
Unlock for access to all 63 flashcards in this deck.
Unlock Deck
k this deck
36
A deliberate politically or religiously motivated attack against data compilations, computer programs, and/or information systems which is intended to disrupt and/or deny service or acquire information which disrupts the social, physical, or political infrastructure of a target is known as cyberterrorism.
Unlock Deck
Unlock for access to all 63 flashcards in this deck.
Unlock Deck
k this deck
37
According to the Office of Juvenile Justice and Delinquency Prevention (OJJDP) and the National Center for Missing and Exploited Children (NCMEC), almost all possessors of child pornography are black males who are under the age of 25.
Unlock Deck
Unlock for access to all 63 flashcards in this deck.
Unlock Deck
k this deck
38
Rootkit is a software program or hardware device that records all keystrokes of a compromised computer.
Unlock Deck
Unlock for access to all 63 flashcards in this deck.
Unlock Deck
k this deck
39
Stealing credit card information by installing devices on magnetic card readers located in ATMs and gas pumps is known as data diddling.
Unlock Deck
Unlock for access to all 63 flashcards in this deck.
Unlock Deck
k this deck
40
Like the majority of malware, whose survival is almost entirely contingent upon concealment, ransomware does not proclaim its existence at inception.
Unlock Deck
Unlock for access to all 63 flashcards in this deck.
Unlock Deck
k this deck
41
________ involves the use of radio waves to facilitate the transfer of information between an electronic tag (or label) and a reader.
Unlock Deck
Unlock for access to all 63 flashcards in this deck.
Unlock Deck
k this deck
42
Discuss various methods of criminal theft of information or data manipulation.
Unlock Deck
Unlock for access to all 63 flashcards in this deck.
Unlock Deck
k this deck
43
________ stalkers seek to re-establish a relationship with an unwilling partner and are considered the most dangerous of stalkers.
Unlock Deck
Unlock for access to all 63 flashcards in this deck.
Unlock Deck
k this deck
44
Engaging in deliberate financial transactions to conceal the identity, source, and/or destination of income is known as ________.
Unlock Deck
Unlock for access to all 63 flashcards in this deck.
Unlock Deck
k this deck
45
An aggressive, intentional act carried out by a group or individual, using electronic forms of contact, repeatedly and over time against a victim who cannot easily defend him-or herself is known as ________.
Unlock Deck
Unlock for access to all 63 flashcards in this deck.
Unlock Deck
k this deck
46
The process of buying and selling highly speculative stocks within one trading day is known as ________.
Unlock Deck
Unlock for access to all 63 flashcards in this deck.
Unlock Deck
k this deck
47
________ refers to the deliberate manipulation of an existing program to redirect or reroute data representing monies or economic exchanges.
Unlock Deck
Unlock for access to all 63 flashcards in this deck.
Unlock Deck
k this deck
48
An intentional deception, misrepresentation, or falsehood made with the intention of receiving unwarranted compensation or gratification is known as ________.
Unlock Deck
Unlock for access to all 63 flashcards in this deck.
Unlock Deck
k this deck
49
________ involves disconnecting individual users from their selected Internet service providers and redirecting them to illegitimate servers.
Unlock Deck
Unlock for access to all 63 flashcards in this deck.
Unlock Deck
k this deck
50
The sale of stolen goods through technological means is known as ________.
Unlock Deck
Unlock for access to all 63 flashcards in this deck.
Unlock Deck
k this deck
51
________ is most often accomplished when criminals develop new Web pages for small businesses and nonprofit groups for little or no expense.
Unlock Deck
Unlock for access to all 63 flashcards in this deck.
Unlock Deck
k this deck
52
________ may be defined as the willful, malicious, and repeated following and/ or harassing of another person in an effort to inflict or cause fear of actual harm through words or deeds.
Unlock Deck
Unlock for access to all 63 flashcards in this deck.
Unlock Deck
k this deck
53
________ are delusional and believe that their victim is in love with them or has had a previous relationship with them.
Unlock Deck
Unlock for access to all 63 flashcards in this deck.
Unlock Deck
k this deck
54
What are some of the malwares employed by terrorists, hacktivists, corporate spies, criminals, and pleasure seekers?
Unlock Deck
Unlock for access to all 63 flashcards in this deck.
Unlock Deck
k this deck
55
Misrepresentation occurs in an auction when a fraudster deceives the bidder as to the item's ________.
Unlock Deck
Unlock for access to all 63 flashcards in this deck.
Unlock Deck
k this deck
56
Compromised computers attached to the Internet, which are often used to remotely perform malicious or criminal tasks, are called ________.
Unlock Deck
Unlock for access to all 63 flashcards in this deck.
Unlock Deck
k this deck
57
A malware program that encrypts or otherwise renders computer or digital resources inoperable or inaccessible in furtherance of the illegal compulsion of an action or exchange is termed as ________.
Unlock Deck
Unlock for access to all 63 flashcards in this deck.
Unlock Deck
k this deck
58
Discuss the process of money laundering and the methods of combating it in the computer era.
Unlock Deck
Unlock for access to all 63 flashcards in this deck.
Unlock Deck
k this deck
59
Discuss how a traditional crime such as dissemination of contraband and offensive materials has reappeared in the computer era.
The answer should include the following points:
-Child pornography
-Child enticement/exploitation
-Online pharmacies
-Online gambling
The answer should include the following points:
-Child pornography
-Child enticement/exploitation
-Online pharmacies
-Online gambling
Unlock Deck
Unlock for access to all 63 flashcards in this deck.
Unlock Deck
k this deck
60
What, in your opinion, are the factors that make online gambling attractive to customers?
Unlock Deck
Unlock for access to all 63 flashcards in this deck.
Unlock Deck
k this deck
61
Match between columns
Unlock Deck
Unlock for access to all 63 flashcards in this deck.
Unlock Deck
k this deck
62
Match between columns
Unlock Deck
Unlock for access to all 63 flashcards in this deck.
Unlock Deck
k this deck
63
Match between columns
Unlock Deck
Unlock for access to all 63 flashcards in this deck.
Unlock Deck
k this deck