Cyber crimes chap 4

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/19

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

20 Terms

1
New cards

According to the text, logic bombs are typically installed by outsiders of an organization or corporation.

False

2
New cards

The ______, an underground web, allows offenders to stay anonymous and undetected, as these are not traceable by police.

Dark Net

3
New cards

In 2015, the most common crime reported to the Federal Consumer Commission was ______.

Identity theft

4
New cards

Commercial e-mail is defined as any electronic mail message the primary purpose of which is commercial advertisement or promotion of products or services.

True

5
New cards

Which of the following countermeasures helps prevent e-mail spoofing, that is, the forgery of an e-mail header to make it appear as if it is coming from a friend or employee?

implement message authentication

6
New cards

According to the text, human trafficking consists of all of the following elements EXCEPT ______.

outcome

7
New cards

The Identity Theft Resource Center estimates that it takes on average ______ hours to repair the damage of identity theft.

600

8
New cards

Botnets use ______ architecture in which each workstation has the same capabilities and responsibilities.

peer to peer

9
New cards

According to the text, phishing scams typically target ______.

personal information

10
New cards

______ is defined as a collection of infected machines worldwide that receive commands and perform some illegal actions such as distributed denial of service attacks, among others.

A botnet

11
New cards

Using the same password for several accounts does not make it easy for thieves to steal a victim's information.

False

12
New cards

The exchange of insults in a public setting, such as a bulletin board or chat room, is known as ______.

flaming

13
New cards

In 1998 Congress passed the Assumption Deterrence Act making identity theft ______.

a felony crime

14
New cards

Per the 1998 Assumption Deterrence Act, the text identified all of the following types of punishment EXCEPT ______.

probation

15
New cards

______ refers to all types of crime in which someone wrongfully obtains and uses another person's personal data in some way that involves fraud or deception, typically for economic gain.

identity theft

16
New cards

The Internal Revenue Service uses which of the following methods to contact a taxpayer?

mail

17
New cards

Which of the following was NOT identified as a way that criminals get information from their victims?

Criminals directly ask the victim for their personal information.

18
New cards

Which of the following countermeasures recommends that companies must complete regular data backups?

complete regular updates

19
New cards

Phishing is also referred to as "brand spoofing" or "carding."

True

20
New cards

According to the text, which of the following entities are considered a special target for botnets?

banks and financial institutions