暗記メーカー
ログイン
CYBERCRIME 2
  • Jessa Trocio

  • 問題数 44 • 3/4/2025

    記憶度

    完璧

    6

    覚えた

    17

    うろ覚え

    0

    苦手

    0

    未解答

    0

    アカウント登録して、解答結果を保存しよう

    問題一覧

  • 1

    The Convention on Cyber Crime Distinguish between four different types of offenses

    Computer-related offenses, such as computer-related forgery and computer-related Fraud Content-related offenses, such as offenses related to child pornography, and Copyright-related offenses, such as offenses related to copyright infringements and related rights

  • 2

    An attacker may commit a criminal offense against a company after a perceived injustice against themselves

    REVENGE

  • 3

    This attacker understake their duties they may identify vulnerability or loopholes in the internal systems where money or data could be removed without anyone else being able to identify their actions.

    OPPORTUNITY

  • 4

    This is the most motivation of hackers whether internal or external to the company. The potential to enrich thejr lives at the expense of others is an enticing option to them, with little to no concern as to the damage they do to others.

    GREED

  • 5

    Some cyber criminals may commit technical attacks against others as a training exercise for MORE FINANCIALLY LUCRATIVE ATTACK. EX. ROBERT MORRIS

    TEST OF SKILL

  • 6

    This motive steals the competitors IP through computer hacking to competitor's REPUTATION.

    BUSINESS COMPETITOR

  • 7

    They are professional hacker, they seek personal financial advantage.The attack is rarely personal but nothing than a business venture to make money

    PROFESSIONAL CRIMINAL

  • 8

    TERRORISM came from what word which means to CAUSE FEAR-POLITICALLY MOTIVATED and "NO MONITARY INTEREST"

    TERIRI

  • 9

    Designed to cause terror. Like CONVENTIONAL TERRORISM, E-TERRORISM is utilize is utilize hacking to cause enoigh harm to generate fear

    CYBER-TERRORIZM

  • 10

    Is someone who intimidates or coerces a government to advance his/her political or social objectives by launching a COMPUTER-BASED ATTACK against computers, networks, or the information stored on them.

    CYBERTERRORIST

  • 11

    It is a State Sanction Illegal Activity who conducts cyber activities in behalf on that government. Their motivation is to seek the IP of specific industries in foreign countries to gain competitive advantage. They seek to target the infrastructure of a hostile company.

    GEOPOLITICS

  • 12

    This occurs when a WEBSITE, EMAIL SERVER, COMPUTER SYSTEM is subjected or threatened with repeated denial of service or other attacks by malicious hacker. These hackers demand money to the attacks and to offer PROTECTION

    EXTORSION

  • 13

    The category of cybercrime that use computer ro attack other computer. Ex Hacking, virus , worms attack , dos attack

    COMPUTER AS A TARGET

  • 14

    Tye category of crime that use computer to commit reak world crime. Ex. Cyber terrorism, credit card fraud, and pornography

    COMPUTER AS A WEAPON

  • 15

    Someone who is proficient at SOFTWARE PROGRAMMING, DEBUGGING SYSTEMS, or Identifying Vulnerabilities in a given computer.

    HACKER

  • 16

    Also known as ethical hackers, they work doing penetration, hired to attempt to break and test into the company's network. They are sa safetiest hacker.

    WHITE HAT HACKER

  • 17

    The most dangerous hacker that has a malicious intent, spread MALWARE or RANSOMWARE. They are criminals by definition because they violate laws against accessing systems without authorization engage in illegal activity like IDENTIFY THEFT.

    BLACK HAT HACKER

  • 18

    It is paying for the files in order that to be disclosed to the public

    RANSOMWARE

  • 19

    They access system at the same time, they aren't typically motivated by money, they may offer to fix vulnerabilities they have discovered through their own and use their knowledge fir profit.

    GRAY HAT HACKERS

  • 20

    Considered as UNPREDICTABLE, they shift to back and white depending on their PURPOSE or NEEDS.

    GRAY HAT HACKERS

  • 21

    is an electronic device that manipulates information, or data. It has the ability store, retrieve, and process data. You may already know that you can use a computer to type documents, send email, play games, and browse the Web. You can also use it to edit or create spreadsheets, presentations, and even videos

    COMPUTER

  • 22

    the process of entering any type of data and instructions into a computer system. Uses the input devices such as Keyboard, Mouse, Scanner, Microphone, etc., in order to receive user signals to the computer

    INPUT FUNCTION

  • 23

    processes data of the computer It takes data and instructions from the input devices and performs all types of calculations based on the instructions given. It is also known as the "Brain of Computer" as it controls operation of all parts of computer.

    CENTRAL PROCESSING UNIT

  • 24

    Records and preserves digital information

    DATA STORAGE

  • 25

    is a computer's short-term memory, where the data that the processor is currently using is stored. A volatile memory used to hold instructions and data of currently running programs

    RANDOM ACCESS MEMORY (RAM)

  • 26

    non-volatile memory type. This means it receives data and permanently writes it on a chip, and it lasts even after your turn off your computer. The data that remains on the ROM cannot be changed and remains forever.

    READ ONLY MEMORY (ROM)

  • 27

    2 types of Data Storage

    RANDOM ACCESS MEMORY (RAM) READ ONLY MEMORY (ROM)

  • 28

    a re-writable permanent memory

    HARD DISK DRIVE(HDD)

  • 29

    a new generation of storage device used in computers. It stores data using flash-based memory, which is much faster than the traditional hard disks they've come to replace

    SOLID STATE DRIVE(SSD)

  • 30

    a plug-and-play portable storage device that uses flash memory that is lightweight

    PEND DRIVES/FLASH DRIVES/THUMB DRIVE

  • 31

    means the results generated by the computer once the processing of CPU is completed, based on the instruction given by the user. The output is in the form of documents, videos, audio, graphs, images, etc. Results are displayed on your computer screen

    OUTPUT FUNCTION

  • 32

    What are Input function tools of computer

    SCANNER MOUSE CAMERA KEYBOARD BARCODE READER BIOMETRIC SENSOR

  • 33

    What are output function tools of computer

    MONITOR PRINTER SPEAKER PLOTTER

  • 34

    This is a part that holds all of the parts of the computer system

    COMPUTER CASE

  • 35

    the main printed circuit board within a computer, which means it's the primary piece of circuitry that all of the other pieces plug into to create a cohesive whole.

    MOTHERBOARD

  • 36

    is an output device that processes the data from the motherboard and sends the appropriate information to the computer's screen for display.

    GRAPHICS CARD

  • 37

    converts the Alternating current (AC) mains supply from the power cord from a wall socket and supplies the correct Direct current (DC) voltages to all the components inside the computer.

    POWER SUPPLY UNIT

  • 38

    an output device used to visualize the graphics data sent from the computer's graphic card

    MONITOR

  • 39

    device that enables a user to input text into a computer or any other electronic machinery

    KEYBOARD (QWERTY)

  • 40

    small device that a computer user pushes across a desk surface in order to point to a place on a display screen and to select one or more actions to take from that position

    MOUSE

  • 41

    can be thought of as fingerprints for files. The contents of a file are processed through a cryptographic algorithm, and a unique numerical value is produced that identifies the contents of the file. The fingerprint of any files.

    HASH VALUES

  • 42

    The hash values that are utilized in cybercrime investigation are

    SHA-1 MD5

  • 43

    Is an abbreviation for binary digit

    BIT

  • 44

    Legal Access is also known as

    HACKING