1/39
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
With increased digitalization of our personal information, the integrity of our data is at low risk.
false
Spoofing cannot be used to manipulate the stock market.
false
According to the text, censorship is mainly used by ______ governments, which have come into power by dint of monarchy, family dynasty, coup d'état, rigged election, or some combination thereof.
authoritarian
One of the latest trends is data mining and data brokerage.
true
Which of the following companies have fallen victim to cybercriminals in recent years?
sony, ashley madison, experian (all of these)
A new prank that is not only draining law enforcement resources but also creating very dangerous situations for citizens is known as ______.
swatting
E-mail spoofing is the least common type of spoofing.
false
According to the text, one of the latest trends is data ______.
mining and brokerage
The human brain thinks of life in a ______.
linear fashion
A technology that detects the current geolocation of a target, which may be anything from a vehicle to an item in a manufacturing plant to a person, is referred to as ______.
Real Time Location Services
In the 1970s, Gordon Moore showed how ______ doubled every two years.
central processing units
A fraudulent or malicious practice in which communication is sent from an unknown source disguised as a source known to the receiver is referred to as ______.
spoofing
The forgery of an e-mail header pretending to be a legitimate sender like a business or friend scamming the receiver into opening the e-mail and downloading malicious software or responding to a solicitation is an example of ______.
The position has a specific job description.
Which of the following was NOT identified as a warning sign of money mule schemes?
The position has a specific job description.
Authoritarian governments are not the only ones that manipulate the facts and block websites.
true
Europe and the U.S. government also engage in censorship, mainly targeting ______.
hate speech
Cell phone providers are by law required to enable GPS tracking on at least ______ of devices in their network.
95%
E-mail spoofing is used for which of the following campaigns?
spam and phishing
______ is known as one of the largest data collectors.
One such tool used to manipulate data and people is censorship.
true
Which of the following was NOT identified as a warning sign of money mule schemes?
The employer is located outside of the United States. | |
The job promises an unusual high amount of earnings. | |
The position has a specific job description. | |
All interactions and transactions occur online. |
The position has a specific job description
With increased digitalization of our personal information, the integrity of our data is at low risk.
True | ||
False |
False
Europe and the U.S. government also engage in censorship, mainly targeting ______.
narcotics | |
violence | |
hate speech | |
pornography |
hate speech
The human brain thinks of life in a ______.
nonexponential fashion | |
exponential fashion | |
nonlinear fashion | |
linear fashion |
linear fashion
Cell phone providers are by law required to enable GPS tracking on at least ______ of devices in their network.
75% | |
25% | |
50% | |
95% |
95%
Which of the following was suggested as a way to avoid becoming a money mule?
utilizing fraud protection companies, such as PayPal | |
not monitoring transactions | |
forgoing your research into the company or person offering the job | |
not calling the authorities |
utilizing fraud protection companies, such as PayPal
People who are desperately looking for a job or are looking for a “work from home” job for a variety of reasons are referred to as ______.
slackers | |
couch potatoes | |
money mules | |
lazy dogs |
money mules
The country with the best known and most discussed censorship is ______.
China | |
Russia | |
North Korea | |
Syria |
China
Which of the following is not a factor that leads to the deployment of SWAT officers?
risk of harm to law enforcement officers | |
likelihood of surrender by the criminal | |
risk of harm to the public | |
case requirements |
likelihood of surrender by the criminal
Google and Twitter are among the biggest data collection agencies.
True | ||
False |
False
A technology that detects the current geolocation of a target, which may be anything from a vehicle to an item in a manufacturing plant to a person, is referred to as ______.
Ultrasonic Ranging | |
Global Positioning System | |
Wireless Local Area Network | |
Real Time Location Services |
Real Time Location Services
In 2010, the Dodd-Frank Act made spoofing a(n) ______, but it has been difficult to prosecute spoofers.
felony crime | |
infraction | |
misdemeanor crime | |
crime not punishable by law |
felony crime
______ is known as one of the largest data collectors.
Amazon | |
E-mail spoofing is used for which of the following campaigns?
spam and phishing | |
scanning and phishing | |
vishing and spam | |
phishing and scanning |
spam and phishing
The government of Japan forced Google to reshoot street-level views because the images were enabling viewers to look inside the houses.
True | ||
False |
True
Authoritarian governments are not the only ones that manipulate the facts and block websites.
True | ||
False |
True
Which of the following companies have fallen victim to cybercriminals in recent years?
Sony | |
Ashley Madison | |
Experian | |
all of these |
all of these
A radio frequency transmitter that blocks the communication between cell phones and text messages is referred to as a ______.
radio beacon | |
GPS jammer | |
Bluetooth | |
spoofer |
GPS jammer
According to the text, one of the latest trends is data ______.
sales and mining | |
analysis and brokerage | |
analysis and mining | |
mining and brokerage |
mining and brokerage
One of the latest trends is data mining and data brokerage.
True | ||
False |
True