SlideShare a Scribd company logo
1 of 2
T06 cybersecurity exam 2 | Computer Science homework help
Which of the following examples may be classified as identity fraud? A. You are
wrongfully accused of a crime committed by an impostor. B. Your phone bill reflects
long distance charges you did not make. C. You have documents that helped you
illegally immigrate into the country. D. You use a fake name to make a restaurant
reservation Which of the following statements correctly distinguishes between
identity theft and identity fraud? A. Identity fraud is always a victimless crime. B.
Identity fraud may involve the fabrication of identity information based on a fictitious
person. C. Identity theft may be done for criminal purposes. D. Identity theft does not
utilize historical or biometric information Which of the following refers to redirecting
thin slices of accounts into a designated location? A. Salami technique B. Data
diddling C. Spoofing D. ISP-jacking Which of the following refers to a seller in
an auction driving up the cost of his or her own item by bidding on it? A. Fee stacking
B. Shill bidding C. Misrepresentation D. Non delivery Which of the
following refers to a software program or hardware device that records everything you type
into a compromised computer? A. Keyloggers B. Salamis C. Worms D.
Trojans Which of the following refers to the abuse of electronic messaging systems
to randomly or indiscriminately send unsolicited bulk messages? A. Phishing B.
Spamming C. Phreaking D. Shoulder surfing “Popcorning” is a technique used in
which of the following physical methods of identity theft? A. Child identity theft B.
Mail theft C. Fraudulent or fictitious companies D. Theft of computers Paper
shredders and disk-wiping software are means to avoid which of the following physical
methods of identity theft? A. Mail theft B. Bag operations C. ATM manipulation
D. Dumpster diving Which of the following refers to the sale of stolen goods
through technological means? A. Day trading B. Insider trading C. e-Fencing
D. Spoofing Which of the following refers to a malware program that encrypts
or otherwise renders computer or digital resources inoperable or inaccessible in
furtherance of the illegal compulsion of an action or exchange? A. Worm B. Social
engineering C. Ransomware D. Spyware A deliberate, politically or
religiously motivated attack against data compilations, computer programs, and/or
information systems that is intended to disrupt and/or deny service or acquire information
that disrupts the social, physical, or political infrastructure of a target, is known as: A.
cyberterrorism. B. salami technique. C. cyberstalking. D. cyberbullying.
Which of the following types of identity theft/fraud is by far the most common and
also the most feared by the American public? A. Credit identity theft/fraud B.
Assumption of identity C. Theft for employment and/or border entry D. Virtual
identity theft/fraud Which of the following is true regarding bag operations as a
physical method of identity theft? A. They include sifting through commercial or
residential trash or waste for information deemed valuable. B. They are typically
conducted by the host government’s security or intelligence services. C. They are executed
by depositing personal documents in unlocked containers on the side of the road until they
are retrieved. D. They involve the creation of shell companies that engage in the collection
of personal financial information Which of the following best distinguishes identity
theft? A. Identity theft is the illegal use or transfer of third party’s personal identification
information with unlawful intent. B. Identity theft encompasses identity fraud within
its purview. C. Identity theft involves any attempts by minors to use fake IDs to
purchase alcohol or gain access to nightclubs or gambling establishments. D. Identity
theft is a vast array of illegal activities based on fraudulent use of identifying information of
a real or fictitious person Which of the following is atypical of both physical stalkers
and cyberstalkers? A. They are usually known to their victims. B. They are motivated
by economic gain. C. They are usually male. D. They usually focus their attentions
on women. Cybervandalism and cyberterrorism are examples of which category of
online crime? A. Theft of information and copyright infringement B. Interference with
lawful use of computers C. Threatening communications D. Dissemination of
contraband or offensive materials Which of the following refers to the deliberate
manipulation of an existing program to redirect or reroute data representing monies or
economic exchanges? A. ISP jacking B. Web cramming C. Data diddling D. IP
spoofing Which of the following are most often used fraudulently to obtain
immigration benefits? A. Student ID B. Drivers’ licenses C. Documentation of
residency D. Credit cards Which of the following is an example of a bag
operation? A. A person surreptitiously enters a suspect’s hotel room to download
information from the suspect’s laptop computer. B. , A person retrieves a bag full of
documents containing personal and financial information from his neighbor’s mailbox.
C. A logistics manager is accused of losing tapes containing personal information of
government employees during shipment. D. A person is found sifting through bags of
commercial Which of the following is true regarding the theft of computers as a physical
method of identity theft? A. Physical theft of computers is the least common technique
employed by identity thieves. B. Individuals without technical expertise cannot
successfully execute this physical method of identity theft. C. Areas particularly
vulnerable to theft of computers include private residences and recreation centers. D.
Theft of computers does not alleviate the need to analyze and organize voluminous paper
documents.

More Related Content

Similar to T06 cybersecurity exam 2 Computer Science homework help.docx

Lesson iv on fraud awareness (cyber frauds)
Lesson  iv on fraud awareness   (cyber frauds)Lesson  iv on fraud awareness   (cyber frauds)
Lesson iv on fraud awareness (cyber frauds)CA.Kolluru Narayanarao
 
Lesson iv on fraud awareness (cyber frauds)
Lesson  iv on fraud awareness   (cyber frauds)Lesson  iv on fraud awareness   (cyber frauds)
Lesson iv on fraud awareness (cyber frauds)Kolluru N Rao
 
Identity Theft: Evolving with Technology
Identity Theft: Evolving with TechnologyIdentity Theft: Evolving with Technology
Identity Theft: Evolving with Technology- Mark - Fullbright
 
1CYBER CRIMEChapter 5Objectives· Understand the differen.docx
1CYBER CRIMEChapter 5Objectives· Understand the differen.docx1CYBER CRIMEChapter 5Objectives· Understand the differen.docx
1CYBER CRIMEChapter 5Objectives· Understand the differen.docxjesusamckone
 
1CYBER CRIMEChapter 5Objectives· Understand the differen.docx
1CYBER CRIMEChapter 5Objectives· Understand the differen.docx1CYBER CRIMEChapter 5Objectives· Understand the differen.docx
1CYBER CRIMEChapter 5Objectives· Understand the differen.docxherminaprocter
 
International-Dimensions-of-Cybercrime (1).pptx
International-Dimensions-of-Cybercrime (1).pptxInternational-Dimensions-of-Cybercrime (1).pptx
International-Dimensions-of-Cybercrime (1).pptxchrixymae
 
ID Theft and Computer Security 2008
ID Theft and Computer Security 2008ID Theft and Computer Security 2008
ID Theft and Computer Security 2008Donald E. Hester
 
Dealing with Fraud in E-Banking Sphere
Dealing with Fraud in E-Banking SphereDealing with Fraud in E-Banking Sphere
Dealing with Fraud in E-Banking SphereGoutama Bachtiar
 
Cyber Landscape in the Philippines.pptx
Cyber Landscape in the Philippines.pptxCyber Landscape in the Philippines.pptx
Cyber Landscape in the Philippines.pptxACAD1ITG
 
Investigating & proving cybercrime
Investigating & proving cybercrimeInvestigating & proving cybercrime
Investigating & proving cybercrimeJenny Reid
 
Your Employees at Risk: The New, Dangerous Realities of Identity Theft
Your Employees at Risk: The New, Dangerous Realities of Identity TheftYour Employees at Risk: The New, Dangerous Realities of Identity Theft
Your Employees at Risk: The New, Dangerous Realities of Identity TheftElizabeth Dimit
 
Cyber Law (Identity Theft)
Cyber Law (Identity Theft)Cyber Law (Identity Theft)
Cyber Law (Identity Theft)Jermaine Smith
 
Cyber law (identity theft)
Cyber law (identity theft)Cyber law (identity theft)
Cyber law (identity theft)Jermaine Smith
 
Identity Theft and Society: What's in it for me?
Identity Theft and Society: What's in it for me?Identity Theft and Society: What's in it for me?
Identity Theft and Society: What's in it for me?Robert Bromwich
 
SJCTNC-A.ALBERT RAVI-PCM1017Q-E COMMERCE-UNIT-V- TYPES OF CYBER CRIMES.pptx
SJCTNC-A.ALBERT RAVI-PCM1017Q-E COMMERCE-UNIT-V- TYPES OF CYBER CRIMES.pptxSJCTNC-A.ALBERT RAVI-PCM1017Q-E COMMERCE-UNIT-V- TYPES OF CYBER CRIMES.pptx
SJCTNC-A.ALBERT RAVI-PCM1017Q-E COMMERCE-UNIT-V- TYPES OF CYBER CRIMES.pptxAalbert Albert
 

Similar to T06 cybersecurity exam 2 Computer Science homework help.docx (20)

Lesson iv on fraud awareness (cyber frauds)
Lesson  iv on fraud awareness   (cyber frauds)Lesson  iv on fraud awareness   (cyber frauds)
Lesson iv on fraud awareness (cyber frauds)
 
Lesson iv on fraud awareness (cyber frauds)
Lesson  iv on fraud awareness   (cyber frauds)Lesson  iv on fraud awareness   (cyber frauds)
Lesson iv on fraud awareness (cyber frauds)
 
Identity Theft: Evolving with Technology
Identity Theft: Evolving with TechnologyIdentity Theft: Evolving with Technology
Identity Theft: Evolving with Technology
 
Cyber laws
Cyber lawsCyber laws
Cyber laws
 
1CYBER CRIMEChapter 5Objectives· Understand the differen.docx
1CYBER CRIMEChapter 5Objectives· Understand the differen.docx1CYBER CRIMEChapter 5Objectives· Understand the differen.docx
1CYBER CRIMEChapter 5Objectives· Understand the differen.docx
 
1CYBER CRIMEChapter 5Objectives· Understand the differen.docx
1CYBER CRIMEChapter 5Objectives· Understand the differen.docx1CYBER CRIMEChapter 5Objectives· Understand the differen.docx
1CYBER CRIMEChapter 5Objectives· Understand the differen.docx
 
International-Dimensions-of-Cybercrime (1).pptx
International-Dimensions-of-Cybercrime (1).pptxInternational-Dimensions-of-Cybercrime (1).pptx
International-Dimensions-of-Cybercrime (1).pptx
 
ID Theft and Computer Security 2008
ID Theft and Computer Security 2008ID Theft and Computer Security 2008
ID Theft and Computer Security 2008
 
Dealing with Fraud in E-Banking Sphere
Dealing with Fraud in E-Banking SphereDealing with Fraud in E-Banking Sphere
Dealing with Fraud in E-Banking Sphere
 
Electronic fraud by prof godwin oyedokun (1)
Electronic fraud by prof godwin oyedokun (1)Electronic fraud by prof godwin oyedokun (1)
Electronic fraud by prof godwin oyedokun (1)
 
2.Cyber law and Crime.pptx
2.Cyber law and Crime.pptx2.Cyber law and Crime.pptx
2.Cyber law and Crime.pptx
 
Cyber Landscape in the Philippines.pptx
Cyber Landscape in the Philippines.pptxCyber Landscape in the Philippines.pptx
Cyber Landscape in the Philippines.pptx
 
Investigating & proving cybercrime
Investigating & proving cybercrimeInvestigating & proving cybercrime
Investigating & proving cybercrime
 
Your Employees at Risk: The New, Dangerous Realities of Identity Theft
Your Employees at Risk: The New, Dangerous Realities of Identity TheftYour Employees at Risk: The New, Dangerous Realities of Identity Theft
Your Employees at Risk: The New, Dangerous Realities of Identity Theft
 
IT Sample Paper
IT Sample PaperIT Sample Paper
IT Sample Paper
 
Cyber Law (Identity Theft)
Cyber Law (Identity Theft)Cyber Law (Identity Theft)
Cyber Law (Identity Theft)
 
Cyber law (identity theft)
Cyber law (identity theft)Cyber law (identity theft)
Cyber law (identity theft)
 
Identity Theft and Society: What's in it for me?
Identity Theft and Society: What's in it for me?Identity Theft and Society: What's in it for me?
Identity Theft and Society: What's in it for me?
 
THE CYBER WORLD.pptx
THE CYBER WORLD.pptxTHE CYBER WORLD.pptx
THE CYBER WORLD.pptx
 
SJCTNC-A.ALBERT RAVI-PCM1017Q-E COMMERCE-UNIT-V- TYPES OF CYBER CRIMES.pptx
SJCTNC-A.ALBERT RAVI-PCM1017Q-E COMMERCE-UNIT-V- TYPES OF CYBER CRIMES.pptxSJCTNC-A.ALBERT RAVI-PCM1017Q-E COMMERCE-UNIT-V- TYPES OF CYBER CRIMES.pptx
SJCTNC-A.ALBERT RAVI-PCM1017Q-E COMMERCE-UNIT-V- TYPES OF CYBER CRIMES.pptx
 

More from 4934bk

You are the information technology manager of an.docx
You are the information technology manager of an.docxYou are the information technology manager of an.docx
You are the information technology manager of an.docx4934bk
 
Your parents gave you up for adoption at a.docx
Your parents gave you up for adoption at a.docxYour parents gave you up for adoption at a.docx
Your parents gave you up for adoption at a.docx4934bk
 
Writing in the social sciences.docx
Writing in the social sciences.docxWriting in the social sciences.docx
Writing in the social sciences.docx4934bk
 
to questions.docx
to questions.docxto questions.docx
to questions.docx4934bk
 
Write an essay on the colonial.docx
Write an essay on the colonial.docxWrite an essay on the colonial.docx
Write an essay on the colonial.docx4934bk
 
Write about interactions in the premodern world.docx
Write about interactions in the premodern world.docxWrite about interactions in the premodern world.docx
Write about interactions in the premodern world.docx4934bk
 
Write about Frontline Video or.docx
Write about Frontline Video or.docxWrite about Frontline Video or.docx
Write about Frontline Video or.docx4934bk
 
World War II.docx
World War II.docxWorld War II.docx
World War II.docx4934bk
 
work and Chicano.docx
work and Chicano.docxwork and Chicano.docx
work and Chicano.docx4934bk
 
Write a literary essay based on the.docx
Write a literary essay based on the.docxWrite a literary essay based on the.docx
Write a literary essay based on the.docx4934bk
 
Why are the ancient legends of China of interest to.docx
Why are the ancient legends of China of interest to.docxWhy are the ancient legends of China of interest to.docx
Why are the ancient legends of China of interest to.docx4934bk
 
Why and how did the loom large in focus on.docx
Why and how did the loom large in focus on.docxWhy and how did the loom large in focus on.docx
Why and how did the loom large in focus on.docx4934bk
 
Why did the Roman Catholic Church consider the sin of.docx
Why did the Roman Catholic Church consider the sin of.docxWhy did the Roman Catholic Church consider the sin of.docx
Why did the Roman Catholic Church consider the sin of.docx4934bk
 
Why and how did the loom large in.docx
Why and how did the loom large in.docxWhy and how did the loom large in.docx
Why and how did the loom large in.docx4934bk
 
What similarities do you notice between organizations for the.docx
What similarities do you notice between organizations for the.docxWhat similarities do you notice between organizations for the.docx
What similarities do you notice between organizations for the.docx4934bk
 
Who invented the printing and how did it have an.docx
Who invented the printing and how did it have an.docxWho invented the printing and how did it have an.docx
Who invented the printing and how did it have an.docx4934bk
 
Which is the true statement regarding the criteria for prioritizing.docx
Which is the true statement regarding the criteria for prioritizing.docxWhich is the true statement regarding the criteria for prioritizing.docx
Which is the true statement regarding the criteria for prioritizing.docx4934bk
 
What.docx
What.docxWhat.docx
What.docx4934bk
 
What was the threat posed to western style democracy in.docx
What was the threat posed to western style democracy in.docxWhat was the threat posed to western style democracy in.docx
What was the threat posed to western style democracy in.docx4934bk
 
What stereotypes did Catholics have of Protestants and Protestants of.docx
What stereotypes did Catholics have of Protestants and Protestants of.docxWhat stereotypes did Catholics have of Protestants and Protestants of.docx
What stereotypes did Catholics have of Protestants and Protestants of.docx4934bk
 

More from 4934bk (20)

You are the information technology manager of an.docx
You are the information technology manager of an.docxYou are the information technology manager of an.docx
You are the information technology manager of an.docx
 
Your parents gave you up for adoption at a.docx
Your parents gave you up for adoption at a.docxYour parents gave you up for adoption at a.docx
Your parents gave you up for adoption at a.docx
 
Writing in the social sciences.docx
Writing in the social sciences.docxWriting in the social sciences.docx
Writing in the social sciences.docx
 
to questions.docx
to questions.docxto questions.docx
to questions.docx
 
Write an essay on the colonial.docx
Write an essay on the colonial.docxWrite an essay on the colonial.docx
Write an essay on the colonial.docx
 
Write about interactions in the premodern world.docx
Write about interactions in the premodern world.docxWrite about interactions in the premodern world.docx
Write about interactions in the premodern world.docx
 
Write about Frontline Video or.docx
Write about Frontline Video or.docxWrite about Frontline Video or.docx
Write about Frontline Video or.docx
 
World War II.docx
World War II.docxWorld War II.docx
World War II.docx
 
work and Chicano.docx
work and Chicano.docxwork and Chicano.docx
work and Chicano.docx
 
Write a literary essay based on the.docx
Write a literary essay based on the.docxWrite a literary essay based on the.docx
Write a literary essay based on the.docx
 
Why are the ancient legends of China of interest to.docx
Why are the ancient legends of China of interest to.docxWhy are the ancient legends of China of interest to.docx
Why are the ancient legends of China of interest to.docx
 
Why and how did the loom large in focus on.docx
Why and how did the loom large in focus on.docxWhy and how did the loom large in focus on.docx
Why and how did the loom large in focus on.docx
 
Why did the Roman Catholic Church consider the sin of.docx
Why did the Roman Catholic Church consider the sin of.docxWhy did the Roman Catholic Church consider the sin of.docx
Why did the Roman Catholic Church consider the sin of.docx
 
Why and how did the loom large in.docx
Why and how did the loom large in.docxWhy and how did the loom large in.docx
Why and how did the loom large in.docx
 
What similarities do you notice between organizations for the.docx
What similarities do you notice between organizations for the.docxWhat similarities do you notice between organizations for the.docx
What similarities do you notice between organizations for the.docx
 
Who invented the printing and how did it have an.docx
Who invented the printing and how did it have an.docxWho invented the printing and how did it have an.docx
Who invented the printing and how did it have an.docx
 
Which is the true statement regarding the criteria for prioritizing.docx
Which is the true statement regarding the criteria for prioritizing.docxWhich is the true statement regarding the criteria for prioritizing.docx
Which is the true statement regarding the criteria for prioritizing.docx
 
What.docx
What.docxWhat.docx
What.docx
 
What was the threat posed to western style democracy in.docx
What was the threat posed to western style democracy in.docxWhat was the threat posed to western style democracy in.docx
What was the threat posed to western style democracy in.docx
 
What stereotypes did Catholics have of Protestants and Protestants of.docx
What stereotypes did Catholics have of Protestants and Protestants of.docxWhat stereotypes did Catholics have of Protestants and Protestants of.docx
What stereotypes did Catholics have of Protestants and Protestants of.docx
 

Recently uploaded

e-Sealing at EADTU by Kamakshi Rajagopal
e-Sealing at EADTU by Kamakshi Rajagopale-Sealing at EADTU by Kamakshi Rajagopal
e-Sealing at EADTU by Kamakshi RajagopalEADTU
 
diagnosting testing bsc 2nd sem.pptx....
diagnosting testing bsc 2nd sem.pptx....diagnosting testing bsc 2nd sem.pptx....
diagnosting testing bsc 2nd sem.pptx....Ritu480198
 
Analyzing and resolving a communication crisis in Dhaka textiles LTD.pptx
Analyzing and resolving a communication crisis in Dhaka textiles LTD.pptxAnalyzing and resolving a communication crisis in Dhaka textiles LTD.pptx
Analyzing and resolving a communication crisis in Dhaka textiles LTD.pptxLimon Prince
 
The Liver & Gallbladder (Anatomy & Physiology).pptx
The Liver &  Gallbladder (Anatomy & Physiology).pptxThe Liver &  Gallbladder (Anatomy & Physiology).pptx
The Liver & Gallbladder (Anatomy & Physiology).pptxVishal Singh
 
Major project report on Tata Motors and its marketing strategies
Major project report on Tata Motors and its marketing strategiesMajor project report on Tata Motors and its marketing strategies
Major project report on Tata Motors and its marketing strategiesAmanpreetKaur157993
 
Dementia (Alzheimer & vasular dementia).
Dementia (Alzheimer & vasular dementia).Dementia (Alzheimer & vasular dementia).
Dementia (Alzheimer & vasular dementia).Mohamed Rizk Khodair
 
The basics of sentences session 4pptx.pptx
The basics of sentences session 4pptx.pptxThe basics of sentences session 4pptx.pptx
The basics of sentences session 4pptx.pptxheathfieldcps1
 
PSYPACT- Practicing Over State Lines May 2024.pptx
PSYPACT- Practicing Over State Lines May 2024.pptxPSYPACT- Practicing Over State Lines May 2024.pptx
PSYPACT- Practicing Over State Lines May 2024.pptxMarlene Maheu
 
An Overview of the Odoo 17 Knowledge App
An Overview of the Odoo 17 Knowledge AppAn Overview of the Odoo 17 Knowledge App
An Overview of the Odoo 17 Knowledge AppCeline George
 
TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...
TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...
TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...Nguyen Thanh Tu Collection
 
male presentation...pdf.................
male presentation...pdf.................male presentation...pdf.................
male presentation...pdf.................MirzaAbrarBaig5
 
Graduate Outcomes Presentation Slides - English (v3).pptx
Graduate Outcomes Presentation Slides - English (v3).pptxGraduate Outcomes Presentation Slides - English (v3).pptx
Graduate Outcomes Presentation Slides - English (v3).pptxneillewis46
 
Đề tieng anh thpt 2024 danh cho cac ban hoc sinh
Đề tieng anh thpt 2024 danh cho cac ban hoc sinhĐề tieng anh thpt 2024 danh cho cac ban hoc sinh
Đề tieng anh thpt 2024 danh cho cac ban hoc sinhleson0603
 
UChicago CMSC 23320 - The Best Commit Messages of 2024
UChicago CMSC 23320 - The Best Commit Messages of 2024UChicago CMSC 23320 - The Best Commit Messages of 2024
UChicago CMSC 23320 - The Best Commit Messages of 2024Borja Sotomayor
 
Envelope of Discrepancy in Orthodontics: Enhancing Precision in Treatment
 Envelope of Discrepancy in Orthodontics: Enhancing Precision in Treatment Envelope of Discrepancy in Orthodontics: Enhancing Precision in Treatment
Envelope of Discrepancy in Orthodontics: Enhancing Precision in Treatmentsaipooja36
 
How to Manage Closest Location in Odoo 17 Inventory
How to Manage Closest Location in Odoo 17 InventoryHow to Manage Closest Location in Odoo 17 Inventory
How to Manage Closest Location in Odoo 17 InventoryCeline George
 
SURVEY I created for uni project research
SURVEY I created for uni project researchSURVEY I created for uni project research
SURVEY I created for uni project researchCaitlinCummins3
 
SPLICE Working Group: Reusable Code Examples
SPLICE Working Group:Reusable Code ExamplesSPLICE Working Group:Reusable Code Examples
SPLICE Working Group: Reusable Code ExamplesPeter Brusilovsky
 

Recently uploaded (20)

e-Sealing at EADTU by Kamakshi Rajagopal
e-Sealing at EADTU by Kamakshi Rajagopale-Sealing at EADTU by Kamakshi Rajagopal
e-Sealing at EADTU by Kamakshi Rajagopal
 
diagnosting testing bsc 2nd sem.pptx....
diagnosting testing bsc 2nd sem.pptx....diagnosting testing bsc 2nd sem.pptx....
diagnosting testing bsc 2nd sem.pptx....
 
Analyzing and resolving a communication crisis in Dhaka textiles LTD.pptx
Analyzing and resolving a communication crisis in Dhaka textiles LTD.pptxAnalyzing and resolving a communication crisis in Dhaka textiles LTD.pptx
Analyzing and resolving a communication crisis in Dhaka textiles LTD.pptx
 
The Liver & Gallbladder (Anatomy & Physiology).pptx
The Liver &  Gallbladder (Anatomy & Physiology).pptxThe Liver &  Gallbladder (Anatomy & Physiology).pptx
The Liver & Gallbladder (Anatomy & Physiology).pptx
 
Major project report on Tata Motors and its marketing strategies
Major project report on Tata Motors and its marketing strategiesMajor project report on Tata Motors and its marketing strategies
Major project report on Tata Motors and its marketing strategies
 
Dementia (Alzheimer & vasular dementia).
Dementia (Alzheimer & vasular dementia).Dementia (Alzheimer & vasular dementia).
Dementia (Alzheimer & vasular dementia).
 
Mattingly "AI and Prompt Design: LLMs with NER"
Mattingly "AI and Prompt Design: LLMs with NER"Mattingly "AI and Prompt Design: LLMs with NER"
Mattingly "AI and Prompt Design: LLMs with NER"
 
The basics of sentences session 4pptx.pptx
The basics of sentences session 4pptx.pptxThe basics of sentences session 4pptx.pptx
The basics of sentences session 4pptx.pptx
 
PSYPACT- Practicing Over State Lines May 2024.pptx
PSYPACT- Practicing Over State Lines May 2024.pptxPSYPACT- Practicing Over State Lines May 2024.pptx
PSYPACT- Practicing Over State Lines May 2024.pptx
 
An Overview of the Odoo 17 Knowledge App
An Overview of the Odoo 17 Knowledge AppAn Overview of the Odoo 17 Knowledge App
An Overview of the Odoo 17 Knowledge App
 
TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...
TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...
TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...
 
male presentation...pdf.................
male presentation...pdf.................male presentation...pdf.................
male presentation...pdf.................
 
Graduate Outcomes Presentation Slides - English (v3).pptx
Graduate Outcomes Presentation Slides - English (v3).pptxGraduate Outcomes Presentation Slides - English (v3).pptx
Graduate Outcomes Presentation Slides - English (v3).pptx
 
Đề tieng anh thpt 2024 danh cho cac ban hoc sinh
Đề tieng anh thpt 2024 danh cho cac ban hoc sinhĐề tieng anh thpt 2024 danh cho cac ban hoc sinh
Đề tieng anh thpt 2024 danh cho cac ban hoc sinh
 
UChicago CMSC 23320 - The Best Commit Messages of 2024
UChicago CMSC 23320 - The Best Commit Messages of 2024UChicago CMSC 23320 - The Best Commit Messages of 2024
UChicago CMSC 23320 - The Best Commit Messages of 2024
 
Envelope of Discrepancy in Orthodontics: Enhancing Precision in Treatment
 Envelope of Discrepancy in Orthodontics: Enhancing Precision in Treatment Envelope of Discrepancy in Orthodontics: Enhancing Precision in Treatment
Envelope of Discrepancy in Orthodontics: Enhancing Precision in Treatment
 
Mattingly "AI & Prompt Design: Named Entity Recognition"
Mattingly "AI & Prompt Design: Named Entity Recognition"Mattingly "AI & Prompt Design: Named Entity Recognition"
Mattingly "AI & Prompt Design: Named Entity Recognition"
 
How to Manage Closest Location in Odoo 17 Inventory
How to Manage Closest Location in Odoo 17 InventoryHow to Manage Closest Location in Odoo 17 Inventory
How to Manage Closest Location in Odoo 17 Inventory
 
SURVEY I created for uni project research
SURVEY I created for uni project researchSURVEY I created for uni project research
SURVEY I created for uni project research
 
SPLICE Working Group: Reusable Code Examples
SPLICE Working Group:Reusable Code ExamplesSPLICE Working Group:Reusable Code Examples
SPLICE Working Group: Reusable Code Examples
 

T06 cybersecurity exam 2 Computer Science homework help.docx

  • 1. T06 cybersecurity exam 2 | Computer Science homework help Which of the following examples may be classified as identity fraud? A. You are wrongfully accused of a crime committed by an impostor. B. Your phone bill reflects long distance charges you did not make. C. You have documents that helped you illegally immigrate into the country. D. You use a fake name to make a restaurant reservation Which of the following statements correctly distinguishes between identity theft and identity fraud? A. Identity fraud is always a victimless crime. B. Identity fraud may involve the fabrication of identity information based on a fictitious person. C. Identity theft may be done for criminal purposes. D. Identity theft does not utilize historical or biometric information Which of the following refers to redirecting thin slices of accounts into a designated location? A. Salami technique B. Data diddling C. Spoofing D. ISP-jacking Which of the following refers to a seller in an auction driving up the cost of his or her own item by bidding on it? A. Fee stacking B. Shill bidding C. Misrepresentation D. Non delivery Which of the following refers to a software program or hardware device that records everything you type into a compromised computer? A. Keyloggers B. Salamis C. Worms D. Trojans Which of the following refers to the abuse of electronic messaging systems to randomly or indiscriminately send unsolicited bulk messages? A. Phishing B. Spamming C. Phreaking D. Shoulder surfing “Popcorning” is a technique used in which of the following physical methods of identity theft? A. Child identity theft B. Mail theft C. Fraudulent or fictitious companies D. Theft of computers Paper shredders and disk-wiping software are means to avoid which of the following physical methods of identity theft? A. Mail theft B. Bag operations C. ATM manipulation D. Dumpster diving Which of the following refers to the sale of stolen goods through technological means? A. Day trading B. Insider trading C. e-Fencing D. Spoofing Which of the following refers to a malware program that encrypts or otherwise renders computer or digital resources inoperable or inaccessible in furtherance of the illegal compulsion of an action or exchange? A. Worm B. Social engineering C. Ransomware D. Spyware A deliberate, politically or religiously motivated attack against data compilations, computer programs, and/or information systems that is intended to disrupt and/or deny service or acquire information that disrupts the social, physical, or political infrastructure of a target, is known as: A. cyberterrorism. B. salami technique. C. cyberstalking. D. cyberbullying. Which of the following types of identity theft/fraud is by far the most common and
  • 2. also the most feared by the American public? A. Credit identity theft/fraud B. Assumption of identity C. Theft for employment and/or border entry D. Virtual identity theft/fraud Which of the following is true regarding bag operations as a physical method of identity theft? A. They include sifting through commercial or residential trash or waste for information deemed valuable. B. They are typically conducted by the host government’s security or intelligence services. C. They are executed by depositing personal documents in unlocked containers on the side of the road until they are retrieved. D. They involve the creation of shell companies that engage in the collection of personal financial information Which of the following best distinguishes identity theft? A. Identity theft is the illegal use or transfer of third party’s personal identification information with unlawful intent. B. Identity theft encompasses identity fraud within its purview. C. Identity theft involves any attempts by minors to use fake IDs to purchase alcohol or gain access to nightclubs or gambling establishments. D. Identity theft is a vast array of illegal activities based on fraudulent use of identifying information of a real or fictitious person Which of the following is atypical of both physical stalkers and cyberstalkers? A. They are usually known to their victims. B. They are motivated by economic gain. C. They are usually male. D. They usually focus their attentions on women. Cybervandalism and cyberterrorism are examples of which category of online crime? A. Theft of information and copyright infringement B. Interference with lawful use of computers C. Threatening communications D. Dissemination of contraband or offensive materials Which of the following refers to the deliberate manipulation of an existing program to redirect or reroute data representing monies or economic exchanges? A. ISP jacking B. Web cramming C. Data diddling D. IP spoofing Which of the following are most often used fraudulently to obtain immigration benefits? A. Student ID B. Drivers’ licenses C. Documentation of residency D. Credit cards Which of the following is an example of a bag operation? A. A person surreptitiously enters a suspect’s hotel room to download information from the suspect’s laptop computer. B. , A person retrieves a bag full of documents containing personal and financial information from his neighbor’s mailbox. C. A logistics manager is accused of losing tapes containing personal information of government employees during shipment. D. A person is found sifting through bags of commercial Which of the following is true regarding the theft of computers as a physical method of identity theft? A. Physical theft of computers is the least common technique employed by identity thieves. B. Individuals without technical expertise cannot successfully execute this physical method of identity theft. C. Areas particularly vulnerable to theft of computers include private residences and recreation centers. D. Theft of computers does not alleviate the need to analyze and organize voluminous paper documents.