Questions

User Generated

svryqznefuny4378

Business Finance

Description

Multiple choice questions and answer can be found on text below... Price is firm.

Thanks


Taylor, R., Fritsch, E., & Liederbach, J. & Holt, T. (2015). Digital crime and digital terrorism (3rd ed). Upper Saddle River, N.J.: Pearson. ISBN: 13:978-0-13-345890-9

Unformatted Attachment Preview

Multiple Choice-Week 4 1. Despite the rapid growth of the computer industry, very little research has been done on the nature of cybercrimes and cybercriminals. This is largely because: a. The rapid growth has made it a futile gesture. b. The behavior of cybercriminals does not equate to traditional crime and therefore it is much harder to determine what drives computer criminals. c. Researchers concluded that cybercrime was just a small part of the effect of technology and didn’t merit study. d. The benefits of the new technology far outweighed any downside. 2. Vulnerability within an organization poses the most serious threat since a large percentage of computer crimes are committed by employees of victimized companies. What percentage of these crimes is committed by insiders? a. 73% b. 90% 69% c. 84% 3. What was described as the “world’s first precision guided cybermunition”? a. Military drones b. The “I Love You” virus c. Stuxnet d. Flame 4. Attacks on critical infrastructure have become commonplace since most of it is now available online. How many attempts are made each day to infiltrate the Department of Defense (DOD) computer systems? a. 10 million b. 24 million c. 15 million d. 100 million 5. A worm is a program that reproduces itself over a computer network by breaking into computers much like a virtual hacker. A worm installs itself on to a target computer by: a. Tricking computer users into clicking on an infected email attachment. b. Luring computer users to a fake website where they click on an infected link. c. Sending a message to a computer user with an infected link that advertises a free screen saver. d. Finding a vulnerable computer, penetrating it, and transferring its infected code to that computer. 6. Flash Mobs refer to: a. Formations of individuals in one place and time, coordinated through use of texts, emails, or websites. b. DDos attacks that infect flash drives only c. Malware that attacks flash memory on a computer’s motherboard d. Electronic surges that overwhelm a computer system 7. Steganograpy is a form of secret communication. It hides it data by: a. Encrypting its message so it is unreadable b. Putting malware on a steno machine so human keystrokes are corrupted c. Through use of a picture or sound file. d. Through use of a public key 8. Deterrence Theory says that crime results from: a. A criminal with a personality disorder that is not checked in an early stage of life. b. A criminal who was denied economic opportunities c. Criminals making a choice to commit the crime. d. Criminals learning how to offend from other criminals 9. “Warez” is a term that involves: a. Clothing used to mask identity such as garb worn by the hacking group “Anonymous.” b. Boxes that are color coded to signify different methods of stealing from telecommunication companies c. Overcoming copy protection devices in electronic media. d. Planting worms on computers by tricking users into clicking on a link containing malicious code. 10. A cracker is defined as: a. A malicious hacker. b. A veteran criminal who is adept at safe cracking c. A computer genius who is adept at getting into other users’ computers, but never steals anything from the victim or causes any kind of damage to their computer. d. A “White Hat” hacker 11. Open source software is software that is: a. Users are able to debug much faster b. Capable of being altered by the user c. Believed to be improved when all users are allowed access to it d. All of the above 12. The United States is less vulnerable to cyberattack than other countries like North Korea because we have better technological defense systems here. a. True b. False (We have much more critical infrastructure online than any other country. 13. In 2012, attacks against Saudi Aramco by the Cutting Sword of Justice shut down more than 30,000 computers. This was done by: a. A sophisticated worm that infiltrated the system via an unguarded computer portal and then replicated itself b. A Distributed Denial of Service attack. c. A physical attack on the underground electrical cables that severed power to the computer system. d. A social engineering attack 14. Programme 863 is a Russian program whose purpose is to make “industry financially independent of foreign technology. a. True b. False 15. Holt and Bossler did an empirical study postulating that Routine Activities Theory accounted for: a. Social Engineering b. Child pornography online c. Illegal gambling online d. Online harassment 16. In 2012, what percentage of cybercrime was attributed to organized crime associations? a. 74% b. 78% c. 80% d. 93% 17. What is “Silk Road?” a. An underground website that traded in illegal goods and services b. The “ebay” of drugs and illegal contraband c. A website that used “bitcoins” as its source of electronic currency\ d. Had Ross Ulbricht as its operator and mastermind e. All of the above 18. Money laundering is a process by which: a. Illegally obtained assets are concealed. b. Criminals are more easily caught because they are using the Internet to facilitate transactions. c. Transactions over $10,000 are not scrutinized by the IRS d. E-cash systems are never used. 19. A “spoofed” webpage is used by IT personnel to help computer users manage technical problems by remotely taking control of their computer. a. True b. False 20. Which two of the following are “Urban Legends?” a. Cyanide-laced deposit envelopes b. A TOR network that encrypts messages to hide the identity of the sender c. Cybercriminals using “phishing” to get people to put in their access information like social security numbers and passwords d. Poison Perfume Samples
Purchase answer to see full attachment
User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.

Explanation & Answer

please find the attached file. i look forward to working with you again. good bye

Multiple Choice-Week 4
1. Despite the rapid growth of the computer industry, very little research has been done on
the nature of cybercrimes and cybercriminals. This is largely because:
a. The rapid growth has made it a futile gesture.
b. The behavior of cybercriminals does not equate to traditional crime and
therefore it is much harder to determine what drives computer criminals.
c. Researchers concluded that cybercrime was just a small part of the effect of
technology and didn’t merit study.
d. The benefits of the new technology far outweighed any downside.
2. Vulnerability within an organization poses the most serious threat since a large
percentage of computer crimes are committed by employees of victimized companies.
What percentage of these crimes is committed by insiders?
a. 73%
b. 90%
c. 69%
d. 84%
3. What was described as the “world’s first precision guided cybermunition”?
a. Military drones
b. The “I Love You” virus
c. Stuxnet
d. Flame
4. Attacks on critical infrastructure have become commonplace since most of it is now
available online. Ho...


Anonymous
I was having a hard time with this subject, and this was a great help.

Studypool
4.7
Trustpilot
4.5
Sitejabber
4.4

Similar Content

Related Tags