1. Is worms similar to viruses that reproduce themselves and subvert computer systems but can spread with no assistance?
Answer
Correct Answer:
True
Note: This Question is unanswered, help us to find answer for this one
2. _____ is known as hackers who work to protect systems rather than harm them.
Answer
Correct Answer:
“white hat” hackers
Note: This Question is unanswered, help us to find answer for this one
3. _____ is defined as a secret, malicious computer program hidden within other programs.
Answer
Correct Answer:
Trojan horse
Note: This Question is unanswered, help us to find answer for this one
4. _____ is creates a false (shadow) version of a website that is controlled by the attacker.
Answer
Correct Answer:
Spoofing
Note: This Question is unanswered, help us to find answer for this one
5. Is salami techniques a computer crime in which small slices (amounts of money) are taken from many accounts and transferred to that of the thief?
Answer
Correct Answer:
True
Note: This Question is unanswered, help us to find answer for this one
6. _____ is known as entails a cracker stealing password, account, or credit card information.
Answer
Correct Answer:
Phishing
Note: This Question is unanswered, help us to find answer for this one
7. _____ is defined as items that are in high demand to be stolen.
Answer
Correct Answer:
Hot products
Note: This Question is unanswered, help us to find answer for this one
8. _____ is that there should be no restrictions on their right to surf the Internet and test systems.
Answer
Correct Answer:
Hacker’s ethic
Note: This Question is unanswered, help us to find answer for this one
9. Is hackers unwanted electronic guests regardless of motive?
Answer
Correct Answer:
True
Note: This Question is unanswered, help us to find answer for this one
10. _____ is known as procedures that ask a panel of experts to predict the future.
Answer
Correct Answer:
Delphi techniques
Note: This Question is unanswered, help us to find answer for this one
11. _____ is defined as crime that uses the computer as a tool in crime commission.
Answer
Correct Answer:
Cybercrime
Note: This Question is unanswered, help us to find answer for this one
12. _____ is the idea that change takes place unevenly— technological changes take place far more quickly than the social aspects of a culture such as its laws and customs.
Answer
Correct Answer:
Cultural lag
Note: This Question is unanswered, help us to find answer for this one
13. Is crackers ill-intended hackers who attempt to crack (break into) computer systems, often in order to do damage?
Answer
Correct Answer:
True
Note: This Question is unanswered, help us to find answer for this one
14. _____ is known as the stereotypical hacker who is a criminal.
Answer
Correct Answer:
“Black hat” hacker
Note: This Question is unanswered, help us to find answer for this one
15. Dos and ddos attacks use _______ to prevent authorized users from accessing the system resources.
Answer
Correct Answer:
SYN
Note: This Question is unanswered, help us to find answer for this one
16. An internet-based crime is referred to as a(n) ____ crime.
Answer
Correct Answer:
Cyber
Note: This Question is unanswered, help us to find answer for this one
17. Web spoofing is creating a false (shadow) version of a website controlled by the attacker.
Answer
Correct Answer:
True
Note: This Question is unanswered, help us to find answer for this one
18. The concept that there should be no restrictions on a hacker’s right to surf the net is referred to as ______.
Answer
Correct Answer:
Hacker’s ethics
Note: This Question is unanswered, help us to find answer for this one
19. Which of the following were identified as British Home Office Predictions?
Answer
Correct Answer:
All of these
Note: This Question is unanswered, help us to find answer for this one
20. The TV show in which online predators were lured on Internet chat rooms to show up at the homes of minors whose parents were supposedly not home was called ______.
Answer
Correct Answer:
To Catch a Predator
Note: This Question is unanswered, help us to find answer for this one
21. The development of newer synthetic drugs like ecstasy poses future challenges for crime control.
Answer
Correct Answer:
True
Note: This Question is unanswered, help us to find answer for this one
22. Which of the following were identified as ways to keep children safe on the internet?
Answer
Correct Answer:
Parents should play a more proactive role in monitoring their children’s use of the internet.
Note: This Question is unanswered, help us to find answer for this one
23. ______ are subprograms (hidden in a program) that contain a virus, bomb, or other harmful feature.
Answer
Correct Answer:
Trojan horses
Note: This Question is unanswered, help us to find answer for this one
24. Manifest functions are unanticipated, unintended, hidden functions of social change.
Answer
Correct Answer:
False
Note: This Question is unanswered, help us to find answer for this one
25. Which of the following were identified as crime predictions?
Answer
Correct Answer:
All of these
Note: This Question is unanswered, help us to find answer for this one
26. Delphi techniques are procedures that ask a panel of experts to predict the future.
Answer
Correct Answer:
True
Note: This Question is unanswered, help us to find answer for this one
27. The Youth Internet Safety Survey found that ______ percent of the young people they surveyed reported having been the victims of reputed harassment (threats, rumors, or other offensive behavior) during the past year.
Answer
Correct Answer:
Six
Note: This Question is unanswered, help us to find answer for this one
28. Doing psychological harm to or inciting physical harm against others, thereby breaching laws relating to the protection of the person, is an example of ______.
Answer
Correct Answer:
Cyberviolence
Note: This Question is unanswered, help us to find answer for this one
29. ______ is the idea that technological changes take place far more quickly than the social aspects of a culture such as its laws and customs.
Answer
Correct Answer:
Cultural lag
Note: This Question is unanswered, help us to find answer for this one
30. Approximately 80 percent of cybercrime is committed by “insiders” or employees.
Answer
Correct Answer:
True
Note: This Question is unanswered, help us to find answer for this one
31. Cyberterrorism includes all of the following except ______.
Answer
Correct Answer:
Overt communications
Note: This Question is unanswered, help us to find answer for this one