CIS 170 Midterm Exam Solution

875 Words4 Pages
CIS 170 Midterm Exam Solution https://hwguiders.com/downloads/cis-170-midterm-exam-solution CIS 170 Midterm Exam Solution • Question 1 Data alteration and denial directly targets the computer by attacking the useful information stored or processed by the computer. • Question 2 Child pornography is an example of which type of computer crime? • Question 3 Agnew argues that crime is due to a lack of attachment to parents. • Question 4 _____________ is designed to impose a sanction on convicted offenders in order to prevent them from continuing to commit criminal acts in the future • Question 5 Which of the following forms of technology expanded the scope of hacker activities? • Question 6 The primary avenue of redress for corporations…show more content…
• Question 10 An unauthorized program typically contained within a legitimate program is known as a: • Question 11 During what decade did electronic funds transfers (EFT’s) begin to expand money laundering opportunities? • Question 12 Recent research has linked the act of music and software piracy to what prominent theory? • Question 13 Fortune 1000 technology firms report an average of how many espionage attacks per year? • Question 14 Which of the following is defined in terms of their activities related to denial of service attacks? • Question 15 Traditional money laundering techniques include all of the following except one. Which technique below is not a traditional method of money laundering? • Question 16 Opportunities for identity crimes have increased primarily because consumers are increasingly asked to use their social security number as a personal identifier. • Question 17 A subculture is a set of values, norms, and beliefs that differ from the dominant culture. • Question 18 The unique feature of a worm is that it: • Question 19 A virus is a piece of code that attaches itself to other instructions within a computer. • Question…show more content…
• Question 29 Virus writers generally write viruses to steal information and destroy data. • Question 30 Which of the following is true? • Question 31 What major category of information warfare/cyber-terror does “web site defacement” fall into? • Question 32 Hackers were generally considered to be “criminals” as early as the 60s. • Question 33 The motives for many writers of malicious software have changed from profit to curiosity and revenge. • Question 34 What major category of information warfare/cyber-terror does “data hiding” fall into? • Question 35 Hackers predominantly associate themselves with illegal acts. • Question 36 What major category of information warfare/cyber-terror does “cyber-plagues” fall into? • Question 37 This group tends to define hackers and their activities in terms of the danger associated with hacking and its sometimes malicious intent. • Question 38 All of the following terms are used to characterize and describe viruses, except: • Question 39 Which of the following is NOT one of the four primary environments viruses operate in? • Question 40 Recent studies suggest that 10 percent of personal computers are infected by malicious

More about CIS 170 Midterm Exam Solution

Open Document