Exam 11: Cybertrespass, Cybervandalism, and Cybertheft

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

______ refers to ownership rights to intangible property.

Free
(Short Answer)
5.0/5
(33)
Correct Answer:
Verified

Intellectual property

Dumps are any stolen credit card or other financial information,

Free
(True/False)
5.0/5
(45)
Correct Answer:
Verified

True

_________ can surreptitiously monitor users' activity and relay this activity to the person who created or distributed the malware.

Free
(Multiple Choice)
5.0/5
(38)
Correct Answer:
Verified

D

_______ involves the use of an individual's personal information and medical insurance card data to obtain medical services.

(Short Answer)
4.8/5
(28)

A ______ protects symbols and names associated with a particular good or service.

(Short Answer)
4.7/5
(37)

A ________ is a person who controls zombie computers.

(Multiple Choice)
4.9/5
(31)

The ______ refers to the connection of humans, animals, plants, and inanimate objects in the physical world to the Internet.

(Short Answer)
4.7/5
(38)

_________ scams involve masquerading as a legitimate entity or business to trick users into revealing some type of information.

(Multiple Choice)
4.8/5
(32)

_______ explains why specific signals are considered reliable, whereas others are not, by examining the signal and the quality it purportedly represents.

(Short Answer)
4.8/5
(43)

An identity theft report is also known as the identity theft affidavit.

(True/False)
4.8/5
(32)

___________ involves spoofed websites that look identical or nearly identical to the known websites they are pretending to be.

(Multiple Choice)
4.9/5
(26)

A _______ is designed to appear as a legitimate program but actually carries a malicious payload.

(Short Answer)
4.9/5
(39)

Which of the following elements is common to all types of frauds?

(Multiple Choice)
4.9/5
(33)

Bots have also been used in spamming campaigns.

(True/False)
4.9/5
(30)

A ______ enables users to engage in electronic commerce transactions by allowing them to pay using their digital devices.

(Short Answer)
4.8/5
(37)

_________ are fraudsters or scam artists seeking to sell fake financial information.

(Multiple Choice)
4.8/5
(35)

Computer viruses are self-executing and self-propagating.

(True/False)
4.8/5
(32)

A ______ protects literary or artistic works.

(Short Answer)
4.8/5
(30)

Online transactions depend on trust in the seller and trust in the platform.

(True/False)
4.9/5
(33)

A trademark is obtained to protect an invention.

(True/False)
4.7/5
(38)
Showing 1 - 20 of 30
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)