1/19
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
According to the text, logic bombs are typically installed by outsiders of an organization or corporation.
False
The ______, an underground web, allows offenders to stay anonymous and undetected, as these are not traceable by police.
Dark Net
In 2015, the most common crime reported to the Federal Consumer Commission was ______.
Identity theft
Commercial e-mail is defined as any electronic mail message the primary purpose of which is commercial advertisement or promotion of products or services.
True
Which of the following countermeasures helps prevent e-mail spoofing, that is, the forgery of an e-mail header to make it appear as if it is coming from a friend or employee?
implement message authentication
According to the text, human trafficking consists of all of the following elements EXCEPT ______.
outcome
The Identity Theft Resource Center estimates that it takes on average ______ hours to repair the damage of identity theft.
600
Botnets use ______ architecture in which each workstation has the same capabilities and responsibilities.
peer to peer
According to the text, phishing scams typically target ______.
personal information
______ is defined as a collection of infected machines worldwide that receive commands and perform some illegal actions such as distributed denial of service attacks, among others.
A botnet
Using the same password for several accounts does not make it easy for thieves to steal a victim's information.
False
The exchange of insults in a public setting, such as a bulletin board or chat room, is known as ______.
flaming
In 1998 Congress passed the Assumption Deterrence Act making identity theft ______.
a felony crime
Per the 1998 Assumption Deterrence Act, the text identified all of the following types of punishment EXCEPT ______.
probation
______ refers to all types of crime in which someone wrongfully obtains and uses another person's personal data in some way that involves fraud or deception, typically for economic gain.
identity theft
The Internal Revenue Service uses which of the following methods to contact a taxpayer?
Which of the following was NOT identified as a way that criminals get information from their victims?
Criminals directly ask the victim for their personal information.
Which of the following countermeasures recommends that companies must complete regular data backups?
complete regular updates
Phishing is also referred to as "brand spoofing" or "carding."
True
According to the text, which of the following entities are considered a special target for botnets?
banks and financial institutions