Deck 5: Crime

Full screen (f)
exit full mode
Question
Which of the following is an example of biometrics:

A) DNA
B) Fingerprints
C) Voice prints
D) All of the above
Use Space or
up arrow
down arrow
to flip the card.
Question
In the early days of computing (1960's to the early 1970's), a "hacker" was:

A) An incompetent programmer who wrote programs that did not work properly
B) A busy programmer who reused code to save time
C) A creative programmer who wrote very elegant or clever programs
D) A new programmer who wrote simple programs
Question
Hacktivism is:

A) A political activist group promoting tougher anti-hacking laws
B) The counter-hacking techniques used by the FBI and other law enforcement agencies
C) The use of hacking to promote a political cause
D) A newsletter for hackers
Question
Web sites that look attractive to hackers, but are closely monitored so that everything the hacker does at the site is recorded and studied are known as:

A) Honey pots
B) Digital surveillance
C) Computer entrapment
D) Hacker crackdown
Question
Which of the following is NOT a program used by hackers to gain access to your computer:

A) Keyloggers
B) Trojans
C) Rootkits
D) Honey pots
Question
In 2000, a French court ordered Yahoo! to block access by French people to

A) Web sites containing pornography
B) an Al Qaeda training manual
C) online auction sites containing Nazi materials
D) a Web site containing instructions for making bombs
Question
Give two ways to identify an email as a phishing attempt
Question
How did the USA PATRIOT Act expand the Computer Fraud and Abuse Act?
Question
What are two significant issues raised by the Stuxnet worm, which damaged equipment in a uranium enrichment plant in Iran?
Question
Why is "harmless hacking"
not harmless?
Question
Give arguments for and against hiring former hackers to enhance security.
Question
The government cannot monitor online activity of suspected hackers without a court order.
Question
Computer forensics specialists cannot recover deleted files from an erased disk.
Question
a. Briefly define identity theft.
b. Describe two techniques criminals can use to gather the information they need to steal an identity.
c. Describe two ways a person can protect their identity.
d. Describe two ways a business can protect its customers from identity thieves.
Question
In the context of Internet content that some countries prohibit, discuss how the "responsibility to prevent access"
differs from the "authority to prevent entry". Include examples.
Question
MATCHING

-denial-of-service (DOS)

A) an attack in which hackers overload a target site with requests for information.
B) hacking to promote a political cause
C) Web sites that are specifically designed to be attractive to hackers
D) sending millions of emails fishing for information to use to impersonate someone and steal money or goods
E) planting false Internet addresses in the tables on a Domain Name Server (DNS) so that when someone types a URL, they are re-directed to a bogus site
F) biological characteristics that are unique to an individual
G) written defamation
H) verbal defamation
I) a law which covers unauthorized access to computers over which the federal government has jurisdiction, such as government computers, financial systems, medical
Systems, and activities that involve computers in more than one state
Question
MATCHING

-hactivism

A) an attack in which hackers overload a target site with requests for information.
B) hacking to promote a political cause
C) Web sites that are specifically designed to be attractive to hackers
D) sending millions of emails fishing for information to use to impersonate someone and steal money or goods
E) planting false Internet addresses in the tables on a Domain Name Server (DNS) so that when someone types a URL, they are re-directed to a bogus site
F) biological characteristics that are unique to an individual
G) written defamation
H) verbal defamation
I) a law which covers unauthorized access to computers over which the federal government has jurisdiction, such as government computers, financial systems, medical
J) systems, and activities that involve computers in more than one state
Question
MATCHING

-honey pots

A) an attack in which hackers overload a target site with requests for information.
B) hacking to promote a political cause
C) Web sites that are specifically designed to be attractive to hackers
D) sending millions of emails fishing for information to use to impersonate someone and steal money or goods
E) planting false Internet addresses in the tables on a Domain Name Server (DNS) so that when someone types a URL, they are re-directed to a bogus site
F) biological characteristics that are unique to an individual
G) written defamation
H) verbal defamation
I) a law which covers unauthorized access to computers over which the federal government has jurisdiction, such as government computers, financial systems, medical
J) systems, and activities that involve computers in more than one state
Question
MATCHING

-phishing

A) an attack in which hackers overload a target site with requests for information.
B) hacking to promote a political cause
C) Web sites that are specifically designed to be attractive to hackers
D) sending millions of emails fishing for information to use to impersonate someone and steal money or goods
E) planting false Internet addresses in the tables on a Domain Name Server (DNS) so that when someone types a URL, they are re-directed to a bogus site
F) biological characteristics that are unique to an individual
G) written defamation
H) verbal defamation
I) a law which covers unauthorized access to computers over which the federal government has jurisdiction, such as government computers, financial systems, medical
J) systems, and activities that involve computers in more than one state
Question
MATCHING

-pharming

A) an attack in which hackers overload a target site with requests for information.
B) hacking to promote a political cause
C) Web sites that are specifically designed to be attractive to hackers
D) sending millions of emails fishing for information to use to impersonate someone and steal money or goods
E) planting false Internet addresses in the tables on a Domain Name Server (DNS) so that when someone types a URL, they are re-directed to a bogus site
F) biological characteristics that are unique to an individual
G) written defamation
H) verbal defamation
I) a law which covers unauthorized access to computers over which the federal government has jurisdiction, such as government computers, financial systems, medical
J) systems, and activities that involve computers in more than one state
Question
MATCHING

-biometrics

A) an attack in which hackers overload a target site with requests for information.
B) hacking to promote a political cause
C) Web sites that are specifically designed to be attractive to hackers
D) sending millions of emails fishing for information to use to impersonate someone and steal money or goods
E) planting false Internet addresses in the tables on a Domain Name Server (DNS) so that when someone types a URL, they are re-directed to a bogus site
F) biological characteristics that are unique to an individual
G) written defamation
H) verbal defamation
I) a law which covers unauthorized access to computers over which the federal government has jurisdiction, such as government computers, financial systems, medical
J) systems, and activities that involve computers in more than one state
Question
MATCHING

-libel

A) an attack in which hackers overload a target site with requests for information.
B) hacking to promote a political cause
C) Web sites that are specifically designed to be attractive to hackers
D) sending millions of emails fishing for information to use to impersonate someone and steal money or goods
E) planting false Internet addresses in the tables on a Domain Name Server (DNS) so that when someone types a URL, they are re-directed to a bogus site
F) biological characteristics that are unique to an individual
G) written defamation
H) verbal defamation
I) a law which covers unauthorized access to computers over which the federal government has jurisdiction, such as government computers, financial systems, medical
J) systems, and activities that involve computers in more than one state
Question
MATCHING

-slander

A) an attack in which hackers overload a target site with requests for information.
B) hacking to promote a political cause
C) Web sites that are specifically designed to be attractive to hackers
D) sending millions of emails fishing for information to use to impersonate someone and steal money or goods
E) planting false Internet addresses in the tables on a Domain Name Server (DNS) so that when someone types a URL, they are re-directed to a bogus site
F) biological characteristics that are unique to an individual
G) written defamation
H) verbal defamation
I) a law which covers unauthorized access to computers over which the federal government has jurisdiction, such as government computers, financial systems, medical
J) systems, and activities that involve computers in more than one state
Question
MATCHING

-CFAA

A) an attack in which hackers overload a target site with requests for information.
B) hacking to promote a political cause
C) Web sites that are specifically designed to be attractive to hackers
D) sending millions of emails fishing for information to use to impersonate someone and steal money or goods
E) planting false Internet addresses in the tables on a Domain Name Server (DNS) so that when someone types a URL, they are re-directed to a bogus site
F) biological characteristics that are unique to an individual
G) written defamation
H) verbal defamation
I) a law which covers unauthorized access to computers over which the federal government has jurisdiction, such as government computers, financial systems, medical
J) systems, and activities that involve computers in more than one state
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/24
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 5: Crime
1
Which of the following is an example of biometrics:

A) DNA
B) Fingerprints
C) Voice prints
D) All of the above
All of the above
2
In the early days of computing (1960's to the early 1970's), a "hacker" was:

A) An incompetent programmer who wrote programs that did not work properly
B) A busy programmer who reused code to save time
C) A creative programmer who wrote very elegant or clever programs
D) A new programmer who wrote simple programs
A creative programmer who wrote very elegant or clever programs
3
Hacktivism is:

A) A political activist group promoting tougher anti-hacking laws
B) The counter-hacking techniques used by the FBI and other law enforcement agencies
C) The use of hacking to promote a political cause
D) A newsletter for hackers
The use of hacking to promote a political cause
4
Web sites that look attractive to hackers, but are closely monitored so that everything the hacker does at the site is recorded and studied are known as:

A) Honey pots
B) Digital surveillance
C) Computer entrapment
D) Hacker crackdown
Unlock Deck
Unlock for access to all 24 flashcards in this deck.
Unlock Deck
k this deck
5
Which of the following is NOT a program used by hackers to gain access to your computer:

A) Keyloggers
B) Trojans
C) Rootkits
D) Honey pots
Unlock Deck
Unlock for access to all 24 flashcards in this deck.
Unlock Deck
k this deck
6
In 2000, a French court ordered Yahoo! to block access by French people to

A) Web sites containing pornography
B) an Al Qaeda training manual
C) online auction sites containing Nazi materials
D) a Web site containing instructions for making bombs
Unlock Deck
Unlock for access to all 24 flashcards in this deck.
Unlock Deck
k this deck
7
Give two ways to identify an email as a phishing attempt
Unlock Deck
Unlock for access to all 24 flashcards in this deck.
Unlock Deck
k this deck
8
How did the USA PATRIOT Act expand the Computer Fraud and Abuse Act?
Unlock Deck
Unlock for access to all 24 flashcards in this deck.
Unlock Deck
k this deck
9
What are two significant issues raised by the Stuxnet worm, which damaged equipment in a uranium enrichment plant in Iran?
Unlock Deck
Unlock for access to all 24 flashcards in this deck.
Unlock Deck
k this deck
10
Why is "harmless hacking"
not harmless?
Unlock Deck
Unlock for access to all 24 flashcards in this deck.
Unlock Deck
k this deck
11
Give arguments for and against hiring former hackers to enhance security.
Unlock Deck
Unlock for access to all 24 flashcards in this deck.
Unlock Deck
k this deck
12
The government cannot monitor online activity of suspected hackers without a court order.
Unlock Deck
Unlock for access to all 24 flashcards in this deck.
Unlock Deck
k this deck
13
Computer forensics specialists cannot recover deleted files from an erased disk.
Unlock Deck
Unlock for access to all 24 flashcards in this deck.
Unlock Deck
k this deck
14
a. Briefly define identity theft.
b. Describe two techniques criminals can use to gather the information they need to steal an identity.
c. Describe two ways a person can protect their identity.
d. Describe two ways a business can protect its customers from identity thieves.
Unlock Deck
Unlock for access to all 24 flashcards in this deck.
Unlock Deck
k this deck
15
In the context of Internet content that some countries prohibit, discuss how the "responsibility to prevent access"
differs from the "authority to prevent entry". Include examples.
Unlock Deck
Unlock for access to all 24 flashcards in this deck.
Unlock Deck
k this deck
16
MATCHING

-denial-of-service (DOS)

A) an attack in which hackers overload a target site with requests for information.
B) hacking to promote a political cause
C) Web sites that are specifically designed to be attractive to hackers
D) sending millions of emails fishing for information to use to impersonate someone and steal money or goods
E) planting false Internet addresses in the tables on a Domain Name Server (DNS) so that when someone types a URL, they are re-directed to a bogus site
F) biological characteristics that are unique to an individual
G) written defamation
H) verbal defamation
I) a law which covers unauthorized access to computers over which the federal government has jurisdiction, such as government computers, financial systems, medical
Systems, and activities that involve computers in more than one state
Unlock Deck
Unlock for access to all 24 flashcards in this deck.
Unlock Deck
k this deck
17
MATCHING

-hactivism

A) an attack in which hackers overload a target site with requests for information.
B) hacking to promote a political cause
C) Web sites that are specifically designed to be attractive to hackers
D) sending millions of emails fishing for information to use to impersonate someone and steal money or goods
E) planting false Internet addresses in the tables on a Domain Name Server (DNS) so that when someone types a URL, they are re-directed to a bogus site
F) biological characteristics that are unique to an individual
G) written defamation
H) verbal defamation
I) a law which covers unauthorized access to computers over which the federal government has jurisdiction, such as government computers, financial systems, medical
J) systems, and activities that involve computers in more than one state
Unlock Deck
Unlock for access to all 24 flashcards in this deck.
Unlock Deck
k this deck
18
MATCHING

-honey pots

A) an attack in which hackers overload a target site with requests for information.
B) hacking to promote a political cause
C) Web sites that are specifically designed to be attractive to hackers
D) sending millions of emails fishing for information to use to impersonate someone and steal money or goods
E) planting false Internet addresses in the tables on a Domain Name Server (DNS) so that when someone types a URL, they are re-directed to a bogus site
F) biological characteristics that are unique to an individual
G) written defamation
H) verbal defamation
I) a law which covers unauthorized access to computers over which the federal government has jurisdiction, such as government computers, financial systems, medical
J) systems, and activities that involve computers in more than one state
Unlock Deck
Unlock for access to all 24 flashcards in this deck.
Unlock Deck
k this deck
19
MATCHING

-phishing

A) an attack in which hackers overload a target site with requests for information.
B) hacking to promote a political cause
C) Web sites that are specifically designed to be attractive to hackers
D) sending millions of emails fishing for information to use to impersonate someone and steal money or goods
E) planting false Internet addresses in the tables on a Domain Name Server (DNS) so that when someone types a URL, they are re-directed to a bogus site
F) biological characteristics that are unique to an individual
G) written defamation
H) verbal defamation
I) a law which covers unauthorized access to computers over which the federal government has jurisdiction, such as government computers, financial systems, medical
J) systems, and activities that involve computers in more than one state
Unlock Deck
Unlock for access to all 24 flashcards in this deck.
Unlock Deck
k this deck
20
MATCHING

-pharming

A) an attack in which hackers overload a target site with requests for information.
B) hacking to promote a political cause
C) Web sites that are specifically designed to be attractive to hackers
D) sending millions of emails fishing for information to use to impersonate someone and steal money or goods
E) planting false Internet addresses in the tables on a Domain Name Server (DNS) so that when someone types a URL, they are re-directed to a bogus site
F) biological characteristics that are unique to an individual
G) written defamation
H) verbal defamation
I) a law which covers unauthorized access to computers over which the federal government has jurisdiction, such as government computers, financial systems, medical
J) systems, and activities that involve computers in more than one state
Unlock Deck
Unlock for access to all 24 flashcards in this deck.
Unlock Deck
k this deck
21
MATCHING

-biometrics

A) an attack in which hackers overload a target site with requests for information.
B) hacking to promote a political cause
C) Web sites that are specifically designed to be attractive to hackers
D) sending millions of emails fishing for information to use to impersonate someone and steal money or goods
E) planting false Internet addresses in the tables on a Domain Name Server (DNS) so that when someone types a URL, they are re-directed to a bogus site
F) biological characteristics that are unique to an individual
G) written defamation
H) verbal defamation
I) a law which covers unauthorized access to computers over which the federal government has jurisdiction, such as government computers, financial systems, medical
J) systems, and activities that involve computers in more than one state
Unlock Deck
Unlock for access to all 24 flashcards in this deck.
Unlock Deck
k this deck
22
MATCHING

-libel

A) an attack in which hackers overload a target site with requests for information.
B) hacking to promote a political cause
C) Web sites that are specifically designed to be attractive to hackers
D) sending millions of emails fishing for information to use to impersonate someone and steal money or goods
E) planting false Internet addresses in the tables on a Domain Name Server (DNS) so that when someone types a URL, they are re-directed to a bogus site
F) biological characteristics that are unique to an individual
G) written defamation
H) verbal defamation
I) a law which covers unauthorized access to computers over which the federal government has jurisdiction, such as government computers, financial systems, medical
J) systems, and activities that involve computers in more than one state
Unlock Deck
Unlock for access to all 24 flashcards in this deck.
Unlock Deck
k this deck
23
MATCHING

-slander

A) an attack in which hackers overload a target site with requests for information.
B) hacking to promote a political cause
C) Web sites that are specifically designed to be attractive to hackers
D) sending millions of emails fishing for information to use to impersonate someone and steal money or goods
E) planting false Internet addresses in the tables on a Domain Name Server (DNS) so that when someone types a URL, they are re-directed to a bogus site
F) biological characteristics that are unique to an individual
G) written defamation
H) verbal defamation
I) a law which covers unauthorized access to computers over which the federal government has jurisdiction, such as government computers, financial systems, medical
J) systems, and activities that involve computers in more than one state
Unlock Deck
Unlock for access to all 24 flashcards in this deck.
Unlock Deck
k this deck
24
MATCHING

-CFAA

A) an attack in which hackers overload a target site with requests for information.
B) hacking to promote a political cause
C) Web sites that are specifically designed to be attractive to hackers
D) sending millions of emails fishing for information to use to impersonate someone and steal money or goods
E) planting false Internet addresses in the tables on a Domain Name Server (DNS) so that when someone types a URL, they are re-directed to a bogus site
F) biological characteristics that are unique to an individual
G) written defamation
H) verbal defamation
I) a law which covers unauthorized access to computers over which the federal government has jurisdiction, such as government computers, financial systems, medical
J) systems, and activities that involve computers in more than one state
Unlock Deck
Unlock for access to all 24 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 24 flashcards in this deck.