Deck 10: Tracking Down Those Who Intend to Do Harm on a Large Scale

Full screen (f)
exit full mode
Question
________ refers to the digital coordination of an integrated plan stretching across geographical boundaries that may or may not result in bloodshed.
Use Space or
up arrow
down arrow
to flip the card.
Question
Detecting and investigating criminal hacker cases require investigators to

A)Take steps to stop attacks
B)Understand the vocabulary
C)Have the latest hacker tools
D)All are necessary
Question
Adversaries unable to counter the U.S.military on the battlefield instead exploit military ________.
Question
Some military experts suggest that our future defense will rely more on __________ officers than on tanks and artillery.
Question
What is considered to be the first step in cyber investigations?

A)Shutting down all infected machines
B)Finding out as much as possible about the attacker
C)Calling in the authorities
D)Trying to contact the attacker
Question
Cybercriminals are using hijacked computers to perform which of the following feats?

A)Spy on people
B)Spam people
C)Steal identities
D)All are being performed
Question
In 2005,authorities described an assault as the heaviest ever perpetrated on another nations computer systems from overseas.What country was being attacked?

A)South Korea
B)China
C)Japan
D)Thailand
Question
Studying examples of attacks and malicious applications will NOT help forensics investigators

A)To better understand hacker methodologies
B)To be able to profile hackers
C)To better understand terrorist methodologies
D)To recognize where and what to look for
Question
From May through June of 2002,the al Qaeda Web site appeared at a Web location in

A)Malaysia
B)Texas
C)Michigan
D)All of the above
Question
Based on verified e-evidence,it was concluded that Aaron Caffrey

A)Did indeed launch an attack against the Port of Houston
B)Did not launch an attack against the Port of Houston
C)Was able to prove he was an unwilling accomplice
D)Was exonerated of all charges
Question
Which of the following was NOT e-evidence used to track the creator of the Melissa virus?

A)Hardware ID
B)Operating system event log
C)AOL return address
D)Key signature in e-mails from the perpetrator
Question
Anonymity,control resources,and many other features make the ________ the criminals' conduit for coordinating and carrying out an agenda.
Question
One of the original motives of many hackers was

A)Stealing bandwidth
B)Political activism
C)Creating bot networks
D)Organized criminal activities
Question
Which of the following is NOT considered a cyberplanning tool for coordinating and carrying out an agenda?

A)Internet
B)E-mail
C)VoIP
D)Mail
Question
What bank was found to be hosting an attack unknowingly against another?

A)Unipol Internationale
B)Chase Manhattan
C)China Construction Bank
D)Thailand First
Question
Investigations into hackers can be difficult because even with a full audit trail showing that a user came from a particular account on a particular ISP,

A)ISPs almost never release the necessary information
B)The hacker may use more than one ISP
C)Often only billing information is available,which does not prove identity
D)All of the above
Question
Which of the following is NOT considered a tactic used by hackers to hijack a computer?

A)DoS attacks
B)Spamming activities
C)Phishing scams
D)Breaking and entering
Question
What is one way to track criminals who use IRC?

A)Use bounce programs
B)Other users can report suspicious behavior
C)ISPs can track hacker behavior
D)IRC administrators can monitor hackers' actions
Question
________ kits were used by identity thieves to convince Chase Bank customers to supply financial information.
Question
How many computers was the bot-herder 0x80 said to control?

A)20,000 in 13 countries
B)20,000 in more than 13 countries
C)13,000 in more than 20 countries
D)20,000 in more than 20 countries
Question
Another way to track criminals is in IRC ________.
Question
________ control these computer networks that often are the source of DoS attacks.
Question
A(n)________ program reads from one port and writes to another.
Question
David Smith and VicodinES both signed off using the word ________.
Question
________ are large groupings of hacked,remote-controlled computers used to distribute and install software.
Question
________ logs help track down criminals because they hold evidence that a crime has been committed and where the intrusion occurred.
Question
Instrumental in tracing the Melissa virus's origins were unique hardware numbers,known as ________,that were stored in Office 97 document files.
Question
Christopher Maxwell began the process of building his network by signing on as an affiliate with several ________ companies who paid him to install their programs on computers.
Question
Match between columns
Premises:
Responses:
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/29
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 10: Tracking Down Those Who Intend to Do Harm on a Large Scale
1
________ refers to the digital coordination of an integrated plan stretching across geographical boundaries that may or may not result in bloodshed.
Cyberplanning
2
Detecting and investigating criminal hacker cases require investigators to

A)Take steps to stop attacks
B)Understand the vocabulary
C)Have the latest hacker tools
D)All are necessary
B
3
Adversaries unable to counter the U.S.military on the battlefield instead exploit military ________.
networks
4
Some military experts suggest that our future defense will rely more on __________ officers than on tanks and artillery.
Unlock Deck
Unlock for access to all 29 flashcards in this deck.
Unlock Deck
k this deck
5
What is considered to be the first step in cyber investigations?

A)Shutting down all infected machines
B)Finding out as much as possible about the attacker
C)Calling in the authorities
D)Trying to contact the attacker
Unlock Deck
Unlock for access to all 29 flashcards in this deck.
Unlock Deck
k this deck
6
Cybercriminals are using hijacked computers to perform which of the following feats?

A)Spy on people
B)Spam people
C)Steal identities
D)All are being performed
Unlock Deck
Unlock for access to all 29 flashcards in this deck.
Unlock Deck
k this deck
7
In 2005,authorities described an assault as the heaviest ever perpetrated on another nations computer systems from overseas.What country was being attacked?

A)South Korea
B)China
C)Japan
D)Thailand
Unlock Deck
Unlock for access to all 29 flashcards in this deck.
Unlock Deck
k this deck
8
Studying examples of attacks and malicious applications will NOT help forensics investigators

A)To better understand hacker methodologies
B)To be able to profile hackers
C)To better understand terrorist methodologies
D)To recognize where and what to look for
Unlock Deck
Unlock for access to all 29 flashcards in this deck.
Unlock Deck
k this deck
9
From May through June of 2002,the al Qaeda Web site appeared at a Web location in

A)Malaysia
B)Texas
C)Michigan
D)All of the above
Unlock Deck
Unlock for access to all 29 flashcards in this deck.
Unlock Deck
k this deck
10
Based on verified e-evidence,it was concluded that Aaron Caffrey

A)Did indeed launch an attack against the Port of Houston
B)Did not launch an attack against the Port of Houston
C)Was able to prove he was an unwilling accomplice
D)Was exonerated of all charges
Unlock Deck
Unlock for access to all 29 flashcards in this deck.
Unlock Deck
k this deck
11
Which of the following was NOT e-evidence used to track the creator of the Melissa virus?

A)Hardware ID
B)Operating system event log
C)AOL return address
D)Key signature in e-mails from the perpetrator
Unlock Deck
Unlock for access to all 29 flashcards in this deck.
Unlock Deck
k this deck
12
Anonymity,control resources,and many other features make the ________ the criminals' conduit for coordinating and carrying out an agenda.
Unlock Deck
Unlock for access to all 29 flashcards in this deck.
Unlock Deck
k this deck
13
One of the original motives of many hackers was

A)Stealing bandwidth
B)Political activism
C)Creating bot networks
D)Organized criminal activities
Unlock Deck
Unlock for access to all 29 flashcards in this deck.
Unlock Deck
k this deck
14
Which of the following is NOT considered a cyberplanning tool for coordinating and carrying out an agenda?

A)Internet
B)E-mail
C)VoIP
D)Mail
Unlock Deck
Unlock for access to all 29 flashcards in this deck.
Unlock Deck
k this deck
15
What bank was found to be hosting an attack unknowingly against another?

A)Unipol Internationale
B)Chase Manhattan
C)China Construction Bank
D)Thailand First
Unlock Deck
Unlock for access to all 29 flashcards in this deck.
Unlock Deck
k this deck
16
Investigations into hackers can be difficult because even with a full audit trail showing that a user came from a particular account on a particular ISP,

A)ISPs almost never release the necessary information
B)The hacker may use more than one ISP
C)Often only billing information is available,which does not prove identity
D)All of the above
Unlock Deck
Unlock for access to all 29 flashcards in this deck.
Unlock Deck
k this deck
17
Which of the following is NOT considered a tactic used by hackers to hijack a computer?

A)DoS attacks
B)Spamming activities
C)Phishing scams
D)Breaking and entering
Unlock Deck
Unlock for access to all 29 flashcards in this deck.
Unlock Deck
k this deck
18
What is one way to track criminals who use IRC?

A)Use bounce programs
B)Other users can report suspicious behavior
C)ISPs can track hacker behavior
D)IRC administrators can monitor hackers' actions
Unlock Deck
Unlock for access to all 29 flashcards in this deck.
Unlock Deck
k this deck
19
________ kits were used by identity thieves to convince Chase Bank customers to supply financial information.
Unlock Deck
Unlock for access to all 29 flashcards in this deck.
Unlock Deck
k this deck
20
How many computers was the bot-herder 0x80 said to control?

A)20,000 in 13 countries
B)20,000 in more than 13 countries
C)13,000 in more than 20 countries
D)20,000 in more than 20 countries
Unlock Deck
Unlock for access to all 29 flashcards in this deck.
Unlock Deck
k this deck
21
Another way to track criminals is in IRC ________.
Unlock Deck
Unlock for access to all 29 flashcards in this deck.
Unlock Deck
k this deck
22
________ control these computer networks that often are the source of DoS attacks.
Unlock Deck
Unlock for access to all 29 flashcards in this deck.
Unlock Deck
k this deck
23
A(n)________ program reads from one port and writes to another.
Unlock Deck
Unlock for access to all 29 flashcards in this deck.
Unlock Deck
k this deck
24
David Smith and VicodinES both signed off using the word ________.
Unlock Deck
Unlock for access to all 29 flashcards in this deck.
Unlock Deck
k this deck
25
________ are large groupings of hacked,remote-controlled computers used to distribute and install software.
Unlock Deck
Unlock for access to all 29 flashcards in this deck.
Unlock Deck
k this deck
26
________ logs help track down criminals because they hold evidence that a crime has been committed and where the intrusion occurred.
Unlock Deck
Unlock for access to all 29 flashcards in this deck.
Unlock Deck
k this deck
27
Instrumental in tracing the Melissa virus's origins were unique hardware numbers,known as ________,that were stored in Office 97 document files.
Unlock Deck
Unlock for access to all 29 flashcards in this deck.
Unlock Deck
k this deck
28
Christopher Maxwell began the process of building his network by signing on as an affiliate with several ________ companies who paid him to install their programs on computers.
Unlock Deck
Unlock for access to all 29 flashcards in this deck.
Unlock Deck
k this deck
29
Match between columns
Premises:
Responses:
Unlock Deck
Unlock for access to all 29 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 29 flashcards in this deck.