Deck 5: Crime
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/24
Play
Full screen (f)
Deck 5: Crime
1
Which of the following is an example of biometrics:
A) DNA
B) Fingerprints
C) Voice prints
D) All of the above
A) DNA
B) Fingerprints
C) Voice prints
D) All of the above
All of the above
2
In the early days of computing (1960's to the early 1970's), a "hacker" was:
A) An incompetent programmer who wrote programs that did not work properly
B) A busy programmer who reused code to save time
C) A creative programmer who wrote very elegant or clever programs
D) A new programmer who wrote simple programs
A) An incompetent programmer who wrote programs that did not work properly
B) A busy programmer who reused code to save time
C) A creative programmer who wrote very elegant or clever programs
D) A new programmer who wrote simple programs
A creative programmer who wrote very elegant or clever programs
3
Hacktivism is:
A) A political activist group promoting tougher anti-hacking laws
B) The counter-hacking techniques used by the FBI and other law enforcement agencies
C) The use of hacking to promote a political cause
D) A newsletter for hackers
A) A political activist group promoting tougher anti-hacking laws
B) The counter-hacking techniques used by the FBI and other law enforcement agencies
C) The use of hacking to promote a political cause
D) A newsletter for hackers
The use of hacking to promote a political cause
4
Web sites that look attractive to hackers, but are closely monitored so that everything the hacker does at the site is recorded and studied are known as:
A) Honey pots
B) Digital surveillance
C) Computer entrapment
D) Hacker crackdown
A) Honey pots
B) Digital surveillance
C) Computer entrapment
D) Hacker crackdown
Unlock Deck
Unlock for access to all 24 flashcards in this deck.
Unlock Deck
k this deck
5
Which of the following is NOT a program used by hackers to gain access to your computer:
A) Keyloggers
B) Trojans
C) Rootkits
D) Honey pots
A) Keyloggers
B) Trojans
C) Rootkits
D) Honey pots
Unlock Deck
Unlock for access to all 24 flashcards in this deck.
Unlock Deck
k this deck
6
In 2000, a French court ordered Yahoo! to block access by French people to
A) Web sites containing pornography
B) an Al Qaeda training manual
C) online auction sites containing Nazi materials
D) a Web site containing instructions for making bombs
A) Web sites containing pornography
B) an Al Qaeda training manual
C) online auction sites containing Nazi materials
D) a Web site containing instructions for making bombs
Unlock Deck
Unlock for access to all 24 flashcards in this deck.
Unlock Deck
k this deck
7
Give two ways to identify an email as a phishing attempt
Unlock Deck
Unlock for access to all 24 flashcards in this deck.
Unlock Deck
k this deck
8
How did the USA PATRIOT Act expand the Computer Fraud and Abuse Act?
Unlock Deck
Unlock for access to all 24 flashcards in this deck.
Unlock Deck
k this deck
9
What are two significant issues raised by the Stuxnet worm, which damaged equipment in a uranium enrichment plant in Iran?
Unlock Deck
Unlock for access to all 24 flashcards in this deck.
Unlock Deck
k this deck
10
Why is "harmless hacking"
not harmless?
not harmless?
Unlock Deck
Unlock for access to all 24 flashcards in this deck.
Unlock Deck
k this deck
11
Give arguments for and against hiring former hackers to enhance security.
Unlock Deck
Unlock for access to all 24 flashcards in this deck.
Unlock Deck
k this deck
12
The government cannot monitor online activity of suspected hackers without a court order.
Unlock Deck
Unlock for access to all 24 flashcards in this deck.
Unlock Deck
k this deck
13
Computer forensics specialists cannot recover deleted files from an erased disk.
Unlock Deck
Unlock for access to all 24 flashcards in this deck.
Unlock Deck
k this deck
14
a. Briefly define identity theft.
b. Describe two techniques criminals can use to gather the information they need to steal an identity.
c. Describe two ways a person can protect their identity.
d. Describe two ways a business can protect its customers from identity thieves.
b. Describe two techniques criminals can use to gather the information they need to steal an identity.
c. Describe two ways a person can protect their identity.
d. Describe two ways a business can protect its customers from identity thieves.
Unlock Deck
Unlock for access to all 24 flashcards in this deck.
Unlock Deck
k this deck
15
In the context of Internet content that some countries prohibit, discuss how the "responsibility to prevent access"
differs from the "authority to prevent entry". Include examples.
differs from the "authority to prevent entry". Include examples.
Unlock Deck
Unlock for access to all 24 flashcards in this deck.
Unlock Deck
k this deck
16
MATCHING
-denial-of-service (DOS)
A) an attack in which hackers overload a target site with requests for information.
B) hacking to promote a political cause
C) Web sites that are specifically designed to be attractive to hackers
D) sending millions of emails fishing for information to use to impersonate someone and steal money or goods
E) planting false Internet addresses in the tables on a Domain Name Server (DNS) so that when someone types a URL, they are re-directed to a bogus site
F) biological characteristics that are unique to an individual
G) written defamation
H) verbal defamation
I) a law which covers unauthorized access to computers over which the federal government has jurisdiction, such as government computers, financial systems, medical
Systems, and activities that involve computers in more than one state
-denial-of-service (DOS)
A) an attack in which hackers overload a target site with requests for information.
B) hacking to promote a political cause
C) Web sites that are specifically designed to be attractive to hackers
D) sending millions of emails fishing for information to use to impersonate someone and steal money or goods
E) planting false Internet addresses in the tables on a Domain Name Server (DNS) so that when someone types a URL, they are re-directed to a bogus site
F) biological characteristics that are unique to an individual
G) written defamation
H) verbal defamation
I) a law which covers unauthorized access to computers over which the federal government has jurisdiction, such as government computers, financial systems, medical
Systems, and activities that involve computers in more than one state
Unlock Deck
Unlock for access to all 24 flashcards in this deck.
Unlock Deck
k this deck
17
MATCHING
-hactivism
A) an attack in which hackers overload a target site with requests for information.
B) hacking to promote a political cause
C) Web sites that are specifically designed to be attractive to hackers
D) sending millions of emails fishing for information to use to impersonate someone and steal money or goods
E) planting false Internet addresses in the tables on a Domain Name Server (DNS) so that when someone types a URL, they are re-directed to a bogus site
F) biological characteristics that are unique to an individual
G) written defamation
H) verbal defamation
I) a law which covers unauthorized access to computers over which the federal government has jurisdiction, such as government computers, financial systems, medical
J) systems, and activities that involve computers in more than one state
-hactivism
A) an attack in which hackers overload a target site with requests for information.
B) hacking to promote a political cause
C) Web sites that are specifically designed to be attractive to hackers
D) sending millions of emails fishing for information to use to impersonate someone and steal money or goods
E) planting false Internet addresses in the tables on a Domain Name Server (DNS) so that when someone types a URL, they are re-directed to a bogus site
F) biological characteristics that are unique to an individual
G) written defamation
H) verbal defamation
I) a law which covers unauthorized access to computers over which the federal government has jurisdiction, such as government computers, financial systems, medical
J) systems, and activities that involve computers in more than one state
Unlock Deck
Unlock for access to all 24 flashcards in this deck.
Unlock Deck
k this deck
18
MATCHING
-honey pots
A) an attack in which hackers overload a target site with requests for information.
B) hacking to promote a political cause
C) Web sites that are specifically designed to be attractive to hackers
D) sending millions of emails fishing for information to use to impersonate someone and steal money or goods
E) planting false Internet addresses in the tables on a Domain Name Server (DNS) so that when someone types a URL, they are re-directed to a bogus site
F) biological characteristics that are unique to an individual
G) written defamation
H) verbal defamation
I) a law which covers unauthorized access to computers over which the federal government has jurisdiction, such as government computers, financial systems, medical
J) systems, and activities that involve computers in more than one state
-honey pots
A) an attack in which hackers overload a target site with requests for information.
B) hacking to promote a political cause
C) Web sites that are specifically designed to be attractive to hackers
D) sending millions of emails fishing for information to use to impersonate someone and steal money or goods
E) planting false Internet addresses in the tables on a Domain Name Server (DNS) so that when someone types a URL, they are re-directed to a bogus site
F) biological characteristics that are unique to an individual
G) written defamation
H) verbal defamation
I) a law which covers unauthorized access to computers over which the federal government has jurisdiction, such as government computers, financial systems, medical
J) systems, and activities that involve computers in more than one state
Unlock Deck
Unlock for access to all 24 flashcards in this deck.
Unlock Deck
k this deck
19
MATCHING
-phishing
A) an attack in which hackers overload a target site with requests for information.
B) hacking to promote a political cause
C) Web sites that are specifically designed to be attractive to hackers
D) sending millions of emails fishing for information to use to impersonate someone and steal money or goods
E) planting false Internet addresses in the tables on a Domain Name Server (DNS) so that when someone types a URL, they are re-directed to a bogus site
F) biological characteristics that are unique to an individual
G) written defamation
H) verbal defamation
I) a law which covers unauthorized access to computers over which the federal government has jurisdiction, such as government computers, financial systems, medical
J) systems, and activities that involve computers in more than one state
-phishing
A) an attack in which hackers overload a target site with requests for information.
B) hacking to promote a political cause
C) Web sites that are specifically designed to be attractive to hackers
D) sending millions of emails fishing for information to use to impersonate someone and steal money or goods
E) planting false Internet addresses in the tables on a Domain Name Server (DNS) so that when someone types a URL, they are re-directed to a bogus site
F) biological characteristics that are unique to an individual
G) written defamation
H) verbal defamation
I) a law which covers unauthorized access to computers over which the federal government has jurisdiction, such as government computers, financial systems, medical
J) systems, and activities that involve computers in more than one state
Unlock Deck
Unlock for access to all 24 flashcards in this deck.
Unlock Deck
k this deck
20
MATCHING
-pharming
A) an attack in which hackers overload a target site with requests for information.
B) hacking to promote a political cause
C) Web sites that are specifically designed to be attractive to hackers
D) sending millions of emails fishing for information to use to impersonate someone and steal money or goods
E) planting false Internet addresses in the tables on a Domain Name Server (DNS) so that when someone types a URL, they are re-directed to a bogus site
F) biological characteristics that are unique to an individual
G) written defamation
H) verbal defamation
I) a law which covers unauthorized access to computers over which the federal government has jurisdiction, such as government computers, financial systems, medical
J) systems, and activities that involve computers in more than one state
-pharming
A) an attack in which hackers overload a target site with requests for information.
B) hacking to promote a political cause
C) Web sites that are specifically designed to be attractive to hackers
D) sending millions of emails fishing for information to use to impersonate someone and steal money or goods
E) planting false Internet addresses in the tables on a Domain Name Server (DNS) so that when someone types a URL, they are re-directed to a bogus site
F) biological characteristics that are unique to an individual
G) written defamation
H) verbal defamation
I) a law which covers unauthorized access to computers over which the federal government has jurisdiction, such as government computers, financial systems, medical
J) systems, and activities that involve computers in more than one state
Unlock Deck
Unlock for access to all 24 flashcards in this deck.
Unlock Deck
k this deck
21
MATCHING
-biometrics
A) an attack in which hackers overload a target site with requests for information.
B) hacking to promote a political cause
C) Web sites that are specifically designed to be attractive to hackers
D) sending millions of emails fishing for information to use to impersonate someone and steal money or goods
E) planting false Internet addresses in the tables on a Domain Name Server (DNS) so that when someone types a URL, they are re-directed to a bogus site
F) biological characteristics that are unique to an individual
G) written defamation
H) verbal defamation
I) a law which covers unauthorized access to computers over which the federal government has jurisdiction, such as government computers, financial systems, medical
J) systems, and activities that involve computers in more than one state
-biometrics
A) an attack in which hackers overload a target site with requests for information.
B) hacking to promote a political cause
C) Web sites that are specifically designed to be attractive to hackers
D) sending millions of emails fishing for information to use to impersonate someone and steal money or goods
E) planting false Internet addresses in the tables on a Domain Name Server (DNS) so that when someone types a URL, they are re-directed to a bogus site
F) biological characteristics that are unique to an individual
G) written defamation
H) verbal defamation
I) a law which covers unauthorized access to computers over which the federal government has jurisdiction, such as government computers, financial systems, medical
J) systems, and activities that involve computers in more than one state
Unlock Deck
Unlock for access to all 24 flashcards in this deck.
Unlock Deck
k this deck
22
MATCHING
-libel
A) an attack in which hackers overload a target site with requests for information.
B) hacking to promote a political cause
C) Web sites that are specifically designed to be attractive to hackers
D) sending millions of emails fishing for information to use to impersonate someone and steal money or goods
E) planting false Internet addresses in the tables on a Domain Name Server (DNS) so that when someone types a URL, they are re-directed to a bogus site
F) biological characteristics that are unique to an individual
G) written defamation
H) verbal defamation
I) a law which covers unauthorized access to computers over which the federal government has jurisdiction, such as government computers, financial systems, medical
J) systems, and activities that involve computers in more than one state
-libel
A) an attack in which hackers overload a target site with requests for information.
B) hacking to promote a political cause
C) Web sites that are specifically designed to be attractive to hackers
D) sending millions of emails fishing for information to use to impersonate someone and steal money or goods
E) planting false Internet addresses in the tables on a Domain Name Server (DNS) so that when someone types a URL, they are re-directed to a bogus site
F) biological characteristics that are unique to an individual
G) written defamation
H) verbal defamation
I) a law which covers unauthorized access to computers over which the federal government has jurisdiction, such as government computers, financial systems, medical
J) systems, and activities that involve computers in more than one state
Unlock Deck
Unlock for access to all 24 flashcards in this deck.
Unlock Deck
k this deck
23
MATCHING
-slander
A) an attack in which hackers overload a target site with requests for information.
B) hacking to promote a political cause
C) Web sites that are specifically designed to be attractive to hackers
D) sending millions of emails fishing for information to use to impersonate someone and steal money or goods
E) planting false Internet addresses in the tables on a Domain Name Server (DNS) so that when someone types a URL, they are re-directed to a bogus site
F) biological characteristics that are unique to an individual
G) written defamation
H) verbal defamation
I) a law which covers unauthorized access to computers over which the federal government has jurisdiction, such as government computers, financial systems, medical
J) systems, and activities that involve computers in more than one state
-slander
A) an attack in which hackers overload a target site with requests for information.
B) hacking to promote a political cause
C) Web sites that are specifically designed to be attractive to hackers
D) sending millions of emails fishing for information to use to impersonate someone and steal money or goods
E) planting false Internet addresses in the tables on a Domain Name Server (DNS) so that when someone types a URL, they are re-directed to a bogus site
F) biological characteristics that are unique to an individual
G) written defamation
H) verbal defamation
I) a law which covers unauthorized access to computers over which the federal government has jurisdiction, such as government computers, financial systems, medical
J) systems, and activities that involve computers in more than one state
Unlock Deck
Unlock for access to all 24 flashcards in this deck.
Unlock Deck
k this deck
24
MATCHING
-CFAA
A) an attack in which hackers overload a target site with requests for information.
B) hacking to promote a political cause
C) Web sites that are specifically designed to be attractive to hackers
D) sending millions of emails fishing for information to use to impersonate someone and steal money or goods
E) planting false Internet addresses in the tables on a Domain Name Server (DNS) so that when someone types a URL, they are re-directed to a bogus site
F) biological characteristics that are unique to an individual
G) written defamation
H) verbal defamation
I) a law which covers unauthorized access to computers over which the federal government has jurisdiction, such as government computers, financial systems, medical
J) systems, and activities that involve computers in more than one state
-CFAA
A) an attack in which hackers overload a target site with requests for information.
B) hacking to promote a political cause
C) Web sites that are specifically designed to be attractive to hackers
D) sending millions of emails fishing for information to use to impersonate someone and steal money or goods
E) planting false Internet addresses in the tables on a Domain Name Server (DNS) so that when someone types a URL, they are re-directed to a bogus site
F) biological characteristics that are unique to an individual
G) written defamation
H) verbal defamation
I) a law which covers unauthorized access to computers over which the federal government has jurisdiction, such as government computers, financial systems, medical
J) systems, and activities that involve computers in more than one state
Unlock Deck
Unlock for access to all 24 flashcards in this deck.
Unlock Deck
k this deck