Deck 11: What the Future Holds

Full screen (f)
exit full mode
Question
The country with the best known and most discussed censorship is ______.

A) Russia
B) North Korea
C) Syria
D) China
Use Space or
up arrow
down arrow
to flip the card.
Question
A technology that detects the current geolocation of a target, which may be anything from a vehicle to an item in a manufacturing plant to a person, is referred to as ______.

A) Real Time Location Services
B) Global Positioning System
C) Wireless Local Area Network
D) Ultrasonic Ranging
Question
A fraudulent or malicious practice in which communication is sent from an unknown source disguised as a source known to the receiver is referred to as ______.

A) spamming
B) phishing
C) spoofing
D) vishing
Question
The Internet of Things are network-connected devices and sensors such as ______.

A) alarm systems
B) iPads
C) elevators
D) all of these
Question
A radio frequency transmitter that blocks the communication between cell phones and text messages is referred to as a ______.

A) GPS jammer
B) spoofer
C) Bluetooth
D) radio beacon
Question
In 2010, the Dodd-Frank Act made spoofing a(n) ______, but it has been difficult to prosecute spoofers.

A) misdemeanor crime
B) infraction
C) felony crime
D) crime not punishable by law
Question
Which of the following was suggested as a way to avoid becoming a money mule?

A) forgoing your research into the company or person offering the job
B) not monitoring transactions
C) utilizing fraud protection companies, such as PayPal
D) not calling the authorities
Question
A new prank that is not only draining law enforcement resources but also creating very dangerous situations for citizens is known as ______.

A) spoofing
B) swatting
C) squatting
D) phishing
Question
According to the text, censorship is mainly used by ______ governments, which have come into power by dint of monarchy, family dynasty, coup d'état, rigged election, or some combination thereof.

A) democratic
B) totalitarian
C) authoritarian
D) monarchical
Question
Which of the following is not a factor that leads to the deployment of SWAT officers?

A) likelihood of surrender by the criminal
B) risk of harm to the public
C) risk of harm to law enforcement officers
D) case requirements
Question
Cell phone providers are by law required to enable GPS tracking on at least ______ of devices in their network.

A) 25%
B) 50%
C) 75%
D) 95%
Question
Which of the following was NOT identified as a warning sign of money mule schemes?

A) The employer is located outside of the United States.
B) All interactions and transactions occur online.
C) The job promises an unusual high amount of earnings.
D) The position has a specific job description.
Question
All of the following countries are on the list of most censored countries in the world except ______.

A) China
B) Iran
C) Cuba
D) Turkey
Question
E-mail spoofing is used for which of the following campaigns?

A) vishing and spam
B) spam and phishing
C) scanning and phishing
D) phishing and scanning
Question
Europe and the U.S. government also engage in censorship, mainly targeting ______.

A) violence
B) hate speech
C) pornography
D) narcotics
Question
According to Moore's law, the growth in the information technology is exponential, such as ______

A) 1, 2, 3, 4, 5, 6
B) 1, 2, 4, 8, 16, 32
C) 1, 2, 4, 6, 8, 10
D) 1, 3, 6, 9, 12, 15
Question
In ______ scams, criminals intercept e-mails between two businesses or a private person and a business and direct the purchasing party to send the payment for the product to a new bank account.

A) man-in-the-middle
B) man-in-the-cloud
C) man-in-the-app
D) man-in-the-IoT
Question
The forgery of an e-mail header pretending to be a legitimate sender like a business or friend scamming the receiver into opening the e-mail and downloading malicious software or responding to a solicitation is an example of ______.

A) e-mail spamming
B) e-mail phishing
C) e-mail spoofing
D) e-mail vishing
Question
People who are desperately looking for a job or are looking for a "work from home" job for a variety of reasons are referred to as ______.

A) money mules
B) lazy dogs
C) couch potatoes
D) slackers
Question
Which of the following was identified as one of the main tools used by criminals?

A) GPS jammer
B) police scanner
C) Bluetooth
D) radio beacons
Question
Google and Twitter are among the biggest data collection agencies.
Question
E-mail spoofing is the least common type of spoofing.
Question
Explain real-time location services and discuss the risks of using apps that contain location services. Use an app as an example.
Question
What is censorship's purpose and why do countries censor information?
Question
Criminals can use GPS spoofing as a tool by creating false GPS signals. This is possible because the real GPS signals are very weak because satellites are far away.
Question
Which of the following companies have fallen victim to cybercriminals in recent years?

A) Sony
B) Ashley Madison
C) Experian
D) all of these
Question
Discuss data mining. Who does data mining benefit? Is it a safe practice for companies to use?
Question
Spoofing cannot be used to manipulate the stock market.
Question
When location services are turned on, cell phones are constantly sending signals of location and attach so-called "metrotags" to all pictures.
Question
Why is it difficult to prosecute individuals who have been charged with spoofing?
Question
In the 1970s, Gordon Moore showed how ______ doubled every two years.

A) a graphics card
B) random access memory
C) central processing units
D) a hard drive
Question
One such tool used to manipulate data and people is censorship.
Question
Authoritarian governments are not the only ones that manipulate the facts and block websites.
Question
According to the text, one of the latest trends is data ______.

A) analysis and mining
B) mining and brokerage
C) sales and mining
D) analysis and brokerage
Question
______ is known as one of the largest data collectors.

A) Google
B) Instagram
C) Amazon
D) Snapchat
Question
With increased digitalization of our personal information, the integrity of our data is at low risk.
Question
The human brain thinks of life in a ______.

A) nonlinear fashion
B) linear fashion
C) exponential fashion
D) nonexponential fashion
Question
The government of Japan forced Google to reshoot street-level views because the images were enabling viewers to look inside the houses.
Question
One of the latest trends is data mining and data brokerage.
Question
What does the future hold in terms of cybersecurity?
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/40
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 11: What the Future Holds
1
The country with the best known and most discussed censorship is ______.

A) Russia
B) North Korea
C) Syria
D) China
D
2
A technology that detects the current geolocation of a target, which may be anything from a vehicle to an item in a manufacturing plant to a person, is referred to as ______.

A) Real Time Location Services
B) Global Positioning System
C) Wireless Local Area Network
D) Ultrasonic Ranging
A
3
A fraudulent or malicious practice in which communication is sent from an unknown source disguised as a source known to the receiver is referred to as ______.

A) spamming
B) phishing
C) spoofing
D) vishing
C
4
The Internet of Things are network-connected devices and sensors such as ______.

A) alarm systems
B) iPads
C) elevators
D) all of these
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
5
A radio frequency transmitter that blocks the communication between cell phones and text messages is referred to as a ______.

A) GPS jammer
B) spoofer
C) Bluetooth
D) radio beacon
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
6
In 2010, the Dodd-Frank Act made spoofing a(n) ______, but it has been difficult to prosecute spoofers.

A) misdemeanor crime
B) infraction
C) felony crime
D) crime not punishable by law
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
7
Which of the following was suggested as a way to avoid becoming a money mule?

A) forgoing your research into the company or person offering the job
B) not monitoring transactions
C) utilizing fraud protection companies, such as PayPal
D) not calling the authorities
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
8
A new prank that is not only draining law enforcement resources but also creating very dangerous situations for citizens is known as ______.

A) spoofing
B) swatting
C) squatting
D) phishing
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
9
According to the text, censorship is mainly used by ______ governments, which have come into power by dint of monarchy, family dynasty, coup d'état, rigged election, or some combination thereof.

A) democratic
B) totalitarian
C) authoritarian
D) monarchical
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
10
Which of the following is not a factor that leads to the deployment of SWAT officers?

A) likelihood of surrender by the criminal
B) risk of harm to the public
C) risk of harm to law enforcement officers
D) case requirements
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
11
Cell phone providers are by law required to enable GPS tracking on at least ______ of devices in their network.

A) 25%
B) 50%
C) 75%
D) 95%
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
12
Which of the following was NOT identified as a warning sign of money mule schemes?

A) The employer is located outside of the United States.
B) All interactions and transactions occur online.
C) The job promises an unusual high amount of earnings.
D) The position has a specific job description.
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
13
All of the following countries are on the list of most censored countries in the world except ______.

A) China
B) Iran
C) Cuba
D) Turkey
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
14
E-mail spoofing is used for which of the following campaigns?

A) vishing and spam
B) spam and phishing
C) scanning and phishing
D) phishing and scanning
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
15
Europe and the U.S. government also engage in censorship, mainly targeting ______.

A) violence
B) hate speech
C) pornography
D) narcotics
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
16
According to Moore's law, the growth in the information technology is exponential, such as ______

A) 1, 2, 3, 4, 5, 6
B) 1, 2, 4, 8, 16, 32
C) 1, 2, 4, 6, 8, 10
D) 1, 3, 6, 9, 12, 15
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
17
In ______ scams, criminals intercept e-mails between two businesses or a private person and a business and direct the purchasing party to send the payment for the product to a new bank account.

A) man-in-the-middle
B) man-in-the-cloud
C) man-in-the-app
D) man-in-the-IoT
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
18
The forgery of an e-mail header pretending to be a legitimate sender like a business or friend scamming the receiver into opening the e-mail and downloading malicious software or responding to a solicitation is an example of ______.

A) e-mail spamming
B) e-mail phishing
C) e-mail spoofing
D) e-mail vishing
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
19
People who are desperately looking for a job or are looking for a "work from home" job for a variety of reasons are referred to as ______.

A) money mules
B) lazy dogs
C) couch potatoes
D) slackers
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
20
Which of the following was identified as one of the main tools used by criminals?

A) GPS jammer
B) police scanner
C) Bluetooth
D) radio beacons
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
21
Google and Twitter are among the biggest data collection agencies.
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
22
E-mail spoofing is the least common type of spoofing.
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
23
Explain real-time location services and discuss the risks of using apps that contain location services. Use an app as an example.
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
24
What is censorship's purpose and why do countries censor information?
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
25
Criminals can use GPS spoofing as a tool by creating false GPS signals. This is possible because the real GPS signals are very weak because satellites are far away.
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
26
Which of the following companies have fallen victim to cybercriminals in recent years?

A) Sony
B) Ashley Madison
C) Experian
D) all of these
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
27
Discuss data mining. Who does data mining benefit? Is it a safe practice for companies to use?
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
28
Spoofing cannot be used to manipulate the stock market.
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
29
When location services are turned on, cell phones are constantly sending signals of location and attach so-called "metrotags" to all pictures.
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
30
Why is it difficult to prosecute individuals who have been charged with spoofing?
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
31
In the 1970s, Gordon Moore showed how ______ doubled every two years.

A) a graphics card
B) random access memory
C) central processing units
D) a hard drive
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
32
One such tool used to manipulate data and people is censorship.
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
33
Authoritarian governments are not the only ones that manipulate the facts and block websites.
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
34
According to the text, one of the latest trends is data ______.

A) analysis and mining
B) mining and brokerage
C) sales and mining
D) analysis and brokerage
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
35
______ is known as one of the largest data collectors.

A) Google
B) Instagram
C) Amazon
D) Snapchat
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
36
With increased digitalization of our personal information, the integrity of our data is at low risk.
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
37
The human brain thinks of life in a ______.

A) nonlinear fashion
B) linear fashion
C) exponential fashion
D) nonexponential fashion
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
38
The government of Japan forced Google to reshoot street-level views because the images were enabling viewers to look inside the houses.
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
39
One of the latest trends is data mining and data brokerage.
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
40
What does the future hold in terms of cybersecurity?
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 40 flashcards in this deck.