Cybervandalism and cyberterrorism are examples of which category of online crime?
theft of information and copyright infringement
Correct!
interference with lawful use of computers
threatening communications
dissemination of contraband or offensive materials
Definition
interference with lawful use of computers
Term
Which of the following refers to a computer that has been compromised by some form of malware, enabling the criminal to remotely control that computer?
Trojan
bundler
Correct!
zombie
rootkit
Definition
zombie
Term
Which of the following refers to a software program or hardware device that records everything you type into a compromised computer?
Correct!
keyloggers
salamis
worms
Trojans
Definition
keyloggers
Term
Which of the following refers to two distinct methods of distributed denial of service (DDoS) attacks?
spamming and fraggling
Correct!
smurfing and fraggling
stalking and spamming
freezing and stalking
Definition
smurfing and fraggling
Term
Which of the following refers to a malware program that encrypts or otherwise renders computer or digital resources inoperable or inaccessible in furtherance of the illegal compulsion of an action or exchange?
worm
social engineering
Correct!
ransomware
spyware
Definition
ransomware
Term
Which of the following best defines shoulder surfing?
using computers to remotely perform malicious or criminal tasks
using electronic messaging systems to randomly or indiscriminately send unsolicited bulk messages
rendering computers or digital resources inoperable in furtherance of the illegal compulsion of an action or exchange
Correct!
literally watching someone from behind, as he or she inputs a password
Definition
literally watching someone from behind, as he or she inputs a password
Term
A deliberate, politically or religiously motivated attack against data compilations, computer programs, and/or information systems that is intended to disrupt and/or deny service or acquire information that disrupts the social, physical, or political infrastructure of a target, is known as ________.
Correct!
cyberterrorism
salami technique
cyberstalking
cyberbullying
Definition
cyberterrorism
Term
According to the Office of Juvenile Justice and Delinquency Prevention (OJJDP) and the National Center for Missing and Exploited Children (NCMEC), almost all possessors of child pornography are ________.
black males who are younger than 25
white males who are younger than 25
homosexual males who are older than 25
Correct!
white males who are older than 25
Definition
white males who are older than 25
Term
Which of the following is NOT a primary motivation for the possession of child pornography?
Correct!
fight for legalizing man/boy sexual relationship
satisfaction of a desire for new and different sexual stimuli
satisfaction of a peculiar curiosity
possession and subsequent distribution designed for economic profict
Definition
fight for legalizing man/boy sexual relationship
Term
Which of the following launched the first online casino in 1995 with 18 games?
PokerStars
Rational Group US Holdings
Correct!
Internet Casinos, Inc.
Full Tilt Poker
Definition
Internet Casinos, Inc.
Term
The individuals who seek to re-establish a relationship with an unwilling partner and are considered the most dangerous of stalkers are known as ________.
Correct!
obsessional stalkers
love-obsession stalkers
erotomaniacs
vengence stalkers
Definition
obsessional stalkers
Term
Which of the following refers to stalkers who are delusional and believe that their victim is in love with them or has had a previous relationship with them?
obsessional stalkers
love-obsession stalkers
Correct!
erotomaniacs
vengence stalker
Definition
erotomaniacs
Term
Which of the following statements regarding online gaming is untrue?
The increase in e-banking allows users to access and add funds without even leaving their chair.
The continuous operation of online casinos makes them accessible 24 hours a day.
The lack of physicality and geographical location makes online casinos accessible to any user with a computer, PDA, or cell phone.
Correct!
Minors accessibility to online gaming is restricted, as age verification is mandatory.
Definition
Minors accessibility to online gaming is restricted, as age verification is mandatory.
Term
Which of the following types of fraud occurs when a fraudster adds hidden charges to the advertised price, perhaps in shipping or handling?
Correct!
fee stacking
misrepresentation
nondelivery
shill bidding
Definition
fee stacking
Term
To steal credit card information by installing devices on card readers located in ATMs, gas pumps, restaurants, grocery stores, retail establishments, or any other area where magnetic strip card readers are employed is known as ________.
spamming
Correct!
skimming
RFID
shill bidding
Definition
skimming
Term
Which of the following refers to the deliberate manipulation of an existing program to redirect or reroute data representing monies or economic exchanges?
ISP jacking
web cramming
Correct!
data diddling
IP spoofing
Definition
data diddling
Term
Which of the following refers to the sale of stolen goods through technological means?
day trading
insider trading
Correct!
e-Fencing
spoofing
Definition
e-Fencing
Term
Which of the following refers to redirecting thin slices of accounts into a designated location?
Correct!
salami technique
data diddling
spoofing
ISP-jacking
Definition
salami technique
Term
Which of the following refers to a seller in an auction driving up the cost of his or her own item by bidding on it?
fee stacking
Correct!
shill bidding
misrepresentation
nondelivery
Definition
shill bidding
Term
________ involves the use of radio waves to facilitate the transfer of information between an electronic tag (or label) and a reader.