Deck 3: Computer and Internet Crime
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/90
Play
Full screen (f)
Deck 3: Computer and Internet Crime
1
A zero-day attack is an attack on an information system that takes advantage of a particular system vulnerability before the security community or system developer knows about the vulnerability or has been able to repair it. Such attacks are quite common and occur nearly everyday.
False
2
Although the necessity of security is obvious, it must often be balanced against other business needs and issues. As a result, most organizations spend 5 percent or less of their overall IT budget on information security.
True
3
The Computer Fraud and Abuse Act addresses identity theft.
False
4
A completed risk assessment identifies the most dangerous threats to a company and helps focus security efforts on the areas of highest payoff.
Unlock Deck
Unlock for access to all 90 flashcards in this deck.
Unlock Deck
k this deck
5
Crackers break into other people's networks and systems to cause harm-defacing Web pages, crashing computers, and spreading harmful programs or hateful messages.
Unlock Deck
Unlock for access to all 90 flashcards in this deck.
Unlock Deck
k this deck
6
The USA Patriot Act defines cyberterrorism as hacking attempts that cause $5,000 in aggregate damage in one year, damage to medical equipment, or injury to any person. Because the $5,000 threshold is easy to exceed, many young people who have been involved in what they consider to be "minor computer pranks" have found that they meet the criteria to be tried as cyberterrorists.
Unlock Deck
Unlock for access to all 90 flashcards in this deck.
Unlock Deck
k this deck
7
Individuals committed to trustworthy computing take a pledge to not send viruses and worms and to refrain from spamming others.
Unlock Deck
Unlock for access to all 90 flashcards in this deck.
Unlock Deck
k this deck
8
According to the 2008 CSI Computer Crime and Security Survey, virus related incidents were the most common security incident.
Unlock Deck
Unlock for access to all 90 flashcards in this deck.
Unlock Deck
k this deck
9
Fraud often involves some form of collusion, or cooperation, between an employee and an outsider.
Unlock Deck
Unlock for access to all 90 flashcards in this deck.
Unlock Deck
k this deck
10
Rootkit is a set of programs that enables its users to gain administrator level access to a computer without the end user's consent or knowledge. Fortunately, rootkits are fairly easy to discover and remove from infected computers.
Unlock Deck
Unlock for access to all 90 flashcards in this deck.
Unlock Deck
k this deck
11
Societe Generale, France's second largest banking establishment, had long had a reputation for having poor internal controls. It is no wonder that a relatively inexperienced trader was able to take advantage of the bank's system of weak internal controls to exceed his trading limit and cause the bank to lose more than €4.9 billion.
Unlock Deck
Unlock for access to all 90 flashcards in this deck.
Unlock Deck
k this deck
12
A distributed denial-of-service attack keeps the target so busy responding to a stream of automated requests that legitimate users cannot access the target.
Unlock Deck
Unlock for access to all 90 flashcards in this deck.
Unlock Deck
k this deck
13
The cost of creating an e-mail campaign for a product or a service can easily exceed the cost of a direct-mail campaign. Such an e-mail campaign also typically takes longer to develop.
Unlock Deck
Unlock for access to all 90 flashcards in this deck.
Unlock Deck
k this deck
14
A hacktivist is a person who wishes to destroy the infrastructure components of financial institutions, utilities, and emergency response units.
Unlock Deck
Unlock for access to all 90 flashcards in this deck.
Unlock Deck
k this deck
15
The security of any system or network is a combination of technology, policy, and people and requires a surprisingly narrow range of activities to be effective.
Unlock Deck
Unlock for access to all 90 flashcards in this deck.
Unlock Deck
k this deck
16
Phishing frequently leads consumers to counterfeit Web sites designed to trick them into initiating a denial-of-service attack.
Unlock Deck
Unlock for access to all 90 flashcards in this deck.
Unlock Deck
k this deck
17
Unlike a computer worm, which requires users to spread infected files to other users, a virus is a harmful program that resides in the active memory of the computer and duplicates itself. A virus can propagate without human intervention.
Unlock Deck
Unlock for access to all 90 flashcards in this deck.
Unlock Deck
k this deck
18
Industrial espionage and competitive intelligence are the same thing.
Unlock Deck
Unlock for access to all 90 flashcards in this deck.
Unlock Deck
k this deck
19
The use of smart cards which contain a memory chip that is updated with encrypted data every time the card is used, is much more popular in the United States than Europe.
Unlock Deck
Unlock for access to all 90 flashcards in this deck.
Unlock Deck
k this deck
20
The cost to repair the worldwide damage done by a computer worm has exceeded $1 billion on more than one occasion.
Unlock Deck
Unlock for access to all 90 flashcards in this deck.
Unlock Deck
k this deck
21
The Societe Generale employee alleged to have committed fraud against the firm that resulted in a loss to the bank of some €4.9 billion was ____.
A) Robert Richardson
B) Jerome Kerviel
C) Daniel Boulton
D) Nicholas Sarkozy
A) Robert Richardson
B) Jerome Kerviel
C) Daniel Boulton
D) Nicholas Sarkozy
Unlock Deck
Unlock for access to all 90 flashcards in this deck.
Unlock Deck
k this deck
22
A security policy details exactly what needs to be done and how it must be accomplished.
Unlock Deck
Unlock for access to all 90 flashcards in this deck.
Unlock Deck
k this deck
23
It is estimated that about one in ____ personal computers in the United States is part of a botnet.
A) two
B) four
C) six
D) eight
A) two
B) four
C) six
D) eight
Unlock Deck
Unlock for access to all 90 flashcards in this deck.
Unlock Deck
k this deck
24
Installation of a corporate firewall is the most common security precaution taken by business. Once a good firewall is in place, the organization is safe from future attacks.
Unlock Deck
Unlock for access to all 90 flashcards in this deck.
Unlock Deck
k this deck
25
Whenever possible, automated system rules should mirror an organization's written policies.
Unlock Deck
Unlock for access to all 90 flashcards in this deck.
Unlock Deck
k this deck
26
____ viruses have become a common and easily created form of virus. Attackers use an application macro language to create these programs that infect documents and templates.
A) Macro
B) Logic bomb
C) Trojan horse
D) Application
A) Macro
B) Logic bomb
C) Trojan horse
D) Application
Unlock Deck
Unlock for access to all 90 flashcards in this deck.
Unlock Deck
k this deck
27
Organizations must define employee roles so that a single employee can input as well as approve purchase orders. Such action is needed to provide adequate redundancy in the event of a pandemic or other form of disaster.
Unlock Deck
Unlock for access to all 90 flashcards in this deck.
Unlock Deck
k this deck
28
A(n) ____ is a term for any sort of general attack on an information system that takes advantage of a particular system vulnerability.
A) exploit
B) zero-day attack
C) virus
D) worm
A) exploit
B) zero-day attack
C) virus
D) worm
Unlock Deck
Unlock for access to all 90 flashcards in this deck.
Unlock Deck
k this deck
29
____ is a form of Trojan horse which executes when it is triggered by a specific event such as a change in a particular files, by typing a specific series of keystrokes, or by a specific time or date.
A) Distributed denial-of-service attack
B) Logic bomb
C) Botnet
D) Worm
A) Distributed denial-of-service attack
B) Logic bomb
C) Botnet
D) Worm
Unlock Deck
Unlock for access to all 90 flashcards in this deck.
Unlock Deck
k this deck
30
Antivirus software works to prevent an attack by blocking viruses, malformed packets, and other threats from getting into the protected network.
Unlock Deck
Unlock for access to all 90 flashcards in this deck.
Unlock Deck
k this deck
31
While it is important that employees should be well aware of an organization's security policies, this information should not be shared with part-time workers and contractors.
Unlock Deck
Unlock for access to all 90 flashcards in this deck.
Unlock Deck
k this deck
32
____ was a worm that was released in 2007 and caused billions of dollars in damages.
A) Melissa
B) SirCam
C) Code Red
D) Storm
A) Melissa
B) SirCam
C) Code Red
D) Storm
Unlock Deck
Unlock for access to all 90 flashcards in this deck.
Unlock Deck
k this deck
33
An organization can never be prepared for the worst-a successful attack that defeats all or some of a system's defenses and damages data and information systems.
Unlock Deck
Unlock for access to all 90 flashcards in this deck.
Unlock Deck
k this deck
34
____ is a form of security incident that first registered on the CSI Computer Crime and Security Survey in 2007.
A) Laptop theft
B) Denial of service
C) Instant messaging abuse
D) Insider abuse
A) Laptop theft
B) Denial of service
C) Instant messaging abuse
D) Insider abuse
Unlock Deck
Unlock for access to all 90 flashcards in this deck.
Unlock Deck
k this deck
35
It is not unusual for a security audit to reveal that too many people have access to critical data and that many people have capabilities beyond those needed to perform their jobs.
Unlock Deck
Unlock for access to all 90 flashcards in this deck.
Unlock Deck
k this deck
36
Some IT security experts warn that is will not be long before we see ____ aimed at smartphones to steal user's data or turn them into remote-controlled bots.
A) denial-of-service attacks
B) zero-day attacks
C) zombies
D) exploits
A) denial-of-service attacks
B) zero-day attacks
C) zombies
D) exploits
Unlock Deck
Unlock for access to all 90 flashcards in this deck.
Unlock Deck
k this deck
37
A ____ attack keeps the target so busy responding to a stream of automated requests that legitimate users cannot get in.
A) botnet
B) rootkit
C) logic bomb
D) distributed denial-of-service
A) botnet
B) rootkit
C) logic bomb
D) distributed denial-of-service
Unlock Deck
Unlock for access to all 90 flashcards in this deck.
Unlock Deck
k this deck
38
Often a successful attack on an information system is due to poor system design or implementation. Once such a vulnerability is discovered, software developers quickly create and issue a ____ to eliminate the problem.
A) patch
B) bot
C) logic bomb
D) Trojan horse
A) patch
B) bot
C) logic bomb
D) Trojan horse
Unlock Deck
Unlock for access to all 90 flashcards in this deck.
Unlock Deck
k this deck
39
An intrusion prevention system is software and/or hardware that monitors system and network resources and activities, and notifies network security personnel when it identifies possible intrusions from outside the organization or misuse from within the organization.
Unlock Deck
Unlock for access to all 90 flashcards in this deck.
Unlock Deck
k this deck
40
Discussing security attacks through public trials and the associated publicity has not only enormous potential costs in public relations but real monetary costs as well.
Unlock Deck
Unlock for access to all 90 flashcards in this deck.
Unlock Deck
k this deck
41
A strong security program begins by ____.
A) assessing the threats to an organization's computers and network
B) authorizing a large budget to pay for the necessary hardware and software
C) hiring a chief security officer
D) monitoring the network for potential intrusions
A) assessing the threats to an organization's computers and network
B) authorizing a large budget to pay for the necessary hardware and software
C) hiring a chief security officer
D) monitoring the network for potential intrusions
Unlock Deck
Unlock for access to all 90 flashcards in this deck.
Unlock Deck
k this deck
42
The ____ is a partnership between the Department of Homeland Security and the public and private sectors, established in 2003 to protect the nation's Internet infrastructure against cyberattacks.
A) Carnegie Mellon's Computer Response Team
B) U.S. Computer Emergency Readiness Team
C) The National Institute of Standards and Technology
D) The Science and Technology Directorate of Homeland Security
A) Carnegie Mellon's Computer Response Team
B) U.S. Computer Emergency Readiness Team
C) The National Institute of Standards and Technology
D) The Science and Technology Directorate of Homeland Security
Unlock Deck
Unlock for access to all 90 flashcards in this deck.
Unlock Deck
k this deck
43
The ____ code portion of a rootkit gets the rootkit installation started and can be easily activated by clicking on a link to a malicious Website in an e-mail or opening an infected .pdf file.
A) logic bomb
B) zombie
C) dropper
D) loader
A) logic bomb
B) zombie
C) dropper
D) loader
Unlock Deck
Unlock for access to all 90 flashcards in this deck.
Unlock Deck
k this deck
44
Part of a thorough security risk assessment is to determine how each threat can be ____ so that it becomes much less likely to occur or, if it does occur, has less of an impact on the organizations.
A) detected
B) mitigated
C) eliminated
D) overcome
A) detected
B) mitigated
C) eliminated
D) overcome
Unlock Deck
Unlock for access to all 90 flashcards in this deck.
Unlock Deck
k this deck
45
The concept of ____ recognizes that managers must use their judgment to ensure that the cost of control does not exceed the system's benefits or the risks involved.
A) internal control
B) reasonable assurance
C) separation of duties
D) risk assessment
A) internal control
B) reasonable assurance
C) separation of duties
D) risk assessment
Unlock Deck
Unlock for access to all 90 flashcards in this deck.
Unlock Deck
k this deck
46
____ have become the primary means for distributing spam, malware, and phishing scams.
A) Spear-phishers
B) Hackers
C) Botnets
D) Logic bombs
A) Spear-phishers
B) Hackers
C) Botnets
D) Logic bombs
Unlock Deck
Unlock for access to all 90 flashcards in this deck.
Unlock Deck
k this deck
47
The ____ is a Federal law that primarily addresses unlawful access to stored electronic communications.
A) USA Patriot Act
B) Computer Fraud and Abuse Act
C) US Code Title 18, Part I, Chapter 121
D) Identity Theft and Assumption Deterrence Act
A) USA Patriot Act
B) Computer Fraud and Abuse Act
C) US Code Title 18, Part I, Chapter 121
D) Identity Theft and Assumption Deterrence Act
Unlock Deck
Unlock for access to all 90 flashcards in this deck.
Unlock Deck
k this deck
48
A security policy outlines what needs to be done but not ____ to do it.
A) when
B) where
C) how
D) who
A) when
B) where
C) how
D) who
Unlock Deck
Unlock for access to all 90 flashcards in this deck.
Unlock Deck
k this deck
49
Rootkits are designed so cleverly that it is difficult to even discover if they are installed on a computer. The fundamental problem with trying to detect a rootkit is that the operating system cannot be trusted to provide ____.
A) valid test results
B) correct system logon ids
C) the correct date and time
D) sufficent memory for operations
A) valid test results
B) correct system logon ids
C) the correct date and time
D) sufficent memory for operations
Unlock Deck
Unlock for access to all 90 flashcards in this deck.
Unlock Deck
k this deck
50
____ is an annual gathering in Las Vegas of computer hackers.
A) Woodstock
B) DEFCON
C) Computer Security Institute convention
D) CAPTCHA
A) Woodstock
B) DEFCON
C) Computer Security Institute convention
D) CAPTCHA
Unlock Deck
Unlock for access to all 90 flashcards in this deck.
Unlock Deck
k this deck
51
A software and/or hardware device that monitors system and network resources and activities, and notifies network security personnel when it identifies possible intrusions from outside the organization or misuse from within the organization is a(n) ____.
A) anti-virus device
B) intrusion prevention system
C) intrusion detection system
D) network monitor
A) anti-virus device
B) intrusion prevention system
C) intrusion detection system
D) network monitor
Unlock Deck
Unlock for access to all 90 flashcards in this deck.
Unlock Deck
k this deck
52
A(n) ____ works to prevent an attack by blocking viruses, malformed packets, and other threats from getting into the protected network.
A) anti-virus software
B) intrusion prevention system
C) intrusion detection system
D) network monitor
A) anti-virus software
B) intrusion prevention system
C) intrusion detection system
D) network monitor
Unlock Deck
Unlock for access to all 90 flashcards in this deck.
Unlock Deck
k this deck
53
____ is (are) the abuse of e-mail systems to send unsolicited e-mail to large numbers of people.
A) Botnets
B) E-mail spam
C) Logic bombs
D) Worms
A) Botnets
B) E-mail spam
C) Logic bombs
D) Worms
Unlock Deck
Unlock for access to all 90 flashcards in this deck.
Unlock Deck
k this deck
54
Installation of a(n) ____ is the most common computer security precaution taken by businesses.
A) emergency response team
B) intrusion detection device
C) intrusion prevention device
D) firewall
A) emergency response team
B) intrusion detection device
C) intrusion prevention device
D) firewall
Unlock Deck
Unlock for access to all 90 flashcards in this deck.
Unlock Deck
k this deck
55
The ____ is a nonregulatory federal agency within the U.S. Department of Commerce whose Computer Security Division develops security standards and technology against threats to the confidentiality, integrity, and availability of information and services.
A) The Science and Technology Directorate of the Department of Homeland Security
B) The U.S. Computer Emergency Response Team
C) Carnegie Mellon Computer Emergency Response Team
D) National Institute of Standards and Technology
A) The Science and Technology Directorate of the Department of Homeland Security
B) The U.S. Computer Emergency Response Team
C) Carnegie Mellon Computer Emergency Response Team
D) National Institute of Standards and Technology
Unlock Deck
Unlock for access to all 90 flashcards in this deck.
Unlock Deck
k this deck
56
Edward Davidson ran a spamming operation out of his home that sent hundreds of thousands of spam e-mails. The header information of these e-mails concealed the actual sender from the recipient of the e-mail, a violation of the ____ Act.
A) Patriot
B) CAPTCHA
C) CAN-SPAM
D) Do Not Call
A) Patriot
B) CAPTCHA
C) CAN-SPAM
D) Do Not Call
Unlock Deck
Unlock for access to all 90 flashcards in this deck.
Unlock Deck
k this deck
57
Chinese hackers have repeatedly hacked into systems to intercept e-mails between U.S. and UK officials. This is an example of ____.
A) hacktivism
B) industrial spying
C) cyberterrorism
D) cracking
A) hacktivism
B) industrial spying
C) cyberterrorism
D) cracking
Unlock Deck
Unlock for access to all 90 flashcards in this deck.
Unlock Deck
k this deck
58
The ____ is a type of computer crime perpetrator whose primary motive is to achieve a financial gain.
A) industrial spy
B) cracker
C) cracker
D) cybercriminal
A) industrial spy
B) cracker
C) cracker
D) cybercriminal
Unlock Deck
Unlock for access to all 90 flashcards in this deck.
Unlock Deck
k this deck
59
Spammers can defeat the registration process of free e-mail services by launching a coordinated ____ attack that can sign up for thousands of untraceable e-mail accounts.
A) distributed denial-of-service attack
B) bot
C) CAPTCHA
D) logic bomb
A) distributed denial-of-service attack
B) bot
C) CAPTCHA
D) logic bomb
Unlock Deck
Unlock for access to all 90 flashcards in this deck.
Unlock Deck
k this deck
60
____ has made a strong commitment to support trustworthy computing and defined four pillars of trustworthy computing.
A) IBM
B) Microsoft
C) Oracle
D) Hewlett Packard
A) IBM
B) Microsoft
C) Oracle
D) Hewlett Packard
Unlock Deck
Unlock for access to all 90 flashcards in this deck.
Unlock Deck
k this deck
61
The use of legal techniques to gather information that is publicly available in order to learn about a competitor is called ____________________.
Unlock Deck
Unlock for access to all 90 flashcards in this deck.
Unlock Deck
k this deck
62
A(n) ____________________ is a program in which malicious code is hidden inside a seemingly harmless program.
Unlock Deck
Unlock for access to all 90 flashcards in this deck.
Unlock Deck
k this deck
63
The ____________________ Act went into effect in 2004 and states that it is legal to spam provided messages meet a few basic requirements.
Unlock Deck
Unlock for access to all 90 flashcards in this deck.
Unlock Deck
k this deck
64
Using e-mail fraudulently to try to get the recipient to reveal personal data is called ____________________.
Unlock Deck
Unlock for access to all 90 flashcards in this deck.
Unlock Deck
k this deck
65
An employee who seeks to disrupt his firm's information systems or to use them to seek financial gain is called a(n) ____________________.
Unlock Deck
Unlock for access to all 90 flashcards in this deck.
Unlock Deck
k this deck
66
People, motivated by the potential for monetary gain, who hack into corporate computers to steal are called ____________________.
Unlock Deck
Unlock for access to all 90 flashcards in this deck.
Unlock Deck
k this deck
67
According to a 2008 CSI Computer Crime and Security Survey, 53 percent of the responding organizations spend 5 percent or less of their overall ____________________ on information security.
Unlock Deck
Unlock for access to all 90 flashcards in this deck.
Unlock Deck
k this deck
68
To initiate a denial-of-service attack, a tiny program is downloaded surreptitiously from the attacker's computer to dozens, hundreds, or even thousands of computers all over the world. Based on a command by the attacker or at a preset time, these computers called ____________________ go into action, each sending a simple request for access to the target site again and again.
Unlock Deck
Unlock for access to all 90 flashcards in this deck.
Unlock Deck
k this deck
69
Estimates of the rate at which software vulnerabilities are discovered around the world ____________________.
Unlock Deck
Unlock for access to all 90 flashcards in this deck.
Unlock Deck
k this deck
70
Spammers can defeat the registration process of free e-mail services by launching a coordinated bot attack that can sign up for thousands of e-mail accounts. A partial solution to this problem is the use of ____________________ to ensure that only humans obtain free accounts.
Unlock Deck
Unlock for access to all 90 flashcards in this deck.
Unlock Deck
k this deck
71
A(n) ____________________ is a type of Trojan horse which executes when it is triggered by a specific event.
Unlock Deck
Unlock for access to all 90 flashcards in this deck.
Unlock Deck
k this deck
72
A card, similar to a debit or credit card which contains a memory chip that is updated with encrypted data every time the card is used is called a ____________________.
Unlock Deck
Unlock for access to all 90 flashcards in this deck.
Unlock Deck
k this deck
73
The sending of fraudulent e-mails to the employees in a specific organization in an attempt to gain personal information is called ____________________.
Unlock Deck
Unlock for access to all 90 flashcards in this deck.
Unlock Deck
k this deck
74
The cooperation between an employee and company outsider to steal money from a firm is called ____________________.
Unlock Deck
Unlock for access to all 90 flashcards in this deck.
Unlock Deck
k this deck
75
People who test the limitations of information systems out of intellectual curiosity to see whether they can gain access and how far they can go are called ____________________.
Unlock Deck
Unlock for access to all 90 flashcards in this deck.
Unlock Deck
k this deck
76
A large group of computers controlled from one or more remote locations by hackers without the knowledge or consent of their owners is called a ____________________.
Unlock Deck
Unlock for access to all 90 flashcards in this deck.
Unlock Deck
k this deck
77
____________________ differ from viruses in that they propagate without human intervention, sending copies of themselves to other computers by e-mail or Internet Relay Chat.
Unlock Deck
Unlock for access to all 90 flashcards in this deck.
Unlock Deck
k this deck
78
Most viruses deliver a "payload" or ____________________ software that causes the computer to behave in an unexpected way.
Unlock Deck
Unlock for access to all 90 flashcards in this deck.
Unlock Deck
k this deck
79
People who use illegal means to obtain trade secrets from a competitor are called ____________________.
Unlock Deck
Unlock for access to all 90 flashcards in this deck.
Unlock Deck
k this deck
80
Spam is a form of low-cost commercial advertising. It may also be used to deliver harmful worms or other ____________________.
Unlock Deck
Unlock for access to all 90 flashcards in this deck.
Unlock Deck
k this deck