Deck 9: Cybersecurity Operations
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/40
Play
Full screen (f)
Deck 9: Cybersecurity Operations
1
The leading agency for investigating cyberattacks by criminals, overseas adversaries, and terrorists is known as the ______.
A) Central Intelligence Agency
B) National Security Agency
C) Federal Bureau of Investigation
D) Defense Intelligence Agency
A) Central Intelligence Agency
B) National Security Agency
C) Federal Bureau of Investigation
D) Defense Intelligence Agency
C
2
An ethnic, regional, economic, or social group exhibiting characteristic patterns of behavior sufficient to distinguish it from others within an embracing culture or society is referred to as a ______.
A) group
B) subculture
C) faction
D) division
A) group
B) subculture
C) faction
D) division
B
3
Undocumented, nonmalicious, surprises installed on a program by the creator are referred to as ______.
A) payloads
B) rootkits
C) Easter eggs
D) dumpster dives
A) payloads
B) rootkits
C) Easter eggs
D) dumpster dives
C
4
Outsiders in the hacker subculture who do not have the skills and use prewritten programs are referred to as ______.
A) dumpster divers
B) Easter eggs
C) script kiddies
D) rootkids
A) dumpster divers
B) Easter eggs
C) script kiddies
D) rootkids
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
5
Asserting that criminal behavior is learned via intimate personal groups is a premise for ______.
A) subculture theory
B) routine activity theory
C) differential association theory
D) social disorganization theory
A) subculture theory
B) routine activity theory
C) differential association theory
D) social disorganization theory
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
6
Examining trends that are necessary for crime to occur is an element of ______.
A) subculture theory
B) routine activity theory
C) differential association theory
D) social disorganization theory
A) subculture theory
B) routine activity theory
C) differential association theory
D) social disorganization theory
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
7
Maneuvering around, trying to access unprotected WiFi networks, is referred to as ______.
A) dumpster diving
B) rootkits
C) script kiddies
D) wardriving
A) dumpster diving
B) rootkits
C) script kiddies
D) wardriving
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
8
Which of the following is not considered one of the responsibilities of the Department of Homeland Security?
A) prevent terrorism and enhance security
B) secure and manage our borders
C) enforce and administer our immigration laws
D) ensure a fast, safe, and effective transportation system
A) prevent terrorism and enhance security
B) secure and manage our borders
C) enforce and administer our immigration laws
D) ensure a fast, safe, and effective transportation system
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
9
Systems utilized by many of the nation's critical infrastructures to provide automated control of the functions of the infrastructure are referred to as ______.
A) firewalls
B) honeypots
C) supervisory control and data acquisition systems
D) intrusion detection systems
A) firewalls
B) honeypots
C) supervisory control and data acquisition systems
D) intrusion detection systems
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
10
The ______ is primarily responsible for intelligence interception and interpretation/decryption.
A) Federal Bureau of Investigation
B) National Security Agency
C) Central Intelligence Agency
D) Defense Intelligence Agency
A) Federal Bureau of Investigation
B) National Security Agency
C) Central Intelligence Agency
D) Defense Intelligence Agency
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
11
According to the text, low socioeconomic status is a predominate marker for engaging in crime in ______.
A) subculture theory
B) routine activity theory
C) differential association theory
D) labeling theory
A) subculture theory
B) routine activity theory
C) differential association theory
D) labeling theory
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
12
In conjunction with local and tribal agencies, the Department of Homeland Security works to do all of the following except ______.
A) analyze cyberthreats and vulnerabilities
B) prevent threat warnings from becoming public knowledge
C) reduce cyberthreats and vulnerabilities
D) coordinate the response to cyberincidents
A) analyze cyberthreats and vulnerabilities
B) prevent threat warnings from becoming public knowledge
C) reduce cyberthreats and vulnerabilities
D) coordinate the response to cyberincidents
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
13
One of the oldest and largest hacker conventions is known as ______.
A) Comicon
B) DEFCON
C) Black Hat
D) ShmooCOn
A) Comicon
B) DEFCON
C) Black Hat
D) ShmooCOn
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
14
According to the routine activities theory, crime is more likely to occur if there is ______.
A) a motivated offender
B) appropriate guardianship
C) a suitable target
D) a predetermined location
A) a motivated offender
B) appropriate guardianship
C) a suitable target
D) a predetermined location
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
15
Although multiple agencies play a role in our nation's cybersecurity, leading the way is the ______.
A) Federal Bureau of Investigation
B) National Security Agency
C) Central Intelligence Agency
D) Defense Intelligence Agency
A) Federal Bureau of Investigation
B) National Security Agency
C) Central Intelligence Agency
D) Defense Intelligence Agency
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
16
Which of the following differential association theory points was not proposed by Edwin Sutherland?
A) Criminal behavior is acquired through interactions with other persons via communication.
B) Learning includes techniques, rationalizations, and attitudes.
C) The process of learning criminal behavior parallels those of any other learning process.
D) Behavior is learned the best in larger social groups.
A) Criminal behavior is acquired through interactions with other persons via communication.
B) Learning includes techniques, rationalizations, and attitudes.
C) The process of learning criminal behavior parallels those of any other learning process.
D) Behavior is learned the best in larger social groups.
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
17
The ______ is primarily responsible for the protection of civilian computers.
A) Department of Defense
B) Department of State
C) Department of Homeland Security
D) Department of Transportation
A) Department of Defense
B) Department of State
C) Department of Homeland Security
D) Department of Transportation
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
18
Hacker subcultures may consist of various identifying factors. Which of the following is NOT likely to be one of those factors?
A) like-minded individuals
B) works common within the subculture
C) a dislike for information technology
D) a like for computer programming
A) like-minded individuals
B) works common within the subculture
C) a dislike for information technology
D) a like for computer programming
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
19
Albert K. Cohen's subculture theory propositions are based on ______.
A) delinquent adult males
B) delinquent adult females
C) delinquent boys
D) delinquent girls
A) delinquent adult males
B) delinquent adult females
C) delinquent boys
D) delinquent girls
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
20
In the 1950s and 1960s, subculture theories began to examine the prevalence of ______.
A) incarcerated females
B) drug abuse among inmates
C) youth gangs
D) racial profiling
A) incarcerated females
B) drug abuse among inmates
C) youth gangs
D) racial profiling
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
21
Cybercrimes operate in a virtual environment, with undefined and specific jurisdictions.
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
22
What role does guardianship have in crime, according to the routine activities theory? Provide examples of types of guardianship.
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
23
The idea that people learn to behave in certain ways based on imitating the behavior of those they are close to applies to only conventional behaviors.
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
24
According to Deputy Attorney General Mark R. Filip, there are three main challenges to policing cybercrimes. What are these? Are there any others that you can think of?
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
25
The most recent era of local-level policing is known as the ______.
A) Political Era
B) Reform Era
C) Homeland Security Era
D) Community Era
A) Political Era
B) Reform Era
C) Homeland Security Era
D) Community Era
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
26
Traditional crimes occur in a specific location/jurisdiction(s) and are thus subjected to the rule of law of that specific jurisdiction.
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
27
An individual who doesn't have the skills to hack on his or her own so uses prewritten programs to do so is referred to as a dumpster diver.
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
28
The role of local-level agencies in cybersecurity is constantly evolving.
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
29
Within criminal justice and criminology, subcultures may include the prison subculture, the criminal subculture, the courtroom working group, etc.
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
30
Public-private partnerships are not necessary for the cybersecurity of our nation.
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
31
According to the differential association theory, criminal behavior is acquired through interactions with other persons via communication.
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
32
The first responders to most catastrophic events are usually at the ______ level.
A) local
B) state
C) federal
D) tribal
A) local
B) state
C) federal
D) tribal
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
33
Entities that have resources to put toward security and may not be subjected to the scrutiny and restrictions are usually in the ______.
A) private sector
B) government sector
C) international sector
D) public sector
A) private sector
B) government sector
C) international sector
D) public sector
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
34
The U.S. government should cooperate not only with national jurisdiction of law enforcement at all levels but the international community and private sector organizations as well.
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
35
Explain the routine activities theory. What are the three factors associated with this theory? Why is motivation an important component? What role does guardianship have in crime, according to the routine activities theory?
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
36
The role of ______ hackers in the collaborator effort of cybersecurity is vital.
A) black hat
B) white hat
C) gray hat
D) red hat
A) black hat
B) white hat
C) gray hat
D) red hat
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
37
Explain the differential association theory. Why is it difficult to apply this theory to cybercrime?
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
38
According to the routine activities theory, guardianship plays a major role in the prevalence of crime.
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
39
Which of the following was NOT identified as an entity that must collaborate and cooperate in order to enhance cyberterrorism deterrence?
A) citizens
B) hackers
C) international community
D) free Internet service providers
A) citizens
B) hackers
C) international community
D) free Internet service providers
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
40
Explain the hacker subculture. What is it? Is it comparable to a criminal subculture?
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck