Filters
Question type

Study Flashcards

Which of the following was suggested as a way to avoid becoming a money mule?


A) forgoing your research into the company or person offering the job
B) not monitoring transactions
C) utilizing fraud protection companies, such as PayPal
D) not calling the authorities

Correct Answer

verifed

verified

The country with the best known and most discussed censorship is ______.


A) Russia
B) North Korea
C) Syria
D) China

Correct Answer

verifed

verified

Spoofing cannot be used to manipulate the stock market.

Correct Answer

verifed

verified

Europe and the U.S. government also engage in censorship, mainly targeting ______.


A) violence
B) hate speech
C) pornography
D) narcotics

Correct Answer

verifed

verified

Discuss data mining. Who does data mining benefit? Is it a safe practice for companies to use?

Correct Answer

verifed

verified

A strong answer will include t...

View Answer

Criminals can use GPS spoofing as a tool by creating false GPS signals. This is possible because the real GPS signals are very weak because satellites are far away.

Correct Answer

verifed

verified

Which of the following was identified as one of the main tools used by criminals?


A) GPS jammer
B) police scanner
C) Bluetooth
D) radio beacons

Correct Answer

verifed

verified

What is censorship's purpose and why do countries censor information?

Correct Answer

verifed

verified

A strong answer will include the followi...

View Answer

Google and Twitter are among the biggest data collection agencies.

Correct Answer

verifed

verified

A fraudulent or malicious practice in which communication is sent from an unknown source disguised as a source known to the receiver is referred to as ______.


A) spamming
B) phishing
C) spoofing
D) vishing

Correct Answer

verifed

verified

With increased digitalization of our personal information, the integrity of our data is at low risk.

Correct Answer

verifed

verified

A radio frequency transmitter that blocks the communication between cell phones and text messages is referred to as a ______.


A) GPS jammer
B) spoofer
C) Bluetooth
D) radio beacon

Correct Answer

verifed

verified

In the 1970s, Gordon Moore showed how ______ doubled every two years.


A) a graphics card
B) random access memory
C) central processing units
D) a hard drive

Correct Answer

verifed

verified

Explain real-time location services and discuss the risks of using apps that contain location services. Use an app as an example.

Correct Answer

verifed

verified

A strong answer will include t...

View Answer

The human brain thinks of life in a ______.


A) nonlinear fashion
B) linear fashion
C) exponential fashion
D) nonexponential fashion

Correct Answer

verifed

verified

Which of the following companies have fallen victim to cybercriminals in recent years?


A) Sony
B) Ashley Madison
C) Experian
D) all of these

Correct Answer

verifed

verified

In ______ scams, criminals intercept e-mails between two businesses or a private person and a business and direct the purchasing party to send the payment for the product to a new bank account.


A) man-in-the-middle
B) man-in-the-cloud
C) man-in-the-app
D) man-in-the-IoT

Correct Answer

verifed

verified

In 2010, the Dodd-Frank Act made spoofing a(n) ______, but it has been difficult to prosecute spoofers.


A) misdemeanor crime
B) infraction
C) felony crime
D) crime not punishable by law

Correct Answer

verifed

verified

Why is it difficult to prosecute individuals who have been charged with spoofing?

Correct Answer

verifed

verified

A strong answer will discuss the Dodd-Fr...

View Answer

Which of the following was NOT identified as a warning sign of money mule schemes?


A) The employer is located outside of the United States.
B) All interactions and transactions occur online.
C) The job promises an unusual high amount of earnings.
D) The position has a specific job description.

Correct Answer

verifed

verified

Showing 21 - 40 of 40

Related Exams

Show Answer