Filters
Question type

Study Flashcards

A technology that detects the current geolocation of a target, which may be anything from a vehicle to an item in a manufacturing plant to a person, is referred to as ______.


A) Real Time Location Services
B) Global Positioning System
C) Wireless Local Area Network
D) Ultrasonic Ranging

Correct Answer

verifed

verified

A new prank that is not only draining law enforcement resources but also creating very dangerous situations for citizens is known as ______.


A) spoofing
B) swatting
C) squatting
D) phishing

Correct Answer

verifed

verified

According to Moore's law, the growth in the information technology is exponential, such as ______


A) 1, 2, 3, 4, 5, 6
B) 1, 2, 4, 8, 16, 32
C) 1, 2, 4, 6, 8, 10
D) 1, 3, 6, 9, 12, 15

Correct Answer

verifed

verified

Which of the following is not a factor that leads to the deployment of SWAT officers?


A) likelihood of surrender by the criminal
B) risk of harm to the public
C) risk of harm to law enforcement officers
D) case requirements

Correct Answer

verifed

verified

When location services are turned on, cell phones are constantly sending signals of location and attach so-called "metrotags" to all pictures.

Correct Answer

verifed

verified

______ is known as one of the largest data collectors.


A) Google
B) Instagram
C) Amazon
D) Snapchat

Correct Answer

verifed

verified

One of the latest trends is data mining and data brokerage.

Correct Answer

verifed

verified

E-mail spoofing is used for which of the following campaigns?


A) vishing and spam
B) spam and phishing
C) scanning and phishing
D) phishing and scanning

Correct Answer

verifed

verified

According to the text, one of the latest trends is data ______.


A) analysis and mining
B) mining and brokerage
C) sales and mining
D) analysis and brokerage

Correct Answer

verifed

verified

What does the future hold in terms of cybersecurity?

Correct Answer

verifed

verified

The answer will vary...

View Answer

All of the following countries are on the list of most censored countries in the world except ______.


A) China
B) Iran
C) Cuba
D) Turkey

Correct Answer

verifed

verified

E-mail spoofing is the least common type of spoofing.

Correct Answer

verifed

verified

One such tool used to manipulate data and people is censorship.

Correct Answer

verifed

verified

According to the text, censorship is mainly used by ______ governments, which have come into power by dint of monarchy, family dynasty, coup d'Γ©tat, rigged election, or some combination thereof.


A) democratic
B) totalitarian
C) authoritarian
D) monarchical

Correct Answer

verifed

verified

C

Cell phone providers are by law required to enable GPS tracking on at least ______ of devices in their network.


A) 25%
B) 50%
C) 75%
D) 95%

Correct Answer

verifed

verified

The Internet of Things are network-connected devices and sensors such as ______.


A) alarm systems
B) iPads
C) elevators
D) all of these

Correct Answer

verifed

verified

D

People who are desperately looking for a job or are looking for a "work from home" job for a variety of reasons are referred to as ______.


A) money mules
B) lazy dogs
C) couch potatoes
D) slackers

Correct Answer

verifed

verified

A

Authoritarian governments are not the only ones that manipulate the facts and block websites.

Correct Answer

verifed

verified

The forgery of an e-mail header pretending to be a legitimate sender like a business or friend scamming the receiver into opening the e-mail and downloading malicious software or responding to a solicitation is an example of ______.


A) e-mail spamming
B) e-mail phishing
C) e-mail spoofing
D) e-mail vishing

Correct Answer

verifed

verified

The government of Japan forced Google to reshoot street-level views because the images were enabling viewers to look inside the houses.

Correct Answer

verifed

verified

Showing 1 - 20 of 40

Related Exams

Show Answer