Deck 17: Cybercrime
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/55
Play
Full screen (f)
Deck 17: Cybercrime
1
The primary purpose of a virus is to
A) replicate itself as many times as possible
B) cause mischief or damage to the infected computer
C) make the computer "sick"
D) Both A and B
A) replicate itself as many times as possible
B) cause mischief or damage to the infected computer
C) make the computer "sick"
D) Both A and B
D
2
A small program that sends itself to other computers,rather than relying on user actions,is a
A) virus.
B) Malicious Mobile Code.
C) Trojan horse.
D) worm.
A) virus.
B) Malicious Mobile Code.
C) Trojan horse.
D) worm.
D
3
Email was created by
A) Al Gore
B) Ray Tomlinson
C) Bill Gates
D) Steve Jobs
A) Al Gore
B) Ray Tomlinson
C) Bill Gates
D) Steve Jobs
B
4
If person(s)of interest are located at a computer-assisted or cybercrime scene,the investigator should
A) use them to help locate all of the possible evidence
B) allow them to access the computer so that the officers can examine its contents
C) keep them in separate rooms
D) none of the above
A) use them to help locate all of the possible evidence
B) allow them to access the computer so that the officers can examine its contents
C) keep them in separate rooms
D) none of the above
Unlock Deck
Unlock for access to all 55 flashcards in this deck.
Unlock Deck
k this deck
5
If no destructive processes are running and no items of evidentiary value on the screen,one step in seizing computer crime evidence is to
A) type c:.
B) boot the computer.
C) unplug the computer.
D) record the serial number of all equipment.
A) type c:.
B) boot the computer.
C) unplug the computer.
D) record the serial number of all equipment.
Unlock Deck
Unlock for access to all 55 flashcards in this deck.
Unlock Deck
k this deck
6
Cybercrime tools and services are being mass marketed on the Internet.They are found on publically accessible web forums,such as Internet Relay Chat (IRC); the major vendors are principally located in
A) Russia
B) Eastern Europe
C) Malaysia.
D) All of the above are correct
A) Russia
B) Eastern Europe
C) Malaysia.
D) All of the above are correct
Unlock Deck
Unlock for access to all 55 flashcards in this deck.
Unlock Deck
k this deck
7
Which of the following is not a type of computer intrusion?
A) virus
B) Trojan Horse
C) shlumping
D) spyware
A) virus
B) Trojan Horse
C) shlumping
D) spyware
Unlock Deck
Unlock for access to all 55 flashcards in this deck.
Unlock Deck
k this deck
8
Which of the following types of cybercriminal is not listed in the taxonomy of cybercriminals?
A) Phisherman
B) Novice
C) Cyberpunk
D) Old guard hacker
A) Phisherman
B) Novice
C) Cyberpunk
D) Old guard hacker
Unlock Deck
Unlock for access to all 55 flashcards in this deck.
Unlock Deck
k this deck
9
The two prerequisites for the emergence of cybercrime were:
A) computers had to be commonplace, and had to be linked in a network.
B) large corporations had to use them for business and financial transactions
C) government had to create laws and business had to create the software
D) none of the above are correct
A) computers had to be commonplace, and had to be linked in a network.
B) large corporations had to use them for business and financial transactions
C) government had to create laws and business had to create the software
D) none of the above are correct
Unlock Deck
Unlock for access to all 55 flashcards in this deck.
Unlock Deck
k this deck
10
The first personal computer was the
A) IBM PC
B) Kenbak-1
C) Apple MacIntosh
D) Radio Shack/Tandy TRS-80
A) IBM PC
B) Kenbak-1
C) Apple MacIntosh
D) Radio Shack/Tandy TRS-80
Unlock Deck
Unlock for access to all 55 flashcards in this deck.
Unlock Deck
k this deck
11
The first online service provider for consumers was
A) America Online (AOL)
B) Time Warner Cable
C) Netzero
D) Delphi
A) America Online (AOL)
B) Time Warner Cable
C) Netzero
D) Delphi
Unlock Deck
Unlock for access to all 55 flashcards in this deck.
Unlock Deck
k this deck
12
This type of evidence does not need to be seized at the scene of a computer-assisted or cybercrime.
A) computers
B) peripherials
C) copiers
D) compact discs
A) computers
B) peripherials
C) copiers
D) compact discs
Unlock Deck
Unlock for access to all 55 flashcards in this deck.
Unlock Deck
k this deck
13
An attack that is intended to overwhelm a person's e-mail account by surreptitiously subscribing it to dozens or even hundreds of mailing lists is called
A) buffer overflow attack.
B) email bomb attack.
C) malware attack.
D) Trojan horse attack.
A) buffer overflow attack.
B) email bomb attack.
C) malware attack.
D) Trojan horse attack.
Unlock Deck
Unlock for access to all 55 flashcards in this deck.
Unlock Deck
k this deck
14
When searching the scene of a computer crime,the best method is with
A) a warrant
B) consent of whoever is there at the time
C) consent of the owner of the computer
D) none of the above are correct
A) a warrant
B) consent of whoever is there at the time
C) consent of the owner of the computer
D) none of the above are correct
Unlock Deck
Unlock for access to all 55 flashcards in this deck.
Unlock Deck
k this deck
15
Which of the following does not rely on infecting a host program which allows it to be programmed to act faster?
A) Virus.
B) Worm.
C) Trojan horse.
D) Malware.
A) Virus.
B) Worm.
C) Trojan horse.
D) Malware.
Unlock Deck
Unlock for access to all 55 flashcards in this deck.
Unlock Deck
k this deck
16
One name for a computer that has been hijacked or taken over by another is
A) jacked computer
B) RAT (remote accessed terminal)
C) zombie
D) none of the above
A) jacked computer
B) RAT (remote accessed terminal)
C) zombie
D) none of the above
Unlock Deck
Unlock for access to all 55 flashcards in this deck.
Unlock Deck
k this deck
17
Transportation hazards when transporting digital evidence that the investigator should be aware of include
A) magnetic fields
B) heat
C) static electricity
D) all of the above
A) magnetic fields
B) heat
C) static electricity
D) all of the above
Unlock Deck
Unlock for access to all 55 flashcards in this deck.
Unlock Deck
k this deck
18
A parent's ability to give consent to search the room of their child may not be valid if
A) the child in question is 18 year old or older
B) pays rent
C) have asserted their right to deny access to their room
D) All of the above are correct
A) the child in question is 18 year old or older
B) pays rent
C) have asserted their right to deny access to their room
D) All of the above are correct
Unlock Deck
Unlock for access to all 55 flashcards in this deck.
Unlock Deck
k this deck
19
The most profitable type of crime is
A) cybercrime
B) drug trafficking
C) bank robbery
D) all of the above
A) cybercrime
B) drug trafficking
C) bank robbery
D) all of the above
Unlock Deck
Unlock for access to all 55 flashcards in this deck.
Unlock Deck
k this deck
20
Which of the following type of cybercriminal is more likely to cause the greatest losses?
A) Phisherman
B) Internal/Insider
C) Petty crook
D) None of the above are correct
A) Phisherman
B) Internal/Insider
C) Petty crook
D) None of the above are correct
Unlock Deck
Unlock for access to all 55 flashcards in this deck.
Unlock Deck
k this deck
21
The investigator should put digital evidence in regular plastic bags to protect it from moisture.
Unlock Deck
Unlock for access to all 55 flashcards in this deck.
Unlock Deck
k this deck
22
A __________is a network of zombies or bots.
Unlock Deck
Unlock for access to all 55 flashcards in this deck.
Unlock Deck
k this deck
23
The first modern electronic computer was completed in 1942.
Unlock Deck
Unlock for access to all 55 flashcards in this deck.
Unlock Deck
k this deck
24
Whereas computer assisted crimes are may be thought of as any crime that uses a computer,in cybercrime,the computer itself is the target.
Unlock Deck
Unlock for access to all 55 flashcards in this deck.
Unlock Deck
k this deck
25
When conducting the preliminary interview about a computer-assisted or cybercrime,the investigators should establish
A) who owns the computers
B) whether they prefer broadband, DSL or T1 connection
C) how often they visit illicit/illegal websites
D) All of the above
A) who owns the computers
B) whether they prefer broadband, DSL or T1 connection
C) how often they visit illicit/illegal websites
D) All of the above
Unlock Deck
Unlock for access to all 55 flashcards in this deck.
Unlock Deck
k this deck
26
There were two prerequisites for the emergence of cybercrime: (1)computers had to be commonplace,and (2)they had to be ________in a network.
Unlock Deck
Unlock for access to all 55 flashcards in this deck.
Unlock Deck
k this deck
27
Which statement about the typical computer hacker is not correct?
A) Hackers are typically male.
B) Hackers tend to be very socially active.
C) Hackers are usually between the ages of 14 and 30.
D) All of the above are correct
A) Hackers are typically male.
B) Hackers tend to be very socially active.
C) Hackers are usually between the ages of 14 and 30.
D) All of the above are correct
Unlock Deck
Unlock for access to all 55 flashcards in this deck.
Unlock Deck
k this deck
28
The FBI and the United States Attorney General play the most prominent roles in investigating computer - assisted and cybercrime.
Unlock Deck
Unlock for access to all 55 flashcards in this deck.
Unlock Deck
k this deck
29
A virus is a small program that sends itself to other computers,rather than relying on user actions,as a virus does.
Unlock Deck
Unlock for access to all 55 flashcards in this deck.
Unlock Deck
k this deck
30
The best reason for the careful packaging of digital evidence is to protect it from
A) remote attacks from other computers
B) attempts by the suspect to damage or destroy it
C) shock and vibration
D) clumsy evidence technicians
A) remote attacks from other computers
B) attempts by the suspect to damage or destroy it
C) shock and vibration
D) clumsy evidence technicians
Unlock Deck
Unlock for access to all 55 flashcards in this deck.
Unlock Deck
k this deck
31
This type of hacker may work for a national government to destroy the operational capabilities of the target.
A) Novice
B) Information/Espionage Warfare
C) Cyberpunks
D) All of the above are correct
A) Novice
B) Information/Espionage Warfare
C) Cyberpunks
D) All of the above are correct
Unlock Deck
Unlock for access to all 55 flashcards in this deck.
Unlock Deck
k this deck
32
This organized crime group is sending its members to get degrees in computer science,software engineering and information systems so that they can commit cybercrimes.
A) Hong Kong Triads
B) Italian-American Mafia
C) Russian Mafiya
D) N'dragheta
A) Hong Kong Triads
B) Italian-American Mafia
C) Russian Mafiya
D) N'dragheta
Unlock Deck
Unlock for access to all 55 flashcards in this deck.
Unlock Deck
k this deck
33
The presence of a/an __________________ may indicate that other evidence may be located on devices away from the primary crime scene.
Unlock Deck
Unlock for access to all 55 flashcards in this deck.
Unlock Deck
k this deck
34
The first online service provider for consumers was America Online (AOL).
Unlock Deck
Unlock for access to all 55 flashcards in this deck.
Unlock Deck
k this deck
35
Oftentimes the would-be buyers of cybercrime tools are themselves scammed out of their money.
Unlock Deck
Unlock for access to all 55 flashcards in this deck.
Unlock Deck
k this deck
36
The denial-of-service (DOS)attack occurs when the service provider suspends service after the subscriber's email account is flooded by thousands of emails in a short period of time.
Unlock Deck
Unlock for access to all 55 flashcards in this deck.
Unlock Deck
k this deck
37
________ refers to the unauthorized entry into a computer system.
Unlock Deck
Unlock for access to all 55 flashcards in this deck.
Unlock Deck
k this deck
38
A/an _______________,may be the most common form of spyware.
Unlock Deck
Unlock for access to all 55 flashcards in this deck.
Unlock Deck
k this deck
39
One motivation for the activities of an old guard hacker is the need for a challenge.
Unlock Deck
Unlock for access to all 55 flashcards in this deck.
Unlock Deck
k this deck
40
When asking for consent to search for computer-related evidence,the investigator is required by law to have the person giving the consent sign a "Consent to Search" waiver.
Unlock Deck
Unlock for access to all 55 flashcards in this deck.
Unlock Deck
k this deck
41
Discuss the creation of the cybercriminal,a new breed of criminal and how they differed from past criminals.
Unlock Deck
Unlock for access to all 55 flashcards in this deck.
Unlock Deck
k this deck
42
Discuss polymorphic and metamorphic viruses.
Unlock Deck
Unlock for access to all 55 flashcards in this deck.
Unlock Deck
k this deck
43
________ is "detonated" when a specific event occurs-for example,all personnel records are erased when an electronic notation is made that a particular person was fired.
Unlock Deck
Unlock for access to all 55 flashcards in this deck.
Unlock Deck
k this deck
44
Discuss the professional criminal typology of cybercriminal,including their characteristics,motivations and skill level
Unlock Deck
Unlock for access to all 55 flashcards in this deck.
Unlock Deck
k this deck
45
A/an __________ is a type of computer intrusion programmed to execute at a particular time or on a particular date.
Unlock Deck
Unlock for access to all 55 flashcards in this deck.
Unlock Deck
k this deck
46
Discuss the differences between "black hatters" and "white hatters."
Unlock Deck
Unlock for access to all 55 flashcards in this deck.
Unlock Deck
k this deck
47
What are the eight steps in documenting the computer crime scene?
Unlock Deck
Unlock for access to all 55 flashcards in this deck.
Unlock Deck
k this deck
48
A ________________ occurs when a botnet herder uses all of his/her zombies to overwhelm even the largest servers.
Unlock Deck
Unlock for access to all 55 flashcards in this deck.
Unlock Deck
k this deck
49
Discuss the physical evidence that an investigator should consider when investigating computer and/or cybercrime.
Unlock Deck
Unlock for access to all 55 flashcards in this deck.
Unlock Deck
k this deck
50
The consent to search must be freely and _______________ given.
Unlock Deck
Unlock for access to all 55 flashcards in this deck.
Unlock Deck
k this deck
51
A specially designed malware package with tools that give the intruder "superpowers" over computers,which allows them,for example,to steal personal information is a ________.
Unlock Deck
Unlock for access to all 55 flashcards in this deck.
Unlock Deck
k this deck
52
Discuss the various types of computer intrusions.
Unlock Deck
Unlock for access to all 55 flashcards in this deck.
Unlock Deck
k this deck
53
Name the types of cybercriminals described in the taxonomy of cybercriminals.
Unlock Deck
Unlock for access to all 55 flashcards in this deck.
Unlock Deck
k this deck
54
Discuss the issues relating to cybercrime/computer/high technology/electronic crime units at the state and local level.
Unlock Deck
Unlock for access to all 55 flashcards in this deck.
Unlock Deck
k this deck
55
Discuss how scareware attacks are executed.
Unlock Deck
Unlock for access to all 55 flashcards in this deck.
Unlock Deck
k this deck