Answered step by step
Verified Expert Solution
Question
00
1 Approved Answer
Name: ALL questions should be answered by clearly writing the ALPHA designation on the space provided. Answers that are not legible will be marked as
Name: ALL questions should be answered by clearly writing the ALPHA designation on the space provided. Answers that are not legible will be marked as incorrect. I. Which criminological theory posits that there is a constant supply of motivated offenders willing and capable of committing computer related crime? a. Choice theory b. Routine activities c. Deterrence theory d. Strain theory 1. 2. Morton's Strain Theory suggests that there five modes of adaption that differentiate between acceptable goals and means for achieving success. Which mode of adaptation is most likely to lead to criminal activity that includes computer criminals? a. Conformity b. Ritualism c. Innovation d. Retreatism e. Rebellion 2. 3. Which criminological theory assumes that people will violate the law? a. Learning theory b. Rational Choice c. Routine Activities d. Social control 4. What represents the highest risk for cybercrime and corporate and industrial espionage? a. b. c. d. Script kiddies White hat hackers Insider threat Nonstate actors 4 5. Which of the following is not recognized or suggested as a method used by hackers? a. Socialization b. Authorized use of organization systems c. Bypassing security and control processes d. Compromised accounts 6. Which type of hacker is more concerned with bragging and attacking other hackers? a. Cracker b. Script kiddie c. White hat d. Black hat 6. 7. Which type of hacker is also considered an ethical hacker? a. Cracker b. Script kiddie c. White hat d. Black hat 7. 8. Research on the subculture of hackers suggests that there are five norms in the social world of hacking. Which of these norms permeated the language of hackers in the 1970s and 1980s? a. Technology b. Knowledge c. Commitment d. Categorization 8. Which of the following is not identified as a reason why organized crime will use social media and networking sites like Twitter, Facebook, or LinkedIn? 9. a. Conduct intelligence operations to collect information. b. Facilitate the commission of crimes. c. As a communications vehicle or medium. d. To post pictures. 10. What internet network is used by criminal, terrorist, and organized crime groups to buy, sell, and trade services, illicit and illegal goods? a. Facebook b. Stark industries c. Tor d. Stuxnet 10
Step by Step Solution
There are 3 Steps involved in it
Step: 1
Get Instant Access with AI-Powered Solutions
See step-by-step solutions with expert insights and AI powered tools for academic success
Step: 2
Step: 3
Ace Your Homework with AI
Get the answers you need in no time with our AI-driven, step-by-step assistance
Get Started