CIS 170 WEEK 5 MIDTERM
CIS 170 Week 5 Midterm
1.
Data alteration
and denial directly targets the computer by attacking the useful information
stored or processed by the computer.
2.
Child
pornography is an example of which type of computer crime?
3.
Agnew argues
that crime is due to a lack of attachment to parents.
4.
_____________ is
designed to impose a sanction on convicted offenders in order to prevent them
from continuing to commit criminal acts in the future
5.
Which of the
following forms of technology expanded the scope of hacker activities?
6.
The primary
avenue of redress for corporations seeking to litigate charges of corporate
espionage is the criminal courts.
7.
What major
category of information warfare/cyber-terror does "cryptography" fall
into?
8.
Which technique
of neutralization occurs when an individual believes that the victim "had
it coming"?
9.
Computer crime
is not an international problem.
10.
An unauthorized
program typically contained within a legitimate program is known as a:
11.
During what
decade did electronic funds transfers (EFT's) begin to expand money laundering
opportunities?
12.
Recent research
has linked the act of music and software piracy to what prominent theory?
13.
Fortune 1000
technology firms report an average of how many espionage attacks per year?
14.
Which of the
following is defined in terms of their activities related to denial of service
attacks?
15.
Traditional
money laundering techniques include all of the following except one. Which
technique below is not a traditional method of money laundering?
16.
Opportunities
for identity crimes have increased primarily because consumers are increasingly
asked to use their social security number as a personal identifier.
17.
A subculture is
a set of values, norms, and beliefs that differ from the dominant culture.
18.
The unique
feature of a worm is that it:
19.
A virus is a
piece of code that attaches itself to other instructions within a computer.
20.
Which of the
following is most true?
21.
A worm is a
program that reproduces itself over a computer network by breaking into
computers much like a virtual hacker.
22.
The United
States is likely the nation that is most vulnerable to digital terrorism.
23.
According to
Merton, a(n) ___________ accepts the goal of economic success but rejects the
institutionalized means to obtain it.
24. The 80s were a pivotal
decade in the trend toward defining hackers as "criminals."
25. One of the primary
tenets of the "hacker code" as conceived by Levy is that information
should be free to all users.
26. Data alteration,
denial of service, network intrusions, thefts of information, and computer
vandalism are examples of which type of computer crime?
27. Research indicates
that individuals with low self control are more likely to view on-line
pornography
28. Which of the following
is defined as a malicious hacker?
29. Virus writers
generally write viruses to steal information and destroy data.
30. Which of the following
is true?
31. What major category of
information warfare/cyber-terror does "web site defacement" fall
into?
32. Hackers were generally
considered to be "criminals" as early as the 60s.
33. The motives for many
writers of malicious software have changed from profit to curiosity and
revenge.
34. What major category of
information warfare/cyber-terror does "data hiding" fall into?
35. Hackers predominantly
associate themselves with illegal acts.
36. What major category of
information warfare/cyber-terror does "cyber-plagues" fall into?
37. This group tends to
define hackers and their activities in terms of the danger associated with
hacking and its sometimes malicious intent.
38. All of the following
terms are used to characterize and describe viruses, except:
39. Which of the following
is NOT one of the four primary environments viruses operate in?
40. Recent studies suggest
that 10 percent of personal computers are infected by malicious software.
41. "Neutralization
techniques" may be defined as:
42. The primary difference
between data alteration and network intrusion is the
43. According to Kohlberg,
right corresponds to seeing one's own needs met, taking responsibility for
oneself, and allowing others to do the same in which stage of moral
development?
44. Criminal statistics on
computer crime are
45. The advent of
large-scale computerized databases in the financial services field has made
embezzlement a more technically-oriented crime requiring more sophisticated
knowledge than was the case 30 years ago.
46. This group tends to
define hackers and their activities in terms of the illegality of hacking.
47. Which type of computer
crime describes actions in which the computer is used only to further a
criminal end? In other words, the computer or data contained therein is not the
object of the crime.
48. Despite its contention
that modern technological advancements are incompatible with fundamentalist
Islam culture, Al-Qaeda has become a primary foe in the digital terrorism area.
49. Hackers appear to
exhibit a subculture that includes:
No comments:
Post a Comment