Exam 4: Contemporary Computer Crime

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Which of the following refers to a malware program that encrypts or otherwise renders computer or digital resources inoperable or inaccessible in furtherance of the illegal compulsion of an action or exchange?

(Multiple Choice)
4.9/5
(44)

Which of the following refers to two distinct methods of distributed denial of service (DDoS) attacks?

(Multiple Choice)
4.8/5
(43)
Match the following types of stalkers with their definitions.
Obsessional stalkers
They seek to re-establish a relationship with an unwilling partner and are considered the most dangerous of stalkers.
Erotomaniacs
They are individuals who have low selfesteem and target a victim whom they hold in high regard.
Vengeance or terrorist stalkers
They are delusional and believe that their victim is in love with them or has had a previous relationship with them.
Correct Answer:
Verified
Premises:
Responses:
Obsessional stalkers
They seek to re-establish a relationship with an unwilling partner and are considered the most dangerous of stalkers.
Erotomaniacs
They are individuals who have low selfesteem and target a victim whom they hold in high regard.
Vengeance or terrorist stalkers
They are delusional and believe that their victim is in love with them or has had a previous relationship with them.
Love-obsession stalkers
They do not seek or fantasize about a personal relationship with the victim; rather, they are motivated by either economic gain or revenge
(Matching)
4.8/5
(45)
Showing 61 - 63 of 63
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)