Deck 11: What the Future Holds

ملء الشاشة (f)
exit full mode
سؤال
The country with the best known and most discussed censorship is ______.

A) Russia
B) North Korea
C) Syria
D) China
استخدم زر المسافة أو
up arrow
down arrow
لقلب البطاقة.
سؤال
A technology that detects the current geolocation of a target, which may be anything from a vehicle to an item in a manufacturing plant to a person, is referred to as ______.

A) Real Time Location Services
B) Global Positioning System
C) Wireless Local Area Network
D) Ultrasonic Ranging
سؤال
A fraudulent or malicious practice in which communication is sent from an unknown source disguised as a source known to the receiver is referred to as ______.

A) spamming
B) phishing
C) spoofing
D) vishing
سؤال
The Internet of Things are network-connected devices and sensors such as ______.

A) alarm systems
B) iPads
C) elevators
D) all of these
سؤال
A radio frequency transmitter that blocks the communication between cell phones and text messages is referred to as a ______.

A) GPS jammer
B) spoofer
C) Bluetooth
D) radio beacon
سؤال
In 2010, the Dodd-Frank Act made spoofing a(n) ______, but it has been difficult to prosecute spoofers.

A) misdemeanor crime
B) infraction
C) felony crime
D) crime not punishable by law
سؤال
Which of the following was suggested as a way to avoid becoming a money mule?

A) forgoing your research into the company or person offering the job
B) not monitoring transactions
C) utilizing fraud protection companies, such as PayPal
D) not calling the authorities
سؤال
A new prank that is not only draining law enforcement resources but also creating very dangerous situations for citizens is known as ______.

A) spoofing
B) swatting
C) squatting
D) phishing
سؤال
According to the text, censorship is mainly used by ______ governments, which have come into power by dint of monarchy, family dynasty, coup d'état, rigged election, or some combination thereof.

A) democratic
B) totalitarian
C) authoritarian
D) monarchical
سؤال
Which of the following is not a factor that leads to the deployment of SWAT officers?

A) likelihood of surrender by the criminal
B) risk of harm to the public
C) risk of harm to law enforcement officers
D) case requirements
سؤال
Cell phone providers are by law required to enable GPS tracking on at least ______ of devices in their network.

A) 25%
B) 50%
C) 75%
D) 95%
سؤال
Which of the following was NOT identified as a warning sign of money mule schemes?

A) The employer is located outside of the United States.
B) All interactions and transactions occur online.
C) The job promises an unusual high amount of earnings.
D) The position has a specific job description.
سؤال
All of the following countries are on the list of most censored countries in the world except ______.

A) China
B) Iran
C) Cuba
D) Turkey
سؤال
E-mail spoofing is used for which of the following campaigns?

A) vishing and spam
B) spam and phishing
C) scanning and phishing
D) phishing and scanning
سؤال
Europe and the U.S. government also engage in censorship, mainly targeting ______.

A) violence
B) hate speech
C) pornography
D) narcotics
سؤال
According to Moore's law, the growth in the information technology is exponential, such as ______

A) 1, 2, 3, 4, 5, 6
B) 1, 2, 4, 8, 16, 32
C) 1, 2, 4, 6, 8, 10
D) 1, 3, 6, 9, 12, 15
سؤال
In ______ scams, criminals intercept e-mails between two businesses or a private person and a business and direct the purchasing party to send the payment for the product to a new bank account.

A) man-in-the-middle
B) man-in-the-cloud
C) man-in-the-app
D) man-in-the-IoT
سؤال
The forgery of an e-mail header pretending to be a legitimate sender like a business or friend scamming the receiver into opening the e-mail and downloading malicious software or responding to a solicitation is an example of ______.

A) e-mail spamming
B) e-mail phishing
C) e-mail spoofing
D) e-mail vishing
سؤال
People who are desperately looking for a job or are looking for a "work from home" job for a variety of reasons are referred to as ______.

A) money mules
B) lazy dogs
C) couch potatoes
D) slackers
سؤال
Which of the following was identified as one of the main tools used by criminals?

A) GPS jammer
B) police scanner
C) Bluetooth
D) radio beacons
سؤال
Google and Twitter are among the biggest data collection agencies.
سؤال
E-mail spoofing is the least common type of spoofing.
سؤال
Explain real-time location services and discuss the risks of using apps that contain location services. Use an app as an example.
سؤال
What is censorship's purpose and why do countries censor information?
سؤال
Criminals can use GPS spoofing as a tool by creating false GPS signals. This is possible because the real GPS signals are very weak because satellites are far away.
سؤال
Which of the following companies have fallen victim to cybercriminals in recent years?

A) Sony
B) Ashley Madison
C) Experian
D) all of these
سؤال
Discuss data mining. Who does data mining benefit? Is it a safe practice for companies to use?
سؤال
Spoofing cannot be used to manipulate the stock market.
سؤال
When location services are turned on, cell phones are constantly sending signals of location and attach so-called "metrotags" to all pictures.
سؤال
Why is it difficult to prosecute individuals who have been charged with spoofing?
سؤال
In the 1970s, Gordon Moore showed how ______ doubled every two years.

A) a graphics card
B) random access memory
C) central processing units
D) a hard drive
سؤال
One such tool used to manipulate data and people is censorship.
سؤال
Authoritarian governments are not the only ones that manipulate the facts and block websites.
سؤال
According to the text, one of the latest trends is data ______.

A) analysis and mining
B) mining and brokerage
C) sales and mining
D) analysis and brokerage
سؤال
______ is known as one of the largest data collectors.

A) Google
B) Instagram
C) Amazon
D) Snapchat
سؤال
With increased digitalization of our personal information, the integrity of our data is at low risk.
سؤال
The human brain thinks of life in a ______.

A) nonlinear fashion
B) linear fashion
C) exponential fashion
D) nonexponential fashion
سؤال
The government of Japan forced Google to reshoot street-level views because the images were enabling viewers to look inside the houses.
سؤال
One of the latest trends is data mining and data brokerage.
سؤال
What does the future hold in terms of cybersecurity?
فتح الحزمة
قم بالتسجيل لفتح البطاقات في هذه المجموعة!
Unlock Deck
Unlock Deck
1/40
auto play flashcards
العب
simple tutorial
ملء الشاشة (f)
exit full mode
Deck 11: What the Future Holds
1
The country with the best known and most discussed censorship is ______.

A) Russia
B) North Korea
C) Syria
D) China
D
2
A technology that detects the current geolocation of a target, which may be anything from a vehicle to an item in a manufacturing plant to a person, is referred to as ______.

A) Real Time Location Services
B) Global Positioning System
C) Wireless Local Area Network
D) Ultrasonic Ranging
A
3
A fraudulent or malicious practice in which communication is sent from an unknown source disguised as a source known to the receiver is referred to as ______.

A) spamming
B) phishing
C) spoofing
D) vishing
C
4
The Internet of Things are network-connected devices and sensors such as ______.

A) alarm systems
B) iPads
C) elevators
D) all of these
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 40 في هذه المجموعة.
فتح الحزمة
k this deck
5
A radio frequency transmitter that blocks the communication between cell phones and text messages is referred to as a ______.

A) GPS jammer
B) spoofer
C) Bluetooth
D) radio beacon
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 40 في هذه المجموعة.
فتح الحزمة
k this deck
6
In 2010, the Dodd-Frank Act made spoofing a(n) ______, but it has been difficult to prosecute spoofers.

A) misdemeanor crime
B) infraction
C) felony crime
D) crime not punishable by law
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 40 في هذه المجموعة.
فتح الحزمة
k this deck
7
Which of the following was suggested as a way to avoid becoming a money mule?

A) forgoing your research into the company or person offering the job
B) not monitoring transactions
C) utilizing fraud protection companies, such as PayPal
D) not calling the authorities
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 40 في هذه المجموعة.
فتح الحزمة
k this deck
8
A new prank that is not only draining law enforcement resources but also creating very dangerous situations for citizens is known as ______.

A) spoofing
B) swatting
C) squatting
D) phishing
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 40 في هذه المجموعة.
فتح الحزمة
k this deck
9
According to the text, censorship is mainly used by ______ governments, which have come into power by dint of monarchy, family dynasty, coup d'état, rigged election, or some combination thereof.

A) democratic
B) totalitarian
C) authoritarian
D) monarchical
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 40 في هذه المجموعة.
فتح الحزمة
k this deck
10
Which of the following is not a factor that leads to the deployment of SWAT officers?

A) likelihood of surrender by the criminal
B) risk of harm to the public
C) risk of harm to law enforcement officers
D) case requirements
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 40 في هذه المجموعة.
فتح الحزمة
k this deck
11
Cell phone providers are by law required to enable GPS tracking on at least ______ of devices in their network.

A) 25%
B) 50%
C) 75%
D) 95%
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 40 في هذه المجموعة.
فتح الحزمة
k this deck
12
Which of the following was NOT identified as a warning sign of money mule schemes?

A) The employer is located outside of the United States.
B) All interactions and transactions occur online.
C) The job promises an unusual high amount of earnings.
D) The position has a specific job description.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 40 في هذه المجموعة.
فتح الحزمة
k this deck
13
All of the following countries are on the list of most censored countries in the world except ______.

A) China
B) Iran
C) Cuba
D) Turkey
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 40 في هذه المجموعة.
فتح الحزمة
k this deck
14
E-mail spoofing is used for which of the following campaigns?

A) vishing and spam
B) spam and phishing
C) scanning and phishing
D) phishing and scanning
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 40 في هذه المجموعة.
فتح الحزمة
k this deck
15
Europe and the U.S. government also engage in censorship, mainly targeting ______.

A) violence
B) hate speech
C) pornography
D) narcotics
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 40 في هذه المجموعة.
فتح الحزمة
k this deck
16
According to Moore's law, the growth in the information technology is exponential, such as ______

A) 1, 2, 3, 4, 5, 6
B) 1, 2, 4, 8, 16, 32
C) 1, 2, 4, 6, 8, 10
D) 1, 3, 6, 9, 12, 15
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 40 في هذه المجموعة.
فتح الحزمة
k this deck
17
In ______ scams, criminals intercept e-mails between two businesses or a private person and a business and direct the purchasing party to send the payment for the product to a new bank account.

A) man-in-the-middle
B) man-in-the-cloud
C) man-in-the-app
D) man-in-the-IoT
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 40 في هذه المجموعة.
فتح الحزمة
k this deck
18
The forgery of an e-mail header pretending to be a legitimate sender like a business or friend scamming the receiver into opening the e-mail and downloading malicious software or responding to a solicitation is an example of ______.

A) e-mail spamming
B) e-mail phishing
C) e-mail spoofing
D) e-mail vishing
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 40 في هذه المجموعة.
فتح الحزمة
k this deck
19
People who are desperately looking for a job or are looking for a "work from home" job for a variety of reasons are referred to as ______.

A) money mules
B) lazy dogs
C) couch potatoes
D) slackers
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 40 في هذه المجموعة.
فتح الحزمة
k this deck
20
Which of the following was identified as one of the main tools used by criminals?

A) GPS jammer
B) police scanner
C) Bluetooth
D) radio beacons
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 40 في هذه المجموعة.
فتح الحزمة
k this deck
21
Google and Twitter are among the biggest data collection agencies.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 40 في هذه المجموعة.
فتح الحزمة
k this deck
22
E-mail spoofing is the least common type of spoofing.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 40 في هذه المجموعة.
فتح الحزمة
k this deck
23
Explain real-time location services and discuss the risks of using apps that contain location services. Use an app as an example.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 40 في هذه المجموعة.
فتح الحزمة
k this deck
24
What is censorship's purpose and why do countries censor information?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 40 في هذه المجموعة.
فتح الحزمة
k this deck
25
Criminals can use GPS spoofing as a tool by creating false GPS signals. This is possible because the real GPS signals are very weak because satellites are far away.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 40 في هذه المجموعة.
فتح الحزمة
k this deck
26
Which of the following companies have fallen victim to cybercriminals in recent years?

A) Sony
B) Ashley Madison
C) Experian
D) all of these
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 40 في هذه المجموعة.
فتح الحزمة
k this deck
27
Discuss data mining. Who does data mining benefit? Is it a safe practice for companies to use?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 40 في هذه المجموعة.
فتح الحزمة
k this deck
28
Spoofing cannot be used to manipulate the stock market.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 40 في هذه المجموعة.
فتح الحزمة
k this deck
29
When location services are turned on, cell phones are constantly sending signals of location and attach so-called "metrotags" to all pictures.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 40 في هذه المجموعة.
فتح الحزمة
k this deck
30
Why is it difficult to prosecute individuals who have been charged with spoofing?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 40 في هذه المجموعة.
فتح الحزمة
k this deck
31
In the 1970s, Gordon Moore showed how ______ doubled every two years.

A) a graphics card
B) random access memory
C) central processing units
D) a hard drive
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 40 في هذه المجموعة.
فتح الحزمة
k this deck
32
One such tool used to manipulate data and people is censorship.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 40 في هذه المجموعة.
فتح الحزمة
k this deck
33
Authoritarian governments are not the only ones that manipulate the facts and block websites.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 40 في هذه المجموعة.
فتح الحزمة
k this deck
34
According to the text, one of the latest trends is data ______.

A) analysis and mining
B) mining and brokerage
C) sales and mining
D) analysis and brokerage
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 40 في هذه المجموعة.
فتح الحزمة
k this deck
35
______ is known as one of the largest data collectors.

A) Google
B) Instagram
C) Amazon
D) Snapchat
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 40 في هذه المجموعة.
فتح الحزمة
k this deck
36
With increased digitalization of our personal information, the integrity of our data is at low risk.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 40 في هذه المجموعة.
فتح الحزمة
k this deck
37
The human brain thinks of life in a ______.

A) nonlinear fashion
B) linear fashion
C) exponential fashion
D) nonexponential fashion
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 40 في هذه المجموعة.
فتح الحزمة
k this deck
38
The government of Japan forced Google to reshoot street-level views because the images were enabling viewers to look inside the houses.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 40 في هذه المجموعة.
فتح الحزمة
k this deck
39
One of the latest trends is data mining and data brokerage.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 40 في هذه المجموعة.
فتح الحزمة
k this deck
40
What does the future hold in terms of cybersecurity?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 40 في هذه المجموعة.
فتح الحزمة
k this deck
locked card icon
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 40 في هذه المجموعة.