Deck 4: Threats to Cybersecurity by Criminals and Organized Crime

Full screen (f)
exit full mode
Question
______ is defined as unsolicited commercial e-mail that includes any commercial emails addressed to a recipient with whom the sender has no existing business or personal relationship and not sent with the consent of the recipient.

A) Identity theft
B) A phishing scam
C) Spam
D) Keylogging
Use Space or
up arrow
down arrow
to flip the card.
Question
Per the 1998 Assumption Deterrence Act, the text identified all of the following types of punishment except ______.

A) up to 15 years in prison
B) a fine
C) criminal forfeiture
D) probation
Question
Which of the following was NOT identified as a type of personal information that is sought out by identity thieves?

A) Social Security Number
B) telephone number
C) bank account number
D) credit card information
Question
According to the text, which of the following entities are considered a special target for botnets?

A) individuals
B) governments
C) banks and financial institutions
D) educational institutions
Question
Botnets use ______ architecture in which each workstation has the same capabilities and responsibilities.

A) peer-to-peer
B) command and control
C) denial of service
D) universal serial bus
Question
The ______, an underground web, allows offenders to stay anonymous and undetected, as these are not traceable by police.

A) Dark Net
B) Dreamboard
C) Yandex
D) Baidu
Question
In 1998 Congress passed the Assumption Deterrence Act making identity theft ______.

A) a misdemeanor crime
B) an infraction
C) a felony crime
D) a crime not punishable by law
Question
Botnets typically infect computers via ______ or drive-by-downloads.

A) ethernet cables
B) modems
C) routers
D) USBs
Question
The Identity Theft Resource Center estimates that it takes on average ______ hours to repair the damage of identity theft.

A) 200
B) 400
C) 600
D) 800
Question
Which of the following are considered small programs or sections of a program triggered by some event such as a certain date or time, a certain percentage of disk space filled, or the removal of a file?

A) keylogging
B) logic bombs
C) botnets
D) Trojan horses
Question
Which of the following was NOT identified as a way that criminals get information from their victims?

A) Criminals watch or listen to the victim.
B) Criminals access pre-approved credit card information from their victims.
C) Criminals directly ask the victim for their personal information.
D) Criminals steal the victim's mail.
Question
Which of the following countermeasures recommends that companies must complete regular data backups?

A) update e-mail policies
B) plan for ID theft after a data breach
C) complete regular updates
D) implement message authentication
Question
Which of the following countermeasures helps prevent e-mail spoofing, that is, the forgery of an e-mail header to make it appear as if it is coming from a friend or employee?

A) implement message authentication
B) update e-mail policies
C) complete regular updates
D) plan for ID theft after a data breach
Question
In 2015, the most common crime reported to the Federal Consumer Commission was ______.

A) cyberstalking
B) identify theft
C) spam
D) phishing scams
Question
According to the text, phishing scams typically target ______.

A) personal information
B) education information
C) employment information
D) demographic information
Question
______ is defined as a collection of infected machines worldwide that receive commands and perform some illegal actions such as distributed denial of service attacks, among others.

A) Phishing
B) A logic bomb
C) A Trojan horse
D) A botnet
Question
The Internal Revenue Service uses which of the following methods to contact a taxpayer?

A) e-mails
B) text messages
C) mail
D) phone calls
Question
______ refers to all types of crime in which someone wrongfully obtains and uses another person's personal data in some way that involves fraud or deception, typically for economic gain.

A) Phishing
B) Spamming
C) Identity theft
D) Cyberstalking
Question
According to the Federal Trade Commission, all of the following are ways that consumers can prevent identity theft except ______.

A) checking your credit report
B) using easy passwords
C) using security software
D) shredding financial documents
Question
Consumer crimes that include identity theft, phishing scams, and spam fall within which of the following categories?

A) fraud and financial crimes
B) cyberbullying crimes
C) Internet-initiated sexual offending crimes
D) hacktivist crimes
Question
Phishing is also referred to as "brand spoofing" or "carding."
Question
According to the author, cybercrime has various layers. What does this mean?
Question
Discuss the impact that social media networking sites have had on human trafficking and sexual exploitation. How have these sites contributed to the problem?
Question
Mail-order-brides typically come from developing countries and countries where women don't see the possibility of developing their full potential.
Question
According to the text, logic bombs are typically installed by outsiders of an organization or corporation.
Question
Access to the Internet, sexual deviance and antisociality have been found to be main explanatory factors of Internet-based child pornography offenses.
Question
According to the Federal Trade Commission, using security software on your computer, such as antivirus, anti-spyware, and a firewall, does not help prevent identity theft.
Question
Consumer crimes are deceptive practices that result in financial or other losses for consumers in the course of seemingly legitimate business transactions.
Question
The exchange of insults in a public setting, such as a bulletin board or chat room, is known as ______.

A) spamming
B) flaming
C) spoofing
D) phishing
Question
Which of the following is NOT a behavior/method that falls under the category of cyberbullying?

A) harassment
B) impersonation
C) inclusion
D) denigration
Question
Hacktivists engage in political action against a certain person, group, or even nation-state. Nation-states are mainly engaging in political and economic espionage.
Question
According to the text, cybercrime only has one layer.
Question
According to the text, human trafficking consists of all of the following elements except ______.

A) act
B) means
C) purpose
D) outcome
Question
What are some of the ways in which an individual can protect him- or herself from identity theft?
Question
Commercial e-mail is defined as any electronic mail message the primary purpose of which is commercial advertisement or promotion of products or services.
Question
The posting of harassing messages aiming to cause harm to the victim is also known as ______.

A) denigration
B) inclusion
C) exclusion
D) impersonation
Question
What are some of the criticisms of the CAN-SPAM Act. Do you agree with these criticisms? Why or why not?
Question
The intentional, aggressive behavior toward another person that is performed through electronic means is also known as ______.

A) spamming
B) spoofing
C) cyberbullying
D) phishing
Question
Using the same password for several accounts does not make it easy for thieves to steal a victim's information.
Question
Identify the countermeasures for identity theft. Do you believe these methods are effective at reducing identity theft?
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/40
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 4: Threats to Cybersecurity by Criminals and Organized Crime
1
______ is defined as unsolicited commercial e-mail that includes any commercial emails addressed to a recipient with whom the sender has no existing business or personal relationship and not sent with the consent of the recipient.

A) Identity theft
B) A phishing scam
C) Spam
D) Keylogging
C
2
Per the 1998 Assumption Deterrence Act, the text identified all of the following types of punishment except ______.

A) up to 15 years in prison
B) a fine
C) criminal forfeiture
D) probation
D
3
Which of the following was NOT identified as a type of personal information that is sought out by identity thieves?

A) Social Security Number
B) telephone number
C) bank account number
D) credit card information
B
4
According to the text, which of the following entities are considered a special target for botnets?

A) individuals
B) governments
C) banks and financial institutions
D) educational institutions
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
5
Botnets use ______ architecture in which each workstation has the same capabilities and responsibilities.

A) peer-to-peer
B) command and control
C) denial of service
D) universal serial bus
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
6
The ______, an underground web, allows offenders to stay anonymous and undetected, as these are not traceable by police.

A) Dark Net
B) Dreamboard
C) Yandex
D) Baidu
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
7
In 1998 Congress passed the Assumption Deterrence Act making identity theft ______.

A) a misdemeanor crime
B) an infraction
C) a felony crime
D) a crime not punishable by law
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
8
Botnets typically infect computers via ______ or drive-by-downloads.

A) ethernet cables
B) modems
C) routers
D) USBs
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
9
The Identity Theft Resource Center estimates that it takes on average ______ hours to repair the damage of identity theft.

A) 200
B) 400
C) 600
D) 800
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
10
Which of the following are considered small programs or sections of a program triggered by some event such as a certain date or time, a certain percentage of disk space filled, or the removal of a file?

A) keylogging
B) logic bombs
C) botnets
D) Trojan horses
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
11
Which of the following was NOT identified as a way that criminals get information from their victims?

A) Criminals watch or listen to the victim.
B) Criminals access pre-approved credit card information from their victims.
C) Criminals directly ask the victim for their personal information.
D) Criminals steal the victim's mail.
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
12
Which of the following countermeasures recommends that companies must complete regular data backups?

A) update e-mail policies
B) plan for ID theft after a data breach
C) complete regular updates
D) implement message authentication
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
13
Which of the following countermeasures helps prevent e-mail spoofing, that is, the forgery of an e-mail header to make it appear as if it is coming from a friend or employee?

A) implement message authentication
B) update e-mail policies
C) complete regular updates
D) plan for ID theft after a data breach
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
14
In 2015, the most common crime reported to the Federal Consumer Commission was ______.

A) cyberstalking
B) identify theft
C) spam
D) phishing scams
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
15
According to the text, phishing scams typically target ______.

A) personal information
B) education information
C) employment information
D) demographic information
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
16
______ is defined as a collection of infected machines worldwide that receive commands and perform some illegal actions such as distributed denial of service attacks, among others.

A) Phishing
B) A logic bomb
C) A Trojan horse
D) A botnet
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
17
The Internal Revenue Service uses which of the following methods to contact a taxpayer?

A) e-mails
B) text messages
C) mail
D) phone calls
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
18
______ refers to all types of crime in which someone wrongfully obtains and uses another person's personal data in some way that involves fraud or deception, typically for economic gain.

A) Phishing
B) Spamming
C) Identity theft
D) Cyberstalking
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
19
According to the Federal Trade Commission, all of the following are ways that consumers can prevent identity theft except ______.

A) checking your credit report
B) using easy passwords
C) using security software
D) shredding financial documents
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
20
Consumer crimes that include identity theft, phishing scams, and spam fall within which of the following categories?

A) fraud and financial crimes
B) cyberbullying crimes
C) Internet-initiated sexual offending crimes
D) hacktivist crimes
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
21
Phishing is also referred to as "brand spoofing" or "carding."
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
22
According to the author, cybercrime has various layers. What does this mean?
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
23
Discuss the impact that social media networking sites have had on human trafficking and sexual exploitation. How have these sites contributed to the problem?
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
24
Mail-order-brides typically come from developing countries and countries where women don't see the possibility of developing their full potential.
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
25
According to the text, logic bombs are typically installed by outsiders of an organization or corporation.
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
26
Access to the Internet, sexual deviance and antisociality have been found to be main explanatory factors of Internet-based child pornography offenses.
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
27
According to the Federal Trade Commission, using security software on your computer, such as antivirus, anti-spyware, and a firewall, does not help prevent identity theft.
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
28
Consumer crimes are deceptive practices that result in financial or other losses for consumers in the course of seemingly legitimate business transactions.
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
29
The exchange of insults in a public setting, such as a bulletin board or chat room, is known as ______.

A) spamming
B) flaming
C) spoofing
D) phishing
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
30
Which of the following is NOT a behavior/method that falls under the category of cyberbullying?

A) harassment
B) impersonation
C) inclusion
D) denigration
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
31
Hacktivists engage in political action against a certain person, group, or even nation-state. Nation-states are mainly engaging in political and economic espionage.
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
32
According to the text, cybercrime only has one layer.
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
33
According to the text, human trafficking consists of all of the following elements except ______.

A) act
B) means
C) purpose
D) outcome
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
34
What are some of the ways in which an individual can protect him- or herself from identity theft?
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
35
Commercial e-mail is defined as any electronic mail message the primary purpose of which is commercial advertisement or promotion of products or services.
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
36
The posting of harassing messages aiming to cause harm to the victim is also known as ______.

A) denigration
B) inclusion
C) exclusion
D) impersonation
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
37
What are some of the criticisms of the CAN-SPAM Act. Do you agree with these criticisms? Why or why not?
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
38
The intentional, aggressive behavior toward another person that is performed through electronic means is also known as ______.

A) spamming
B) spoofing
C) cyberbullying
D) phishing
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
39
Using the same password for several accounts does not make it easy for thieves to steal a victim's information.
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
40
Identify the countermeasures for identity theft. Do you believe these methods are effective at reducing identity theft?
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 40 flashcards in this deck.