CyberSecurity Quizlet Test
The creation of a fake account may be evidence of intent or purpose by the offender. p. 58
True
The general advice given out by police includes "Don't engage in retaliation with the bully
True
The term "social media" describes websites, applications, media, and online communication platforms that facilitate human interaction.
True
To be effective, an investigator must always prepare a search plan prior to conducting an investigation in social media
True
The 3 steps to retail credit card transactions are: a) Authorization, Capture and Settlement b) Authorization, Capture, Selling c) Authorization, Collection and Settlement d) Authorization, Collection and Selling
a) Authorization, Capture and Settlement
Mirai is what type of Malware? a) Bots b) Ransomware c) Worms d) Adware
a) Bots
What does POS stand for in the context of retail? a) Point-of-sale b) Purchase-or-sell c) Protect-or-Secure d) Popcorn-or-Soda
a) Point-of-sale
Which of the following is a type of program that either pretends to have, or is describe as having, a set of useful or desirable features but actually contains damaging code. a) Trojans b) Viruses c) Worm d) Adware
a) Trojans
"PII" or "personally identifiable information" is best described as a. Any information that can be used to identify an individual. b. Only information that pertains to financial information such as bank accounts or credit cards. c. Information about your name, address, telephone or mobile number, and email address. d. Any information as defined by the Privacy Act
a. Any information that can be used to identify an individual.
In the case of libel, if a statement about the person is true, it remains an offence to publish the statement
True
Online fraud frequently occurs via "money mules."
True
The Canadian legal system recognizes a computer as both an object of crime as well as a storage container for evidence of a crime
True
An MLAT is required when law enforcement needs to gather information from another province in Canada.
False
Cyberbullying usually only affects teenagers or younger children.
False
Cybercrime is only defined as an old crime committed in modern ways
False
Cybercriminals know that computers are the weakest link in cybersecurity.
False
The RCMP are responsible for establishing a national framework for cybersecurity in Canada
False
The Competition Act prohibits deceptive telemarketing in the form of mass communications of false or misleading information by email or text.
True
List 3 common fraud schemes?
Lottery Scam Roman Scam Tax Scam
Slander" is best described as: a. Written information that causes harm to a person. b. Spoken information that causes harm to a person. c. Published records claiming false information about a person. d. Misinformation posted publicly on the Internet
Published records claiming false information about a person.
Cybercrime awareness and prevention are critical to being proactive.
True
In cases dealing with issues like ransomware and revenge porn people often seek help from private computer services and private investigators.
True
1. Which Criminal Code offence is most often associated with cyberbullying? p. 54 a. Harassing communications, section 241 b. Theft, section 334 c. Attempted murder, section 269 d. Corruptly accept reward, section 142
a. Harassing communications, section 241
What is the weakest link in cybersecurity a. Humans b. Government c. Antiquated laws d. Internet service providers
a. Humans
When it comes to collecting and protecting computer-based electronic evidence, what are two key factors. a. Preservation and lawful authority b. Time and expertise c. Legal reasons and connectivity d. Authority and powering off the device
a. Preservation and lawful authority
Police are often asked to offer advice about sexting. Which statement is a key point they should use. a. Sexting is not a normal part of growing up today b. Sexting is only illegal when minors are involved c. Sexting is not illegal if both parties consented to sharing the images d. Sexting only occurs when the image is uploaded to a public website
a. Sexting is not a normal part of growing up today
Which of the following is a software that once installed on your computer, tracks your internet browsing habits and sends you popups containing advertisements related to the sites and topics you've visited? a) Backdoors b) Adware c) Malwares d) Spywares
b) Adware
How can you tell if a website encrypts its traffic? a) Google it b) Look for the lock symbol in a URL c) All websites encrypt their traffic d) Encrypted sites take longer to load
b) Look for the lock symbol in a URL
Select the best answer. You prepared a report and sending it to your supervisor for her feedback. Select from the list below the file format that has the highest potential for preserving integrity. a) Text format b) PDF format c) MS Word format d) HTML format
b) PDF format
When investigating an incident of sextortion, law enforcement should. a. Notify Interpol because it's likely someone overseas b. Have the victim contact the offender so they can see for themselves c. Assess the situation to ensure the victim is not at risk of suicide or self-harm d. Notify the victim's family if it involves a minor
c. Assess the situation to ensure the victim is not at risk of suicide or self-harm
Two key multidisciplinary approaches to combatting cybercrime are. a. Enforcement and training b. Investigation and enforcement c. Awareness and prevention d. Education and research
c. Awareness and prevention
What does the acronym EXIF stand for? a. External Information Format b. Exchangeable Image Format c. Exchangeable Image File d. External Image File
c. Exchangeable Image File
Malware 13: What is the software called which when gets downloaded on computer scans your hard drive for personal information and your internet browsing habits. a) Backdoors b) Keyloggers c) Antiware d) Spyware
d) Spyware
Which of the following can be considered a cybercrime in Canada. a. Hate crimes b. Possession of child pornography c. Theft d. All of the above
d. All of the above
Which of the following may intercept and use you messages for their own purpose? a) News outlets b) Governments c) Advertising agencies d) Crime rings e) All of these Answers
e) All of these Answers
In Canada, there is no such offence as "cyberbullying." Other offences are used to prosecute offenders.
false
In order to seize a computer, police must always have a warrant
true
Intelligence" and "information" collected by police covertly are different things
true
It is considered a "best practice" to document or photograph all steps taken when seizing a digital device.
true
The term "tracking data" simply means data that relate to the location of a transaction, an individual, or a thing.
true
In Canada, what are some of the types of cybercrime investigated by law enforcement?
· Pirated films · drugs · stolen credit card data