Exam 9: Cybersecurity Operations

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

According to the differential association theory, criminal behavior is acquired through interactions with other persons via communication.

Free
(True/False)
4.9/5
(37)
Correct Answer:
Verified

True

Maneuvering around, trying to access unprotected WiFi networks, is referred to as ______.

Free
(Multiple Choice)
4.9/5
(34)
Correct Answer:
Verified

D

An individual who doesn't have the skills to hack on his or her own so uses prewritten programs to do so is referred to as a dumpster diver.

Free
(True/False)
4.8/5
(27)
Correct Answer:
Verified

False

Which of the following was NOT identified as an entity that must collaborate and cooperate in order to enhance cyberterrorism deterrence?

(Multiple Choice)
5.0/5
(43)

The role of local-level agencies in cybersecurity is constantly evolving.

(True/False)
4.8/5
(35)

According to Deputy Attorney General Mark R. Filip, there are three main challenges to policing cybercrimes. What are these? Are there any others that you can think of?

(Essay)
4.9/5
(43)

Explain the routine activities theory. What are the three factors associated with this theory? Why is motivation an important component? What role does guardianship have in crime, according to the routine activities theory?

(Essay)
4.9/5
(38)

Examining trends that are necessary for crime to occur is an element of ______.

(Multiple Choice)
4.8/5
(38)

Cybercrimes operate in a virtual environment, with undefined and specific jurisdictions.

(True/False)
4.7/5
(35)

According to the routine activities theory, guardianship plays a major role in the prevalence of crime.

(True/False)
4.7/5
(38)

Public-private partnerships are not necessary for the cybersecurity of our nation.

(True/False)
5.0/5
(34)

Entities that have resources to put toward security and may not be subjected to the scrutiny and restrictions are usually in the ______.

(Multiple Choice)
4.9/5
(40)

An ethnic, regional, economic, or social group exhibiting characteristic patterns of behavior sufficient to distinguish it from others within an embracing culture or society is referred to as a ______.

(Multiple Choice)
4.8/5
(36)

The ______ is primarily responsible for the protection of civilian computers.

(Multiple Choice)
4.7/5
(34)

The U.S. government should cooperate not only with national jurisdiction of law enforcement at all levels but the international community and private sector organizations as well.

(True/False)
4.9/5
(38)

One of the oldest and largest hacker conventions is known as ______.

(Multiple Choice)
4.9/5
(34)

Explain the hacker subculture. What is it? Is it comparable to a criminal subculture?

(Essay)
4.8/5
(41)

The role of ______ hackers in the collaborator effort of cybersecurity is vital.

(Multiple Choice)
4.9/5
(39)

The leading agency for investigating cyberattacks by criminals, overseas adversaries, and terrorists is known as the ______.

(Multiple Choice)
4.9/5
(39)

According to the routine activities theory, crime is more likely to occur if there is ______.

(Multiple Choice)
4.8/5
(42)
Showing 1 - 20 of 40
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)