Cj 348 - Exam 2 - Ch. 7, 8, 9 & 11

40 Questions | Total Attempts: 787

SettingsSettingsSettings
Please wait...
Cj 348 - Exam 2 - Ch. 7, 8, 9 & 11

.


Questions and Answers
  • 1. 
    _________________ refers to the politically, religiously, or ideologically motivated use of computers (or related technology) by an individual, group, or state targeting critical infrastructure with the intention of harming persons and/or damaging property in order to influence the population (or segment of the population) or cause a government to change its policies.
    • A. 

      Cyberterrorism

    • B. 

      Cyberwarfare

    • C. 

      Hacktivism

    • D. 

      All of the above

    • E. 

      None of the above

  • 2. 
    ________________ refers to the intentional access to a computer system and/or website, without authorization or exceeding authorized access, in pursuit of a political goal.
    • A. 

      Cyberterrorism

    • B. 

      Cyberwarfare

    • C. 

      Hacktivism

    • D. 

      All of the above

    • E. 

      None of the above

  • 3. 
    ________________ refers to a state-sponsored cyberattack against another state's computers or information networks. To be considered cyberwarfare, the cyberattacks must amount to an “armed attack” and be committed in conjunction with real-world, physical attacks.
    • A. 

      Cyberterrorism

    • B. 

      Cyberwarfare

    • C. 

      Hacktivism

    • D. 

      All of the above

    • E. 

      None of the above

  • 4. 
    The ______________ is an example of critical infrastructure.
    • A. 

      Communications industry

    • B. 

      Banking and finance industry

    • C. 

      Energy industry

    • D. 

      A and c

    • E. 

      All of the above

  • 5. 
    The ______________ is an example of critical infrastructure
    • A. 

      Food and agriculture industry

    • B. 

      Critical manufacturing industry

    • C. 

      Dams industry

    • D. 

      Postal and shipping

    • E. 

      All of the above

  • 6. 
    The _____________ criminalized acts of cyberterrorism.
    • A. 

      USA Patriot Act

    • B. 

      National Defense Authorization Act

    • C. 

      Defense Authorization Act

    • D. 

      All of the above

    • E. 

      None of the above

  • 7. 
    The ______________ includes enhanced penalties for cybercrimes.
    • A. 

      Cyber Security Enhancement Act of 2002

    • B. 

      Homeland Security Act of 2002

    • C. 

      A and b

    • D. 

      National Defense Authorization Act

    • E. 

      All of the above

  • 8. 
    ICS-CERT seeks to reduce cyber risks by: ____________.
    • A. 

      Responding to and analyzing control systems incident

    • B. 

      Providing support for incident response and forensic analysis

    • C. 

      Coordinating efforts and sharing information among private agencies and local, state, federal, and tribal governments

    • D. 

      All of the above

    • E. 

      None of the above

  • 9. 
    ___________________ was designed to cripple industrial control systems
    • A. 

      Stuxnet

    • B. 

      Duqu

    • C. 

      Stars

    • D. 

      A and b

    • E. 

      All of the above

  • 10. 
    Cyberterrorists seek to __________________
    • A. 

      Provoke widespread panic and fear

    • B. 

      Cause illness

    • C. 

      Cause serious bodily harm

    • D. 

      A and c

    • E. 

      All of the above

  • 11. 
    Files that may be created by the computer user include:
    • A. 

      Document

    • B. 

      Image

    • C. 

      Graphics

    • D. 

      A and b

    • E. 

      All of the above

  • 12. 
    An individual may use ______________ to physically block third-party access to them, either by using a password or by rendering the file or aspects of the file unusable.
    • A. 

      Encryption

    • B. 

      Steganography

    • C. 

      Decryption

    • D. 

      Spam

    • E. 

      None of the above

  • 13. 
    Individuals can hide files in plain sight by renaming or changing the file extensions.
    • A. 

      True

    • B. 

      False

  • 14. 
    _______________ logs contain the events that are logged by programs and applications.  Errors of these applications and programs are also recorded in this log.
    • A. 

      Security

    • B. 

      Application

    • C. 

      Setup

    • D. 

      System

    • E. 

      None of the above

  • 15. 
    Volatile data are stored and preserved in the hard drive when the computer is powered off.
    • A. 

      True

    • B. 

      False

  • 16. 
    _______________ are files created by Web sites that are stored on a user's computer hard drive when he or she visits that particular Web site.
    • A. 

      Cookies

    • B. 

      History files

    • C. 

      Event logs

    • D. 

      Spooler files

    • E. 

      None of the above

  • 17. 
    _______________ is the space that is available because it was never used or because the information in it was deleted.
    • A. 

      A hidden partition

    • B. 

      A bad cluster

    • C. 

      Unallocated space

    • D. 

      Slack space

    • E. 

      None of the above

  • 18. 
    _______________ are devices that are not essential parts of a computer system.
    • A. 

      Handheld computing devices

    • B. 

      Peripheral devices

    • C. 

      Telecommunications devices

    • D. 

      A and c

    • E. 

      None of the above

  • 19. 
    Peripheral devices are devices that are not essential parts of a computer system.
    • A. 

      True

    • B. 

      False

  • 20. 
    _______________ is used to prevent anything from being written to the hard drive or other data source.
    • A. 

      Imaging

    • B. 

      MD5 hash algorithm

    • C. 

      SHA hash algorithm

    • D. 

      A write blocker device

    • E. 

      All of the above

  • 21. 
    There are five ways to document the crime scene:
    • A. 

      Notes, sketches, audio, video, reports

    • B. 

      Notes, sketches, photographs, video, reports

    • C. 

      Notes, sketches, photographs, audio, video

    • D. 

      Notes, photographs, audio, video, reports

    • E. 

      None of the above

  • 22. 
    The sketch should contain the:
    • A. 

      Case number

    • B. 

      Location of crime

    • C. 

      Type of crime

    • D. 

      A and C

    • E. 

      All of the above

  • 23. 
    __________________ are required to prevent messages from being sent or received by electronic devices (such as PDAs and mobile phones)
    • A. 

      Faraday bags

    • B. 

      Antistatic bags

    • C. 

      Static banks

    • D. 

      Antisignal bags

    • E. 

      None of the above

  • 24. 
    Electronic evidence should be kept in a forensic lab that is:
    • A. 

      Climate controlled

    • B. 

      Cool and dry

    • C. 

      Protected from magnetic fields or radio frequency interference sources

    • D. 

      A and C

    • E. 

      All of the above

  • 25. 
    __________________ is the process by which investigators preserve the crime scene and evidence throughout the life cycle of a case.
    • A. 

      Reporting

    • B. 

      Chain of custody

    • C. 

      Note taking

    • D. 

      Videography

    • E. 

      None of the above

Back to Top Back to top