Deck 12: Computer Crime
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Match between columns
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/63
Play
Full screen (f)
Deck 12: Computer Crime
1
Hacking can include all of the following except:
A)a bank employee checking credit history of bank customers.
B)using the telephone book to target doctors and searching their credit records.
C)checking TRW records for credit ratings.
D)tapping into local credit bureau records.
A)a bank employee checking credit history of bank customers.
B)using the telephone book to target doctors and searching their credit records.
C)checking TRW records for credit ratings.
D)tapping into local credit bureau records.
A
2
WAREZ sites encourage which of the following activities?
A)Violent acts
B)Contact with terrorist cells
C)Copying of copyrighted programs
D)Buying cheap foreign computers
A)Violent acts
B)Contact with terrorist cells
C)Copying of copyrighted programs
D)Buying cheap foreign computers
C
3
The acronym EFT stands for:
A)east fun target.
B)ending fund target.
C)earned from trust.
D)electronic funds transfer.
A)east fun target.
B)ending fund target.
C)earned from trust.
D)electronic funds transfer.
D
4
Which of the following is unlikely to be classed as a computer crime?
A)Phony tax returns
B)Public intoxication
C)Blowing up toilets
D)Pedophilia
A)Phony tax returns
B)Public intoxication
C)Blowing up toilets
D)Pedophilia
Unlock Deck
Unlock for access to all 63 flashcards in this deck.
Unlock Deck
k this deck
5
Hackers first targeted:
A)the stock exchange.
B)the government.
C)schools.
D)banks.
A)the stock exchange.
B)the government.
C)schools.
D)banks.
Unlock Deck
Unlock for access to all 63 flashcards in this deck.
Unlock Deck
k this deck
6
Toll fraud is:
A)avoiding a fee to use a road.
B)avoiding phone charges.
C)avoiding cable television fees.
D)avoiding internet services fees.
A)avoiding a fee to use a road.
B)avoiding phone charges.
C)avoiding cable television fees.
D)avoiding internet services fees.
Unlock Deck
Unlock for access to all 63 flashcards in this deck.
Unlock Deck
k this deck
7
According to Cressey, embezzlers go through a process that includes all of the following except:
A)opportunity.
B)secret financial problem.
C)remorse.
D)rationalizing.
A)opportunity.
B)secret financial problem.
C)remorse.
D)rationalizing.
Unlock Deck
Unlock for access to all 63 flashcards in this deck.
Unlock Deck
k this deck
8
The Masters of Destruction (MOD) corrupted the databases of all of the following companies except:
A)ITT.
B)Sprint.
C)Pacific Bell.
D)Nynex.
A)ITT.
B)Sprint.
C)Pacific Bell.
D)Nynex.
Unlock Deck
Unlock for access to all 63 flashcards in this deck.
Unlock Deck
k this deck
9
In 1996 the General Accounting Office said that hackers had targeted the Pentagon __________ times and gained entry 2 of every 3 times.
A)250,000
B)100,000
C)half a million
D)a million
A)250,000
B)100,000
C)half a million
D)a million
Unlock Deck
Unlock for access to all 63 flashcards in this deck.
Unlock Deck
k this deck
10
Showoffs have which of the following qualities?
A)Goal is to do the most damage
B)Goal is fun, not profit
C)Coasting along looking for doors to open
D)Goal is breaking in
A)Goal is to do the most damage
B)Goal is fun, not profit
C)Coasting along looking for doors to open
D)Goal is breaking in
Unlock Deck
Unlock for access to all 63 flashcards in this deck.
Unlock Deck
k this deck
11
According to the text, the broad but somewhat more specific definition of computer crime can be described as:
A)destruction, theft, unauthorized or illegal use, modification or copying of information, programs, services, equipment, or communication networks.
B)a crime that could not be committed without a computer.
C)crimes using a computer to accomplish their ends.
D)a computer or its periphery used as a weapon.
A)destruction, theft, unauthorized or illegal use, modification or copying of information, programs, services, equipment, or communication networks.
B)a crime that could not be committed without a computer.
C)crimes using a computer to accomplish their ends.
D)a computer or its periphery used as a weapon.
Unlock Deck
Unlock for access to all 63 flashcards in this deck.
Unlock Deck
k this deck
12
The term "hacker" can include all of the following except a(n):
A)norm-violating individual.
B)accidental tourist.
C)curious individual.
D)computer virtuoso.
A)norm-violating individual.
B)accidental tourist.
C)curious individual.
D)computer virtuoso.
Unlock Deck
Unlock for access to all 63 flashcards in this deck.
Unlock Deck
k this deck
13
According to the text, all of the following have been invaded to get credit and debit card information except:
A)Western Union.
B)Yahoo.com.
C)America Online.
D)Egghead.com.
A)Western Union.
B)Yahoo.com.
C)America Online.
D)Egghead.com.
Unlock Deck
Unlock for access to all 63 flashcards in this deck.
Unlock Deck
k this deck
14
Malicious hacking, affecting national security, has affected all of the following except:
A)White House computers.
B)Pacific Fleet computers.
C)Congressional committee files.
D)Boeing Corporation.
A)White House computers.
B)Pacific Fleet computers.
C)Congressional committee files.
D)Boeing Corporation.
Unlock Deck
Unlock for access to all 63 flashcards in this deck.
Unlock Deck
k this deck
15
The average bank robbery nets approximately:
A)$1,200.
B)$3,200.
C)$5,400.
D)$2,100.
A)$1,200.
B)$3,200.
C)$5,400.
D)$2,100.
Unlock Deck
Unlock for access to all 63 flashcards in this deck.
Unlock Deck
k this deck
16
Crackers break which of the following?
A)Government security codes
B)Copy protection codes
C)Password codes
D)Access codes
A)Government security codes
B)Copy protection codes
C)Password codes
D)Access codes
Unlock Deck
Unlock for access to all 63 flashcards in this deck.
Unlock Deck
k this deck
17
In the 1970s a Los Angeles-based insurance company programmed its computers to do all of the following except:
A)fail to pay legitimate claims.
B)sell fake policies to other companies.
C)issue policies on people who did not exist.
D)use reinsurance to disguise indebtedness.
A)fail to pay legitimate claims.
B)sell fake policies to other companies.
C)issue policies on people who did not exist.
D)use reinsurance to disguise indebtedness.
Unlock Deck
Unlock for access to all 63 flashcards in this deck.
Unlock Deck
k this deck
18
Computer crimes may have begun with the use of the blue box. The blue box involved which instrument?
A)Phones
B)Radios
C)Televisions
D)Stereos
A)Phones
B)Radios
C)Televisions
D)Stereos
Unlock Deck
Unlock for access to all 63 flashcards in this deck.
Unlock Deck
k this deck
19
Which one of the following crimes could not be classified as a computer crime?
A)Espionage
B)Scams
C)Assault
D)Sabotage
A)Espionage
B)Scams
C)Assault
D)Sabotage
Unlock Deck
Unlock for access to all 63 flashcards in this deck.
Unlock Deck
k this deck
20
An authorized program planted on a computer is known as a(n):
A)Trojan Horse.
B)Achilles Heel.
C)Sword of Damocles.
D)Cyclops Eye.
A)Trojan Horse.
B)Achilles Heel.
C)Sword of Damocles.
D)Cyclops Eye.
Unlock Deck
Unlock for access to all 63 flashcards in this deck.
Unlock Deck
k this deck
21
Computer crime has become increasingly globalized.
Unlock Deck
Unlock for access to all 63 flashcards in this deck.
Unlock Deck
k this deck
22
Mafiaboy activities affected all of the following except:
A)eBay.
B)Buy.com.
C)Yahoo.com.
D)Amazon.com.
A)eBay.
B)Buy.com.
C)Yahoo.com.
D)Amazon.com.
Unlock Deck
Unlock for access to all 63 flashcards in this deck.
Unlock Deck
k this deck
23
Mafiaboy turned out to be a(n) ____________ Canadian.
A)25-year-old
B)12-year-old
C)15-year-old
D)18-year-old
A)25-year-old
B)12-year-old
C)15-year-old
D)18-year-old
Unlock Deck
Unlock for access to all 63 flashcards in this deck.
Unlock Deck
k this deck
24
The Nigerian scam involved:
A)contributions to overthrow Communist Nigerian government.
B)a fake charity for Nigerian refugees.
C)a smuggling operation to get dissenters out of Nigeria.
D)a ploy using deceptive emails and stories of sequestered funds
A)contributions to overthrow Communist Nigerian government.
B)a fake charity for Nigerian refugees.
C)a smuggling operation to get dissenters out of Nigeria.
D)a ploy using deceptive emails and stories of sequestered funds
Unlock Deck
Unlock for access to all 63 flashcards in this deck.
Unlock Deck
k this deck
25
International cooperation in regards to stealing software has faltered because of minimal economic impact.
Unlock Deck
Unlock for access to all 63 flashcards in this deck.
Unlock Deck
k this deck
26
Stealth programs:
A)hide from virus protection programs.
B)are triggered at some point in the future.
C)infect the host computer.
D)multiply.
A)hide from virus protection programs.
B)are triggered at some point in the future.
C)infect the host computer.
D)multiply.
Unlock Deck
Unlock for access to all 63 flashcards in this deck.
Unlock Deck
k this deck
27
Playpen-mentality hackers have the goal of breaking in.
Unlock Deck
Unlock for access to all 63 flashcards in this deck.
Unlock Deck
k this deck
28
Back door programs:
A)allow entry at will.
B)insert advertisements.
C)attack specific programs.
D)look for passwords.
A)allow entry at will.
B)insert advertisements.
C)attack specific programs.
D)look for passwords.
Unlock Deck
Unlock for access to all 63 flashcards in this deck.
Unlock Deck
k this deck
29
The most effective computer crimes are those perpetrated by experts.
Unlock Deck
Unlock for access to all 63 flashcards in this deck.
Unlock Deck
k this deck
30
The broad but somewhat more specific definition of computer crime can be described as destruction, theft, unauthorized or illegal use, modification or copying of information, programs, services, equipment, or communication networks.
Unlock Deck
Unlock for access to all 63 flashcards in this deck.
Unlock Deck
k this deck
31
Computers can be used to commit all of the following kinds of espionage except:
A)social.
B)international.
C)political.
D)industrial.
A)social.
B)international.
C)political.
D)industrial.
Unlock Deck
Unlock for access to all 63 flashcards in this deck.
Unlock Deck
k this deck
32
The average computer crime nets $500,000.
Unlock Deck
Unlock for access to all 63 flashcards in this deck.
Unlock Deck
k this deck
33
Trap doors or sleepers allow a technique known as salami slicing to loot accounts. This is taking small amounts from a lot of people.
Unlock Deck
Unlock for access to all 63 flashcards in this deck.
Unlock Deck
k this deck
34
Viruses:
A)infect the host computer.
B)multiply.
C)are triggered at some point in the future.
D)hide from virus protection programs.
A)infect the host computer.
B)multiply.
C)are triggered at some point in the future.
D)hide from virus protection programs.
Unlock Deck
Unlock for access to all 63 flashcards in this deck.
Unlock Deck
k this deck
35
Reasons for the Nigerian scam include all of the following except:
A)it has a well-educated populace.
B)it is an oil-rich country with a healthy economy.
C)it uses English as a first language.
D)it is a well-populated country.
A)it has a well-educated populace.
B)it is an oil-rich country with a healthy economy.
C)it uses English as a first language.
D)it is a well-populated country.
Unlock Deck
Unlock for access to all 63 flashcards in this deck.
Unlock Deck
k this deck
36
So-called first generation phone "phreaks" used their talents to steal from checking accounts.
Unlock Deck
Unlock for access to all 63 flashcards in this deck.
Unlock Deck
k this deck
37
If you send out 30,000 e-mails and get only one response, but you get $40.00 per response and you send out a half a million e-mails, how much money can you make?
A)$750,000
B)$100,00
C)$1 million
D)$250,000
A)$750,000
B)$100,00
C)$1 million
D)$250,000
Unlock Deck
Unlock for access to all 63 flashcards in this deck.
Unlock Deck
k this deck
38
The magnitude of Mafiaboy damage was estimated to exceed at least:
A)$1 billion.
B)$100 million.
C)$10 million.
D)$500 million.
A)$1 billion.
B)$100 million.
C)$10 million.
D)$500 million.
Unlock Deck
Unlock for access to all 63 flashcards in this deck.
Unlock Deck
k this deck
39
Coasting along looking for doors to open is a quality of cookbook hackers.
Unlock Deck
Unlock for access to all 63 flashcards in this deck.
Unlock Deck
k this deck
40
A less formal definition of computer crime would be those crimes using a computer to accomplish its ends.
Unlock Deck
Unlock for access to all 63 flashcards in this deck.
Unlock Deck
k this deck
41
Michael Bloomberg was the subject of a computer crime. He was asked to pay a sum of money in return for being advised as to the perpetrator's methods that were used to invade his system. In street crime terms this would be extortion.
Unlock Deck
Unlock for access to all 63 flashcards in this deck.
Unlock Deck
k this deck
42
Shoulder surfers ________________ access codes at airports.
Unlock Deck
Unlock for access to all 63 flashcards in this deck.
Unlock Deck
k this deck
43
Identify and describe the four phases of computer viruses. Practically speaking, how do these stages work and what are the implications in the context of computer crime?
Unlock Deck
Unlock for access to all 63 flashcards in this deck.
Unlock Deck
k this deck
44
Explain what the "dark figure" of computer crime means.
Unlock Deck
Unlock for access to all 63 flashcards in this deck.
Unlock Deck
k this deck
45
The dark figure of crime is crime that is ________________.
Unlock Deck
Unlock for access to all 63 flashcards in this deck.
Unlock Deck
k this deck
46
The easiest way into a computer is through the ________________ door.
Unlock Deck
Unlock for access to all 63 flashcards in this deck.
Unlock Deck
k this deck
47
A simple but effective form of electronic bank robbery used ________________ slips.
Unlock Deck
Unlock for access to all 63 flashcards in this deck.
Unlock Deck
k this deck
48
Discuss why early computer hackers exhibited few characteristics of secondary deviance as defined by Lemert.
Unlock Deck
Unlock for access to all 63 flashcards in this deck.
Unlock Deck
k this deck
49
The virus that overwrites the system, and whose data files download a password-thieving program, destroys files, and is sent to everyone on the contact list was called ________________ Letter.
Unlock Deck
Unlock for access to all 63 flashcards in this deck.
Unlock Deck
k this deck
50
Describe the three state process defined by Cressey that characterized typical embezzlers.
Unlock Deck
Unlock for access to all 63 flashcards in this deck.
Unlock Deck
k this deck
51
A denial of service ________________ shuts down a Web site.
Unlock Deck
Unlock for access to all 63 flashcards in this deck.
Unlock Deck
k this deck
52
A reason for the Nigerian scam is that it has a well-educated populace.
Unlock Deck
Unlock for access to all 63 flashcards in this deck.
Unlock Deck
k this deck
53
Logic bombs hide from virus protection programs.
Unlock Deck
Unlock for access to all 63 flashcards in this deck.
Unlock Deck
k this deck
54
Worms infect the ________________ computer.
Unlock Deck
Unlock for access to all 63 flashcards in this deck.
Unlock Deck
k this deck
55
The fastest-spreading virus is a variation of the________________ virus.
Unlock Deck
Unlock for access to all 63 flashcards in this deck.
Unlock Deck
k this deck
56
Only the ________________ computer criminals are caught.
Unlock Deck
Unlock for access to all 63 flashcards in this deck.
Unlock Deck
k this deck
57
Mafiaboy got caught because he was traced through emails.
Unlock Deck
Unlock for access to all 63 flashcards in this deck.
Unlock Deck
k this deck
58
The motivation for the Masters of Destruction was money.
Unlock Deck
Unlock for access to all 63 flashcards in this deck.
Unlock Deck
k this deck
59
Sniffer programs look for ________________.
Unlock Deck
Unlock for access to all 63 flashcards in this deck.
Unlock Deck
k this deck
60
Examine both domestic and international computer espionage and give examples of each. Why do you think it is more difficult to determine the extent of international espionage?
Unlock Deck
Unlock for access to all 63 flashcards in this deck.
Unlock Deck
k this deck
61
Evaluate and explain why you think it has become so much easier to commit identity theft.
Unlock Deck
Unlock for access to all 63 flashcards in this deck.
Unlock Deck
k this deck
62
Distinguish between the following: Trojan Horse, sniffer, spyware, trap door, logic bomb, stealth virus, and phishing.
Unlock Deck
Unlock for access to all 63 flashcards in this deck.
Unlock Deck
k this deck
63
Match between columns
Unlock Deck
Unlock for access to all 63 flashcards in this deck.
Unlock Deck
k this deck