Deck 11: Cybertrespass, Cybervandalism, and Cybertheft

Full screen (f)
exit full mode
Question
_________ collects information about users' web-browsing activities to provide targeted advertising content to the user based on his or her online behavior.

A) Adware
B) Freeware
C) Abandonware
D) Spyware
E) All of the above
Use Space or
up arrow
down arrow
to flip the card.
Question
_________ can surreptitiously monitor users' activity and relay this activity to the person who created or distributed the malware.

A) Adware
B) Freeware
C) Abandonware
D) Spyware
E) All of the above
Question
__________ is malware designed to enable the remote control of digital devices.

A) Botcode
B) Bot
C) Botnet
D) Botherder
E) All of the above
Question
A ________ is a person who controls zombie computers.

A) Botcode
B) Bot
C) Botnet
D) Botherder
E) All of the above
Question
Which of the following elements is common to all types of frauds?

A) Perceived pressure
B) Perceived opportunity
C) Rationalization
D) All of the above
E) None of the above
Question
When scammers create profiles on online dating websites and even social media websites to lure unsuspecting victims into fake relationships, they engage in ___________.

A) Investment scams
B) Click bait scams
C) Advanced fee scams
D) Catphishing
E) All of the above
Question
_________ scams involve masquerading as a legitimate entity or business to trick users into revealing some type of information.

A) Pharming
B) Phishing
C) Catphishing
D) Spamming
E) None of the above
Question
___________ involves spoofed websites that look identical or nearly identical to the known websites they are pretending to be.

A) Pharming
B) Phishing
C) Catphishing
D) Spamming
E) None of the above
Question
_________ occurs when an individual bids on an item for sale on a website that is misrepresented in some way by the seller in an effort to deceive the buyer to obtain a financial gain.

A) Impersonation fraud
B) Click bait fraud
C) Investment fraud
D) Online auction fraud
E) All of the above
Question
_________ are fraudsters or scam artists seeking to sell fake financial information.

A) Spammers
B) Rippers
C) Phishers
D) Pharmers
E) None of the above
Question
A _______ is designed to appear as a legitimate program but actually carries a malicious payload.
Question
_______ explains why specific signals are considered reliable, whereas others are not, by examining the signal and the quality it purportedly represents.
Question
_______ occurs when an individual assumes the identity of a target by unlawfully obtaining and using the target's name, Social Security number (SSN), bank account number, or other identifying information to commit a crime.
Question
_______ involves using social engineering tactics and other methods to steal a wide variety of data for subsequent criminal use, for example, to obtain goods and services in the target's name.
Question
A ______ enables users to engage in electronic commerce transactions by allowing them to pay using their digital devices.
Question
_______ involves the use of an individual's personal information and medical insurance card data to obtain medical services.
Question
The ______ refers to the connection of humans, animals, plants, and inanimate objects in the physical world to the Internet.
Question
______ refers to ownership rights to intangible property.
Question
A ______ protects literary or artistic works.
Question
A ______ protects symbols and names associated with a particular good or service.
Question
Malware has two main components, payload and propagation techniques.
Question
Computer viruses are self-executing and self-propagating.
Question
Bots have also been used in spamming campaigns.
Question
Online transactions depend on trust in the seller and trust in the platform.
Question
Dumps are any stolen credit card or other financial information,
Question
An identity theft report is also known as the identity theft affidavit.
Question
Digital piracy occurs through illegally streaming, downloading, and distributing movies, TV shows, music, and other copyrighted works.
Question
Freeware is software that is no longer available for use.
Question
A trademark is obtained to protect an invention.
Question
The theft of trade secrets illicitly obtained through the use of the Internet, computers, and related technology is referred to as cyberespionage.
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/30
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 11: Cybertrespass, Cybervandalism, and Cybertheft
1
_________ collects information about users' web-browsing activities to provide targeted advertising content to the user based on his or her online behavior.

A) Adware
B) Freeware
C) Abandonware
D) Spyware
E) All of the above
A
2
_________ can surreptitiously monitor users' activity and relay this activity to the person who created or distributed the malware.

A) Adware
B) Freeware
C) Abandonware
D) Spyware
E) All of the above
D
3
__________ is malware designed to enable the remote control of digital devices.

A) Botcode
B) Bot
C) Botnet
D) Botherder
E) All of the above
A
4
A ________ is a person who controls zombie computers.

A) Botcode
B) Bot
C) Botnet
D) Botherder
E) All of the above
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
5
Which of the following elements is common to all types of frauds?

A) Perceived pressure
B) Perceived opportunity
C) Rationalization
D) All of the above
E) None of the above
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
6
When scammers create profiles on online dating websites and even social media websites to lure unsuspecting victims into fake relationships, they engage in ___________.

A) Investment scams
B) Click bait scams
C) Advanced fee scams
D) Catphishing
E) All of the above
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
7
_________ scams involve masquerading as a legitimate entity or business to trick users into revealing some type of information.

A) Pharming
B) Phishing
C) Catphishing
D) Spamming
E) None of the above
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
8
___________ involves spoofed websites that look identical or nearly identical to the known websites they are pretending to be.

A) Pharming
B) Phishing
C) Catphishing
D) Spamming
E) None of the above
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
9
_________ occurs when an individual bids on an item for sale on a website that is misrepresented in some way by the seller in an effort to deceive the buyer to obtain a financial gain.

A) Impersonation fraud
B) Click bait fraud
C) Investment fraud
D) Online auction fraud
E) All of the above
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
10
_________ are fraudsters or scam artists seeking to sell fake financial information.

A) Spammers
B) Rippers
C) Phishers
D) Pharmers
E) None of the above
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
11
A _______ is designed to appear as a legitimate program but actually carries a malicious payload.
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
12
_______ explains why specific signals are considered reliable, whereas others are not, by examining the signal and the quality it purportedly represents.
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
13
_______ occurs when an individual assumes the identity of a target by unlawfully obtaining and using the target's name, Social Security number (SSN), bank account number, or other identifying information to commit a crime.
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
14
_______ involves using social engineering tactics and other methods to steal a wide variety of data for subsequent criminal use, for example, to obtain goods and services in the target's name.
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
15
A ______ enables users to engage in electronic commerce transactions by allowing them to pay using their digital devices.
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
16
_______ involves the use of an individual's personal information and medical insurance card data to obtain medical services.
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
17
The ______ refers to the connection of humans, animals, plants, and inanimate objects in the physical world to the Internet.
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
18
______ refers to ownership rights to intangible property.
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
19
A ______ protects literary or artistic works.
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
20
A ______ protects symbols and names associated with a particular good or service.
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
21
Malware has two main components, payload and propagation techniques.
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
22
Computer viruses are self-executing and self-propagating.
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
23
Bots have also been used in spamming campaigns.
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
24
Online transactions depend on trust in the seller and trust in the platform.
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
25
Dumps are any stolen credit card or other financial information,
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
26
An identity theft report is also known as the identity theft affidavit.
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
27
Digital piracy occurs through illegally streaming, downloading, and distributing movies, TV shows, music, and other copyrighted works.
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
28
Freeware is software that is no longer available for use.
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
29
A trademark is obtained to protect an invention.
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
30
The theft of trade secrets illicitly obtained through the use of the Internet, computers, and related technology is referred to as cyberespionage.
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 30 flashcards in this deck.