CJ 348 - Exam 2 covers crucial topics in chapters 7, 8, 9, and 11, focusing on cyberterrorism, hacktivism, and cyberwarfare. It assesses understanding of threats to critical infrastructure and legal frameworks like the USA Patriot Act, essential for students in IT and criminal justice.
Cyberterrorism
Cyberwarfare
Hacktivism
All of the above
None of the above
Rate this question:
Cyberterrorism
Cyberwarfare
Hacktivism
All of the above
None of the above
Rate this question:
Communications industry
Banking and finance industry
Energy industry
A and c
All of the above
Rate this question:
Food and agriculture industry
Critical manufacturing industry
Dams industry
Postal and shipping
All of the above
Rate this question:
USA Patriot Act
National Defense Authorization Act
Defense Authorization Act
All of the above
None of the above
Rate this question:
Cyber Security Enhancement Act of 2002
Homeland Security Act of 2002
A and b
National Defense Authorization Act
All of the above
Rate this question:
Responding to and analyzing control systems incident
Providing support for incident response and forensic analysis
Coordinating efforts and sharing information among private agencies and local, state, federal, and tribal governments
All of the above
None of the above
Rate this question:
Stuxnet
Duqu
Stars
A and b
All of the above
Rate this question:
Provoke widespread panic and fear
Cause illness
Cause serious bodily harm
A and c
All of the above
Rate this question:
Document
Image
Graphics
A and b
All of the above
Rate this question:
Encryption
Steganography
Decryption
Spam
None of the above
Rate this question:
True
False
Rate this question:
Security
Application
Setup
System
None of the above
Rate this question:
True
False
Rate this question:
Cookies
History files
Event logs
Spooler files
None of the above
Rate this question:
A hidden partition
A bad cluster
Unallocated space
Slack space
None of the above
Rate this question:
Handheld computing devices
Peripheral devices
Telecommunications devices
A and c
None of the above
Rate this question:
True
False
Rate this question:
Imaging
MD5 hash algorithm
SHA hash algorithm
A write blocker device
All of the above
Rate this question:
Notes, sketches, audio, video, reports
Notes, sketches, photographs, video, reports
Notes, sketches, photographs, audio, video
Notes, photographs, audio, video, reports
None of the above
Rate this question:
Case number
Location of crime
Type of crime
A and C
All of the above
Rate this question:
Faraday bags
Antistatic bags
Static banks
Antisignal bags
None of the above
Rate this question:
Climate controlled
Cool and dry
Protected from magnetic fields or radio frequency interference sources
A and C
All of the above
Rate this question:
Reporting
Chain of custody
Note taking
Videography
None of the above
Rate this question:
Photographs; videos
Videos; photographs
Sketches; videos
Sketches; photographs
None of the above
Rate this question:
Antistatic bags
Tweezers
Pliers
A and B
All of the above
Rate this question:
Notes
Videos
Reports
Sketches
None of the above
Rate this question:
Magnetic fields
Static electricity
Corrosive elements
Temperature
All of the above
Rate this question:
Overall, medium-range, and close-range photographs
Overall and close range photographs
Medium-range and close range photographs
Only overall photographs
Only close-range photographs
Rate this question:
Simple Mail Transfer Protocol
Post Office Protocol 3
Internet Message Access Protocol
A and C
All of the above
Rate this question:
Username and domain domain
Domain and header
Header and body
Username and body
None of the above
Rate this question:
To, from, body and subject
To, from, subject and date
To, from, body and date
To, from, body and return address
None of the above
Rate this question:
Received
Message ID
X-Originating-IP
X-mailer
None of the above
Rate this question:
Received
Message ID
X-Originating-IP
X-Mailer
None of the above
Rate this question:
Received-SPF
Message ID
Return-Path
MIME-Version
None of the above
Rate this question:
ARIN
AfriNIC
APNIC
RIPE
LACNIC
Rate this question:
Received-SPF
Message ID
Return-Path
MIME-Version
None of the above
Rate this question:
Received
Message ID
Content-type
X-Mailer
MIME-Version
Rate this question:
Received
Message ID
Content-type
X-Mailer
MIME-Version
Rate this question:
Quiz Review Timeline (Updated): Mar 21, 2023 +
Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.
Wait!
Here's an interesting quiz for you.