Professional Documents
Culture Documents
https://uvu.instructure.com/courses/67279/quizzes/133623
ACC-4800
Quizzes
Chapter 15
Chapter 15
Instructions:
Questions 46 Questions Limits No Time Limit Unlimited Attempts Points 46 pts possible Due Date Jun 18 at 11am Availability Always available
1. Compile the exploit. 2. Download the exploit. 3. Run a web bug against the web site. 4. Stealth scan. 5. Go to a hacker site. 5, 2, 1, 4, and 3. 0% of points 4, 5, 2, 1, and 3. 100% of points 3, 4, 5, 2, and 1. 0% of points 1, 2, 3, 4, and 5. 0% of points 0/1 Question 4: 1 pts Wardialing is a technique that is used:
1 of 10
6/18/2012 5:37 PM
https://uvu.instructure.com/courses/67279/quizzes/133623
None of the above. 0% of points To locate modem tones. 100% of points By telemarketers to automatically call phone numbers. 0% of points To find other hackers on the Internet. 0% of points To create a brute force attack. 0% of points 1/1 Question 5: 1 pts A zone transfer allows the hacker to get a list of: None of the above. 0% of points The IP addresses of the topic company officials at the targeted website. 0% of points Other hackers who have exploited a website. 0% of points A list of trusted websites. 100% of points 0/1 Question 6: 1 pts A hacker scanning a web server is likely to be identified by the target's website: None of the above. 0% of points Through the target's web server's logs. 100% of points By the local phone company's forensic investigators. 0% of points With help from the ISP's logs. 0% of points Because of the FBI's Carnivore scanning program. 0% of points 1/1 Question 7: 1 pts The main reason for IP spoofing is: To acquire confidential information about an individual. 0% of points To allow the attacker's web server to pretend to be a trusted website. 0% of points To scan a website. 0% of points Both b and d. 100% of points To fake an e-mail address. 0% of points 0/1 Question 8: 1 pts The backdoor on a network or PC: Is hidden software used to enter an already compromised website by the hacker at a later date. 100% of points Is an actual physical entry point into the back of a web server. 0% of points None of the above. 0% of points Is a hidden modem on a network. 0% of points 1/1 Question 9: 1 pts
2 of 10
6/18/2012 5:37 PM
https://uvu.instructure.com/courses/67279/quizzes/133623
If an attacker calls the e-mail help desk posing as a company executive on a business trips who has lost her password, and consequently talks the help desk receptionist into giving out a password, such actions are known as: None of the above. 0% of points Help desk exploits. 0% of points Social engineering. 100% of points IP spoofing. 0% of points Mail bombing. 0% of points 1/1 Question 10: 1 pts In order for the stealing of data to be a criminal act, it may be necessary to prove that the: All of the above. 0% of points Criminal was over 21. 0% of points Data was important to the company. 0% of points Data had been analyzed, and it was valued information. 100% of points Criminal intentionally stole the data. 0% of points 0/1 Question 11: 1 pts Which of the following activities is most likely to be a cybercrime? Having a virtual presence in my web server. 0% of points None of the above. 0% of points Assessing the mail port on my web server. 100% of points Using a bot to check a website for price information. 0% of points Stealing my electronic impulse. 0% of points 0/1 Question 12: 1 pts A form of steganography is: Chaffing. 100% of points Scanning. 0% of points Social engineering. 0% of points Spoofing. 0% of points None of the above. 0% of points 1/1 Question 13: 1 pts One problem with enacting legislation against cybercrimes is: These laws prevent the advancement of e-commerce. 0% of points The technology quickly makes the laws outdated. 100% of points Many of the laws are a violation of the U.S. Constitution's right regarding self incrimination. 0% of points The laws violate the rights of innocent third parties.
3 of 10
6/18/2012 5:37 PM
https://uvu.instructure.com/courses/67279/quizzes/133623
0% of points All of the above. 0% of points 0/1 Question 14: 1 pts According to the report, Cybercrime ... and Punishment? Archaic Laws Threaten Global Information, which of the following countries does not need to update its cybercrime laws? Mexico. 0% of points Great Britain. 0% of points None of the above. 0% of points Germany. 0% of points Peru. 100% of points 0/1 Question 15: 1 pts A "protected computer" under federal legislation is generally recognized as: None of the above. 0% of points A PC used in interstate commerce. 0% of points Any U.S. government computer. 0% of points A criminal's computer. 0% of points Any PC of interest to the federal government. 100% of points 0/1 Question 16: 1 pts How is the value of a loss from a cybercrime defined under federal statutes (Section 814)? All of the above are defined as losses under Section 814. 100% of points Value of lost revenue. 0% of points Cost of restoring the system. 0% of points Losses from responding to the attack. 0% of points 1/1 Question 17: 1 pts When an attacker breaks into your PC then: It is the victim's fault. 0% of points It is definitely a crime. 0% of points The best defense is to shut off your PC. 0% of points None of the above. 0% of points It may be a crime. 100% of points 1/1 Question 18: 1 pts A cover file in a steganographic message: None of the above. 0% of points Is the folder that covers up the secret message and removing the folder reveals the secret message.
4 of 10
6/18/2012 5:37 PM
https://uvu.instructure.com/courses/67279/quizzes/133623
0% of points Carries the dispersed portions of the secret message that is being sent. 100% of points Is used to carry the secret message key. 0% of points Is used to carry a decoy message so as to mislead investigators trying to find the secret message. 0% of points 0/1 Question 19: 1 pts Under the Council of Europe Convention's recommendations, a corporation has a recognizable liability if: An employee destroys data on a partner-company's computer. 0% of points The corporation's computers are used in a denial of service attack. 0% of points An employee commits a criminal act due to a lack of supervision. 100% of points All of the above. 0% of points The corporation is negligent in maintaining its website. 0% of points 0/1 Question 20: 1 pts Which of the following terms (or suffix derivative) is not one of the three D's found in state cybercrime legislation? Destroying. 0% of points Damaging. 0% of points Deleting. 0% of points Debilitating. 100% of points None of the above. 0% of points 1/1 Question 21: 1 pts Wardriving is primarily used to gain access to: LANs. 0% of points Biometric systems. 0% of points Hard drives. 0% of points Wireless networks. 100% of points 1/1 Question 22: 1 pts Hackers use port scans primarily to: Identify potential targets. 100% of points To steal credit card numbers. 0% of points To ensure that no one is trying to identify their physical location. 0% of points To send spam. 0% of points 1/1 Question 23: 1 pts In committing financial frauds, cybercriminals use Trojans primarily to: Gain unauthorized access to a PC. 100% of points
5 of 10
6/18/2012 5:37 PM
https://uvu.instructure.com/courses/67279/quizzes/133623
Port scans. 0% of points IP spoofing. 0% of points Send mail bombs. 0% of points 1/1 Question 24: 1 pts When a cybercriminal uses hundreds of linked zombie computers to carry out a fraud, the linked computers are called: Botnet. 100% of points Bot herd. 0% of points Zombienet. 0% of points A zombie line. 0% of points 1/1 Question 25: 1 pts Title 18 USC 1030: Deals with "protected computers." 100% of points Provides more extensive protections for computer users than the Council of Europe's Model Law. 0% of points Is a state law. 0% of points Has been superseded by the Patriot Act. ' 0% of points 0/1 Question 26: 1 pts
The most common illegal activity under the states codes of computer crimes is:
Unauthorized access. 100% of points Destroying a computer. 0% of points Computer tampering. 0% of points Port scanning. 0% of points 1/1 Question 27: 1 pts
Cybercrime statistics indicate that the largest number of frauds occur in which of the following business sectors?
Marketing sector. 0% of points Retail sector. 0% of points Manufacturing sector. 0% of points
6 of 10
6/18/2012 5:37 PM
https://uvu.instructure.com/courses/67279/quizzes/133623
Of the following cyber attack methods used to gain unauthorized access to a computer network, which is the oldest approach:
Social engineering. 100% of points Port access. 0% of points Trusted server access. 0% of points War driving. 0% of points 1/1 Question 32: 1 pts
To help hide your IP address as you surf the Internet, it would be helpful to use:
A whois site. 0% of points Network stumbler. 0% of points A proxy server. 100% of points A zone transfer. 0% of points 1/1 Question 34: 1 pts
7 of 10
6/18/2012 5:37 PM
https://uvu.instructure.com/courses/67279/quizzes/133623
Many cybercrime fraud statutes have their foundation based under a states:
Criminal statutes. 0% of points Fraud statutes. 0% of points Property crime statutes. 100% of points Computer crime statutes. 0% of points 0/1 Question 35: 1 pts
Warped graphics are used at many registration sites. These morphed letters must be filled in before it is possible to complete the registration information. Why are warped graphics used at these sites?
To keep bots from registering. 100% of points The federal government requires that certain sites use warped graphics in their registration process. 0% of points To make sure blind people cannot register at the site. 0% of points These are English language sites only, and the warped graphics help ensure that only English language readers use the site. 0% of points 1/1 Question 36: 1 pts
Where application programs are no longer located on the users PC, but rather inside the Internet cloud.
100% of points 1/1 Question 37: 1 pts
_________ is a process that can be used with an exploit to gain unauthorized access to a wireless system.
IP spoofing. 0% of points Wardriving. 100% of points Chaffing. 0% of points Wardialing. 0% of points 1/1 Question 38: 1 pts
_________can be used to ensnare unsuspecting Internet users and company managers into giving up resources and information to an online criminal.
Smurfing. 0% of points Social engineering. 100% of points Port scans. 0% of points Bots. 0% of points 1/1 Question 39: 1 pts
The most costly crimes against organizations are most likely from:
Financial frauds. 100% of points Denial of service attacks.
8 of 10
6/18/2012 5:37 PM
https://uvu.instructure.com/courses/67279/quizzes/133623
0% of points Virus infections. 0% of points Laptop theft. 0% of points 1/1 Question 40: 1 pts
Which of the following is not a technique specifically used to gain unauthorized access?
Wardriving. 0% of points Social Engineering. 0% of points Steganography. 100% of points Modem Attack. 0% of points 1/1 Question 41: 1 pts
A technique whereby data packets are used to hide files in their headers is called:
Chaffing. 100% of points Telnet. 0% of points Spoofing. 0% of points MACs. 0% of points 1/1 Question 42: 1 pts
9 of 10
6/18/2012 5:37 PM
https://uvu.instructure.com/courses/67279/quizzes/133623
If I am involved in receiving checks and then transfer a portion of the cash proceeds to an overseas account, I am called a:
Horse. 0% of points 611 member. 0% of points Money launder. 0% of points Mule. 100% of points 1/1
10 of 10
6/18/2012 5:37 PM