Exam 3: Traditional Computer Crime: Early Hackers and Theft of Components

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Who was directly responsible for the downfall of LoD?

(Multiple Choice)
4.9/5
(47)

Which of the following is true of the infamous hacking board Plovernet?

(Multiple Choice)
4.9/5
(35)

Which of the following hacking-related developments occurred during the 1990s?

(Multiple Choice)
4.9/5
(33)

Which of the following is the least destructive category of hackers?

(Multiple Choice)
4.8/5
(41)

Traditionally, criminal statutes were predicated on the ________ of the criminal act.

(Short Answer)
4.8/5
(38)
Match the following terms with their descriptions.
Script kiddies
used by law enforcement officials to refer to individuals intent on wreaking havoc via the Internet
Cybercriminal organizations
target data which is valuable on its face
Phreakers
are the lowest life form of cybercriminal
Correct Answer:
Verified
Premises:
Responses:
Script kiddies
used by law enforcement officials to refer to individuals intent on wreaking havoc via the Internet
Cybercriminal organizations
target data which is valuable on its face
Phreakers
are the lowest life form of cybercriminal
Cyberpunks
routinely held conferences to discuss their exploits and successes
Crackers
groups comprised of criminally minded individuals who have used the Internet to communicate, collaborate, and facilitate cybercrime
(Matching)
4.8/5
(48)

Fry Guy and the Atlanta Three were directly responsible for the downfall of the Legion of Doom (LoD).

(True/False)
4.8/5
(31)

The ________ program exploited security holes in the Unix operating system, infecting 10 percent of all computers connected to the Internet.

(Short Answer)
4.7/5
(37)

Many members of the ________ were not malicious or criminal minded and proclaimed themselves as public servants, pointing out security flaws in institutional systems so that repairs would be made.

(Short Answer)
4.8/5
(40)

Which of the following groups does NOT figure in the multilateral film privacy strategy of the Chinese Triads?

(Multiple Choice)
4.8/5
(46)

________ involves the manipulation of telecommunications carriers to gain knowledge of telecommunications, and/or theft of applicable services.

(Short Answer)
4.7/5
(41)

Which of the following is NOT one of the primary motivations for computer intrusion in contemporary society?

(Multiple Choice)
4.8/5
(36)

Which of the following qualifies as social engineering?

(Multiple Choice)
4.8/5
(32)

________ activities may range from snooping around neighbors' computers to searching the recesses of top-secret government databases.

(Short Answer)
4.9/5
(44)

Operations known as ________ involve prepaid calls being sold on the street using stolen access or PBX codes during operations.

(Short Answer)
4.9/5
(38)

Which of the following is a factor that leads many individual users of the Internet to assume that their identities are safely protected?

(Multiple Choice)
4.8/5
(38)
Match the following tools with their uses.
The epitome of sophisticated international hacking, originally formed in Gemmany
8BBS
East Coast hacking board that became a breeding ground for hacking groups
Legion of Doom
One of the first hacking boards, popular on the West Coast
414 Private
Correct Answer:
Verified
Premises:
Responses:
The epitome of sophisticated international hacking, originally formed in Gemmany
8BBS
East Coast hacking board that became a breeding ground for hacking groups
Legion of Doom
One of the first hacking boards, popular on the West Coast
414 Private
The most notable early hacking group
ALTOS
Group of teenage hackers who hacked into the Los Alamos military computers in the earlY 1980s
Plovernet
(Matching)
4.9/5
(45)

Which was the first event to signal the potential of computer crime?

(Multiple Choice)
4.8/5
(38)

Law enforcement agencies should look to ________ and federal legislation to prosecute computer crimes in the absence of technology-specific legislation.

(Short Answer)
4.9/5
(42)

Insiders pose the most overrated danger to informational security.

(True/False)
4.8/5
(44)
Showing 41 - 60 of 62
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)