Exam 3: Traditional Computer Crime: Early Hackers and Theft of Components
Exam 1: Introduction and Overview of Computer Forensics and Cybercrime62 Questions
Exam 2: Computer Terminology and History62 Questions
Exam 3: Traditional Computer Crime: Early Hackers and Theft of Components62 Questions
Exam 4: Contemporary Computer Crime63 Questions
Exam 5: Identity Theft and Identity Fraud62 Questions
Exam 6: Terrorism and Organized Crime62 Questions
Exam 7: Avenues for Prosecution and Government Efforts62 Questions
Exam 8: Applying the First Amendment to Computer-Related Crime62 Questions
Exam 9: The Fourth Amendment and Other Legal Issues62 Questions
Exam 10: Computer Forensics: Terminology and Requirements62 Questions
Exam 11: Searching and Seizing Computer-Related Evidence62 Questions
Exam 12: Processing of Evidence and Report Preparation63 Questions
Exam 13: Conclusions and Future Issues61 Questions
Select questions type
The theft and resale of which computer component has proven to be the most lucrative?
(Multiple Choice)
4.9/5
(36)
Like traditional communication carriers, Internet service providers are required to maintain transmission records.
(True/False)
4.8/5
(30)
The promise of anonymity coupled with the dearth of ________ encourages deviant activity.
(Short Answer)
4.8/5
(31)
Blue boxes were extremely popular among college dorms and were widely considered harmless by users.
(True/False)
4.9/5
(31)
________ is the term use by law enforcement authorities to categorize those involved in vandalism, destructive programs, and general mischief for no economic gain.
(Short Answer)
4.8/5
(44)
________ acknowledge(s) the futility of trying to stop people from copying software and instead relies on people's honesty.
(Multiple Choice)
4.8/5
(38)
________ hat hackers are individuals who identify and exploit system vulnerabilities for nefarious purposes.
(Multiple Choice)
5.0/5
(43)
________ are the most organized groups trafficking in stolen computer components.
(Short Answer)
4.8/5
(46)
The term cybercriminal organizations does not include traditional organized crime syndicates.
(True/False)
4.9/5
(43)
Activities like the theft of computer hardware and the infringement of software copyrights have become unpopular as computer components become smaller and more valuable.
(True/False)
4.8/5
(43)
Traditional hacker culture was characterized by an antiestablishment rhetoric.
(True/False)
4.9/5
(42)
In hacking activities, one computer provides the ________ for the criminal activity, while another serves as the target.
(Short Answer)
4.9/5
(28)
List and describe the primary motivations for computer intrusion or theft of information in contemporary society.
The answer should include the following points:
National origin, ideology, or demographics aside, there appear to be six primary motivations for computer intrusion or theft of information in contemporary society:
-Boredom
-Intellectual challenge (mining for knowledge-pure hackers)
-Revenge (insiders, disgruntled employees, etc.)
-Sexual gratification (stalking, harassment, etc.)
-Economic (criminals)
-Political (hacktivists, terrorists, spies, etc.)
(Essay)
4.8/5
(34)
________ are the least sophisticated of all cybercriminals.
(Multiple Choice)
4.7/5
(44)
Originally, members of the Legion of Doom (LoD) were ________.
(Multiple Choice)
4.8/5
(33)
The increase in anonymous e-mail accounts and remailers has intensified incidences of online harassment, stock manipulation, and child pornography.
(True/False)
4.9/5
(32)
Showing 21 - 40 of 62
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)