1. T06 cybersecurity exam 2 | Computer Science homework help
Which of the following examples may be classified as identity fraud? A. You are
wrongfully accused of a crime committed by an impostor. B. Your phone bill reflects
long distance charges you did not make. C. You have documents that helped you
illegally immigrate into the country. D. You use a fake name to make a restaurant
reservation Which of the following statements correctly distinguishes between
identity theft and identity fraud? A. Identity fraud is always a victimless crime. B.
Identity fraud may involve the fabrication of identity information based on a fictitious
person. C. Identity theft may be done for criminal purposes. D. Identity theft does not
utilize historical or biometric information Which of the following refers to redirecting
thin slices of accounts into a designated location? A. Salami technique B. Data
diddling C. Spoofing D. ISP-jacking Which of the following refers to a seller in
an auction driving up the cost of his or her own item by bidding on it? A. Fee stacking
B. Shill bidding C. Misrepresentation D. Non delivery Which of the
following refers to a software program or hardware device that records everything you type
into a compromised computer? A. Keyloggers B. Salamis C. Worms D.
Trojans Which of the following refers to the abuse of electronic messaging systems
to randomly or indiscriminately send unsolicited bulk messages? A. Phishing B.
Spamming C. Phreaking D. Shoulder surfing “Popcorning” is a technique used in
which of the following physical methods of identity theft? A. Child identity theft B.
Mail theft C. Fraudulent or fictitious companies D. Theft of computers Paper
shredders and disk-wiping software are means to avoid which of the following physical
methods of identity theft? A. Mail theft B. Bag operations C. ATM manipulation
D. Dumpster diving Which of the following refers to the sale of stolen goods
through technological means? A. Day trading B. Insider trading C. e-Fencing
D. Spoofing Which of the following refers to a malware program that encrypts
or otherwise renders computer or digital resources inoperable or inaccessible in
furtherance of the illegal compulsion of an action or exchange? A. Worm B. Social
engineering C. Ransomware D. Spyware A deliberate, politically or
religiously motivated attack against data compilations, computer programs, and/or
information systems that is intended to disrupt and/or deny service or acquire information
that disrupts the social, physical, or political infrastructure of a target, is known as: A.
cyberterrorism. B. salami technique. C. cyberstalking. D. cyberbullying.
Which of the following types of identity theft/fraud is by far the most common and
2. also the most feared by the American public? A. Credit identity theft/fraud B.
Assumption of identity C. Theft for employment and/or border entry D. Virtual
identity theft/fraud Which of the following is true regarding bag operations as a
physical method of identity theft? A. They include sifting through commercial or
residential trash or waste for information deemed valuable. B. They are typically
conducted by the host government’s security or intelligence services. C. They are executed
by depositing personal documents in unlocked containers on the side of the road until they
are retrieved. D. They involve the creation of shell companies that engage in the collection
of personal financial information Which of the following best distinguishes identity
theft? A. Identity theft is the illegal use or transfer of third party’s personal identification
information with unlawful intent. B. Identity theft encompasses identity fraud within
its purview. C. Identity theft involves any attempts by minors to use fake IDs to
purchase alcohol or gain access to nightclubs or gambling establishments. D. Identity
theft is a vast array of illegal activities based on fraudulent use of identifying information of
a real or fictitious person Which of the following is atypical of both physical stalkers
and cyberstalkers? A. They are usually known to their victims. B. They are motivated
by economic gain. C. They are usually male. D. They usually focus their attentions
on women. Cybervandalism and cyberterrorism are examples of which category of
online crime? A. Theft of information and copyright infringement B. Interference with
lawful use of computers C. Threatening communications D. Dissemination of
contraband or offensive materials Which of the following refers to the deliberate
manipulation of an existing program to redirect or reroute data representing monies or
economic exchanges? A. ISP jacking B. Web cramming C. Data diddling D. IP
spoofing Which of the following are most often used fraudulently to obtain
immigration benefits? A. Student ID B. Drivers’ licenses C. Documentation of
residency D. Credit cards Which of the following is an example of a bag
operation? A. A person surreptitiously enters a suspect’s hotel room to download
information from the suspect’s laptop computer. B. , A person retrieves a bag full of
documents containing personal and financial information from his neighbor’s mailbox.
C. A logistics manager is accused of losing tapes containing personal information of
government employees during shipment. D. A person is found sifting through bags of
commercial Which of the following is true regarding the theft of computers as a physical
method of identity theft? A. Physical theft of computers is the least common technique
employed by identity thieves. B. Individuals without technical expertise cannot
successfully execute this physical method of identity theft. C. Areas particularly
vulnerable to theft of computers include private residences and recreation centers. D.
Theft of computers does not alleviate the need to analyze and organize voluminous paper
documents.