cyber crimes chap 8

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/19

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

20 Terms

1
New cards

Two of the most popular forms of cryptocurrency are bitcoins and dogecoins

false

2
New cards

Google, Facebook, and any website you can find via traditional search engines (Internet Explorer, Chrome, Firefox, etc.) are all located on the darknet.

false

3
New cards

On the darknet, prices are listed in ______ and are shipped to remote addresses or P.O. boxes.

bitcoins

4
New cards

Which of the following constitutional Amendments established the right to freedom of speech?

first

5
New cards

Dash eliminates this security issue by implementing a two-tier security network.

true

6
New cards

The deep web, which is not accessible through traditional search engines, is sometimes referred to as the ______.

deep net

7
New cards

Sites on the ToR network end in ______, but if you were to type the web address into Google, the website would not be found.

.onion

8
New cards

Solving complex mathematical puzzles every 10 minutes is a task usually seen with ______.

mining

9
New cards

Which of the following sites was not identified as being one of the popular alternatives in the darknet?

Milky Way

10
New cards

As law enforcement is attempting to infiltrate darknet websites, the group Anonymous is working to restore darknet sites that have been taken down.

false

11
New cards

______ may use ToR for competitions, keeping strategies secret, and internal accountability.

businesses

12
New cards

The Darknet Silk Road runs like a black market ______ site for drugs, drug paraphernalia, and other goods and services.

eBay-type

13
New cards

______ is often referred to as a peer-to-peer platform for censorship-resistant communication and publishing.

Freenet

14
New cards

According to the text, the surface web only accounts for about ______ percent of all the Internet.

4

15
New cards

Protection against unwarranted search and seizure is a constitutional protection given by the ______.

Fourth Amendment

16
New cards

Two of the most popular forms of cryptocurrency are ______.

bitcoin and dash

17
New cards

Which of the following types of cryptocurrency claims to improve on bitcoins by offering n enhanced level of security?

dash

18
New cards

______ may use ToR to protect sources, resources, and report from areas where it is dangerous.

media

19
New cards

In order to access the deep web, special considerations are needed, including private URL addresses or, for some areas, specialized software.

true

20
New cards

On average, Google accesses ______ percent of the surface web.

16