Exam 3: Traditional Computer Crime: Early Hackers and Theft of Components

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Hackers, irrespective of national origin, display startling similarities.

Free
(True/False)
4.9/5
(39)
Correct Answer:
Verified

True

Describe the five general categories of cybercriminals in today's society.

Free
(Essay)
4.9/5
(25)
Correct Answer:
Answered by Examlex AI Copilot

1. Hacktivists: These cybercriminals are motivated by political or social causes and often target government or corporate websites to promote their agenda or protest against certain policies.

2. Cyberterrorists: These individuals or groups use cyber attacks to create fear and chaos for political or ideological reasons. Their goal is to disrupt critical infrastructure or cause harm to individuals or organizations.

3. State-sponsored hackers: These cybercriminals are backed by governments and engage in cyber espionage, sabotage, or warfare to gain a strategic advantage or undermine their adversaries.

4. Organized crime groups: These cybercriminals operate like traditional criminal organizations, using hacking and other cyber activities to steal sensitive information, commit fraud, or extort money from individuals and businesses.

5. Insider threats: These are individuals within an organization who misuse their access to sensitive data or systems for personal gain or to cause harm to their employer. They may be motivated by financial incentives, revenge, or coercion.

According to accomplished phreakers, the theft of telephone access codes requires great technical expertise.

Free
(True/False)
4.8/5
(31)
Correct Answer:
Verified

False

________ are designed to strip the source-address information from e-mail messages.

(Multiple Choice)
4.8/5
(35)

Which of the following hacking-related developments occurred after the year 2000?

(Multiple Choice)
4.8/5
(39)

Shareware publishers encourage users to give copies of programs to friends and colleagues but ask everyone who uses a program regularly to pay a registration fee to the program's author directly.

(True/False)
4.9/5
(38)

What can the exponential increase in online harassment, stock manipulation, and child pornography be attributed to?

(Multiple Choice)
4.8/5
(47)

Computer thieves have traditionally been able to market their stolen goods as legitimate.

(True/False)
4.9/5
(33)

The issue of vicinage has been simplified by the lack of international guidelines for cyberactivity.

(True/False)
4.8/5
(42)

________ sites enable visitors to download software illegally in violation of copyright protections.

(Short Answer)
4.9/5
(34)

Differentiate between traditional crime and computer crime.

(Essay)
4.9/5
(43)

________ are those individuals who have authorized or legitimate access to a computer system, but who exceed that authorization.

(Short Answer)
4.8/5
(38)

Not all crimes involving computers can be characterized as "computer crime."

(True/False)
4.8/5
(32)

________ was the most infamous of all hackers and has been the subject of numerous books and movies.

(Multiple Choice)
4.9/5
(36)

________ can be defined as the reproduction, distribution, and use of software without the permission or authorization of the owner of copyright.

(Multiple Choice)
4.9/5
(32)

What is the primary reason that the resale of integrated chips is so lucrative?

(Multiple Choice)
4.9/5
(33)

Which of the following does NOT accurately describe the Secret Service actions that prompted the seminal court case Steve Jackson Games, Inc.v.U.S.Secret Service et al.?

(Multiple Choice)
5.0/5
(31)

________ were devices which "tricked" switching systems into granting free access to long-distance lines.

(Short Answer)
4.9/5
(48)

Which of the following is NOT a general category of computer crime?

(Multiple Choice)
4.8/5
(36)

Discuss what can be done to apprehend/prevent computer-related crime.

(Essay)
4.9/5
(44)
Showing 1 - 20 of 62
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)