1.
- An FBI computer crime and security survey revealed that virus attacks continue to be the source of:
Correct Answer
B. The greatest financial loss
Explanation
The given answer suggests that virus attacks are the main source of the greatest financial loss. This implies that out of all the mentioned options (financial loss, proprietary information, and intellectual property), virus attacks cause the most significant financial damage. This information could be derived from the FBI computer crime and security survey, which likely analyzed various cyber threats and their associated financial implications.
2.
- Any illegal behavior directed by means of electronic operations that targets the security of computer systems and the data processed by them is generally reffered to as:
Correct Answer
A. Cybercrime
Explanation
Cybercrime refers to any illegal behavior that is carried out through electronic operations and specifically targets the security of computer systems and the data processed by them. This can include activities such as hacking, identity theft, online fraud, and spreading malware. Cybercriminals exploit vulnerabilities in computer networks and systems to gain unauthorized access, steal sensitive information, disrupt services, and cause financial or reputational damage. The term "cybercrime" encompasses a wide range of illegal activities conducted in the digital realm, highlighting the need for robust cybersecurity measures to protect against such threats.
3.
- Sophisticated criminals use _____________ to cover up their actions and hack into systems of unsuspected consumers.
Correct Answer
C. Unsecured Wi-Fi networks
Explanation
Sophisticated criminals use unsecured Wi-Fi networks to cover up their actions and hack into systems of unsuspected consumers. Unsecured Wi-Fi networks provide an easy entry point for hackers as they can intercept data and gain unauthorized access to connected devices. By using these networks, criminals can remain anonymous and hide their activities, making it difficult to trace back to them. This allows them to exploit the vulnerabilities of unsuspecting consumers and gain unauthorized access to their systems.
4.
- Cybercrime falls into three categories; acomputer is a target of criminal activity; acomputer is n intregal part of the crime , and...
Correct Answer
D. The computer is an incidental part of the crime
Explanation
In this context, the term "incidental" means that the computer is not the main focus or purpose of the crime, but it is still involved or used in some way. This suggests that the criminal activity may not directly target the computer system, but it is still utilized as a tool or medium to facilitate the crime.
5.
- In 2000, the FBI teamed the the U.S. Department of Justice and the national White Collar Center to establish the..
Correct Answer
B. Internet crime Complaint Center
Explanation
The correct answer is "Internet crime Complaint Center". In 2000, the FBI collaborated with the U.S. Department of Justice and the national White Collar Center to establish the Internet Crime Complaint Center. This center serves as a platform for individuals to report internet-related crimes, such as online fraud, identity theft, and cyber harassment. It also provides resources and assistance to law enforcement agencies in investigating and combating internet crimes.
6.
- Although, this crime is not new the Internet is making it one of the signature crimes of the digital era..
Correct Answer
D. Identity theft
Explanation
Identity theft refers to the illegal acquisition and use of someone's personal information, such as their name, social security number, or credit card details, without their consent, usually for financial gain. The statement suggests that while identity theft has been a crime for some time, the internet has made it more prevalent and characteristic of the digital age. This is because the internet provides easy access to personal information and facilitates anonymous transactions, making it easier for criminals to steal identities and carry out fraudulent activities.
7.
- What law made identity theft a federal crime and enabled law enforcement agencies to investigate identity theft crimes?
Correct Answer
A. The identity theft and assumption deterrence act 1998
Explanation
The correct answer is the Identity Theft and Assumption Deterrence Act of 1998. This law made identity theft a federal crime and enabled law enforcement agencies to investigate identity theft crimes.
8.
The average victim of identity theft learns of the theft how many months after the theft?
Correct Answer
C. Fourteen
Explanation
The correct answer is Fourteen. This means that, on average, victims of identity theft discover the theft fourteen months after it has occurred. This suggests that identity theft can often go undetected for a significant period of time before the victim becomes aware of it. This delay in discovery can allow the thief to cause more damage and make it more difficult for the victim to recover their identity and financial security.
9.
This technique in identity theft involves the sending of e-mail messages to online payment accounts to update their records with confidential information that is then used by the identity thieves:
Correct Answer
C. pHishing
Explanation
Phishing is a technique used in identity theft where scammers send deceptive emails to online payment accounts, pretending to be a trusted entity like a bank or a popular website. The emails request the recipients to update their confidential information, such as passwords or credit card details, by clicking on a link provided in the email. However, the link leads to a fake website that collects the entered information, which is then used by the identity thieves for fraudulent activities.
10.
When computer hackers attempt to shut down a network operation by overloading the system, it is referred to as:
Correct Answer
A. Denial of service
Explanation
When computer hackers attempt to shut down a network operation by overloading the system, it is referred to as "Denial of service." This term describes the act of intentionally overwhelming a network or website with excessive traffic or requests, causing it to become inaccessible to legitimate users. This can be done through various means, such as flooding the network with a high volume of data or exploiting vulnerabilities in the system. The goal of a denial of service attack is to disrupt the normal functioning of the targeted network or system.
11.
Another type of hacker commits DOS attacks, disssiminates spam, and defaces websites, believing they are carrying out civil disobedience and to call attention to an issue by their crime. This type of hacker is called a/n:
Correct Answer
B. Hacktivist
Explanation
A hacktivist is a type of hacker who carries out activities such as DOS attacks, spam dissemination, and website defacement with the belief that they are engaging in civil disobedience and bringing attention to a particular issue. Unlike other hackers who may have purely malicious intentions, hacktivists aim to use their actions as a form of activism and protest in the digital realm. They often target organizations or individuals that they perceive as unethical or oppressive, using hacking as a means to voice their dissent and advocate for change.
12.
One of the best methods to stop a virus by a file that arrives from the Internet is to:
Correct Answer
C. Not open the file in the first place
Explanation
The best method to stop a virus from a file that arrives from the Internet is to not open the file in the first place. Opening a file can activate any malicious code embedded within it, potentially infecting the computer with a virus. By refraining from opening suspicious files, the risk of virus infection is significantly reduced.
13.
- This interesting and very subliminal type of virus includes virus hoaxes and other types of chain letters, erroneous security alerts. It can be used to sway, influence or deter your actions. Even the military is researching its potential.
Correct Answer
C. Memetic
Explanation
Memetic is the correct answer because the given description mentions that this type of virus includes virus hoaxes and chain letters, which are examples of memes that spread rapidly through social networks. The description also states that this virus can be used to sway, influence, or deter actions, which aligns with the concept of memes affecting people's behavior and beliefs. The mention of the military researching its potential further supports the idea that memetic viruses have significant impact and are worth studying.
14.
The target of idnetity thieves is often a consumer with poor credit because they will not notice a problem with their credit history.
Correct Answer
B. False
Explanation
The statement is false because identity thieves do not solely target consumers with poor credit. In fact, they target individuals across the credit spectrum. Identity theft can affect anyone, regardless of their credit history. Thieves may use stolen identities to open new lines of credit, make fraudulent purchases, or commit other types of financial fraud. Therefore, it is important for all consumers to be vigilant and regularly monitor their credit history for any signs of fraudulent activity.
15.
Computer hacking is the willful and malicious penetration of a computer system to achieve some purpose.
Correct Answer
A. True
Explanation
Computer hacking refers to the intentional and malicious act of infiltrating a computer system with the intention of achieving a specific objective. This could involve gaining unauthorized access to sensitive information, causing damage or disruption to the system, or using the compromised system for illegal activities. Therefore, the statement "Computer hacking is the willful and malicious penetration of a computer system to achieve some purpose" is accurate and true.