CyberSecurity Quizlet Test

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

The creation of a fake account may be evidence of intent or purpose by the offender. p. 58

True

The general advice given out by police includes "Don't engage in retaliation with the bully

True

The term "social media" describes websites, applications, media, and online communication platforms that facilitate human interaction.

True

To be effective, an investigator must always prepare a search plan prior to conducting an investigation in social media

True

The 3 steps to retail credit card transactions are: a) Authorization, Capture and Settlement b) Authorization, Capture, Selling c) Authorization, Collection and Settlement d) Authorization, Collection and Selling

a) Authorization, Capture and Settlement

Mirai is what type of Malware? a) Bots b) Ransomware c) Worms d) Adware

a) Bots

What does POS stand for in the context of retail? a) Point-of-sale b) Purchase-or-sell c) Protect-or-Secure d) Popcorn-or-Soda

a) Point-of-sale

Which of the following is a type of program that either pretends to have, or is describe as having, a set of useful or desirable features but actually contains damaging code. a) Trojans b) Viruses c) Worm d) Adware

a) Trojans

"PII" or "personally identifiable information" is best described as a. Any information that can be used to identify an individual. b. Only information that pertains to financial information such as bank accounts or credit cards. c. Information about your name, address, telephone or mobile number, and email address. d. Any information as defined by the Privacy Act

a. Any information that can be used to identify an individual.

In the case of libel, if a statement about the person is true, it remains an offence to publish the statement

True

Online fraud frequently occurs via "money mules."

True

The Canadian legal system recognizes a computer as both an object of crime as well as a storage container for evidence of a crime

True

An MLAT is required when law enforcement needs to gather information from another province in Canada.

False

Cyberbullying usually only affects teenagers or younger children.

False

Cybercrime is only defined as an old crime committed in modern ways

False

Cybercriminals know that computers are the weakest link in cybersecurity.

False

The RCMP are responsible for establishing a national framework for cybersecurity in Canada

False

The Competition Act prohibits deceptive telemarketing in the form of mass communications of false or misleading information by email or text.

True

List 3 common fraud schemes?

Lottery Scam Roman Scam Tax Scam

Slander" is best described as: a. Written information that causes harm to a person. b. Spoken information that causes harm to a person. c. Published records claiming false information about a person. d. Misinformation posted publicly on the Internet

Published records claiming false information about a person.

Cybercrime awareness and prevention are critical to being proactive.

True

In cases dealing with issues like ransomware and revenge porn people often seek help from private computer services and private investigators.

True

1. Which Criminal Code offence is most often associated with cyberbullying? p. 54 a. Harassing communications, section 241 b. Theft, section 334 c. Attempted murder, section 269 d. Corruptly accept reward, section 142

a. Harassing communications, section 241

What is the weakest link in cybersecurity a. Humans b. Government c. Antiquated laws d. Internet service providers

a. Humans

When it comes to collecting and protecting computer-based electronic evidence, what are two key factors. a. Preservation and lawful authority b. Time and expertise c. Legal reasons and connectivity d. Authority and powering off the device

a. Preservation and lawful authority

Police are often asked to offer advice about sexting. Which statement is a key point they should use. a. Sexting is not a normal part of growing up today b. Sexting is only illegal when minors are involved c. Sexting is not illegal if both parties consented to sharing the images d. Sexting only occurs when the image is uploaded to a public website

a. Sexting is not a normal part of growing up today

Which of the following is a software that once installed on your computer, tracks your internet browsing habits and sends you popups containing advertisements related to the sites and topics you've visited? a) Backdoors b) Adware c) Malwares d) Spywares

b) Adware

How can you tell if a website encrypts its traffic? a) Google it b) Look for the lock symbol in a URL c) All websites encrypt their traffic d) Encrypted sites take longer to load

b) Look for the lock symbol in a URL

Select the best answer. You prepared a report and sending it to your supervisor for her feedback. Select from the list below the file format that has the highest potential for preserving integrity. a) Text format b) PDF format c) MS Word format d) HTML format

b) PDF format

When investigating an incident of sextortion, law enforcement should. a. Notify Interpol because it's likely someone overseas b. Have the victim contact the offender so they can see for themselves c. Assess the situation to ensure the victim is not at risk of suicide or self-harm d. Notify the victim's family if it involves a minor

c. Assess the situation to ensure the victim is not at risk of suicide or self-harm

Two key multidisciplinary approaches to combatting cybercrime are. a. Enforcement and training b. Investigation and enforcement c. Awareness and prevention d. Education and research

c. Awareness and prevention

What does the acronym EXIF stand for? a. External Information Format b. Exchangeable Image Format c. Exchangeable Image File d. External Image File

c. Exchangeable Image File

Malware 13: What is the software called which when gets downloaded on computer scans your hard drive for personal information and your internet browsing habits. a) Backdoors b) Keyloggers c) Antiware d) Spyware

d) Spyware

Which of the following can be considered a cybercrime in Canada. a. Hate crimes b. Possession of child pornography c. Theft d. All of the above

d. All of the above

Which of the following may intercept and use you messages for their own purpose? a) News outlets b) Governments c) Advertising agencies d) Crime rings e) All of these Answers

e) All of these Answers

In Canada, there is no such offence as "cyberbullying." Other offences are used to prosecute offenders.

false

In order to seize a computer, police must always have a warrant

true

Intelligence" and "information" collected by police covertly are different things

true

It is considered a "best practice" to document or photograph all steps taken when seizing a digital device.

true

The term "tracking data" simply means data that relate to the location of a transaction, an individual, or a thing.

true

In Canada, what are some of the types of cybercrime investigated by law enforcement?

· Pirated films · drugs · stolen credit card data


संबंधित स्टडी सेट्स

ECON 202 Exam 3: Chapter 9, 10, 11, 12 Wiggins Meer

View Set

Nursing Assessment and Care of Patients with Endocrine Disorders > Level- 4: Confident - NUPN 1510

View Set

cob 487: midterm question 15: transaction costs and vertical integration

View Set

All- PRACTICAL Application Case Review

View Set

Ch. 8 - Master Budgeting - ACCT 2302

View Set