Which of these is a type of malware? trojans viruses worms all of the above 1.2
ID: 3595521 • Letter: W
Question
Which of these is a type of malware?
trojans
viruses
worms
all of the above
1.2 points
QUESTION 31
Establishing a fake website to which unsuspecting users are redirected to is called _____.
doxing
subterfuging
spamming
spoofing
1.2 points
QUESTION 32
In your reading on hacking, the author argues that humans have a fear that technology ____.
is no longer effective at addressing mankind's problems
will eventually fail humanity
threatens human existence
All of the above.
1.2 points
QUESTION 33
With respect to our understanding of hacking, cultural products like Frankensteinand The Terminatorillustrate _____.
the tendency for Western societies to glorify violence and technology
the tendency in society to demonize technology
our fear that the technologies we create will come to dominate us
our love of sex and violence
1.2 points
QUESTION 34
One explanation of why young people tend to be hackers is that ____.
young people with family problems are more likely to hack
young people who are a part of drug cultures are more likely to hack
young people who lack athletic or musical skills turn to hacking as a way of showing maturity
hacking for young people represents a way to show skills for the labor market
1.2 points
QUESTION 35
In your reading, ___ is used as an example of how technological change has meant anxiety and fear for society.
Star Wars
Dracula
Star Trek
Frankenstein
1.2 points
QUESTION 36
____, like their biological counterparts, need hosts to reproduce and transmit themselves.
Trojans
Worms
Ransomware
Viruses
1.2 points
QUESTION 37
Groups of hackers can be understood as being a distinct subculture.
True
False
1.2 points
QUESTION 38
A ____ is a program or piece of code that appears to perform a benign or useful function, but in fact has destructive capabilities.
ransomware
worm
trojan
virus
1.2 points
QUESTION 39
How are hackers often portrayed in a positive light?
Old hackers are seen as renegades
Young hackers are seen as future leaders
They are praised for their intelligence and ingenuity
White hat hackers are seen as heroes for stopping cybercrime
1.2 points
QUESTION 40
Why have hackers been often represented in a positive light in society?
hackers are often understood to be fighting crime through computer networks
they are often white males
hackers can be seen as humans reclaiming mastery over technology
they tend to be from the upper middle class
1.2 points
QUESTION 41
There are few computer network attacks that meet the criteria of cyberterrorism.
True
False
1.2 points
QUESTION 42
Internet activism designed to enact political change has been called ___.
clicktivism
hacktivism
slacktivism
cyberterrorism
1.2 points
QUESTION 43
Which phrase below is a reason why terrorist groups may be disinclined to use the Internet?
Most terrorist groups are not tech savvy enough to produce sophisticated cyberterror attacks
Governments have enacted international agreements that allow law enforcement to work internationally to prevent cyberterror
The virtuality of the Internet means that it may be hard to generate terror online
None of the above
1.2 points
QUESTION 44
Which phrase below is a reason why terrorist groups may be disinclined to use the Internet?
It is more expensive to produce terror online
Individuals in cyberterorrist groups tend to be older and less computer savvy
Most terrorist groups are not tech savvy enough to produce sophisticated cyberterror attacks
The most valued targets are often not connected to the public Internet
1.2 points
QUESTION 45
In response to terrorism, America passed the ____, which works with the CFAA to strengthen penalties for cyberterrorism.
PATRIOT ACT
Cyberterrorism Act
Ideology and Terrorism Law of 2008
None of the above
1.2 points
QUESTION 46
Based on your reading, cyberterrorism is a combination of ____.
violence and politics
technology and ideology
technology and politics
violence and technology
1.2 points
QUESTION 47
Some Internet activists are resisting Western capitalistic values
True
False
1.2 points
QUESTION 48
Select the ways in which terrorists use the Internet.
Communication and coordination
Negotiating peace treaties
Information gathering
Fundraising and financing
Propaganda, publicity, and recruitment
5 points
QUESTION 49
Match the type of Internet activism with the example given in the text.
Virtual sit-ins
Email bombs
Website defacements
Viruses and worms
Electronic disturbance theatre
Tying up the systems of Institute for Global Communications
The English Defence League
The many activities of the LulzSec collective
the activities of the Antifa (antif-facism) far left group
5 points
QUESTION 50
Young people are disproportionately involved in digital piracy.
True
False
1.2 points
QUESTION 51
SOPA and PIPA are ____.
pieces of legislation that would allow ISPs to block users access to sites that had been identified as hosting copyrighted content.
organizations that advocate for looser restrictions on sharing of copyrighted content.
pieces of legislation that protect computer users from being sued by copyright holders.
organizations that advocate for tighter restrictions on sharing of copyrighted content.
1.2 points
QUESTION 52
Which of these statements below describes a reason why digital piracy levels have risen over the past several years.
The number of people worldwide with Internet access is rising.
The quality and speed of Internet access is improving.
There are a number of file sharing services available online.
All of these are reasons
1.2 points
QUESTION 53
The notion that property rights are natural and unquestionable is often associated with the ideas of ____.
Adam Smith
John Locke
Karl Marx
Stokely Carmicheal
1.2 points
QUESTION 54
One reason why we need to think critically about piracy statistics is because ____.
criminologists have shown repeatedly that digital piracy does not harm society
governments and law enforcement have no interest in piracy
the level of piracy statistics depends on the amount of policing activity.
measuring what is and is not piracy is widely debated in society
1.2 points
QUESTION 55
Which of these is not an example of intellectual property?
An IPhone
The song Blurred Lines
ITunes
iOS operating system
1.2 points
QUESTION 56
One reason why we need to think critically about piracy statistics is because ____.
we have no way of measuring how much piracy occurs in the digital environment
criminologists have shown repeatedly that digital piracy does not harm society
governments and law enforcement have no interest in piracy
industries have an interest in inflating the amount of money lost through piracy
1.2 points
QUESTION 57
In class, I discussed the case of Ardit Ferizi. What was the class question associated with Mr. Ferizi?
Is Ferizi's sentence of 20 years too short?
Is this an example of hacking?
Is this an example of cyberterrorism?
Is Ferizi's sentence of 20 years too long?
1.2 points
QUESTION 58
You cannot predict social consequences from code.
True
False
1.2 points
QUESTION 59
In class I discussed a hack of a sex offender registry. How was this registry hacked?
direct denial of service attack
trojan horse
phishing
SQL injection
1.2 points
QUESTION 60
You can be in the digital environment and the physical environment at the same time.
True
False
1.2 points
QUESTION 61
One of the major themes over the first half of the semester is the importance of being "critical". What phrase below best explains what this means?
Understanding the differences between progressive and conservative ideologies with respect to cybercrime.
Finding ways to support our nation's leaders as they deal with serious issues such as cyberterrorism and identity theft.
Closely examining many of the claims and assumptions made by the media and society's leaders associated with cybercrime.
1.2 points
QUESTION 62
In class I summarize the four ways in which we can think about why someone hacks. Select these four ways from the list below.
Gender
Motivations such as greed or hacker ethic
Global warming
Youth
Changes in law or policy
Psychological or sociological factors
5 points
QUESTION 63
In the article, "Malware Tech's arrest sheds light on the complex culture of the hacking world", the author discusses "grey hat" hackers. Select the statement below that best describes a "grey hat" hacker.
looking for vulnerabilities in order to exploit them
looking for vulnerabilities in order to patch them (usually for a company)
searching for vulnerabilities, and will sell the vulnerability to criminal or offer to fix the patch for a company
1.2 points
QUESTION 64
In the article, "Malware Tech's arrest sheds light on the complex culture of the hacking world", the author discusses the recent experiences of a hacker who found the kill switch for the ___ virus.
Epox Trojan
WannaCry
Equifax
Ashley Madison
1.2 points
QUESTION 65
In the article, "CyberJihad Hacked US Central Command’s Twitter – How Secure is Your Own Feed?", the author states that ____.
often there are attacks against national services, but these go unreported when the offenses are successfully deflected.
the United States government's social media - Twitter, Youtube, etc. - tends to be the target of attacks more than other countries.
there are very few attacks against national services.
the United Kingdom government's social media - Twitter, Youtube, etc. - tends to be the target of attacks more than other countries.
1.2 points
QUESTION 66
In the article "What are software vulnerabilities, and why are there so many of them?", the author argues that there are numerous vulnerabilities in the ____ platform.
Skype
Adobe
MS Word
Java
1.2 points
QUESTION 67
In the article, "CyberJihad Hacked US Central Command’s Twitter – How Secure is Your Own Feed?", the authors state that Twitter is a ____.
an arm of the Islamic State
frequently hacked platform that should not be used by government agencies
finding ways to reduce the number of accounts that get hacked
third-party organization, entirely outside of the control of any governmental organization
1.2 points
QUESTION 68
In the article, "‘Burner’ Phones, Social Media and Online Magazines: Understanding the Technology of Terrorism", the author discusses several ways that terrorists use social media. Select the ways from the list below:
Use web services like Google earth to plan and coordinate an attack
attracting attention by broadcasting bursts of information
Send emails to government leaders in order to threaten and terrorize
Using web forums to discuss, refine, and develop their ideology
Use skype or other video tools to talk to each other across borders
trojans
viruses
worms
all of the above
Explanation / Answer
Ans 1- All of the above is the correct answer.Trojans,viruses,and worms are the types of malware.Malware is short form of malicious software that can be used reduce computer functionality, steal important data, can provide access control to the hacker and can cause loss or harm to the host computer.
Ans 2- Establishing a fake website to which unsespecting users are redirected to is called as spoofing.
Ans 3-In your reading on hacking,the author argues that humans have a fear that technology "is no longer effective at addressing mankinds problems".
Ans 4- With respect to our understamding of hacking, cultural products like Frankenstein and The Terminator illustrate "our fear that the technologies we create will come to dominate us".
Related Questions
drjack9650@gmail.com
Navigate
Integrity-first tutoring: explanations and feedback only — we do not complete graded work. Learn more.