Exam 5: Crime

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

MATCHING -biometrics

Free
(Multiple Choice)
4.8/5
(28)
Correct Answer:
Verified

F

In 2000, a French court ordered Yahoo! to block access by French people to

Free
(Multiple Choice)
4.9/5
(36)
Correct Answer:
Verified

C

MATCHING -honey pots

Free
(Multiple Choice)
4.9/5
(46)
Correct Answer:
Verified

C

MATCHING -libel

(Multiple Choice)
4.7/5
(37)

What are two significant issues raised by the Stuxnet worm, which damaged equipment in a uranium enrichment plant in Iran?

(Essay)
4.8/5
(46)

Give arguments for and against hiring former hackers to enhance security.

(Essay)
4.7/5
(41)

Which of the following is NOT a program used by hackers to gain access to your computer:

(Multiple Choice)
4.8/5
(27)

Give two ways to identify an email as a phishing attempt

(Short Answer)
4.9/5
(36)

Computer forensics specialists cannot recover deleted files from an erased disk.

(True/False)
4.8/5
(37)

In the early days of computing (1960's to the early 1970's), a "hacker" was:

(Multiple Choice)
4.8/5
(33)

In the context of Internet content that some countries prohibit, discuss how the "responsibility to prevent access" differs from the "authority to prevent entry". Include examples.

(Essay)
4.9/5
(34)

MATCHING -pharming

(Multiple Choice)
5.0/5
(30)

The government cannot monitor online activity of suspected hackers without a court order.

(True/False)
4.9/5
(42)

a. Briefly define identity theft. b. Describe two techniques criminals can use to gather the information they need to steal an identity. c. Describe two ways a person can protect their identity. d. Describe two ways a business can protect its customers from identity thieves.

(Essay)
4.8/5
(35)

MATCHING -phishing

(Multiple Choice)
5.0/5
(43)

MATCHING -slander

(Multiple Choice)
4.8/5
(31)

MATCHING -hactivism

(Multiple Choice)
4.7/5
(28)

Web sites that look attractive to hackers, but are closely monitored so that everything the hacker does at the site is recorded and studied are known as:

(Multiple Choice)
4.8/5
(42)

How did the USA PATRIOT Act expand the Computer Fraud and Abuse Act?

(Short Answer)
4.8/5
(35)

Why is "harmless hacking" not harmless?

(Short Answer)
4.9/5
(35)
Showing 1 - 20 of 24
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)