IS4670 CHAPTER 2 Overview of Computer Crime Flashcards

1
Q
  1. ________ occur when an attacker deprives people of the services they are entitled to access or provide.
A

DoS/DDoS attacks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q
2. Which of the following are types of intellectual property theft? (Select two.)
A. Piracy 
B. Extortion 
C. Theft of trade secrets 
D. Identity theft E. Phishing
A

Piracy

Theft of trade secrets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q
  1. Creating a computer virus is a crime.
    A. True
    B. False
A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q
  1. ________ is unauthorized intrusion into a computer system. The first offense can be punished by a year in jail.
A

Hacking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q
5. Which of the following are forms of fraud? (Select two.)
A. Spamming 
B. Hacking 
C. Phishing 
D. Identity theft 
E. Malware
A

Phishing

Identity theft

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q
  1. Cybercrimes are committed by individuals, groups, and even countries.
    A. True
    B. False
A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q
  1. Which of the following is the name for a suspect’s ability to commit a crime?
    A. Means
    B. Motive
    C. Opportunity
A

Means

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q
  1. The motives of cybercriminals are different from the motives of traditional criminals.
    A. True
    B. False
A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q
  1. Which of the following is not a factor that makes it easy to conduct cybercrime?
    A. It’s easy for criminals to use the Internet to research and plan crimes.
    B. Many systems connected to the Internet are vulnerable.
    C. No one ever finds out because hiding electronic evidence is easy.
    D. Numerous
A

No one ever finds out because hiding electronic evidence is easy.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q
  1. All cybercrime tools are readily available online, many for free.
    A. True
    B. False
A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q
  1. Which of the following should not be reported to a law enforcement agency of some sort?
    A. Intrusions or attacks on networks that deal with sensitive data
    B. Cases of suspected industrial espionage
    C. Cases involving child pornography
    D. Port scans, which are often precursors to cyber attacks
A

Port scans, which are often precursors to cyber attacks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q
  1. The FBI, the Secret Service, ICE, the U.S. Postal Inspection Service, and the ATF have local offices for reporting ________.
A

Federal crimes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly