Deck 9: Cybersecurity Operations

Full screen (f)
exit full mode
Question
The leading agency for investigating cyberattacks by criminals, overseas adversaries, and terrorists is known as the ______.

A) Central Intelligence Agency
B) National Security Agency
C) Federal Bureau of Investigation
D) Defense Intelligence Agency
Use Space or
up arrow
down arrow
to flip the card.
Question
An ethnic, regional, economic, or social group exhibiting characteristic patterns of behavior sufficient to distinguish it from others within an embracing culture or society is referred to as a ______.

A) group
B) subculture
C) faction
D) division
Question
Undocumented, nonmalicious, surprises installed on a program by the creator are referred to as ______.

A) payloads
B) rootkits
C) Easter eggs
D) dumpster dives
Question
Outsiders in the hacker subculture who do not have the skills and use prewritten programs are referred to as ______.

A) dumpster divers
B) Easter eggs
C) script kiddies
D) rootkids
Question
Asserting that criminal behavior is learned via intimate personal groups is a premise for ______.

A) subculture theory
B) routine activity theory
C) differential association theory
D) social disorganization theory
Question
Examining trends that are necessary for crime to occur is an element of ______.

A) subculture theory
B) routine activity theory
C) differential association theory
D) social disorganization theory
Question
Maneuvering around, trying to access unprotected WiFi networks, is referred to as ______.

A) dumpster diving
B) rootkits
C) script kiddies
D) wardriving
Question
Which of the following is not considered one of the responsibilities of the Department of Homeland Security?

A) prevent terrorism and enhance security
B) secure and manage our borders
C) enforce and administer our immigration laws
D) ensure a fast, safe, and effective transportation system
Question
Systems utilized by many of the nation's critical infrastructures to provide automated control of the functions of the infrastructure are referred to as ______.

A) firewalls
B) honeypots
C) supervisory control and data acquisition systems
D) intrusion detection systems
Question
The ______ is primarily responsible for intelligence interception and interpretation/decryption.

A) Federal Bureau of Investigation
B) National Security Agency
C) Central Intelligence Agency
D) Defense Intelligence Agency
Question
According to the text, low socioeconomic status is a predominate marker for engaging in crime in ______.

A) subculture theory
B) routine activity theory
C) differential association theory
D) labeling theory
Question
In conjunction with local and tribal agencies, the Department of Homeland Security works to do all of the following except ______.

A) analyze cyberthreats and vulnerabilities
B) prevent threat warnings from becoming public knowledge
C) reduce cyberthreats and vulnerabilities
D) coordinate the response to cyberincidents
Question
One of the oldest and largest hacker conventions is known as ______.

A) Comicon
B) DEFCON
C) Black Hat
D) ShmooCOn
Question
According to the routine activities theory, crime is more likely to occur if there is ______.

A) a motivated offender
B) appropriate guardianship
C) a suitable target
D) a predetermined location
Question
Although multiple agencies play a role in our nation's cybersecurity, leading the way is the ______.

A) Federal Bureau of Investigation
B) National Security Agency
C) Central Intelligence Agency
D) Defense Intelligence Agency
Question
Which of the following differential association theory points was not proposed by Edwin Sutherland?

A) Criminal behavior is acquired through interactions with other persons via communication.
B) Learning includes techniques, rationalizations, and attitudes.
C) The process of learning criminal behavior parallels those of any other learning process.
D) Behavior is learned the best in larger social groups.
Question
The ______ is primarily responsible for the protection of civilian computers.

A) Department of Defense
B) Department of State
C) Department of Homeland Security
D) Department of Transportation
Question
Hacker subcultures may consist of various identifying factors. Which of the following is NOT likely to be one of those factors?

A) like-minded individuals
B) works common within the subculture
C) a dislike for information technology
D) a like for computer programming
Question
Albert K. Cohen's subculture theory propositions are based on ______.

A) delinquent adult males
B) delinquent adult females
C) delinquent boys
D) delinquent girls
Question
In the 1950s and 1960s, subculture theories began to examine the prevalence of ______.

A) incarcerated females
B) drug abuse among inmates
C) youth gangs
D) racial profiling
Question
Cybercrimes operate in a virtual environment, with undefined and specific jurisdictions.
Question
What role does guardianship have in crime, according to the routine activities theory? Provide examples of types of guardianship.
Question
The idea that people learn to behave in certain ways based on imitating the behavior of those they are close to applies to only conventional behaviors.
Question
According to Deputy Attorney General Mark R. Filip, there are three main challenges to policing cybercrimes. What are these? Are there any others that you can think of?
Question
The most recent era of local-level policing is known as the ______.

A) Political Era
B) Reform Era
C) Homeland Security Era
D) Community Era
Question
Traditional crimes occur in a specific location/jurisdiction(s) and are thus subjected to the rule of law of that specific jurisdiction.
Question
An individual who doesn't have the skills to hack on his or her own so uses prewritten programs to do so is referred to as a dumpster diver.
Question
The role of local-level agencies in cybersecurity is constantly evolving.
Question
Within criminal justice and criminology, subcultures may include the prison subculture, the criminal subculture, the courtroom working group, etc.
Question
Public-private partnerships are not necessary for the cybersecurity of our nation.
Question
According to the differential association theory, criminal behavior is acquired through interactions with other persons via communication.
Question
The first responders to most catastrophic events are usually at the ______ level.

A) local
B) state
C) federal
D) tribal
Question
Entities that have resources to put toward security and may not be subjected to the scrutiny and restrictions are usually in the ______.

A) private sector
B) government sector
C) international sector
D) public sector
Question
The U.S. government should cooperate not only with national jurisdiction of law enforcement at all levels but the international community and private sector organizations as well.
Question
Explain the routine activities theory. What are the three factors associated with this theory? Why is motivation an important component? What role does guardianship have in crime, according to the routine activities theory?
Question
The role of ______ hackers in the collaborator effort of cybersecurity is vital.

A) black hat
B) white hat
C) gray hat
D) red hat
Question
Explain the differential association theory. Why is it difficult to apply this theory to cybercrime?
Question
According to the routine activities theory, guardianship plays a major role in the prevalence of crime.
Question
Which of the following was NOT identified as an entity that must collaborate and cooperate in order to enhance cyberterrorism deterrence?

A) citizens
B) hackers
C) international community
D) free Internet service providers
Question
Explain the hacker subculture. What is it? Is it comparable to a criminal subculture?
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/40
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 9: Cybersecurity Operations
1
The leading agency for investigating cyberattacks by criminals, overseas adversaries, and terrorists is known as the ______.

A) Central Intelligence Agency
B) National Security Agency
C) Federal Bureau of Investigation
D) Defense Intelligence Agency
C
2
An ethnic, regional, economic, or social group exhibiting characteristic patterns of behavior sufficient to distinguish it from others within an embracing culture or society is referred to as a ______.

A) group
B) subculture
C) faction
D) division
B
3
Undocumented, nonmalicious, surprises installed on a program by the creator are referred to as ______.

A) payloads
B) rootkits
C) Easter eggs
D) dumpster dives
C
4
Outsiders in the hacker subculture who do not have the skills and use prewritten programs are referred to as ______.

A) dumpster divers
B) Easter eggs
C) script kiddies
D) rootkids
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
5
Asserting that criminal behavior is learned via intimate personal groups is a premise for ______.

A) subculture theory
B) routine activity theory
C) differential association theory
D) social disorganization theory
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
6
Examining trends that are necessary for crime to occur is an element of ______.

A) subculture theory
B) routine activity theory
C) differential association theory
D) social disorganization theory
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
7
Maneuvering around, trying to access unprotected WiFi networks, is referred to as ______.

A) dumpster diving
B) rootkits
C) script kiddies
D) wardriving
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
8
Which of the following is not considered one of the responsibilities of the Department of Homeland Security?

A) prevent terrorism and enhance security
B) secure and manage our borders
C) enforce and administer our immigration laws
D) ensure a fast, safe, and effective transportation system
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
9
Systems utilized by many of the nation's critical infrastructures to provide automated control of the functions of the infrastructure are referred to as ______.

A) firewalls
B) honeypots
C) supervisory control and data acquisition systems
D) intrusion detection systems
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
10
The ______ is primarily responsible for intelligence interception and interpretation/decryption.

A) Federal Bureau of Investigation
B) National Security Agency
C) Central Intelligence Agency
D) Defense Intelligence Agency
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
11
According to the text, low socioeconomic status is a predominate marker for engaging in crime in ______.

A) subculture theory
B) routine activity theory
C) differential association theory
D) labeling theory
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
12
In conjunction with local and tribal agencies, the Department of Homeland Security works to do all of the following except ______.

A) analyze cyberthreats and vulnerabilities
B) prevent threat warnings from becoming public knowledge
C) reduce cyberthreats and vulnerabilities
D) coordinate the response to cyberincidents
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
13
One of the oldest and largest hacker conventions is known as ______.

A) Comicon
B) DEFCON
C) Black Hat
D) ShmooCOn
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
14
According to the routine activities theory, crime is more likely to occur if there is ______.

A) a motivated offender
B) appropriate guardianship
C) a suitable target
D) a predetermined location
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
15
Although multiple agencies play a role in our nation's cybersecurity, leading the way is the ______.

A) Federal Bureau of Investigation
B) National Security Agency
C) Central Intelligence Agency
D) Defense Intelligence Agency
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
16
Which of the following differential association theory points was not proposed by Edwin Sutherland?

A) Criminal behavior is acquired through interactions with other persons via communication.
B) Learning includes techniques, rationalizations, and attitudes.
C) The process of learning criminal behavior parallels those of any other learning process.
D) Behavior is learned the best in larger social groups.
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
17
The ______ is primarily responsible for the protection of civilian computers.

A) Department of Defense
B) Department of State
C) Department of Homeland Security
D) Department of Transportation
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
18
Hacker subcultures may consist of various identifying factors. Which of the following is NOT likely to be one of those factors?

A) like-minded individuals
B) works common within the subculture
C) a dislike for information technology
D) a like for computer programming
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
19
Albert K. Cohen's subculture theory propositions are based on ______.

A) delinquent adult males
B) delinquent adult females
C) delinquent boys
D) delinquent girls
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
20
In the 1950s and 1960s, subculture theories began to examine the prevalence of ______.

A) incarcerated females
B) drug abuse among inmates
C) youth gangs
D) racial profiling
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
21
Cybercrimes operate in a virtual environment, with undefined and specific jurisdictions.
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
22
What role does guardianship have in crime, according to the routine activities theory? Provide examples of types of guardianship.
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
23
The idea that people learn to behave in certain ways based on imitating the behavior of those they are close to applies to only conventional behaviors.
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
24
According to Deputy Attorney General Mark R. Filip, there are three main challenges to policing cybercrimes. What are these? Are there any others that you can think of?
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
25
The most recent era of local-level policing is known as the ______.

A) Political Era
B) Reform Era
C) Homeland Security Era
D) Community Era
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
26
Traditional crimes occur in a specific location/jurisdiction(s) and are thus subjected to the rule of law of that specific jurisdiction.
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
27
An individual who doesn't have the skills to hack on his or her own so uses prewritten programs to do so is referred to as a dumpster diver.
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
28
The role of local-level agencies in cybersecurity is constantly evolving.
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
29
Within criminal justice and criminology, subcultures may include the prison subculture, the criminal subculture, the courtroom working group, etc.
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
30
Public-private partnerships are not necessary for the cybersecurity of our nation.
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
31
According to the differential association theory, criminal behavior is acquired through interactions with other persons via communication.
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
32
The first responders to most catastrophic events are usually at the ______ level.

A) local
B) state
C) federal
D) tribal
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
33
Entities that have resources to put toward security and may not be subjected to the scrutiny and restrictions are usually in the ______.

A) private sector
B) government sector
C) international sector
D) public sector
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
34
The U.S. government should cooperate not only with national jurisdiction of law enforcement at all levels but the international community and private sector organizations as well.
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
35
Explain the routine activities theory. What are the three factors associated with this theory? Why is motivation an important component? What role does guardianship have in crime, according to the routine activities theory?
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
36
The role of ______ hackers in the collaborator effort of cybersecurity is vital.

A) black hat
B) white hat
C) gray hat
D) red hat
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
37
Explain the differential association theory. Why is it difficult to apply this theory to cybercrime?
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
38
According to the routine activities theory, guardianship plays a major role in the prevalence of crime.
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
39
Which of the following was NOT identified as an entity that must collaborate and cooperate in order to enhance cyberterrorism deterrence?

A) citizens
B) hackers
C) international community
D) free Internet service providers
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
40
Explain the hacker subculture. What is it? Is it comparable to a criminal subculture?
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 40 flashcards in this deck.