Name: ALL questions should be answered by clearly writing the ALPHA designation on the space provided. Answers that are not legible will be marked as incorrect. I. Which criminological theory posits that there is a constant supply of motivated offenders willing and capable of committing computer related crime? a. Choice theory b. Routine activities c. Deterrence theory d. Strain theory 1. 2. Morton's Strain Theory suggests that there five modes of adaption that differentiate between acceptable goals and means for achieving success. Which mode of adaptation is most likely to lead to criminal activity that includes computer criminals? a. Conformity b. Ritualism c. Innovation d. Retreatism e. Rebellion 2. 3. Which criminological theory assumes that people will violate the law? a. Learning theory b. Rational Choice c. Routine Activities d. Social control 4. What represents the highest risk for cybercrime and corporate and industrial espionage? a. b. c. d. Script kiddies White hat hackers Insider threat Nonstate actors 4 5. Which of the following is not recognized or suggested as a method used by hackers? a. Socialization b. Authorized use of organization systems c. Bypassing security and control processes d. Compromised accounts 6. Which type of hacker is more concerned with bragging and attacking other hackers? a. Cracker b. Script kiddie c. White hat d. Black hat 6. 7. Which type of hacker is also considered an ethical hacker? a. Cracker b. Script kiddie c. White hat d. Black hat 7. 8. Research on the subculture of hackers suggests that there are five norms in the social world of hacking. Which of these norms permeated the language of hackers in the 1970s and 1980s? a. Technology b. Knowledge c. Commitment d. Categorization 8. Which of the following is not identified as a reason why organized crime will use social media and networking sites like Twitter, Facebook, or LinkedIn? 9. a. Conduct intelligence operations to collect information. b. Facilitate the commission of crimes. c. As a communications vehicle or medium. d. To post pictures. 10. What internet network is used by criminal, terrorist, and organized crime groups to buy, sell, and trade services, illicit and illegal goods? a. Facebook b. Stark industries c. Tor d. Stuxnet 10