04.04.2015 Views

CIS 170 Midterm Exam CIS 170 Midterm Exam

For Any Information or Any Class Which you Did not find on Our Website , Just Hit US Email On below address Email Address: hworkbank@gmail.com Visit Our Website : http://www.homework-bank.com/

For Any Information or Any Class Which you Did not find on Our Website , Just Hit US Email On below address
Email Address: hworkbank@gmail.com
Visit Our Website : http://www.homework-bank.com/

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

<strong>CIS</strong> <strong>170</strong> <strong>Midterm</strong> <strong>Exam</strong><br />

http://www.homework-bank.com/downloads/cis-<strong>170</strong>-midterm-exam/<br />

Paste the above URL into your browser<br />

For Any Information or Any Class Which you Did not find on Our Website, Just Hit US Email On below<br />

address<br />

Email Address: hworkbank@gmail.com<br />

Visit Our Website: http://www.homework-bank.com/<br />

<strong>CIS</strong> <strong>170</strong> <strong>Midterm</strong> <strong>Exam</strong><br />

• Question 1<br />

Data alteration and denial directly targets the computer by attacking the<br />

useful information stored or processed by the computer.<br />

• Question 2<br />

Child pornography is an example of which type of computer crime?<br />

• Question 3<br />

Agnew argues that crime is due to a lack of attachment to parents.<br />

• Question 4<br />

_____________ is designed to impose a sanction on convicted offenders in<br />

order to prevent them from continuing to commit criminal acts in the future<br />

• Question 5


Which of the following forms of technology expanded the scope of hacker<br />

activities?<br />

• Question 6<br />

The primary avenue of redress for corporations seeking to litigate charges of<br />

corporate espionage is the criminal courts.<br />

• Question 7<br />

What major category of information warfare/cyber-terror does<br />

"cryptography" fall into?<br />

• Question 8<br />

Which technique of neutralization occurs when an individual believes that<br />

the victim "had it coming"?<br />

• Question 9<br />

Computer crime is not an international problem.<br />

• Question 10<br />

An unauthorized program typically contained within a legitimate program is<br />

known as a:<br />

• Question 11<br />

During what decade did electronic funds transfers (EFT's) begin to expand<br />

money laundering opportunities?<br />

• Question 12


Recent research has linked the act of music and software piracy to what<br />

prominent theory?<br />

• Question 13<br />

Fortune 1000 technology firms report an average of how many espionage<br />

attacks per year?<br />

• Question 14<br />

Which of the following is defined in terms of their activities related to denial<br />

of service attacks?<br />

• Question 15<br />

Traditional money laundering techniques include all of the following except<br />

one. Which technique below is not a traditional method of money laundering?<br />

• Question 16<br />

Opportunities for identity crimes have increased primarily because<br />

consumers are increasingly asked to use their social security number as a personal<br />

identifier.<br />

• Question 17<br />

A subculture is a set of values, norms, and beliefs that differ from the<br />

dominant culture.<br />

• Question 18<br />

The unique feature of a worm is that it:


• Question 19<br />

A virus is a piece of code that attaches itself to other instructions within a<br />

computer.<br />

• Question 20<br />

Which of the following is most true?<br />

• Question 21<br />

A worm is a program that reproduces itself over a computer network by<br />

breaking into computers much like a virtual hacker.<br />

• Question 22<br />

The United States is likely the nation that is most vulnerable to digital<br />

terrorism.<br />

• Question 23<br />

According to Merton, a(n) ___________ accepts the goal of economic<br />

success but rejects the institutionalized means to obtain it.<br />

• Question 24<br />

The 80s were a pivotal decade in the trend toward defining hackers as<br />

"criminals."<br />

• Question 25


One of the primary tenets of the "hacker code" as conceived by Levy is that<br />

information should be free to all users.<br />

• Question 26<br />

Data alteration, denial of service, network intrusions, thefts of information,<br />

and computer vandalism are examples of which type of computer crime?<br />

• Question 27<br />

Research indicates that individuals with low self control are more likely to<br />

view on-line pornography<br />

• Question 28<br />

Which of the following is defined as a malicious hacker?<br />

• Question 29<br />

Virus writers generally write viruses to steal information and destroy data.<br />

• Question 30<br />

Which of the following is true?<br />

• Question 31<br />

What major category of information warfare/cyber-terror does "web site<br />

defacement" fall into?<br />

• Question 32<br />

Hackers were generally considered to be "criminals" as early as the 60s.


• Question 33<br />

The motives for many writers of malicious software have changed from<br />

profit to curiosity and revenge.<br />

• Question 34<br />

What major category of information warfare/cyber-terror does "data hiding"<br />

fall into?<br />

• Question 35<br />

Hackers predominantly associate themselves with illegal acts.<br />

• Question 36<br />

What major category of information warfare/cyber-terror does "cyberplagues"<br />

fall into?<br />

• Question 37<br />

This group tends to define hackers and their activities in terms of the danger<br />

associated with hacking and its sometimes malicious intent.<br />

• Question 38<br />

All of the following terms are used to characterize and describe viruses,<br />

except:<br />

• Question 39


Which of the following is NOT one of the four primary environments<br />

viruses operate in?<br />

• Question 40<br />

Recent studies suggest that 10 percent of personal computers are infected by<br />

malicious software.<br />

• Question 41<br />

"Neutralization techniques" may be defined as:<br />

• Question 42<br />

The primary difference between data alteration and network intrusion is the<br />

• Question 43<br />

According to Kohlberg, right corresponds to seeing one's own needs met,<br />

taking responsibility for oneself, and allowing others to do the same in which stage<br />

of moral development?<br />

• Question 44<br />

Criminal statistics on computer crime are<br />

• Question 45<br />

The advent of large-scale computerized databases in the financial services<br />

field has made embezzlement a more technically-oriented crime requiring more<br />

sophisticated knowledge than was the case 30 years ago.<br />

• Question 46


This group tends to define hackers and their activities in terms of the<br />

illegality of hacking.<br />

• Question 47<br />

Which type of computer crime describes actions in which the computer is<br />

used only to further a criminal end? In other words, the computer or data contained<br />

therein is not the object of the crime.<br />

• Question 48<br />

Despite its contention that modern technological advancements are<br />

incompatible with fundamentalist Islam culture, Al-Qaeda has become a primary<br />

foe in the digital terrorism area.<br />

• Question 49<br />

Hackers appear to exhibit a subculture that includes:

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!