CIS 170 Midterm Exam CIS 170 Midterm Exam
For Any Information or Any Class Which you Did not find on Our Website , Just Hit US Email On below address Email Address: hworkbank@gmail.com Visit Our Website : http://www.homework-bank.com/
For Any Information or Any Class Which you Did not find on Our Website , Just Hit US Email On below address
Email Address: hworkbank@gmail.com
Visit Our Website : http://www.homework-bank.com/
You also want an ePaper? Increase the reach of your titles
YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.
<strong>CIS</strong> <strong>170</strong> <strong>Midterm</strong> <strong>Exam</strong><br />
http://www.homework-bank.com/downloads/cis-<strong>170</strong>-midterm-exam/<br />
Paste the above URL into your browser<br />
For Any Information or Any Class Which you Did not find on Our Website, Just Hit US Email On below<br />
address<br />
Email Address: hworkbank@gmail.com<br />
Visit Our Website: http://www.homework-bank.com/<br />
<strong>CIS</strong> <strong>170</strong> <strong>Midterm</strong> <strong>Exam</strong><br />
• Question 1<br />
Data alteration and denial directly targets the computer by attacking the<br />
useful information stored or processed by the computer.<br />
• Question 2<br />
Child pornography is an example of which type of computer crime?<br />
• Question 3<br />
Agnew argues that crime is due to a lack of attachment to parents.<br />
• Question 4<br />
_____________ is designed to impose a sanction on convicted offenders in<br />
order to prevent them from continuing to commit criminal acts in the future<br />
• Question 5
Which of the following forms of technology expanded the scope of hacker<br />
activities?<br />
• Question 6<br />
The primary avenue of redress for corporations seeking to litigate charges of<br />
corporate espionage is the criminal courts.<br />
• Question 7<br />
What major category of information warfare/cyber-terror does<br />
"cryptography" fall into?<br />
• Question 8<br />
Which technique of neutralization occurs when an individual believes that<br />
the victim "had it coming"?<br />
• Question 9<br />
Computer crime is not an international problem.<br />
• Question 10<br />
An unauthorized program typically contained within a legitimate program is<br />
known as a:<br />
• Question 11<br />
During what decade did electronic funds transfers (EFT's) begin to expand<br />
money laundering opportunities?<br />
• Question 12
Recent research has linked the act of music and software piracy to what<br />
prominent theory?<br />
• Question 13<br />
Fortune 1000 technology firms report an average of how many espionage<br />
attacks per year?<br />
• Question 14<br />
Which of the following is defined in terms of their activities related to denial<br />
of service attacks?<br />
• Question 15<br />
Traditional money laundering techniques include all of the following except<br />
one. Which technique below is not a traditional method of money laundering?<br />
• Question 16<br />
Opportunities for identity crimes have increased primarily because<br />
consumers are increasingly asked to use their social security number as a personal<br />
identifier.<br />
• Question 17<br />
A subculture is a set of values, norms, and beliefs that differ from the<br />
dominant culture.<br />
• Question 18<br />
The unique feature of a worm is that it:
• Question 19<br />
A virus is a piece of code that attaches itself to other instructions within a<br />
computer.<br />
• Question 20<br />
Which of the following is most true?<br />
• Question 21<br />
A worm is a program that reproduces itself over a computer network by<br />
breaking into computers much like a virtual hacker.<br />
• Question 22<br />
The United States is likely the nation that is most vulnerable to digital<br />
terrorism.<br />
• Question 23<br />
According to Merton, a(n) ___________ accepts the goal of economic<br />
success but rejects the institutionalized means to obtain it.<br />
• Question 24<br />
The 80s were a pivotal decade in the trend toward defining hackers as<br />
"criminals."<br />
• Question 25
One of the primary tenets of the "hacker code" as conceived by Levy is that<br />
information should be free to all users.<br />
• Question 26<br />
Data alteration, denial of service, network intrusions, thefts of information,<br />
and computer vandalism are examples of which type of computer crime?<br />
• Question 27<br />
Research indicates that individuals with low self control are more likely to<br />
view on-line pornography<br />
• Question 28<br />
Which of the following is defined as a malicious hacker?<br />
• Question 29<br />
Virus writers generally write viruses to steal information and destroy data.<br />
• Question 30<br />
Which of the following is true?<br />
• Question 31<br />
What major category of information warfare/cyber-terror does "web site<br />
defacement" fall into?<br />
• Question 32<br />
Hackers were generally considered to be "criminals" as early as the 60s.
• Question 33<br />
The motives for many writers of malicious software have changed from<br />
profit to curiosity and revenge.<br />
• Question 34<br />
What major category of information warfare/cyber-terror does "data hiding"<br />
fall into?<br />
• Question 35<br />
Hackers predominantly associate themselves with illegal acts.<br />
• Question 36<br />
What major category of information warfare/cyber-terror does "cyberplagues"<br />
fall into?<br />
• Question 37<br />
This group tends to define hackers and their activities in terms of the danger<br />
associated with hacking and its sometimes malicious intent.<br />
• Question 38<br />
All of the following terms are used to characterize and describe viruses,<br />
except:<br />
• Question 39
Which of the following is NOT one of the four primary environments<br />
viruses operate in?<br />
• Question 40<br />
Recent studies suggest that 10 percent of personal computers are infected by<br />
malicious software.<br />
• Question 41<br />
"Neutralization techniques" may be defined as:<br />
• Question 42<br />
The primary difference between data alteration and network intrusion is the<br />
• Question 43<br />
According to Kohlberg, right corresponds to seeing one's own needs met,<br />
taking responsibility for oneself, and allowing others to do the same in which stage<br />
of moral development?<br />
• Question 44<br />
Criminal statistics on computer crime are<br />
• Question 45<br />
The advent of large-scale computerized databases in the financial services<br />
field has made embezzlement a more technically-oriented crime requiring more<br />
sophisticated knowledge than was the case 30 years ago.<br />
• Question 46
This group tends to define hackers and their activities in terms of the<br />
illegality of hacking.<br />
• Question 47<br />
Which type of computer crime describes actions in which the computer is<br />
used only to further a criminal end? In other words, the computer or data contained<br />
therein is not the object of the crime.<br />
• Question 48<br />
Despite its contention that modern technological advancements are<br />
incompatible with fundamentalist Islam culture, Al-Qaeda has become a primary<br />
foe in the digital terrorism area.<br />
• Question 49<br />
Hackers appear to exhibit a subculture that includes: