Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

Which of these is a type of malware? trojans viruses worms all of the above 1.2

ID: 3595521 • Letter: W

Question

Which of these is a type of malware?

trojans

viruses

worms

all of the above

1.2 points   

QUESTION 31

Establishing a fake website to which unsuspecting users are redirected to is called _____.

doxing

subterfuging

spamming

spoofing

1.2 points   

QUESTION 32

In your reading on hacking, the author argues that humans have a fear that technology ____.

is no longer effective at addressing mankind's problems

will eventually fail humanity

threatens human existence

All of the above.

1.2 points   

QUESTION 33

With respect to our understanding of hacking, cultural products like Frankensteinand The Terminatorillustrate _____.

the tendency for Western societies to glorify violence and technology

the tendency in society to demonize technology

our fear that the technologies we create will come to dominate us

our love of sex and violence

1.2 points   

QUESTION 34

One explanation of why young people tend to be hackers is that ____.

young people with family problems are more likely to hack

young people who are a part of drug cultures are more likely to hack

young people who lack athletic or musical skills turn to hacking as a way of showing maturity

hacking for young people represents a way to show skills for the labor market

1.2 points   

QUESTION 35

In your reading, ___ is used as an example of how technological change has meant anxiety and fear for society.

Star Wars

Dracula

Star Trek

Frankenstein

1.2 points   

QUESTION 36

____, like their biological counterparts, need hosts to reproduce and transmit themselves.

Trojans

Worms

Ransomware

Viruses

1.2 points   

QUESTION 37

Groups of hackers can be understood as being a distinct subculture.

True

False

1.2 points   

QUESTION 38

A ____ is a program or piece of code that appears to perform a benign or useful function, but in fact has destructive capabilities.

ransomware

worm

trojan

virus

1.2 points   

QUESTION 39

How are hackers often portrayed in a positive light?

Old hackers are seen as renegades

Young hackers are seen as future leaders

They are praised for their intelligence and ingenuity

White hat hackers are seen as heroes for stopping cybercrime

1.2 points   

QUESTION 40

Why have hackers been often represented in a positive light in society?

hackers are often understood to be fighting crime through computer networks

they are often white males

hackers can be seen as humans reclaiming mastery over technology

they tend to be from the upper middle class

1.2 points   

QUESTION 41

There are few computer network attacks that meet the criteria of cyberterrorism.

True

False

1.2 points   

QUESTION 42

Internet activism designed to enact political change has been called ___.

clicktivism

hacktivism

slacktivism

cyberterrorism

1.2 points   

QUESTION 43

Which phrase below is a reason why terrorist groups may be disinclined to use the Internet?

Most terrorist groups are not tech savvy enough to produce sophisticated cyberterror attacks

Governments have enacted international agreements that allow law enforcement to work internationally to prevent cyberterror

The virtuality of the Internet means that it may be hard to generate terror online

None of the above

1.2 points   

QUESTION 44

Which phrase below is a reason why terrorist groups may be disinclined to use the Internet?

It is more expensive to produce terror online

Individuals in cyberterorrist groups tend to be older and less computer savvy

Most terrorist groups are not tech savvy enough to produce sophisticated cyberterror attacks

The most valued targets are often not connected to the public Internet

1.2 points   

QUESTION 45

In response to terrorism, America passed the ____, which works with the CFAA to strengthen penalties for cyberterrorism.

PATRIOT ACT

Cyberterrorism Act

Ideology and Terrorism Law of 2008

None of the above

1.2 points   

QUESTION 46

Based on your reading, cyberterrorism is a combination of ____.

violence and politics

technology and ideology

technology and politics

violence and technology

1.2 points   

QUESTION 47

Some Internet activists are resisting Western capitalistic values

True

False

1.2 points   

QUESTION 48

Select the ways in which terrorists use the Internet.

Communication and coordination

Negotiating peace treaties

Information gathering

Fundraising and financing

Propaganda, publicity, and recruitment

5 points   

QUESTION 49

Match the type of Internet activism with the example given in the text.

Virtual sit-ins

Email bombs

Website defacements

Viruses and worms

Electronic disturbance theatre

Tying up the systems of Institute for Global Communications

The English Defence League

The many activities of the LulzSec collective

the activities of the Antifa (antif-facism) far left group

5 points   

QUESTION 50

Young people are disproportionately involved in digital piracy.

True

False

1.2 points   

QUESTION 51

SOPA and PIPA are ____.

pieces of legislation that would allow ISPs to block users access to sites that had been identified as hosting copyrighted content.

organizations that advocate for looser restrictions on sharing of copyrighted content.

pieces of legislation that protect computer users from being sued by copyright holders.

organizations that advocate for tighter restrictions on sharing of copyrighted content.

1.2 points   

QUESTION 52

Which of these statements below describes a reason why digital piracy levels have risen over the past several years.

The number of people worldwide with Internet access is rising.

The quality and speed of Internet access is improving.

There are a number of file sharing services available online.

All of these are reasons

1.2 points   

QUESTION 53

The notion that property rights are natural and unquestionable is often associated with the ideas of ____.

Adam Smith

John Locke

Karl Marx

Stokely Carmicheal

1.2 points   

QUESTION 54

One reason why we need to think critically about piracy statistics is because ____.

criminologists have shown repeatedly that digital piracy does not harm society

governments and law enforcement have no interest in piracy

the level of piracy statistics depends on the amount of policing activity.

measuring what is and is not piracy is widely debated in society

1.2 points   

QUESTION 55

Which of these is not an example of intellectual property?

An IPhone

The song Blurred Lines

ITunes

iOS operating system

1.2 points   

QUESTION 56

One reason why we need to think critically about piracy statistics is because ____.

we have no way of measuring how much piracy occurs in the digital environment

criminologists have shown repeatedly that digital piracy does not harm society

governments and law enforcement have no interest in piracy

industries have an interest in inflating the amount of money lost through piracy

1.2 points   

QUESTION 57

In class, I discussed the case of Ardit Ferizi. What was the class question associated with Mr. Ferizi?

Is Ferizi's sentence of 20 years too short?

Is this an example of hacking?

Is this an example of cyberterrorism?

Is Ferizi's sentence of 20 years too long?

1.2 points   

QUESTION 58

You cannot predict social consequences from code.

True

False

1.2 points   

QUESTION 59

In class I discussed a hack of a sex offender registry. How was this registry hacked?

direct denial of service attack

trojan horse

phishing

SQL injection

1.2 points   

QUESTION 60

You can be in the digital environment and the physical environment at the same time.

True

False

1.2 points   

QUESTION 61

One of the major themes over the first half of the semester is the importance of being "critical". What phrase below best explains what this means?

Understanding the differences between progressive and conservative ideologies with respect to cybercrime.

Finding ways to support our nation's leaders as they deal with serious issues such as cyberterrorism and identity theft.

Closely examining many of the claims and assumptions made by the media and society's leaders associated with cybercrime.

1.2 points   

QUESTION 62

In class I summarize the four ways in which we can think about why someone hacks. Select these four ways from the list below.

Gender

Motivations such as greed or hacker ethic

Global warming

Youth

Changes in law or policy

Psychological or sociological factors

5 points   

QUESTION 63

In the article, "Malware Tech's arrest sheds light on the complex culture of the hacking world", the author discusses "grey hat" hackers. Select the statement below that best describes a "grey hat" hacker.

looking for vulnerabilities in order to exploit them

looking for vulnerabilities in order to patch them (usually for a company)

searching for vulnerabilities, and will sell the vulnerability to criminal or offer to fix the patch for a company

1.2 points   

QUESTION 64

In the article, "Malware Tech's arrest sheds light on the complex culture of the hacking world", the author discusses the recent experiences of a hacker who found the kill switch for the ___ virus.

Epox Trojan

WannaCry

Equifax

Ashley Madison

1.2 points   

QUESTION 65

In the article, "CyberJihad Hacked US Central Command’s Twitter – How Secure is Your Own Feed?", the author states that ____.

often there are attacks against national services, but these go unreported when the offenses are successfully deflected.

the United States government's social media - Twitter, Youtube, etc. - tends to be the target of attacks more than other countries.

there are very few attacks against national services.

the United Kingdom government's social media - Twitter, Youtube, etc. - tends to be the target of attacks more than other countries.

1.2 points   

QUESTION 66

In the article "What are software vulnerabilities, and why are there so many of them?", the author argues that there are numerous vulnerabilities in the ____ platform.

Skype

Adobe

MS Word

Java

1.2 points   

QUESTION 67

In the article, "CyberJihad Hacked US Central Command’s Twitter – How Secure is Your Own Feed?", the authors state that Twitter is a ____.

an arm of the Islamic State

frequently hacked platform that should not be used by government agencies

finding ways to reduce the number of accounts that get hacked

third-party organization, entirely outside of the control of any governmental organization

1.2 points   

QUESTION 68

In the article, "‘Burner’ Phones, Social Media and Online Magazines: Understanding the Technology of Terrorism", the author discusses several ways that terrorists use social media. Select the ways from the list below:

Use web services like Google earth to plan and coordinate an attack

attracting attention by broadcasting bursts of information

Send emails to government leaders in order to threaten and terrorize

Using web forums to discuss, refine, and develop their ideology

Use skype or other video tools to talk to each other across borders

trojans

viruses

worms

all of the above

Explanation / Answer

Ans 1- All of the above is the correct answer.Trojans,viruses,and worms are the types of malware.Malware is short form of malicious software that can be used reduce computer functionality, steal important data, can provide access control to the hacker and can cause loss or harm to the host computer.

Ans 2- Establishing a fake website to which unsespecting users are redirected to is called as spoofing.

Ans 3-In your reading on hacking,the author argues that humans have a fear that technology "is no longer effective at addressing mankinds problems".

Ans 4- With respect to our understamding of hacking, cultural products like Frankenstein and The Terminator illustrate "our fear that the technologies we create will come to dominate us".

Hire Me For All Your Tutoring Needs
Integrity-first tutoring: clear explanations, guidance, and feedback.
Drop an Email at
drjack9650@gmail.com
Chat Now And Get Quote