233 Test

Pataasin ang iyong marka sa homework at exams ngayon gamit ang Quizwiz!

Which of the following is NOT a reason why lenders have often confounded law enforcement by their reluctance to join in the efforts to combat identity threat/fraud? Consumers are unconcerned and won't take steps to protect their accounts. Lenders are singularly motivated by capitalism. Benefits flow to them from easily available credit. Lenders willingly absorb costs associated with identity theft/fraud.

Consumers are unconcerned and won't take steps to protect their accounts.

Which of the following is a disadvantage of using SpyBuddy to steal passwords? It may be detected by software. It is hard to install and remove. It initiates after start-up. It is attached to a local machine.

It is attached to a local machine.

Which social network has become a popular site for online communities of al Qaeda sympathizers? Facebook MySpace Tumbler Orkut

Orkut

"Popcorning" is a technique used in which of the following physical methods of identity theft? child identity theft mail theft fraudulent or fictitious companies theft of computers

mail theft

_______ is defined as the introduction of illegally obtained funds into the legitimate financial marketplace. Extortion Currency counterfeiting Fencing Money laundering

Money laundering

Which of the following types of justification is employed by terrorists who superficially proclaim an abhorrence of violence and stress the urgency for a diplomatic settlement? "no choice" justifications peaceful, nonviolent rhetoric demonizing and delegitimization justifications emphasis of weakness

peaceful, nonviolent rhetoric

Which of the following cyberterrorist attacks was employed in Operation Desert Storm? physical attack computer network attack electronic attack electromagnetic attack

physical attack

Which of the following refers to scams designed to delude a victim into thinking that he or she had been singled out to be the beneficiary of millions of dollars being given away by a company or government agency? skimming pump and dump carding 4-1-9

4-1-9

Which of the following is an example of a bag operation? A person surreptitiously enters a suspect's hotel room to download information from the suspect's laptop computer. A person retrieves a bag full of documents containing personal and financial information from his neighbor's mailbox. A logistics manager is accused of losing tapes containing personal information of government employees during shipment. A person is found sifting through bags of commercial trash, looking for passwords, computer systems, and software.

A person surreptitiously enters a suspect's hotel room to download information from the suspect's laptop computer.

All of the following are similarities among terrorism and organized crime EXCEPT which? Both have rules and regulations. Both require absolute obedience. Both have formal goals and objectives. Both are politically motivated and economically driven.

Both are politically motivated and economically driven.

Which of the following is true regarding the theft of computers as a physical method of identity theft? Physical theft of computers is the least common technique employed by identity thieves. Individuals without technical expertise cannot successfully execute this physical method of identity theft. Areas particularly vulnerable to theft of computers include private residences and recreation centers. Theft of computers does not alleviate the need to analyze and organize voluminous paper documents.

Areas particularly vulnerable to theft of computers include private residences and recreation centers.

Which of the following statements correctly distinguishes between identity theft and identity fraud? Identity fraud is always a victimless crime. Identity fraud may involve the fabrication of identity information based on a fictitious person. Identity theft may be done for criminal purposes. Identity theft does not utilize historical or biometric information.

Identity fraud may involve the fabrication of identity information based on a fictitious person.

Which of the following best distinguishes identity theft? Identity theft is the illegal use or transfer of a third party's personal identification information with unlawful intent. Identity theft encompasses identity fraud within its purview. Identity theft involves any attempts by minors to use fake IDs to purchase alcohol or gain access to nightclubs or gambling establishments. Identity theft is a vast array of illegal activities based on fraudulent use of identifying information of a real or fictitious person.

Identity theft is the illegal use or transfer of a third party's personal identification information with unlawful intent.

Which of the following federal agencies and offices holds the database of information on potential terrorists and people suspected of narcotics trafficking or other law enforcement violations? Department of State-Consular Lookout and Support System Department of State-TIPOFF Database Federal Bureau of Investigation-Violent Gang and Terrorist Organization File Immigration and Customs Enforcement-Border Inspection System

Immigration and Customs Enforcement-Border Inspection System

Today an identity thief is often remote from the victim. How does this pose a special problem to law enforcement? Victims often don't care if a person is using their identity in a distant state. Jurisdictional questions often confound local authorities. The federal government can't prosecute identity thieves who work exclusively online. Only a few states have passed laws forbidding Internet-facilitated identity theft and fraud.

Jurisdictional questions often confound local authorities.

Which of the following has been described as a "military-grade cybermissile"? Estonia Orkut Skype Stuxnet

Stuxnet

Which of the following was NOT a factor that made Estonia particularly vulnerable to a cyberattack in 2007? Most of the nation's banking transactions and parliamentary elections are affected through the Internet. Main media outlets could be shut down, effectively isolating residents and preventing them from appealing to a global audience. The nation's nuclear facilities were run on a Windows operating system that was uniquely vulnerable to Stuxnet. The country has an extensive network of free Wi-Fi.

The nation's nuclear facilities were run on a Windows operating system that was uniquely vulnerable to Stuxnet.

What did a Western intelligence service seize from Kamel Daoudi, an al Qaeda computer engineer, during his arrest? a codebook to decrypt e-mails and telephone conversations a pile of hard copies of Google maps used by al Qaeda a codebook for making bombs and bulletproof vests sent as ebooks a list of the names foreign officials targeted by al Qaeda

a codebook to decrypt e-mails and telephone conversations

Which of the following is true regarding keyloggers? They are designed to capture passwords and other private information. They are designed to recover lost work in the case of computer problems. They are designed to use company trademarks to represent a legitimate institution. They are designed for worthwhile goals like parental control.

They are designed to capture passwords and other private information.

Which of the following is true regarding Trojans? They provide a mechanism for cybercriminals to change Web site IP addresses. They are malicious programs that redirect users' network traffic to undesired sites. They record every keystroke, including BIOS passwords, and are undetectable by software. They are potentially unwanted and are often housed with commercial utilities

They are potentially unwanted and are often housed with commercial utilities

Which of the following is true regarding bag operations as a physical method of identity theft? They include sifting through commercial or residential trash or waste for information deemed valuable. They are typically conducted by the host government's security or intelligence services. They are executed by depositing personal documents in unlocked containers on the side of the road until they are retrieved. They involve the creation of shell companies that engage in the collection of personal financial information.

They are typically conducted by the host government's security or intelligence services.

Who among the following define(s) terrorism as an attempt to communicate messages through the use of orchestrated violence? Schmid and Jongman UN Resolution Language Tsfati and Weimann League of Nations Convention

Tsfati and Weimann

Which of the following examples may be classified as identity fraud? You are wrongfully accused of a crime committed by an impostor. Your phone bill reflects long distance charges you did not make. You have documents that helped you illegally immigrate into the country. You use a fake name to make a restaurant reservation.

You have documents that helped you illegally immigrate into the country.

Which of the following physical methods of identity theft involves the surreptitious entry into hotel rooms to steal, photograph, or photocopy documents? bag operations insiders card skimming dumpster diving

bag operations

In which of the following points does a strong dissimilarity between terrorism and organized crime manifest? rules and regulation beliefs and motivation adaptability and resilience punishments for noncompliance

beliefs and motivation

Which of the following is NOT a category of phishing attacks? redirectors pharming botnets spoofing

botnets

Which of the following would NOT be classified under insurance and loan fraud? enrolling in distance education and online courses using fake identities creating multiple accounts with a bank to commit-tax related fraud dropping out of community colleges upon receiving government loans for education obtaining free medical care by procuring a victim's personal information

creating multiple accounts with a bank to commit-tax related fraud

If someone found a lost driver's license and then used it to open multiple bank accounts and commit tax-related fraud, which type of identity theft/fraud was committed? reverse criminal record identity theft criminal record identity theft/fraud virtual identity theft/fraud credit identity theft/fraud

credit identity theft/fraud

Which of the following types of identity theft/fraud is by far the most common and also the most feared by the American public? credit identity theft/fraud assumption of identity theft for employment and/or border entry virtual identity theft/fraud

credit identity theft/fraud

Which of the following types of identity theft/fraud is defined as the use of stolen personal and financial information to facilitate the creation of fraudulent accounts? virtual identity theft/fraud criminal record identity theft/fraud theft for employment and/or border entry credit identity theft/fraud

credit identity theft/fraud

Which of the following groups serve as the basis of the formation of organized crime groups? religious fanatics criminal gangs social activists national terrorists

criminal gangs

Which of the following factors plays a role in the solidification of norms and expectations of the members of an organized crime group? culture and tradition earlier affiliations economy or financial status educational background

culture and tradition

Which of the following, according to a recent report to Congress, has now surpassed international drug trafficking as a terrorist financing enterprise? cargo heists cybercrime weapons manufacturing pornography

cybercrime

Which of the following are most often used fraudulently to obtain immigration benefits? student ID drivers' licenses documentation of residency credit cards

documentation of residency

Paper shredders and disk-wiping software are means to avoid which of the following physical methods of identity theft? mail theft bag operations ATM manipulation dumpster diving

dumpster diving

Which of the following facilitated Muhammad Siddique Khan's coordination of the 2005 London bombings? online training videos electronic dead drops satellite imaging online social networking sites

electronic dead drops

An early evaluation of criminal gangs in New York determined that groups coming together for the sole purpose of committing criminal activity didn't last long if they lacked what? flexible rules and regulations competition money ethnic solidarity

ethnic solidarity

The Visa Waiver Pilot Program (VWPP) caused the most recent surge in which of the following fraudulent activities? credit card fraud immigration benefit fraud alien smuggling trafficking

immigration benefit fraud

Which of the following types of fraud is most likely to involve faked work permits and green cards? insurance fraud identity fraud computer fraud immigration fraud

immigration fraud

Which of the following cybercrimes, traditionally involving real estate transactions and straw purchases, now uses contemporary methods like electronic layering, international commodities, and online businesses? fraud money laundering gambling counterfeiting of currency

money laundering

What type of terrorism is exemplified by the Irish Republican Army and Euzkadi Ta Askatasuna? religious terrorism political-social terrorism environmental terrorism nationalist terrorism

nationalist terrorism

What was the basis of the wide acceptance of tyrannicide during the Age of Absolutism? the writings of Juan de Mariana the ideology of conservation of natural resources the staging of anti-royalty plays in public theaters the assassination of Julius Caesar

the writings of Juan de Mariana

Which of the following attacks involve directing conventional weapons against a computer facility for its transmission lines? electronic attacks electromagnetic attacks physical attacks computer network attacks

physical attacks

Which of the following types of terrorists often openly embrace and promote human suffering, and glorify violence as divine ordination? political terrorists environmental terrorists national terrorists religious terrorists

religious terrorists

An upstanding citizen with no police record, Jonathan discovers that a past acquaintance who's now a career criminal is claiming Jonathan's identity. What form of identity theft/threat is Jonathan a victim of? assumption of identity theft for employment reverse criminal record identity theft credit identity theft/fraud

reverse criminal record identity theft

What is the nature of the criminal activity undertaken by groups such as Darkprofits and Shadowcrew? selling or sharing information about stolen credit cards and bank account numbers smuggling of humans across international borders printing counterfeit denominations of American currency distribution of pornographic films

selling or sharing information about stolen credit cards and bank account numbers

Which of the following refers to the illegal duplication of credit cards achieved by running the card through a reader that captures information stored in the magnetic strip on the back? skimming hacking spamming carding

skimming

Which of the following is the most general problem faced by American law enforcement and government officials who want to eradicate identity fraud/theft? the rise of terrorists and organized crime groups the increasing use of compound surnames the trend toward removing social security numbers from drivers licenses the boundless nature of the Internet

the boundless nature of the Internet

Which of the following is an example of monopolization by an organized crime group? the trade and commerce in Madrid the garbage industry in New York the mass media industry in Beijing the food businesses in Rome

the garbage industry in New York

Which of the following types of identity theft/fraud is a person engaged in if he created a fictitious profile on a social networking site so as to facilitate an extramarital affair? criminal record identity theft/fraud assumption of identity credit or financial theft virtual identity theft/fraud

virtual identity theft/fraud


Kaugnay na mga set ng pag-aaral

3. Physics Practice Questions- Reflection/Refraction/Diffraction & Lenses Easy

View Set

mastering a&p 2 ch. 25 group 4 modules 25.9-25.10 DSM

View Set

APWH, Unit 4 Test, My AP Practice

View Set