cyber crimes chap 11

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/39

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

40 Terms

1
New cards

With increased digitalization of our personal information, the integrity of our data is at low risk.

false

2
New cards

Spoofing cannot be used to manipulate the stock market.

false

3
New cards

According to the text, censorship is mainly used by ______ governments, which have come into power by dint of monarchy, family dynasty, coup d'état, rigged election, or some combination thereof.

authoritarian

4
New cards

One of the latest trends is data mining and data brokerage.

true

5
New cards

Which of the following companies have fallen victim to cybercriminals in recent years?

sony, ashley madison, experian (all of these)

6
New cards

A new prank that is not only draining law enforcement resources but also creating very dangerous situations for citizens is known as ______.

swatting

7
New cards

E-mail spoofing is the least common type of spoofing.

false

8
New cards

According to the text, one of the latest trends is data ______.

mining and brokerage

9
New cards

The human brain thinks of life in a ______.

linear fashion

10
New cards

A technology that detects the current geolocation of a target, which may be anything from a vehicle to an item in a manufacturing plant to a person, is referred to as ______.

Real Time Location Services

11
New cards

In the 1970s, Gordon Moore showed how ______ doubled every two years.

central processing units

12
New cards

A fraudulent or malicious practice in which communication is sent from an unknown source disguised as a source known to the receiver is referred to as ______.

spoofing

13
New cards

The forgery of an e-mail header pretending to be a legitimate sender like a business or friend scamming the receiver into opening the e-mail and downloading malicious software or responding to a solicitation is an example of ______.

The position has a specific job description.

14
New cards

Which of the following was NOT identified as a warning sign of money mule schemes?

The position has a specific job description.

15
New cards

Authoritarian governments are not the only ones that manipulate the facts and block websites.

true

16
New cards

Europe and the U.S. government also engage in censorship, mainly targeting ______.

hate speech

17
New cards

Cell phone providers are by law required to enable GPS tracking on at least ______ of devices in their network.

95%

18
New cards

E-mail spoofing is used for which of the following campaigns?

spam and phishing

19
New cards

______ is known as one of the largest data collectors.

google

20
New cards

One such tool used to manipulate data and people is censorship.

true

21
New cards

Which of the following was NOT identified as a warning sign of money mule schemes?

The employer is located outside of the United States.

The job promises an unusual high amount of earnings.

The position has a specific job description.

All interactions and transactions occur online.

The position has a specific job description

22
New cards

With increased digitalization of our personal information, the integrity of our data is at low risk.

True

False

False

23
New cards

Europe and the U.S. government also engage in censorship, mainly targeting ______.

narcotics

violence

hate speech

pornography

hate speech

24
New cards

The human brain thinks of life in a ______.

nonexponential fashion

exponential fashion

nonlinear fashion

linear fashion

linear fashion

25
New cards

Cell phone providers are by law required to enable GPS tracking on at least ______ of devices in their network.

75%

25%

50%

95%

95%

26
New cards

Which of the following was suggested as a way to avoid becoming a money mule?

utilizing fraud protection companies, such as PayPal

not monitoring transactions

forgoing your research into the company or person offering the job

not calling the authorities

utilizing fraud protection companies, such as PayPal

27
New cards

People who are desperately looking for a job or are looking for a “work from home” job for a variety of reasons are referred to as ______.

slackers

couch potatoes

money mules

lazy dogs

money mules

28
New cards

The country with the best known and most discussed censorship is ______.

China

Russia

North Korea

Syria

China

29
New cards

Which of the following is not a factor that leads to the deployment of SWAT officers?

risk of harm to law enforcement officers

likelihood of surrender by the criminal

risk of harm to the public

case requirements

likelihood of surrender by the criminal

30
New cards

Google and Twitter are among the biggest data collection agencies.

True

False

False

31
New cards

A technology that detects the current geolocation of a target, which may be anything from a vehicle to an item in a manufacturing plant to a person, is referred to as ______.

Ultrasonic Ranging

Global Positioning System

Wireless Local Area Network

Real Time Location Services


Real Time Location Services

32
New cards

In 2010, the Dodd-Frank Act made spoofing a(n) ______, but it has been difficult to prosecute spoofers.

felony crime

infraction

misdemeanor crime

crime not punishable by law

felony crime

33
New cards

______ is known as one of the largest data collectors.

Amazon

Google

Instagram

Google

34
New cards

E-mail spoofing is used for which of the following campaigns?

spam and phishing

scanning and phishing

vishing and spam

phishing and scanning

spam and phishing

35
New cards

The government of Japan forced Google to reshoot street-level views because the images were enabling viewers to look inside the houses.

True

False


True

36
New cards

Authoritarian governments are not the only ones that manipulate the facts and block websites.

True

False

True

37
New cards

Which of the following companies have fallen victim to cybercriminals in recent years?

Sony

Ashley Madison

Experian

all of these

all of these

38
New cards

A radio frequency transmitter that blocks the communication between cell phones and text messages is referred to as a ______.

radio beacon

GPS jammer

Bluetooth

spoofer

GPS jammer

39
New cards

According to the text, one of the latest trends is data ______.

sales and mining

analysis and brokerage

analysis and mining

mining and brokerage

mining and brokerage

40
New cards

One of the latest trends is data mining and data brokerage.

True

False

True