Deck 10: Investigative Security
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/49
Play
Full screen (f)
Deck 10: Investigative Security
1
Although this crime is not new, the Internet is making it one of the signature crimes of the digital era.
A) fraud
B) identity theft
C) financial transaction fraud
D) credit card fraud
A) fraud
B) identity theft
C) financial transaction fraud
D) credit card fraud
B
2
In 2000, the FBI teamed with the U.S.Department of Justice and the National White Collar Center to establish the:
A) Internet/cybercrime Network
B) Internet Crime Research Center
C) Internet Crime Complaint Center
D) Internet Cybercrime Network
A) Internet/cybercrime Network
B) Internet Crime Research Center
C) Internet Crime Complaint Center
D) Internet Cybercrime Network
C
3
What law made identity theft a federal crime and enabled law enforcement agencies to investigate identity theft crimes?
A) The Identity Theft and Fraud Statute of 1998
B) The Identity Theft Computer Act of 1999
C) The Identity Theft and Assumption Deterrence Act 1998
D) The Identity Theft and Fraudulent Appropriations Act 1998
A) The Identity Theft and Fraud Statute of 1998
B) The Identity Theft Computer Act of 1999
C) The Identity Theft and Assumption Deterrence Act 1998
D) The Identity Theft and Fraudulent Appropriations Act 1998
C
4
The unlawful misappropriation of money or other things of value by the person to whom it was entrusted (typically an employee) for his or her own use or purpose is called:
A) embezzlement
B) forgery
C) mala in se
D) in flagranti delicti
A) embezzlement
B) forgery
C) mala in se
D) in flagranti delicti
Unlock Deck
Unlock for access to all 49 flashcards in this deck.
Unlock Deck
k this deck
5
An FBI computer crime and security survey revealed that virus attacks continue to be the source of:
A) proprietary information
B) financial losses
C) the greatest financial loss
D) intellectual property
A) proprietary information
B) financial losses
C) the greatest financial loss
D) intellectual property
Unlock Deck
Unlock for access to all 49 flashcards in this deck.
Unlock Deck
k this deck
6
When a program can infect other programs by modifying them or inserting itself into the commands of legitimate programs to wreak havoc, we refer to this process as a:
A) virus
B) thread
C) hard-wire
D) scoop
A) virus
B) thread
C) hard-wire
D) scoop
Unlock Deck
Unlock for access to all 49 flashcards in this deck.
Unlock Deck
k this deck
7
In 2006 it was reported that one of the most common forms of identity theft involved what group using fraudulent social security numbers?
A) illegal immigrants
B) terrorists
C) scam artist
D) miscreants
A) illegal immigrants
B) terrorists
C) scam artist
D) miscreants
Unlock Deck
Unlock for access to all 49 flashcards in this deck.
Unlock Deck
k this deck
8
The average victim of identity theft learns of the theft how many months after the theft?
A) Ten
B) Fourteen
C) Twelve
D) Three
A) Ten
B) Fourteen
C) Twelve
D) Three
Unlock Deck
Unlock for access to all 49 flashcards in this deck.
Unlock Deck
k this deck
9
When computer hackers attempt to shut down a network operation by overloading a system, it is referred to as:
A) denial of service
B) denial of entry
C) log on denial
D) denial of system activation
A) denial of service
B) denial of entry
C) log on denial
D) denial of system activation
Unlock Deck
Unlock for access to all 49 flashcards in this deck.
Unlock Deck
k this deck
10
Another type of hacker commits DOS attacks, disseminates spam, and defaces websites, believing they are carrying out civil disobedience and to call attention to an issue by their crime.This type of hacker is called a/n:
A) cyberism
B) hacktivist
C) attack-divas
D) virtual attacks
A) cyberism
B) hacktivist
C) attack-divas
D) virtual attacks
Unlock Deck
Unlock for access to all 49 flashcards in this deck.
Unlock Deck
k this deck
11
Which of the following is not a security tip given to protect computer users from becoming victims of crime?
A) don't accept cookies
B) do not continually use same password
C) keep anti-virus software updated
D) personally know everyone you exchange emails with
A) don't accept cookies
B) do not continually use same password
C) keep anti-virus software updated
D) personally know everyone you exchange emails with
Unlock Deck
Unlock for access to all 49 flashcards in this deck.
Unlock Deck
k this deck
12
Cybercriminals use ____________ names and images to lure internet users who surf the Web for the latest gossip.
A) political figures
B) cybercriminals
C) a-listers
D) mailing lists
A) political figures
B) cybercriminals
C) a-listers
D) mailing lists
Unlock Deck
Unlock for access to all 49 flashcards in this deck.
Unlock Deck
k this deck
13
What has reshaped the way millions of Americans go online?
A) Internet
B) NTCP
C) Cyberlogon
D) Wi-Fi
A) Internet
B) NTCP
C) Cyberlogon
D) Wi-Fi
Unlock Deck
Unlock for access to all 49 flashcards in this deck.
Unlock Deck
k this deck
14
This technique in identity theft involves the sending of e-mail messages to online payment accounts to update their records with confidential information that is then used by the identity thieves:
A) viruses
B) worm holes
C) phishing
D) pooling
A) viruses
B) worm holes
C) phishing
D) pooling
Unlock Deck
Unlock for access to all 49 flashcards in this deck.
Unlock Deck
k this deck
15
What allows an internet user an opportunity to contact virtually anyone with internet access with little fear of being identified or arrested?
A) cyberhacker
B) anonymity
C) crunchers
D) ISP's
A) cyberhacker
B) anonymity
C) crunchers
D) ISP's
Unlock Deck
Unlock for access to all 49 flashcards in this deck.
Unlock Deck
k this deck
16
Sophisticated criminals use ____________________ to cover up their actions and hack into systems of unsuspecting consumers.
A) unsecured computer terminals
B) unsecured Wi-Fi networks
C) unsecured computer systems
D) unsecured intranet systems
A) unsecured computer terminals
B) unsecured Wi-Fi networks
C) unsecured computer systems
D) unsecured intranet systems
Unlock Deck
Unlock for access to all 49 flashcards in this deck.
Unlock Deck
k this deck
17
Cybercrime falls into three categories: a computer is a target of criminal activity; a computer is an integral part of the crime, and
A) the computer is an incidental part of the crime
B) the computer system is used to commit the crime
C) the computer is not related to the crime
D) the computer hardware is the integral part of the crime
A) the computer is an incidental part of the crime
B) the computer system is used to commit the crime
C) the computer is not related to the crime
D) the computer hardware is the integral part of the crime
Unlock Deck
Unlock for access to all 49 flashcards in this deck.
Unlock Deck
k this deck
18
One of the best methods to stop a virus by a file that arrives from the Internet is to:
A) never turn the computer on unless prompted by a known source
B) only use cable systems, not telephone systems
C) not open the file in the first place
D) save it first, and then open it
A) never turn the computer on unless prompted by a known source
B) only use cable systems, not telephone systems
C) not open the file in the first place
D) save it first, and then open it
Unlock Deck
Unlock for access to all 49 flashcards in this deck.
Unlock Deck
k this deck
19
The IC3 2004 Internet Fraud Crime Report indicated that _____________ is by far the most reported computer offense.
A) hacking
B) internet auction fraud
C) computer bilking
D) financial transaction fraud
A) hacking
B) internet auction fraud
C) computer bilking
D) financial transaction fraud
Unlock Deck
Unlock for access to all 49 flashcards in this deck.
Unlock Deck
k this deck
20
Any illegal behavior directed by means of electronic operations that targets the security of computer systems and the data processed by them is generally referred to as:
A) cybercrime
B) cyber chips
C) chipping
D) wormholes
A) cybercrime
B) cyber chips
C) chipping
D) wormholes
Unlock Deck
Unlock for access to all 49 flashcards in this deck.
Unlock Deck
k this deck
21
_______________ are the basic building blocks of restricting network traffic and providing audit trails.
Unlock Deck
Unlock for access to all 49 flashcards in this deck.
Unlock Deck
k this deck
22
A full directory listing should be made to include:
A) GUI listing
B) graphology
C) ownership
D) folder structure
A) GUI listing
B) graphology
C) ownership
D) folder structure
Unlock Deck
Unlock for access to all 49 flashcards in this deck.
Unlock Deck
k this deck
23
_______________ puts information into algorithms to scramble information that is difficult to decipher until the changes are reversed.
Unlock Deck
Unlock for access to all 49 flashcards in this deck.
Unlock Deck
k this deck
24
The Internet Crime Complaint Center's 2005 report indicated that Internet auction fraud was the most reported offense.
Unlock Deck
Unlock for access to all 49 flashcards in this deck.
Unlock Deck
k this deck
25
One major new problem for security personnel and public policing is the use of the computer for cyberstalking.
Unlock Deck
Unlock for access to all 49 flashcards in this deck.
Unlock Deck
k this deck
26
This interesting and very subliminal type of virus includes virus hoaxes and other types of chain letters, erroneous security alerts.It can be used to sway, influence or deter your actions.Even the military is researching its potential.
A) hooks
B) rubes
C) memetic
D) vulcan mind meld (VMM)
A) hooks
B) rubes
C) memetic
D) vulcan mind meld (VMM)
Unlock Deck
Unlock for access to all 49 flashcards in this deck.
Unlock Deck
k this deck
27
The target of identity thieves is an often a consumer with poor credit because they will not notice a problem with their credit history.
Unlock Deck
Unlock for access to all 49 flashcards in this deck.
Unlock Deck
k this deck
28
Companies continue to implement and improve various security measures, such as _____________, which restrict unlawful access and protect system integrity.
Unlock Deck
Unlock for access to all 49 flashcards in this deck.
Unlock Deck
k this deck
29
According to the Bureau of Justice Statistics, a small percentage of companies have been a victim of cybercrime, but they continually review their software to prevent themselves from becoming victims anyways.
Unlock Deck
Unlock for access to all 49 flashcards in this deck.
Unlock Deck
k this deck
30
In 2000, more than a quarter of the government's major agencies failed a computer security review.
Unlock Deck
Unlock for access to all 49 flashcards in this deck.
Unlock Deck
k this deck
31
Banks have been pressured by government officials to improve their password protection for online banking.
Unlock Deck
Unlock for access to all 49 flashcards in this deck.
Unlock Deck
k this deck
32
Establishing a pattern of ____________ is paramount to the investigation and success of prosecution in a sexual misconduct case.
Unlock Deck
Unlock for access to all 49 flashcards in this deck.
Unlock Deck
k this deck
33
Computer hacking is the willful and malicious penetration of a computer system to achieve some purpose.
Unlock Deck
Unlock for access to all 49 flashcards in this deck.
Unlock Deck
k this deck
34
_______________ use unique physical characteristics to identify an individual and give them access to a secure area.
Unlock Deck
Unlock for access to all 49 flashcards in this deck.
Unlock Deck
k this deck
35
People with little technical knowledge can become computer hackers and system crackers just with the information available on the Internet.
Unlock Deck
Unlock for access to all 49 flashcards in this deck.
Unlock Deck
k this deck
36
This virus, like the earlier 1999 Melissa virus, was activated when a user clicked on an e-mail attachment, and it was propagated automatically to all the e-mail addresses found on the user's computer.
A) The Love Bug
B) Borne Identity
C) Gotcha!
D) Spider's Web
A) The Love Bug
B) Borne Identity
C) Gotcha!
D) Spider's Web
Unlock Deck
Unlock for access to all 49 flashcards in this deck.
Unlock Deck
k this deck
37
The typical ____________ investigation begins with a complaint from a citizen that they have been become a victim of a crime.
Unlock Deck
Unlock for access to all 49 flashcards in this deck.
Unlock Deck
k this deck
38
Digital information electronically delivered from one computer system to another, known as "soft goods," has eliminated the temporal and geographic limitations of:
A) carnivores
B) drive transfer
C) sneakernets
D) cryptography
A) carnivores
B) drive transfer
C) sneakernets
D) cryptography
Unlock Deck
Unlock for access to all 49 flashcards in this deck.
Unlock Deck
k this deck
39
Using algorithms to scramble the information on a computer so that the information is not usable unless the changes are reversed, is referred to as:
A) encryption
B) krypton
C) calligraphy
D) stenography
A) encryption
B) krypton
C) calligraphy
D) stenography
Unlock Deck
Unlock for access to all 49 flashcards in this deck.
Unlock Deck
k this deck
40
Worms copy themselves across systems and networks without attaching to a host program and use the Internet to spread themselves.
Unlock Deck
Unlock for access to all 49 flashcards in this deck.
Unlock Deck
k this deck
41
Describe the concept of phishing or spoofing and how it may be used in identity theft.
Unlock Deck
Unlock for access to all 49 flashcards in this deck.
Unlock Deck
k this deck
42
Recent FCC (2007) rules make broadband Internet providers and voice-over Internet protocol companies subject to the 1994 federal law, the Communications Assistance for Law Enforcement Act, which requires telecom carriers to design their networks so they can quickly intercept communications and deliver them to the government when presented with a ________________________.
Unlock Deck
Unlock for access to all 49 flashcards in this deck.
Unlock Deck
k this deck
43
Cybercrime fall into three categories.List the three categories and describe how they are utilized.
Unlock Deck
Unlock for access to all 49 flashcards in this deck.
Unlock Deck
k this deck
44
The first investigative step in computer fraud, etc., is to find the ________ ______________ address of the individual that defrauded the complainant.
Unlock Deck
Unlock for access to all 49 flashcards in this deck.
Unlock Deck
k this deck
45
What is the purpose of the Internet Crime Complaint Center and how should private security personnel utilize this?
Unlock Deck
Unlock for access to all 49 flashcards in this deck.
Unlock Deck
k this deck
46
The most useful information is who __________ for various aspects of the spam operation.
Unlock Deck
Unlock for access to all 49 flashcards in this deck.
Unlock Deck
k this deck
47
List and describe the top ten tips that can be utilized to improve your computer security.
Unlock Deck
Unlock for access to all 49 flashcards in this deck.
Unlock Deck
k this deck
48
Discuss the concepts of CERT and CIRT teams.Why are these teams important to computer security?
Unlock Deck
Unlock for access to all 49 flashcards in this deck.
Unlock Deck
k this deck
49
The FBI designed and developed a sophisticated electronic surveillance and monitoring device, now called DCS1000, which is a digital collector of data.This device provides the FBI with a "surgical" ability to intercept and collect communications that are the subject of a lawful court order while ignoring those which they are not authorized to intercept.Its original name was _____________.
Unlock Deck
Unlock for access to all 49 flashcards in this deck.
Unlock Deck
k this deck