CIS 170 Midterm
1
Data alteration and denial directly targets the computer by
attacking the useful information stored or processed by the computer.
2
Child pornography is an example of which type of computer
crime?
3
Agnew argues that crime is due to a lack of attachment to
parents.
4
_____________ is designed to impose a sanction on convicted
offenders in order to prevent them from continuing to commit criminal acts in
the future
5
Which of the following forms of technology expanded the
scope of hacker activities?
6
The primary avenue of redress for corporations seeking to
litigate charges of corporate espionage is the criminal courts.
7
What major category of information warfare/cyber-terror does
“cryptography” fall into?
8
Which technique of neutralization occurs when an individual
believes that the victim “had it coming”?
9
Computer crime is not an international problem.
10
An unauthorized program typically contained within a
legitimate program is known as a:
11
During what decade did electronic funds transfers (EFT’s)
begin to expand money laundering opportunities?
12
Recent research has linked the act of music and software
piracy to what prominent theory?
13
Fortune 1000 technology firms report an average of how many
espionage attacks per year?
14
Which of the following is defined in terms of their
activities related to denial of service attacks?
15
Traditional money laundering techniques include all of the
following except one. Which technique below is not a traditional method of
money laundering?
16
Opportunities for identity crimes have increased primarily
because consumers are increasingly asked to use their social security number as
a personal identifier.
17
A subculture is a set of values, norms, and beliefs that differ
from the dominant culture.
18
The unique feature of a worm is that it:
19
A virus is a piece of code that attaches itself to other
instructions within a computer.
20
Which of the following is most true?
21
A worm is a program that reproduces itself over a computer
network by breaking into computers much like a virtual hacker.
22
The United States is likely the nation that is most
vulnerable to digital terrorism.
23
According to Merton, a(n) ___________ accepts the goal of
economic success but rejects the institutionalized means to obtain it.
24
The 80s were a pivotal decade in the trend toward defining
hackers as “criminals.”
25
One of the primary tenets of the “hacker code” as conceived
by Levy is that information should be free to all users.
26
Data alteration, denial of service, network intrusions,
thefts of information, and computer vandalism are examples of which type of
computer crime?
27
Research indicates that individuals with low self control
are more likely to view on-line pornography
28
Which of the following is defined as a malicious hacker?
29
Virus writers generally write viruses to steal information
and destroy data.
30
Which of the following is true?
31
What major category of information warfare/cyber-terror does
“web site defacement” fall into?
32
Hackers were generally considered to be “criminals” as early
as the 60s.
33
The motives for many writers of malicious software have
changed from profit to curiosity and revenge.
34
What major category of information warfare/cyber-terror does
“data hiding” fall into?
35
Hackers predominantly associate themselves with illegal
acts.
36
What major category of information warfare/cyber-terror does
“cyber-plagues” fall into?
37
This group tends to define hackers and their activities in
terms of the danger associated with hacking and its sometimes malicious intent.
38
All of the following terms are used to characterize and
describe viruses, except:
39
Which of the following is NOT one of the four primary environments
viruses operate in?
40
Recent studies suggest that 10 percent of personal computers
are infected by malicious software.
41
“Neutralization techniques” may be defined as:
42
The primary difference between data alteration and network
intrusion is the
43
According to Kohlberg, right corresponds to seeing one’s own
needs met, taking responsibility for oneself, and allowing others to do the
same in which stage of moral development?
44
Criminal statistics on computer crime are
45
The advent of large-scale computerized databases in the
financial services field has made embezzlement a more technically-oriented
crime requiring more sophisticated knowledge than was the case 30 years ago.
46
This group tends to define hackers and their activities in
terms of the illegality of hacking.
47
Which type of computer crime describes actions in which the
computer is used only to further a criminal end? In other words, the computer
or data contained therein is not the object of the crime.
48
Despite its contention that modern technological
advancements are incompatible with fundamentalist Islam culture, Al-Qaeda has
become a primary foe in the digital terrorism area.
0 comments:
Post a Comment