1/49
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced | Call with Kai |
|---|
No analytics yet
Send a link to your students to track their progress
What is identity theft also commonly called?
Identity theft is also commonly called identity fraud.
What occurs during identity theft?
Identity theft occurs when someone obtains personal information to impersonate another person.
What is an example of personally identifiable information (PII)?
An example of personally identifiable information (PII) is a Social Security number.
What type of identity theft involves fraudulent use of healthcare services?
The type of identity theft that involves fraudulent use of healthcare services is called medical identity theft.
What is identity theft targeting minors called?
Identity theft targeting minors is called child identity theft.
What technique involves stealing personal information from discarded documents?
The technique that involves stealing personal information from discarded documents is called dumpster diving.
What is the act of secretly observing someone entering confidential information called?
The act of secretly observing someone entering confidential information is called shoulder surfing.
Which social engineering technique involves sending fake messages to trick users into revealing information?
The social engineering technique that involves sending fake messages to trick users is called phishing.
Why do employers often monitor workplace activities?
Employers often monitor workplace activities primarily to protect company resources and security.
What occurs during an invasion of privacy?
Invasion of privacy occurs when an individual intrudes where privacy is expected.
What is a form of invasion of privacy?
A form of invasion of privacy is a violation of confidentiality.
What approach focuses on minimizing the amount of personal data shared online?
The approach that focuses on minimizing the amount of personal data shared online is called privacy-first.
What is information warfare primarily aimed at achieving?
Information warfare is primarily aimed at achieving information superiority.
What does information warfare involve?
Information warfare involves manipulating information so that the target makes decisions against their interests.
Which of the following is NOT a form of information warfare?
File backup systems are NOT a form of information warfare.
What is an example of information warfare?
Disabling communication networks of an opponent is an example of information warfare.
What is a weapon of information warfare?
Information manipulation is a weapon of information warfare.
Which type of information warfare focuses on hacking activities?
The type of information warfare that focuses on hacking activities is called electronic warfare.
What is the practice of spying to obtain confidential information called?
The practice of spying to obtain confidential information is called espionage.
What does cyber espionage use ICT primarily for?
Cyber espionage uses ICT primarily to collect intelligence or gain economic advantage.
Who may conduct cyber espionage?
Cyber espionage may be conducted by government actors, businesses, and organized groups.
What does intelligence gathering refer to?
Intelligence gathering refers to collecting information about an entity for strategic use.
Which intelligence discipline involves collecting information from publicly available sources?
The intelligence discipline that involves collecting information from publicly available sources is called OSINT.
What is intelligence obtained from human sources called?
Intelligence obtained from human sources is called HUMINT.
What is intelligence derived from digital networks and cyberspace known as?
Intelligence derived from digital networks and cyberspace is known as CYBINT / DNINT.
What does e-health refer to?
E-health refers to the use of ICT to improve healthcare.
What is telemedicine defined as?
Telemedicine is defined as the delivery of healthcare at a distance using technology.
What does telehealth refer to?
Telehealth refers to the broad use of technology for healthcare services.
What is remote patient monitoring used for?
Remote patient monitoring is used for monitoring patients at home.
Which type of telemedicine is asynchronous?
The type of telemedicine that is asynchronous is called store-and-forward.
What does interactive telemedicine involve?
Interactive telemedicine involves real-time communication.
What is an advantage of telemedicine?
An advantage of telemedicine is convenience.
What does telemedicine help reduce?
Telemedicine helps reduce no-shows and cancellations.
What is a disadvantage of telemedicine?
A disadvantage of telemedicine includes technical training requirements.
What do licensing issues in telemedicine refer to?
Licensing issues in telemedicine refer to legal permission to practice across locations.
What can virtual therapy be conducted through?
Virtual therapy can be conducted through electronic devices.
What is virtual psychotherapy also known as?
Virtual psychotherapy is also known as telepsychology.
What does virtual physical therapy provide?
Virtual physical therapy provides online or phone-based treatment.
What is a benefit of virtual therapy?
A benefit of virtual therapy is increased access to care.
What is a disadvantage of virtual therapy?
A disadvantage of virtual therapy includes data concerns.
What does hacking refer to?
Hacking refers to exploiting system weaknesses.
What is cracking?
Cracking is breaking into systems illegally.
Which hacker type is ethical?
The ethical hacker type is called white hat.
What are black hat hackers known for?
Black hat hackers are known for illegal activities.
Which tool scans systems for weaknesses?
A vulnerability scanner is a tool that scans systems for weaknesses.
What is password cracking used for?
Password cracking is used to guess or break passwords.
What are packet sniffers used to do?
Packet sniffers are used to capture network data.
What is a Trojan horse?
A Trojan horse is malicious software disguised as legitimate.
What are keyloggers used for?
Keyloggers are used to record keystrokes.
What does spamming refer to?
Spamming refers to sending unsolicited bulk messages.