Deck 17: Computer Crime and Digital Forensics

Full screen (f)
exit full mode
Question
A collection of computers that have been infected with blocks of code that can run automatically by themselves is known as a ____.

A)botnet
B)mobisode
C)firewall
D)mash-up
Use Space or
up arrow
down arrow
to flip the card.
Question
Which of the following is true of the Stuxnet worm?

A)It could be transferred only via Internet and lay inactive in offline settings.
B)It only activated when it encountered computers running the Step 2 software.
C)It infected Windows computers and then hid itself.
D)It was discovered in 2011.
Question
Which of the following refers to software designed to harm computers or computer security,engage in criminal activity,or compromise resources in some way?

A)Malware
B)Intrusion-detection software
C)Firewall software
D)Grayware
Question
Which of the following worms infected the monitoring system of a nuclear power plant and was introduced to the system via the corporate network using a USB stick?

A)Slammer
B)Love Bug
C)Storm
D)Conficker
Question
An interesting feature of the _____ worm was that it downloaded the latest version of itself when it entered a computer connected to the Internet and secretly recorded the normal readings and played those back while it did its other work.

A)plotter
B)Stuxnet
C)Trojan horse
D)stylus
Question
A(n)_____ attack is one where hackers overwhelm a computer system or network with so many requests that the system goes down or crashes.

A)CAVE
B)DDoS
C)MD5
D)SSD
Question
A _____ is a computer virus that replicates and spreads itself,not only from file to file,but from computer to computer via e-mail and other Internet traffic.

A)zombie
B)scope creep
C)firewall
D)worm
Question
Which of the following was a feature of the Storm botnet?

A)It could launch DDoS attacks against anti-virus researchers.
B)It could detect and eliminate computer viruses.
C)It could help save information if a system crashed.
D)It could take action and block intrusion attempts.
Question
Which of the following is true of the Conficker worm?

A)It directed users to the Microsoft's Windows update site.
B)It was easily detected because it changed the extensions of files that it infected.
C)It was known as the precursor of the Storm worm.
D)It spread rapidly because one infected machine could infect a whole network.
Question
Which of the following was the most the most common type of computer worm during 2007 and 2008?

A)Plotter
B)Trackball
C)Bot
D)Router
Question
What was the main objective of the Storm botnet?

A)To create zombies that could be rented out to spammers
B)To protect a computer or network from intruders
C)To add features and valuable functions to a system
D)To hide information by scrambling contents of a file
Question
Which of the following is a type of malware?

A)Cookie
B)Virus
C)Cache
D)Scope creep
Question
Which of the following worms was designed to attack Iran's nuclear fuel enrichment centrifuges?

A)Stuxnet
B)Conficker
C)Storm
D)Love Bug
Question
A difference between the Slammer and Stuxnet worm was that the Slammer:

A)was introduced to the system via massive amounts of spam e-mail.
B)was less sophisticated than the Stuxnet.
C)attacked equipment made only by certain Iranian and Finnish manufacturers.
D)did not attack a nuclear power plant.
Question
Which of the following botnets started in early 2007 and wreaked havoc with massive amounts of spam?

A)Love Bug
B)Storm
C)Stuxnet
D)Conficker
Question
A _____ refers to software that was written with malicious intent to cause annoyance or damage.

A)virus
B)plotter
C)feature creep
D)router
Question
A computer infected with bots that can run automatically by themselves and that is part of a botnet is known as a _____ computer.

A)cracker
B)worm
C)virus
D)zombie
Question
The _____ worm was transported from computer to computer using a USB stick and represented a new level in the development of worms because it was a finely honed target seeker.

A)SirCam
B)Storm
C)Stuxnet
D)Klez
Question
Which of the following is the most prevalent computer virus?

A)Plotter
B)Worm
C)Walker
D)Wiki
Question
Gina recently downloaded some online music on her system.Without her knowledge,a type of computer virus downloaded itself along with the music.In the next few days,the virus slowed down her system and reproduced itself onto her roommate's system and others' in the network.In such a scenario,Gina's system is most likely to be affected by a ____.

A)zombie
B)plotter
C)worm
D)Trojan horse
Question
Computer security professionals who are hired by a company to break into a computer system to find security lapses are known as _____ hackers.

A)thrill-seeker
B)black-hat
C)hacktivists
D)white-hat
Question
Which of the following refers to an e-mail sent out intending to frighten people about a virus threat that,in fact,does not exist?

A)E-mail spoofing
B)Virus hoax
C)Key trapper
D)Denial-of-service attack
Question
Which of the following viruses does not replicate itself?

A)Trojan horse
B)Slammer
C)Storm
D)Stuxnet
Question
Zombies which are bot-infected computers are also known as ____.

A)caches
B)drones
C)firewalls
D)script bunnies
Question
Ingrid,Inc. ,a software company,recently had a security lapse when a large number of files on their systems were wiped out due to a hidden virus in the office systems.The company has now decided to hire security professionals whose task will be to regularly check loopholes in computer systems and rectify them.Which of the following type of hackers would Ingrid,Inc. ,need to hire?

A)Counter hackers
B)Thrill-seeker hackers
C)Black-hat hackers
D)Hacktivists
Question
Sally does most of her bank transactions online.Recently,while trying to access her bank details online,she realized that her password was no longer valid.On inquiring with the bank authorities,she found that somebody had fraudulently transacted using her login details and had transferred all her money to an unknown account.Sally was a victim of _____ where cyber criminals were tracking her every mouse click to steal her bank details.

A)spoofing
B)keylogging
C)redacting
D)hacktivism
Question
_____ refer to those who are hired to engage in electronic corporate espionage and other profitable ventures.

A)White-hat hackers
B)Crackers
C)Penetration testers
D)Counter hackers
Question
Which of the following is a family of worms that introduced spoofing?

A)Klez
B)LulzSec
C)Stuxnet
D)Slammer
Question
Which of the following should be undertaken when one receives a viral hoax?

A)Forward it to all contacts in one's address book
B)Ask the sender to not send any further e-mails
C)Delete it immediately
D)Save it on one's desktop
Question
Which of the following refers to politically motivated hackers who use the Internet to send a political message of some kind?

A)Cyberterrorists
B)Hacktivists
C)White-hat hackers
D)Ethical hackers
Question
Which of the following viruses hides inside software that one needs?

A)Mobisode
B)Stylus
C)Zombie
D)Trojan horse
Question
_____ refer to knowledgeable computer users who use their knowledge to invade other people's computers.

A)Zombies
B)Routers
C)Hackers
D)Drones
Question
White-hat hackers are known as ____.

A)ethical hackers
B)script kiddies
C)hacktivists
D)crackers
Question
What is the objective of a denial-of-service (DoS)attack?

A)To prevent legitimate customers from getting into a site to do business
B)To reduce one's server overload
C)To help a user maintain back-up information when a system crashes
D)To provide protection to routers used for domestic purposes
Question
Which of the following kind of hackers exploit or destroy the information they find,steal passwords,create viruses,and bring down computer systems just for amusement?

A)Penetration testers
B)Counter hackers
C)Black-hat hackers
D)White-hat hackers
Question
Which of the following is a Visual Basic script virus?

A)Klez
B)Love Bug
C)SirCam
D)Nimda
Question
_____ refers to the forging of a return address on an e-mail so that the e-mail message appears to come from someone other than the actual sender.

A)Redacting
B)Keylogging
C)Prototyping
D)Spoofing
Question
Which of the following is a difference between cyber war and hacktivism?

A)Hacktivism is better organized than cyber war.
B)Hacktivism is a more targeted attack on national infrastructure compared to cyber war.
C)Hacktivism is better funded than cyber war.
D)Hacktivism is not perpetrated by one nation on another whereas cyber war is.
Question
Tracy recently received an e-mail from a friend,Alice.However,she later got to know from Alice that she had not sent the e-mail.A couple of days later,Tracy's system crashed and she lost all important files from her system.In such a situation,Tracy is MOST likely to be a victim of ____.

A)spoofing
B)keylogging
C)redacting
D)encryption
Question
_____ software is a program used to snoop on people to find out what they are doing on a particular computer by recording every mouse click and keystroke.

A)Black-hat
B)Key trapper
C)Router
D)White-hat
Question
Which of the following is a step undertaken in the collection phase of a digital forensics investigation?

A)Undertaking a live analysis
B)Interpreting information
C)Getting access to where information is stored
D)Scrutinizing findings
Question
The SMX Atomic Research Center,which works and conducts research on nuclear reactors,recently received an anti-nuclear message on the center's Web site.A month later,the center's systems crashed with a certain kind of worm,which was planted in their systems.Which of the following kind of hackers is MOST likely to be responsible for such an action?

A)Hacktivists
B)Ethical hackers
C)Counter hackers
D)Penetration testers
Question
Which of the following is true of flash memory?

A)It functions in the same way as magnetic hard drives.
B)It is divided into traditional blocks of bytes.
C)It is in pages of 2 KB or larger.
D)It does not support solid-state hard drives.
Question
_____ is the collection,authentication,preservation,and examination of electronic information,often for presentation in court.

A)Predictive analytics
B)Digital forensics
C)Encapsulation
D)Rapid prototyping
Question
_____ is a process used by forensics teams to gather information while a system is still running.

A)Feature analysis
B)Custom filter function
C)Crossover
D)Live analysis
Question
_____ refers to the hiding of information inside other information.

A)Steganography
B)Ubiquitous computing
C)Redacting
D)Spoofing
Question
Semantic analysis is also known as ____.

A)prototyping
B)concept searching
C)predictive analytics
D)analytics
Question
Which of the following refers to an authentication coding system that experts use to show sometime in the future that no entry or file has changed in the interim?

A)PKE
B)SHA-1
C)RAM
D)RAD
Question
_____ are politically motivated and seek to cause harm to people or destroy critical systems or information.

A)White-hat hackers
B)Penetration testers
C)Counter hackers
D)Cyberterrorists
Question
_____ space refers to the set of clusters that have been marked as available to store information,but have not yet received a file.

A)Unallocated
B)Unused disk
C)File
D)Slack
Question
What is the first phase of investigation in digital forensics?

A)Interpretation
B)Collection
C)Scrutinization
D)Analysis
Question
Excel allows users to protect their files by:

A)scrambling the contents of a file so that others cannot read it.
B)making the font Hidden so that it is not visible on the page.
C)blacking out portions of the document to eliminate selected text.
D)asking for a password every time one opens the file.
Question
The process of blacking out portions of a document,usually to protect confidential information,so that it cannot be recovered later is known as ____.

A)keylogging
B)redacting
C)spoofing
D)pharming
Question
The process of scrambling the contents of a file so that one cannot read it without the right decryption key is known as ____.

A)keylogging
B)DDoS
C)encryption
D)spoofing
Question
_____ space refers to the space left over at the end of a file to the end of the cluster.

A)Slack
B)Unallocated
C)Assigned
D)Free
Question
Which of the following options can make one delete a file so that the file is not listed in the Recycle Bin?

A)Space + delete
B)Alt + delete
C)Control + delete
D)Shift + delete
Question
Which of the following is a tool that makes it hard or impossible to trace user activity or access data in files?

A)Botnet
B)Cracker
C)Encryption
D)DDoS
Question
The analysis phase of a digital forensics investigation consists of:

A)the recovery of authenticated information.
B)getting access to where information is stored.
C)creating a forensic image copy.
D)data preservation.
Question
Which of the following is the second stage of the collection phase of a digital forensics investigation?

A)Creating a forensic image copy
B)Analyzing findings
C)Getting access to information
D)Using software tools to recover data
Question
As part of a class project,David has been asked by his professor to read up on any social issue.On typing "social issues" into a search engine on the system. ,it displayed many terms including children's rights,environmental issues,women's rights,etc.This occurred because of a software in the system which uses a neural network to find other terms closely related to the search term.In such a scenario,the software is using ____.

A)pattern classification
B)multidimensional analysis
C)feature analysis
D)latent semantic analysis
Question
Malware bots are programs that can detect virus attacks and launch a counterattack.
Question
Stuxnet was the first worm to attack a nuclear plant.
Question
Script bunnies are hackers who have a lot of technical expertise.
Question
A worm is a bot-infected computer.
Question
A rootkit is easy to detect because it runs while the operating system is starting up.
Question
Which law requires companies to implement extensive and detailed policies to prevent illegal activity within the company and respond in a timely manner to investigate illegal activity?

A)The National Origins Act
B)The Glass-Steagall Act
C)The Sarbanes-Oxley Act
D)The Johnson-Reed Act
Question
Computers are involved in two ways in the commission of crime,i.e. ,as targets and as weapons or tools.
Question
A ping is a standard operation that networks use to check that all computers are functioning properly.
Question
The early computer viruses depended on people exchanging infected storage media like disks.
Question
Thrill-seeker hackers break into computer systems for entertainment.
Question
The latest worms are Visual Basic script viruses which cannot run on computers that run Win32 programs.
Question
The difference between cyber war and hacktivism is that hacktivism is better-funded.
Question
If a user's phone has GPS capabilities,one's exact location can be pinpointed in real time.
Question
The term "bot" is sometimes used to mean a compromised machine.
Question
Loan sharking,child pornography,and electronic stalking are crimes in which computers play a part.
Question
A Storm botnet is a virus detection program.
Question
A basic motivation for engaging in digital forensics is to gather and preserve evidence to present in court.
Question
Digital forensics experts are called in to help solve crimes such as terrorist activities and political scandals.
Question
The Trojan-horse virus is designed to quickly replicate itself.
Question
A virus hoax is a virus that is nonexistent.
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/125
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 17: Computer Crime and Digital Forensics
1
A collection of computers that have been infected with blocks of code that can run automatically by themselves is known as a ____.

A)botnet
B)mobisode
C)firewall
D)mash-up
A
Explanation: During 2007 and 2008,the most common type of worm was a bot,a much more sophisticated type of worm.A botnet is a collection of computers that have been infected with blocks of code called bots that can run automatically by themselves.
2
Which of the following is true of the Stuxnet worm?

A)It could be transferred only via Internet and lay inactive in offline settings.
B)It only activated when it encountered computers running the Step 2 software.
C)It infected Windows computers and then hid itself.
D)It was discovered in 2011.
C
Explanation: Stuxnet can enter an organization through an infected removable drive.When plugged into a computer that runs Windows,Stuxnet infects the computer and hides itself.
3
Which of the following refers to software designed to harm computers or computer security,engage in criminal activity,or compromise resources in some way?

A)Malware
B)Intrusion-detection software
C)Firewall software
D)Grayware
A
Explanation: Computer security is a big issue in business.Malware refers to software designed to harm computers or computer security,engage in criminal activity,or compromise resources in some way.
4
Which of the following worms infected the monitoring system of a nuclear power plant and was introduced to the system via the corporate network using a USB stick?

A)Slammer
B)Love Bug
C)Storm
D)Conficker
Unlock Deck
Unlock for access to all 125 flashcards in this deck.
Unlock Deck
k this deck
5
An interesting feature of the _____ worm was that it downloaded the latest version of itself when it entered a computer connected to the Internet and secretly recorded the normal readings and played those back while it did its other work.

A)plotter
B)Stuxnet
C)Trojan horse
D)stylus
Unlock Deck
Unlock for access to all 125 flashcards in this deck.
Unlock Deck
k this deck
6
A(n)_____ attack is one where hackers overwhelm a computer system or network with so many requests that the system goes down or crashes.

A)CAVE
B)DDoS
C)MD5
D)SSD
Unlock Deck
Unlock for access to all 125 flashcards in this deck.
Unlock Deck
k this deck
7
A _____ is a computer virus that replicates and spreads itself,not only from file to file,but from computer to computer via e-mail and other Internet traffic.

A)zombie
B)scope creep
C)firewall
D)worm
Unlock Deck
Unlock for access to all 125 flashcards in this deck.
Unlock Deck
k this deck
8
Which of the following was a feature of the Storm botnet?

A)It could launch DDoS attacks against anti-virus researchers.
B)It could detect and eliminate computer viruses.
C)It could help save information if a system crashed.
D)It could take action and block intrusion attempts.
Unlock Deck
Unlock for access to all 125 flashcards in this deck.
Unlock Deck
k this deck
9
Which of the following is true of the Conficker worm?

A)It directed users to the Microsoft's Windows update site.
B)It was easily detected because it changed the extensions of files that it infected.
C)It was known as the precursor of the Storm worm.
D)It spread rapidly because one infected machine could infect a whole network.
Unlock Deck
Unlock for access to all 125 flashcards in this deck.
Unlock Deck
k this deck
10
Which of the following was the most the most common type of computer worm during 2007 and 2008?

A)Plotter
B)Trackball
C)Bot
D)Router
Unlock Deck
Unlock for access to all 125 flashcards in this deck.
Unlock Deck
k this deck
11
What was the main objective of the Storm botnet?

A)To create zombies that could be rented out to spammers
B)To protect a computer or network from intruders
C)To add features and valuable functions to a system
D)To hide information by scrambling contents of a file
Unlock Deck
Unlock for access to all 125 flashcards in this deck.
Unlock Deck
k this deck
12
Which of the following is a type of malware?

A)Cookie
B)Virus
C)Cache
D)Scope creep
Unlock Deck
Unlock for access to all 125 flashcards in this deck.
Unlock Deck
k this deck
13
Which of the following worms was designed to attack Iran's nuclear fuel enrichment centrifuges?

A)Stuxnet
B)Conficker
C)Storm
D)Love Bug
Unlock Deck
Unlock for access to all 125 flashcards in this deck.
Unlock Deck
k this deck
14
A difference between the Slammer and Stuxnet worm was that the Slammer:

A)was introduced to the system via massive amounts of spam e-mail.
B)was less sophisticated than the Stuxnet.
C)attacked equipment made only by certain Iranian and Finnish manufacturers.
D)did not attack a nuclear power plant.
Unlock Deck
Unlock for access to all 125 flashcards in this deck.
Unlock Deck
k this deck
15
Which of the following botnets started in early 2007 and wreaked havoc with massive amounts of spam?

A)Love Bug
B)Storm
C)Stuxnet
D)Conficker
Unlock Deck
Unlock for access to all 125 flashcards in this deck.
Unlock Deck
k this deck
16
A _____ refers to software that was written with malicious intent to cause annoyance or damage.

A)virus
B)plotter
C)feature creep
D)router
Unlock Deck
Unlock for access to all 125 flashcards in this deck.
Unlock Deck
k this deck
17
A computer infected with bots that can run automatically by themselves and that is part of a botnet is known as a _____ computer.

A)cracker
B)worm
C)virus
D)zombie
Unlock Deck
Unlock for access to all 125 flashcards in this deck.
Unlock Deck
k this deck
18
The _____ worm was transported from computer to computer using a USB stick and represented a new level in the development of worms because it was a finely honed target seeker.

A)SirCam
B)Storm
C)Stuxnet
D)Klez
Unlock Deck
Unlock for access to all 125 flashcards in this deck.
Unlock Deck
k this deck
19
Which of the following is the most prevalent computer virus?

A)Plotter
B)Worm
C)Walker
D)Wiki
Unlock Deck
Unlock for access to all 125 flashcards in this deck.
Unlock Deck
k this deck
20
Gina recently downloaded some online music on her system.Without her knowledge,a type of computer virus downloaded itself along with the music.In the next few days,the virus slowed down her system and reproduced itself onto her roommate's system and others' in the network.In such a scenario,Gina's system is most likely to be affected by a ____.

A)zombie
B)plotter
C)worm
D)Trojan horse
Unlock Deck
Unlock for access to all 125 flashcards in this deck.
Unlock Deck
k this deck
21
Computer security professionals who are hired by a company to break into a computer system to find security lapses are known as _____ hackers.

A)thrill-seeker
B)black-hat
C)hacktivists
D)white-hat
Unlock Deck
Unlock for access to all 125 flashcards in this deck.
Unlock Deck
k this deck
22
Which of the following refers to an e-mail sent out intending to frighten people about a virus threat that,in fact,does not exist?

A)E-mail spoofing
B)Virus hoax
C)Key trapper
D)Denial-of-service attack
Unlock Deck
Unlock for access to all 125 flashcards in this deck.
Unlock Deck
k this deck
23
Which of the following viruses does not replicate itself?

A)Trojan horse
B)Slammer
C)Storm
D)Stuxnet
Unlock Deck
Unlock for access to all 125 flashcards in this deck.
Unlock Deck
k this deck
24
Zombies which are bot-infected computers are also known as ____.

A)caches
B)drones
C)firewalls
D)script bunnies
Unlock Deck
Unlock for access to all 125 flashcards in this deck.
Unlock Deck
k this deck
25
Ingrid,Inc. ,a software company,recently had a security lapse when a large number of files on their systems were wiped out due to a hidden virus in the office systems.The company has now decided to hire security professionals whose task will be to regularly check loopholes in computer systems and rectify them.Which of the following type of hackers would Ingrid,Inc. ,need to hire?

A)Counter hackers
B)Thrill-seeker hackers
C)Black-hat hackers
D)Hacktivists
Unlock Deck
Unlock for access to all 125 flashcards in this deck.
Unlock Deck
k this deck
26
Sally does most of her bank transactions online.Recently,while trying to access her bank details online,she realized that her password was no longer valid.On inquiring with the bank authorities,she found that somebody had fraudulently transacted using her login details and had transferred all her money to an unknown account.Sally was a victim of _____ where cyber criminals were tracking her every mouse click to steal her bank details.

A)spoofing
B)keylogging
C)redacting
D)hacktivism
Unlock Deck
Unlock for access to all 125 flashcards in this deck.
Unlock Deck
k this deck
27
_____ refer to those who are hired to engage in electronic corporate espionage and other profitable ventures.

A)White-hat hackers
B)Crackers
C)Penetration testers
D)Counter hackers
Unlock Deck
Unlock for access to all 125 flashcards in this deck.
Unlock Deck
k this deck
28
Which of the following is a family of worms that introduced spoofing?

A)Klez
B)LulzSec
C)Stuxnet
D)Slammer
Unlock Deck
Unlock for access to all 125 flashcards in this deck.
Unlock Deck
k this deck
29
Which of the following should be undertaken when one receives a viral hoax?

A)Forward it to all contacts in one's address book
B)Ask the sender to not send any further e-mails
C)Delete it immediately
D)Save it on one's desktop
Unlock Deck
Unlock for access to all 125 flashcards in this deck.
Unlock Deck
k this deck
30
Which of the following refers to politically motivated hackers who use the Internet to send a political message of some kind?

A)Cyberterrorists
B)Hacktivists
C)White-hat hackers
D)Ethical hackers
Unlock Deck
Unlock for access to all 125 flashcards in this deck.
Unlock Deck
k this deck
31
Which of the following viruses hides inside software that one needs?

A)Mobisode
B)Stylus
C)Zombie
D)Trojan horse
Unlock Deck
Unlock for access to all 125 flashcards in this deck.
Unlock Deck
k this deck
32
_____ refer to knowledgeable computer users who use their knowledge to invade other people's computers.

A)Zombies
B)Routers
C)Hackers
D)Drones
Unlock Deck
Unlock for access to all 125 flashcards in this deck.
Unlock Deck
k this deck
33
White-hat hackers are known as ____.

A)ethical hackers
B)script kiddies
C)hacktivists
D)crackers
Unlock Deck
Unlock for access to all 125 flashcards in this deck.
Unlock Deck
k this deck
34
What is the objective of a denial-of-service (DoS)attack?

A)To prevent legitimate customers from getting into a site to do business
B)To reduce one's server overload
C)To help a user maintain back-up information when a system crashes
D)To provide protection to routers used for domestic purposes
Unlock Deck
Unlock for access to all 125 flashcards in this deck.
Unlock Deck
k this deck
35
Which of the following kind of hackers exploit or destroy the information they find,steal passwords,create viruses,and bring down computer systems just for amusement?

A)Penetration testers
B)Counter hackers
C)Black-hat hackers
D)White-hat hackers
Unlock Deck
Unlock for access to all 125 flashcards in this deck.
Unlock Deck
k this deck
36
Which of the following is a Visual Basic script virus?

A)Klez
B)Love Bug
C)SirCam
D)Nimda
Unlock Deck
Unlock for access to all 125 flashcards in this deck.
Unlock Deck
k this deck
37
_____ refers to the forging of a return address on an e-mail so that the e-mail message appears to come from someone other than the actual sender.

A)Redacting
B)Keylogging
C)Prototyping
D)Spoofing
Unlock Deck
Unlock for access to all 125 flashcards in this deck.
Unlock Deck
k this deck
38
Which of the following is a difference between cyber war and hacktivism?

A)Hacktivism is better organized than cyber war.
B)Hacktivism is a more targeted attack on national infrastructure compared to cyber war.
C)Hacktivism is better funded than cyber war.
D)Hacktivism is not perpetrated by one nation on another whereas cyber war is.
Unlock Deck
Unlock for access to all 125 flashcards in this deck.
Unlock Deck
k this deck
39
Tracy recently received an e-mail from a friend,Alice.However,she later got to know from Alice that she had not sent the e-mail.A couple of days later,Tracy's system crashed and she lost all important files from her system.In such a situation,Tracy is MOST likely to be a victim of ____.

A)spoofing
B)keylogging
C)redacting
D)encryption
Unlock Deck
Unlock for access to all 125 flashcards in this deck.
Unlock Deck
k this deck
40
_____ software is a program used to snoop on people to find out what they are doing on a particular computer by recording every mouse click and keystroke.

A)Black-hat
B)Key trapper
C)Router
D)White-hat
Unlock Deck
Unlock for access to all 125 flashcards in this deck.
Unlock Deck
k this deck
41
Which of the following is a step undertaken in the collection phase of a digital forensics investigation?

A)Undertaking a live analysis
B)Interpreting information
C)Getting access to where information is stored
D)Scrutinizing findings
Unlock Deck
Unlock for access to all 125 flashcards in this deck.
Unlock Deck
k this deck
42
The SMX Atomic Research Center,which works and conducts research on nuclear reactors,recently received an anti-nuclear message on the center's Web site.A month later,the center's systems crashed with a certain kind of worm,which was planted in their systems.Which of the following kind of hackers is MOST likely to be responsible for such an action?

A)Hacktivists
B)Ethical hackers
C)Counter hackers
D)Penetration testers
Unlock Deck
Unlock for access to all 125 flashcards in this deck.
Unlock Deck
k this deck
43
Which of the following is true of flash memory?

A)It functions in the same way as magnetic hard drives.
B)It is divided into traditional blocks of bytes.
C)It is in pages of 2 KB or larger.
D)It does not support solid-state hard drives.
Unlock Deck
Unlock for access to all 125 flashcards in this deck.
Unlock Deck
k this deck
44
_____ is the collection,authentication,preservation,and examination of electronic information,often for presentation in court.

A)Predictive analytics
B)Digital forensics
C)Encapsulation
D)Rapid prototyping
Unlock Deck
Unlock for access to all 125 flashcards in this deck.
Unlock Deck
k this deck
45
_____ is a process used by forensics teams to gather information while a system is still running.

A)Feature analysis
B)Custom filter function
C)Crossover
D)Live analysis
Unlock Deck
Unlock for access to all 125 flashcards in this deck.
Unlock Deck
k this deck
46
_____ refers to the hiding of information inside other information.

A)Steganography
B)Ubiquitous computing
C)Redacting
D)Spoofing
Unlock Deck
Unlock for access to all 125 flashcards in this deck.
Unlock Deck
k this deck
47
Semantic analysis is also known as ____.

A)prototyping
B)concept searching
C)predictive analytics
D)analytics
Unlock Deck
Unlock for access to all 125 flashcards in this deck.
Unlock Deck
k this deck
48
Which of the following refers to an authentication coding system that experts use to show sometime in the future that no entry or file has changed in the interim?

A)PKE
B)SHA-1
C)RAM
D)RAD
Unlock Deck
Unlock for access to all 125 flashcards in this deck.
Unlock Deck
k this deck
49
_____ are politically motivated and seek to cause harm to people or destroy critical systems or information.

A)White-hat hackers
B)Penetration testers
C)Counter hackers
D)Cyberterrorists
Unlock Deck
Unlock for access to all 125 flashcards in this deck.
Unlock Deck
k this deck
50
_____ space refers to the set of clusters that have been marked as available to store information,but have not yet received a file.

A)Unallocated
B)Unused disk
C)File
D)Slack
Unlock Deck
Unlock for access to all 125 flashcards in this deck.
Unlock Deck
k this deck
51
What is the first phase of investigation in digital forensics?

A)Interpretation
B)Collection
C)Scrutinization
D)Analysis
Unlock Deck
Unlock for access to all 125 flashcards in this deck.
Unlock Deck
k this deck
52
Excel allows users to protect their files by:

A)scrambling the contents of a file so that others cannot read it.
B)making the font Hidden so that it is not visible on the page.
C)blacking out portions of the document to eliminate selected text.
D)asking for a password every time one opens the file.
Unlock Deck
Unlock for access to all 125 flashcards in this deck.
Unlock Deck
k this deck
53
The process of blacking out portions of a document,usually to protect confidential information,so that it cannot be recovered later is known as ____.

A)keylogging
B)redacting
C)spoofing
D)pharming
Unlock Deck
Unlock for access to all 125 flashcards in this deck.
Unlock Deck
k this deck
54
The process of scrambling the contents of a file so that one cannot read it without the right decryption key is known as ____.

A)keylogging
B)DDoS
C)encryption
D)spoofing
Unlock Deck
Unlock for access to all 125 flashcards in this deck.
Unlock Deck
k this deck
55
_____ space refers to the space left over at the end of a file to the end of the cluster.

A)Slack
B)Unallocated
C)Assigned
D)Free
Unlock Deck
Unlock for access to all 125 flashcards in this deck.
Unlock Deck
k this deck
56
Which of the following options can make one delete a file so that the file is not listed in the Recycle Bin?

A)Space + delete
B)Alt + delete
C)Control + delete
D)Shift + delete
Unlock Deck
Unlock for access to all 125 flashcards in this deck.
Unlock Deck
k this deck
57
Which of the following is a tool that makes it hard or impossible to trace user activity or access data in files?

A)Botnet
B)Cracker
C)Encryption
D)DDoS
Unlock Deck
Unlock for access to all 125 flashcards in this deck.
Unlock Deck
k this deck
58
The analysis phase of a digital forensics investigation consists of:

A)the recovery of authenticated information.
B)getting access to where information is stored.
C)creating a forensic image copy.
D)data preservation.
Unlock Deck
Unlock for access to all 125 flashcards in this deck.
Unlock Deck
k this deck
59
Which of the following is the second stage of the collection phase of a digital forensics investigation?

A)Creating a forensic image copy
B)Analyzing findings
C)Getting access to information
D)Using software tools to recover data
Unlock Deck
Unlock for access to all 125 flashcards in this deck.
Unlock Deck
k this deck
60
As part of a class project,David has been asked by his professor to read up on any social issue.On typing "social issues" into a search engine on the system. ,it displayed many terms including children's rights,environmental issues,women's rights,etc.This occurred because of a software in the system which uses a neural network to find other terms closely related to the search term.In such a scenario,the software is using ____.

A)pattern classification
B)multidimensional analysis
C)feature analysis
D)latent semantic analysis
Unlock Deck
Unlock for access to all 125 flashcards in this deck.
Unlock Deck
k this deck
61
Malware bots are programs that can detect virus attacks and launch a counterattack.
Unlock Deck
Unlock for access to all 125 flashcards in this deck.
Unlock Deck
k this deck
62
Stuxnet was the first worm to attack a nuclear plant.
Unlock Deck
Unlock for access to all 125 flashcards in this deck.
Unlock Deck
k this deck
63
Script bunnies are hackers who have a lot of technical expertise.
Unlock Deck
Unlock for access to all 125 flashcards in this deck.
Unlock Deck
k this deck
64
A worm is a bot-infected computer.
Unlock Deck
Unlock for access to all 125 flashcards in this deck.
Unlock Deck
k this deck
65
A rootkit is easy to detect because it runs while the operating system is starting up.
Unlock Deck
Unlock for access to all 125 flashcards in this deck.
Unlock Deck
k this deck
66
Which law requires companies to implement extensive and detailed policies to prevent illegal activity within the company and respond in a timely manner to investigate illegal activity?

A)The National Origins Act
B)The Glass-Steagall Act
C)The Sarbanes-Oxley Act
D)The Johnson-Reed Act
Unlock Deck
Unlock for access to all 125 flashcards in this deck.
Unlock Deck
k this deck
67
Computers are involved in two ways in the commission of crime,i.e. ,as targets and as weapons or tools.
Unlock Deck
Unlock for access to all 125 flashcards in this deck.
Unlock Deck
k this deck
68
A ping is a standard operation that networks use to check that all computers are functioning properly.
Unlock Deck
Unlock for access to all 125 flashcards in this deck.
Unlock Deck
k this deck
69
The early computer viruses depended on people exchanging infected storage media like disks.
Unlock Deck
Unlock for access to all 125 flashcards in this deck.
Unlock Deck
k this deck
70
Thrill-seeker hackers break into computer systems for entertainment.
Unlock Deck
Unlock for access to all 125 flashcards in this deck.
Unlock Deck
k this deck
71
The latest worms are Visual Basic script viruses which cannot run on computers that run Win32 programs.
Unlock Deck
Unlock for access to all 125 flashcards in this deck.
Unlock Deck
k this deck
72
The difference between cyber war and hacktivism is that hacktivism is better-funded.
Unlock Deck
Unlock for access to all 125 flashcards in this deck.
Unlock Deck
k this deck
73
If a user's phone has GPS capabilities,one's exact location can be pinpointed in real time.
Unlock Deck
Unlock for access to all 125 flashcards in this deck.
Unlock Deck
k this deck
74
The term "bot" is sometimes used to mean a compromised machine.
Unlock Deck
Unlock for access to all 125 flashcards in this deck.
Unlock Deck
k this deck
75
Loan sharking,child pornography,and electronic stalking are crimes in which computers play a part.
Unlock Deck
Unlock for access to all 125 flashcards in this deck.
Unlock Deck
k this deck
76
A Storm botnet is a virus detection program.
Unlock Deck
Unlock for access to all 125 flashcards in this deck.
Unlock Deck
k this deck
77
A basic motivation for engaging in digital forensics is to gather and preserve evidence to present in court.
Unlock Deck
Unlock for access to all 125 flashcards in this deck.
Unlock Deck
k this deck
78
Digital forensics experts are called in to help solve crimes such as terrorist activities and political scandals.
Unlock Deck
Unlock for access to all 125 flashcards in this deck.
Unlock Deck
k this deck
79
The Trojan-horse virus is designed to quickly replicate itself.
Unlock Deck
Unlock for access to all 125 flashcards in this deck.
Unlock Deck
k this deck
80
A virus hoax is a virus that is nonexistent.
Unlock Deck
Unlock for access to all 125 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 125 flashcards in this deck.