Exam 3: Traditional Computer Crime: Early Hackers and Theft of Components

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

The theft and resale of which computer component has proven to be the most lucrative?

(Multiple Choice)
4.9/5
(36)

Like traditional communication carriers, Internet service providers are required to maintain transmission records.

(True/False)
4.8/5
(30)

The term "hacking" was introduced at MIT in the 1980s.

(True/False)
4.8/5
(30)

The promise of anonymity coupled with the dearth of ________ encourages deviant activity.

(Short Answer)
4.8/5
(31)

Blue boxes were extremely popular among college dorms and were widely considered harmless by users.

(True/False)
4.9/5
(31)

________ is the term use by law enforcement authorities to categorize those involved in vandalism, destructive programs, and general mischief for no economic gain.

(Short Answer)
4.8/5
(44)

Which of the following is NOT a method of film piracy?

(Multiple Choice)
4.9/5
(33)

________ acknowledge(s) the futility of trying to stop people from copying software and instead relies on people's honesty.

(Multiple Choice)
4.8/5
(38)

________ hat hackers are individuals who identify and exploit system vulnerabilities for nefarious purposes.

(Multiple Choice)
5.0/5
(43)

________ are the most organized groups trafficking in stolen computer components.

(Short Answer)
4.8/5
(46)

The term cybercriminal organizations does not include traditional organized crime syndicates.

(True/False)
4.9/5
(43)

What motivates pure hackers to steal information?

(Multiple Choice)
4.7/5
(38)

Activities like the theft of computer hardware and the infringement of software copyrights have become unpopular as computer components become smaller and more valuable.

(True/False)
4.8/5
(43)

Traditional hacker culture was characterized by an antiestablishment rhetoric.

(True/False)
4.9/5
(42)

In hacking activities, one computer provides the ________ for the criminal activity, while another serves as the target.

(Short Answer)
4.9/5
(28)

List and describe the primary motivations for computer intrusion or theft of information in contemporary society. The answer should include the following points: National origin, ideology, or demographics aside, there appear to be six primary motivations for computer intrusion or theft of information in contemporary society: -Boredom -Intellectual challenge (mining for knowledge-pure hackers) -Revenge (insiders, disgruntled employees, etc.) -Sexual gratification (stalking, harassment, etc.) -Economic (criminals) -Political (hacktivists, terrorists, spies, etc.)

(Essay)
4.8/5
(34)

________ are the least sophisticated of all cybercriminals.

(Multiple Choice)
4.7/5
(44)

What was the Illuminati?

(Multiple Choice)
4.9/5
(46)

Originally, members of the Legion of Doom (LoD) were ________.

(Multiple Choice)
4.8/5
(33)

The increase in anonymous e-mail accounts and remailers has intensified incidences of online harassment, stock manipulation, and child pornography.

(True/False)
4.9/5
(32)
Showing 21 - 40 of 62
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)