Deck 4: Threats to Cybersecurity by Criminals and Organized Crime

ملء الشاشة (f)
exit full mode
سؤال
______ is defined as unsolicited commercial e-mail that includes any commercial emails addressed to a recipient with whom the sender has no existing business or personal relationship and not sent with the consent of the recipient.

A) Identity theft
B) A phishing scam
C) Spam
D) Keylogging
استخدم زر المسافة أو
up arrow
down arrow
لقلب البطاقة.
سؤال
Per the 1998 Assumption Deterrence Act, the text identified all of the following types of punishment except ______.

A) up to 15 years in prison
B) a fine
C) criminal forfeiture
D) probation
سؤال
Which of the following was NOT identified as a type of personal information that is sought out by identity thieves?

A) Social Security Number
B) telephone number
C) bank account number
D) credit card information
سؤال
According to the text, which of the following entities are considered a special target for botnets?

A) individuals
B) governments
C) banks and financial institutions
D) educational institutions
سؤال
Botnets use ______ architecture in which each workstation has the same capabilities and responsibilities.

A) peer-to-peer
B) command and control
C) denial of service
D) universal serial bus
سؤال
The ______, an underground web, allows offenders to stay anonymous and undetected, as these are not traceable by police.

A) Dark Net
B) Dreamboard
C) Yandex
D) Baidu
سؤال
In 1998 Congress passed the Assumption Deterrence Act making identity theft ______.

A) a misdemeanor crime
B) an infraction
C) a felony crime
D) a crime not punishable by law
سؤال
Botnets typically infect computers via ______ or drive-by-downloads.

A) ethernet cables
B) modems
C) routers
D) USBs
سؤال
The Identity Theft Resource Center estimates that it takes on average ______ hours to repair the damage of identity theft.

A) 200
B) 400
C) 600
D) 800
سؤال
Which of the following are considered small programs or sections of a program triggered by some event such as a certain date or time, a certain percentage of disk space filled, or the removal of a file?

A) keylogging
B) logic bombs
C) botnets
D) Trojan horses
سؤال
Which of the following was NOT identified as a way that criminals get information from their victims?

A) Criminals watch or listen to the victim.
B) Criminals access pre-approved credit card information from their victims.
C) Criminals directly ask the victim for their personal information.
D) Criminals steal the victim's mail.
سؤال
Which of the following countermeasures recommends that companies must complete regular data backups?

A) update e-mail policies
B) plan for ID theft after a data breach
C) complete regular updates
D) implement message authentication
سؤال
Which of the following countermeasures helps prevent e-mail spoofing, that is, the forgery of an e-mail header to make it appear as if it is coming from a friend or employee?

A) implement message authentication
B) update e-mail policies
C) complete regular updates
D) plan for ID theft after a data breach
سؤال
In 2015, the most common crime reported to the Federal Consumer Commission was ______.

A) cyberstalking
B) identify theft
C) spam
D) phishing scams
سؤال
According to the text, phishing scams typically target ______.

A) personal information
B) education information
C) employment information
D) demographic information
سؤال
______ is defined as a collection of infected machines worldwide that receive commands and perform some illegal actions such as distributed denial of service attacks, among others.

A) Phishing
B) A logic bomb
C) A Trojan horse
D) A botnet
سؤال
The Internal Revenue Service uses which of the following methods to contact a taxpayer?

A) e-mails
B) text messages
C) mail
D) phone calls
سؤال
______ refers to all types of crime in which someone wrongfully obtains and uses another person's personal data in some way that involves fraud or deception, typically for economic gain.

A) Phishing
B) Spamming
C) Identity theft
D) Cyberstalking
سؤال
According to the Federal Trade Commission, all of the following are ways that consumers can prevent identity theft except ______.

A) checking your credit report
B) using easy passwords
C) using security software
D) shredding financial documents
سؤال
Consumer crimes that include identity theft, phishing scams, and spam fall within which of the following categories?

A) fraud and financial crimes
B) cyberbullying crimes
C) Internet-initiated sexual offending crimes
D) hacktivist crimes
سؤال
Phishing is also referred to as "brand spoofing" or "carding."
سؤال
According to the author, cybercrime has various layers. What does this mean?
سؤال
Discuss the impact that social media networking sites have had on human trafficking and sexual exploitation. How have these sites contributed to the problem?
سؤال
Mail-order-brides typically come from developing countries and countries where women don't see the possibility of developing their full potential.
سؤال
According to the text, logic bombs are typically installed by outsiders of an organization or corporation.
سؤال
Access to the Internet, sexual deviance and antisociality have been found to be main explanatory factors of Internet-based child pornography offenses.
سؤال
According to the Federal Trade Commission, using security software on your computer, such as antivirus, anti-spyware, and a firewall, does not help prevent identity theft.
سؤال
Consumer crimes are deceptive practices that result in financial or other losses for consumers in the course of seemingly legitimate business transactions.
سؤال
The exchange of insults in a public setting, such as a bulletin board or chat room, is known as ______.

A) spamming
B) flaming
C) spoofing
D) phishing
سؤال
Which of the following is NOT a behavior/method that falls under the category of cyberbullying?

A) harassment
B) impersonation
C) inclusion
D) denigration
سؤال
Hacktivists engage in political action against a certain person, group, or even nation-state. Nation-states are mainly engaging in political and economic espionage.
سؤال
According to the text, cybercrime only has one layer.
سؤال
According to the text, human trafficking consists of all of the following elements except ______.

A) act
B) means
C) purpose
D) outcome
سؤال
What are some of the ways in which an individual can protect him- or herself from identity theft?
سؤال
Commercial e-mail is defined as any electronic mail message the primary purpose of which is commercial advertisement or promotion of products or services.
سؤال
The posting of harassing messages aiming to cause harm to the victim is also known as ______.

A) denigration
B) inclusion
C) exclusion
D) impersonation
سؤال
What are some of the criticisms of the CAN-SPAM Act. Do you agree with these criticisms? Why or why not?
سؤال
The intentional, aggressive behavior toward another person that is performed through electronic means is also known as ______.

A) spamming
B) spoofing
C) cyberbullying
D) phishing
سؤال
Using the same password for several accounts does not make it easy for thieves to steal a victim's information.
سؤال
Identify the countermeasures for identity theft. Do you believe these methods are effective at reducing identity theft?
فتح الحزمة
قم بالتسجيل لفتح البطاقات في هذه المجموعة!
Unlock Deck
Unlock Deck
1/40
auto play flashcards
العب
simple tutorial
ملء الشاشة (f)
exit full mode
Deck 4: Threats to Cybersecurity by Criminals and Organized Crime
1
______ is defined as unsolicited commercial e-mail that includes any commercial emails addressed to a recipient with whom the sender has no existing business or personal relationship and not sent with the consent of the recipient.

A) Identity theft
B) A phishing scam
C) Spam
D) Keylogging
C
2
Per the 1998 Assumption Deterrence Act, the text identified all of the following types of punishment except ______.

A) up to 15 years in prison
B) a fine
C) criminal forfeiture
D) probation
D
3
Which of the following was NOT identified as a type of personal information that is sought out by identity thieves?

A) Social Security Number
B) telephone number
C) bank account number
D) credit card information
B
4
According to the text, which of the following entities are considered a special target for botnets?

A) individuals
B) governments
C) banks and financial institutions
D) educational institutions
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 40 في هذه المجموعة.
فتح الحزمة
k this deck
5
Botnets use ______ architecture in which each workstation has the same capabilities and responsibilities.

A) peer-to-peer
B) command and control
C) denial of service
D) universal serial bus
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 40 في هذه المجموعة.
فتح الحزمة
k this deck
6
The ______, an underground web, allows offenders to stay anonymous and undetected, as these are not traceable by police.

A) Dark Net
B) Dreamboard
C) Yandex
D) Baidu
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 40 في هذه المجموعة.
فتح الحزمة
k this deck
7
In 1998 Congress passed the Assumption Deterrence Act making identity theft ______.

A) a misdemeanor crime
B) an infraction
C) a felony crime
D) a crime not punishable by law
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 40 في هذه المجموعة.
فتح الحزمة
k this deck
8
Botnets typically infect computers via ______ or drive-by-downloads.

A) ethernet cables
B) modems
C) routers
D) USBs
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 40 في هذه المجموعة.
فتح الحزمة
k this deck
9
The Identity Theft Resource Center estimates that it takes on average ______ hours to repair the damage of identity theft.

A) 200
B) 400
C) 600
D) 800
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 40 في هذه المجموعة.
فتح الحزمة
k this deck
10
Which of the following are considered small programs or sections of a program triggered by some event such as a certain date or time, a certain percentage of disk space filled, or the removal of a file?

A) keylogging
B) logic bombs
C) botnets
D) Trojan horses
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 40 في هذه المجموعة.
فتح الحزمة
k this deck
11
Which of the following was NOT identified as a way that criminals get information from their victims?

A) Criminals watch or listen to the victim.
B) Criminals access pre-approved credit card information from their victims.
C) Criminals directly ask the victim for their personal information.
D) Criminals steal the victim's mail.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 40 في هذه المجموعة.
فتح الحزمة
k this deck
12
Which of the following countermeasures recommends that companies must complete regular data backups?

A) update e-mail policies
B) plan for ID theft after a data breach
C) complete regular updates
D) implement message authentication
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 40 في هذه المجموعة.
فتح الحزمة
k this deck
13
Which of the following countermeasures helps prevent e-mail spoofing, that is, the forgery of an e-mail header to make it appear as if it is coming from a friend or employee?

A) implement message authentication
B) update e-mail policies
C) complete regular updates
D) plan for ID theft after a data breach
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 40 في هذه المجموعة.
فتح الحزمة
k this deck
14
In 2015, the most common crime reported to the Federal Consumer Commission was ______.

A) cyberstalking
B) identify theft
C) spam
D) phishing scams
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 40 في هذه المجموعة.
فتح الحزمة
k this deck
15
According to the text, phishing scams typically target ______.

A) personal information
B) education information
C) employment information
D) demographic information
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 40 في هذه المجموعة.
فتح الحزمة
k this deck
16
______ is defined as a collection of infected machines worldwide that receive commands and perform some illegal actions such as distributed denial of service attacks, among others.

A) Phishing
B) A logic bomb
C) A Trojan horse
D) A botnet
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 40 في هذه المجموعة.
فتح الحزمة
k this deck
17
The Internal Revenue Service uses which of the following methods to contact a taxpayer?

A) e-mails
B) text messages
C) mail
D) phone calls
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 40 في هذه المجموعة.
فتح الحزمة
k this deck
18
______ refers to all types of crime in which someone wrongfully obtains and uses another person's personal data in some way that involves fraud or deception, typically for economic gain.

A) Phishing
B) Spamming
C) Identity theft
D) Cyberstalking
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 40 في هذه المجموعة.
فتح الحزمة
k this deck
19
According to the Federal Trade Commission, all of the following are ways that consumers can prevent identity theft except ______.

A) checking your credit report
B) using easy passwords
C) using security software
D) shredding financial documents
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 40 في هذه المجموعة.
فتح الحزمة
k this deck
20
Consumer crimes that include identity theft, phishing scams, and spam fall within which of the following categories?

A) fraud and financial crimes
B) cyberbullying crimes
C) Internet-initiated sexual offending crimes
D) hacktivist crimes
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 40 في هذه المجموعة.
فتح الحزمة
k this deck
21
Phishing is also referred to as "brand spoofing" or "carding."
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 40 في هذه المجموعة.
فتح الحزمة
k this deck
22
According to the author, cybercrime has various layers. What does this mean?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 40 في هذه المجموعة.
فتح الحزمة
k this deck
23
Discuss the impact that social media networking sites have had on human trafficking and sexual exploitation. How have these sites contributed to the problem?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 40 في هذه المجموعة.
فتح الحزمة
k this deck
24
Mail-order-brides typically come from developing countries and countries where women don't see the possibility of developing their full potential.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 40 في هذه المجموعة.
فتح الحزمة
k this deck
25
According to the text, logic bombs are typically installed by outsiders of an organization or corporation.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 40 في هذه المجموعة.
فتح الحزمة
k this deck
26
Access to the Internet, sexual deviance and antisociality have been found to be main explanatory factors of Internet-based child pornography offenses.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 40 في هذه المجموعة.
فتح الحزمة
k this deck
27
According to the Federal Trade Commission, using security software on your computer, such as antivirus, anti-spyware, and a firewall, does not help prevent identity theft.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 40 في هذه المجموعة.
فتح الحزمة
k this deck
28
Consumer crimes are deceptive practices that result in financial or other losses for consumers in the course of seemingly legitimate business transactions.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 40 في هذه المجموعة.
فتح الحزمة
k this deck
29
The exchange of insults in a public setting, such as a bulletin board or chat room, is known as ______.

A) spamming
B) flaming
C) spoofing
D) phishing
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 40 في هذه المجموعة.
فتح الحزمة
k this deck
30
Which of the following is NOT a behavior/method that falls under the category of cyberbullying?

A) harassment
B) impersonation
C) inclusion
D) denigration
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 40 في هذه المجموعة.
فتح الحزمة
k this deck
31
Hacktivists engage in political action against a certain person, group, or even nation-state. Nation-states are mainly engaging in political and economic espionage.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 40 في هذه المجموعة.
فتح الحزمة
k this deck
32
According to the text, cybercrime only has one layer.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 40 في هذه المجموعة.
فتح الحزمة
k this deck
33
According to the text, human trafficking consists of all of the following elements except ______.

A) act
B) means
C) purpose
D) outcome
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 40 في هذه المجموعة.
فتح الحزمة
k this deck
34
What are some of the ways in which an individual can protect him- or herself from identity theft?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 40 في هذه المجموعة.
فتح الحزمة
k this deck
35
Commercial e-mail is defined as any electronic mail message the primary purpose of which is commercial advertisement or promotion of products or services.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 40 في هذه المجموعة.
فتح الحزمة
k this deck
36
The posting of harassing messages aiming to cause harm to the victim is also known as ______.

A) denigration
B) inclusion
C) exclusion
D) impersonation
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 40 في هذه المجموعة.
فتح الحزمة
k this deck
37
What are some of the criticisms of the CAN-SPAM Act. Do you agree with these criticisms? Why or why not?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 40 في هذه المجموعة.
فتح الحزمة
k this deck
38
The intentional, aggressive behavior toward another person that is performed through electronic means is also known as ______.

A) spamming
B) spoofing
C) cyberbullying
D) phishing
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 40 في هذه المجموعة.
فتح الحزمة
k this deck
39
Using the same password for several accounts does not make it easy for thieves to steal a victim's information.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 40 في هذه المجموعة.
فتح الحزمة
k this deck
40
Identify the countermeasures for identity theft. Do you believe these methods are effective at reducing identity theft?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 40 في هذه المجموعة.
فتح الحزمة
k this deck
locked card icon
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 40 في هذه المجموعة.