Deck 12: The Future of Cybercrime, Terror, and Policy

ملء الشاشة (f)
exit full mode
سؤال
What is the name of the downloadable program individuals can use to anonymize their online activity from others that has been a focus of law enforcement investigations over the last few years?

A) Pingbox
B) Slingbox
C) GCHQ
D) Tor
استخدم زر المسافة أو
up arrow
down arrow
لقلب البطاقة.
سؤال
What is the name for services that allow individuals to remotely access files stored on web servers via the Internet?

A) mobile phones
B) cloud storage
C) wearable devices
D) none of the above
سؤال
Home security systems, thermostats, and appliances that can be controlled via the web are examples of the _______

A) cybercrime devices
B) serious technology platform
C) Internet of Things
D) new Internet
سؤال
Which of the following anonymization tools have been targeted by law enforcement to better identify cybercriminals?

A) Tor
B) Proxify
C) Spotify
D) Hushmail
سؤال
What is the name of the US bill that failed to pass in 2012 in order to combat rates of piracy and counterfeiting?

A) Child Online Protection Act
B) The Megan Meier Act
C) Stop Online Piracy Act
D) none of the above
سؤال
What is the term used to refer to the process where individuals accept a radical ideology without directly engaging others as part of that movement?

A) self-radicalization
B) scary practices
C) revolutionary acceptance
D) none of the above
سؤال
The term ________ references direct relationships between police and the general public to identify certain forms of crime that are viewed as a challenge and finding ways to work together to combat the issue.

A) centralized response
B) community policing
C) problem oriented policing
D) none of the above
فتح الحزمة
قم بالتسجيل لفتح البطاقات في هذه المجموعة!
Unlock Deck
Unlock Deck
1/7
auto play flashcards
العب
simple tutorial
ملء الشاشة (f)
exit full mode
Deck 12: The Future of Cybercrime, Terror, and Policy
1
What is the name of the downloadable program individuals can use to anonymize their online activity from others that has been a focus of law enforcement investigations over the last few years?

A) Pingbox
B) Slingbox
C) GCHQ
D) Tor
D
2
What is the name for services that allow individuals to remotely access files stored on web servers via the Internet?

A) mobile phones
B) cloud storage
C) wearable devices
D) none of the above
B
3
Home security systems, thermostats, and appliances that can be controlled via the web are examples of the _______

A) cybercrime devices
B) serious technology platform
C) Internet of Things
D) new Internet
C
4
Which of the following anonymization tools have been targeted by law enforcement to better identify cybercriminals?

A) Tor
B) Proxify
C) Spotify
D) Hushmail
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 7 في هذه المجموعة.
فتح الحزمة
k this deck
5
What is the name of the US bill that failed to pass in 2012 in order to combat rates of piracy and counterfeiting?

A) Child Online Protection Act
B) The Megan Meier Act
C) Stop Online Piracy Act
D) none of the above
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 7 في هذه المجموعة.
فتح الحزمة
k this deck
6
What is the term used to refer to the process where individuals accept a radical ideology without directly engaging others as part of that movement?

A) self-radicalization
B) scary practices
C) revolutionary acceptance
D) none of the above
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 7 في هذه المجموعة.
فتح الحزمة
k this deck
7
The term ________ references direct relationships between police and the general public to identify certain forms of crime that are viewed as a challenge and finding ways to work together to combat the issue.

A) centralized response
B) community policing
C) problem oriented policing
D) none of the above
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 7 في هذه المجموعة.
فتح الحزمة
k this deck
locked card icon
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 7 في هذه المجموعة.