Privacy, Crime, And Security #2

20 Questions

Settings
Please wait...
Crime Quizzes & Trivia

Open note quiz


Questions and Answers
  • 1. 
    Cookies are small _________ written to your hard drive by websites you have visited.
  • 2. 
    Cookies allow various entities to __________ your browsing habits and ___________ personal information about you without your consent.
  • 3. 
    Cookies cannot be disabled.
    • A. 

      True

    • B. 

      False

  • 4. 
    ___________________ ads are targeted advertisements based on the cookies on your hard drive.
  • 5. 
    Examples of ubiquitous computing include the use of
    • A. 

      Active badges

    • B. 

      Cookies

    • C. 

      Smartphones

    • D. 

      Remote control

  • 6. 
    RFID are used by used by stores to control ___________ and to identify lost  ___________and gather information about individuals from their _________
    • A. 

      Inventory

    • B. 

      Smartphones

    • C. 

      Passports

    • D. 

      Pets

    • E. 

      Gps

  • 7. 
    Technologies that jeopardize anonymity
    • A. 

      Cookies

    • B. 

      Global Positioning System

    • C. 

      GUIDs

    • D. 

      Radio Frequency Identification

    • E. 

      Bluetooth

  • 8. 
    _________ has become more difficult due to the use of computers and the Internet.
  • 9. 
    _____________ are computer hobbyists who attempt to obtain unlawful network access.
  • 10. 
    _______________ refers to the dangerous actions a virus performs.
  • 11. 
    IP ____________ sends a message with an IP address disguised as a message from a trusted source.
    • A. 

      Address

    • B. 

      Man

    • C. 

      Spoofing

    • D. 

      Protocol

  • 12. 
    _______________ is a trap set to detect, deflect, or in some manner counteract attempts at unauthorized use of information systems
    • A. 

      Hackers

    • B. 

      Cybergangs

    • C. 

      IP spoofing

    • D. 

      Honeypot

  • 13. 
    The act of secretly removing RAM chips from office computers and selling them
    • A. 

      Theft

    • B. 

      Memory shaving

    • C. 

      Software piracy

    • D. 

      Salami slicing

  • 14. 
    The following is an example of ______________. A cashier at restaurant  steals a $0.05 from every bill she processes.
    • A. 

      Salami slicing

    • B. 

      Memory shaving

    • C. 

      Data dibbling

    • D. 

      Forgery

  • 15. 
    The following is an example of ______________.  Katherine often goes through her employers' garage cans and locates discarded files of their clients and opens credit cards accounts in their names.
    • A. 

      Identify theft

    • B. 

      Phishing attacks

    • C. 

      Dumpster diving

    • D. 

      Spear phishing

  • 16. 
    Legislation currently in place in the United States to protect consumers from computer and cyber crimes include the
    • A. 

      Fair Credit Bill Act

    • B. 

      Health Insurance Portability and Privacy Act

    • C. 

      Fair Health and Education Act

    • D. 

      Family Education Rights and Privacy Act

  • 17. 
    To protect your privacy online fill out forms only when the website displays
    • A. 

      Http://

    • B. 

      Ftps://

    • C. 

      Ftp://

    • D. 

      Https:

  • 18. 
    ______ are unsolicited messages sent via a cell phone or instant messaging service.
    • A. 

      Spam

    • B. 

      Virus

    • C. 

      Spyware

    • D. 

      Spim

  • 19. 
    A ______ virus attaches to data files and takes advantage of application macros.
  • 20. 
    A _________ is a code concealed inside a program that can harm or destroy files.