Filters
Question type

Study Flashcards

The ______ refers to the connection of humans, animals, plants, and inanimate objects in the physical world to the Internet.

Correct Answer

verifed

verified

_________ scams involve masquerading as a legitimate entity or business to trick users into revealing some type of information.


A) Pharming
B) Phishing
C) Catphishing
D) Spamming
E) None of the above

Correct Answer

verifed

verified

Bots have also been used in spamming campaigns.

Correct Answer

verifed

verified

A ________ is a person who controls zombie computers.


A) Botcode
B) Bot
C) Botnet
D) Botherder
E) All of the above

Correct Answer

verifed

verified

Computer viruses are self-executing and self-propagating.

Correct Answer

verifed

verified

_______ explains why specific signals are considered reliable, whereas others are not, by examining the signal and the quality it purportedly represents.

Correct Answer

verifed

verified

A ______ enables users to engage in electronic commerce transactions by allowing them to pay using their digital devices.

Correct Answer

verifed

verified

A _______ is designed to appear as a legitimate program but actually carries a malicious payload.

Correct Answer

verifed

verified

Dumps are any stolen credit card or other financial information,

Correct Answer

verifed

verified

True

Online transactions depend on trust in the seller and trust in the platform.

Correct Answer

verifed

verified

______ refers to ownership rights to intangible property.

Correct Answer

verifed

verified

Intellectual property

An identity theft report is also known as the identity theft affidavit.

Correct Answer

verifed

verified

_______ involves the use of an individual's personal information and medical insurance card data to obtain medical services.

Correct Answer

verifed

verified

Medical id...

View Answer

A ______ protects literary or artistic works.

Correct Answer

verifed

verified

___________ involves spoofed websites that look identical or nearly identical to the known websites they are pretending to be.


A) Pharming
B) Phishing
C) Catphishing
D) Spamming
E) None of the above

Correct Answer

verifed

verified

A trademark is obtained to protect an invention.

Correct Answer

verifed

verified

_________ are fraudsters or scam artists seeking to sell fake financial information.


A) Spammers
B) Rippers
C) Phishers
D) Pharmers
E) None of the above

Correct Answer

verifed

verified

_________ can surreptitiously monitor users' activity and relay this activity to the person who created or distributed the malware.


A) Adware
B) Freeware
C) Abandonware
D) Spyware
E) All of the above

Correct Answer

verifed

verified

D

Which of the following elements is common to all types of frauds?


A) Perceived pressure
B) Perceived opportunity
C) Rationalization
D) All of the above
E) None of the above

Correct Answer

verifed

verified

A ______ protects symbols and names associated with a particular good or service.

Correct Answer

verifed

verified

Showing 1 - 20 of 30

Related Exams

Show Answer