Docsity
Docsity

Prepare for your exams
Prepare for your exams

Study with the several resources on Docsity


Earn points to download
Earn points to download

Earn points by helping other students or get them with a premium plan


Guidelines and tips
Guidelines and tips

Alberta Security Chapters 8 Questions with Verified Answers,100% CORRECT, Exams of Business Economics

Alberta Security Chapters 8 Questions with Verified Answers

Typology: Exams

2023/2024

Available from 07/20/2024

paul-kamau-2
paul-kamau-2 🇺🇸

2.7

(3)

3.3K documents

1 / 10

Toggle sidebar

Related documents


Partial preview of the text

Download Alberta Security Chapters 8 Questions with Verified Answers,100% CORRECT and more Exams Business Economics in PDF only on Docsity!

Alberta Security Chapters 8-11 Exam 104 Questions with

Verified Answers

Which of the following sites was not identified as being one of the popular alternatives in the darknet? - CORRECT ANSWER Milky Way ______ may use ToR for competitions, keeping strategies secret, and internal accountability. - CORRECT ANSWER Businesses Activists may utilize ToR to protect communications, investigations, and intelligence. - CORRECT ANSWER True According to the text, deep web sites can include all of the following EXCEPT: - CORRECT ANSWER websites that are searchable Which of the following constitutional Amendments established the right to freedom of speech? - CORRECT ANSWER First Solving complex mathematical puzzles every 10 minutes is a task usually seen with ______. - CORRECT ANSWER mining Which of the following is NOT considered a portal of the darknet? - CORRECT ANSWER Safari Sites on the ToR network end in ______, but if you were to type the web address into Google, the website would not be found. - CORRECT ANSWER .onion According to the text, some of the most popular products advertised on the hidden wiki are ______. - CORRECT ANSWER drugs The Darknet Silk Road runs like a black market ______ site for drugs, drug paraphernalia, and other goods and services. - CORRECT ANSWER eBay-type

Surface websites use ______ to browse the web in a systematic and automated manner. - CORRECT ANSWER crawlers Two of the most popular forms of cryptocurrency are ______. - CORRECT ANSWER bitcoin and dash Protection against unwarranted search and seizure is a constitutional protection given by the ______. - CORRECT ANSWER Fourth Amendment On November 6, 2014, law enforcement collaborating together and coordinated via Europol took down multiple darknet drug marketplaces, including Silk Road 2.0, in an operation referred to as ______. - CORRECT ANSWER Operation Onymous Which of the following was NOT identified in the text as an example of a research tool and database located on the deep web? - CORRECT ANSWER LexisNexis On the darknet, prices are listed in ______ and are shipped to remote addresses or P.O. boxes. - CORRECT ANSWER Bitcoins Dash eliminates this security issue by implementing a two-tier security network. - CORRECT ANSWER True The deep web, which is not accessible through traditional search engines, is sometimes referred to as the ______. - CORRECT ANSWER deep net ______ was originally developed by the U.S. Naval Research Laboratory as a method of anonymous communication. - CORRECT ANSWER Onion Router (ToR) Which of the following types of cryptocurrency claims to improve on bitcoins by offering an enhanced level of security? - CORRECT ANSWER dash Which of the following differential association theory points was not proposed by Edwin Sutherland? - CORRECT ANSWER Behavior is learned the best in larger social groups.

The first responders to most catastrophic events are usually at the ______ level. - CORRECT ANSWER Local The role of local-level agencies in cybersecurity is constantly evolving. - CORRECT ANSWER True Albert K. Cohen's subculture theory propositions are based on ______. - CORRECT ANSWER delinquent boys Public-private partnerships are not necessary for the cybersecurity of our nation. - CORRECT ANSWER False Asserting that criminal behavior is learned via intimate personal groups is a premise for ______. - CORRECT ANSWER differential association theory Entities that have resources to put toward security and may not be subjected to the scrutiny and restrictions are usually in the ______. - CORRECT ANSWER private sector According to the text, low socioeconomic status is a predominate marker for engaging in crime in ______. - CORRECT ANSWER subculture theory In the 1950s and 1960s, subculture theories began to examine the prevalence of ______. - CORRECT ANSWER youth gangs According to the routine activities theory, crime is more likely to occur if there is ______. - CORRECT ANSWER suitable targer Within criminal justice and criminology, subcultures may include the prison subculture, the criminal subculture, the courtroom working group, etc. - CORRECT ANSWER true Systems utilized by many of the nation's critical infrastructures to provide automated control of the functions of the infrastructure are referred to as ______. - CORRECT ANSWER supervisory control and data acquisition systems

Outsiders in the hacker subculture who do not have the skills and use prewritten programs are referred to as ______. - CORRECT ANSWER script kiddies Undocumented, nonmalicious, surprises installed on a program by the creator are referred to as - CORRECT ANSWER easter eggs The leading agency for investigating cyberattacks by criminals, overseas adversaries, and terrorists is known as the ______. - CORRECT ANSWER Federal Bureau of Investigation The idea that people learn to behave in certain ways based on imitating the behavior of those they are close to applies to only conventional behaviors. - CORRECT ANSWER false Traditional crimes occur in a specific location/jurisdiction(s) and are thus subjected to the rule of law of that specific jurisdiction. - CORRECT ANSWER true Cybercrimes operate in a virtual environment, with undefined and specific jurisdictions. - CORRECT ANSWER true Which of the following was NOT identified as an entity that must collaborate and cooperate in order to enhance cyberterrorism deterrence? - CORRECT ANSWER free internet service providers Edward Snowden, who released classified information about the U.S. government, found asylum in _______, which has declined to extradite Snowden.

  • CORRECT ANSWER Russia The _______ provided the basis for a comprehensive cyber security strategy. - CORRECT ANSWER Comprehensive National Cybersecurity Initiative A holistic approach integrates all of the following factors EXCEPT - CORRECT ANSWER environmental The ______ has the responsibility to coordinate federal, state, and local governments, laboratories, critical infrastructure owners and operators, and other entities to accomplish goals pertinent to the National Cybersecurity and

Critical Infrastructure Protection Act of 2014 - CORRECT ANSWER secretary of state A holistic approach to cybersecurity involves cooperation between - CORRECT ANSWER industries, lawmakers, and cybersecurity specialists This difference in _________ convictions greatly hampers the development of universal enforcement rules. - CORRECT ANSWER all of these The uncontrollable nature of ______ poses great challenges to coordinating effective federal and state law enforcement responses to cyberattacks and terrorist acts. - CORRECT ANSWER social media The Cybersecurity Information Sharing Act of 2015 calls for the cooperation of all of the following EXCEPT the - CORRECT ANSWER president Some people have suggested applying the ______ to cybercrimes, because they are similar in that there is often no clear jurisdiction. - CORRECT ANSWER Law of the Sea In 2016 a massive denial-of-service attack brought down much of the Internet in Europe and the United States. The attack used a - CORRECT ANSWER botnet ______ has become one of the most feared threats to cybersecurity. - CORRECT ANSWER Ransomware In 2016, the European Union passed the ______ establishing the first actual cybersecurity rules. - CORRECT ANSWER Network and Information Security Directive Jeopardizing the security, integrity, confidentiality, or availability of an information system or network or any information stored on, processed on, or transiting such a system is also referred to as a - CORRECT ANSWER cyberincident The _______ requires the secretary of homeland security to assess the work of the cybersecurity workforce of the Department of Homeland Security and

develop a comprehensive strategy to improve the readiness and quality of the cybersecurity workforce. - CORRECT ANSWER Cybersecurity Workforce Act 2014 The ______ creates a cybersecurity information sharing system for public and private entities. - CORRECT ANSWER Cybersecurity Information Sharing Act of 2015 Telephonic activities were defined much broader than most people would have expected by the - CORRECT ANSWER National Security Agency The ________ proved to be symbolic legislation that assures the public that the international community is taking steps to combat cybercrime and the treat of a cyberwar. - CORRECT ANSWER Budapest Convention on Cybersecurity The _______ gives government the authority to collect content records related to telephonic activities. - CORRECT ANSWER USA PATRIOT Act A cybercall is defined as an incident, or an attempt to cause an incident, that if successful would deny access to or degrade, disrupt, or destruct such a system or network. - CORRECT ANSWER false A health tracker is an example of a device that can be used in the _______ technique. - CORRECT ANSWER Man-in-the-loT The ______ provided the basis for a comprehensive cyber security strategy. - CORRECT ANSWER Comprehensive National Cybersecurity Initiative The U.S. Foreign Intelligence Surveillance Court is a secret court. - CORRECT ANSWER true Taking a computer or device hostage until the owner pays a ransom is referred to as ransomware. - CORRECT ANSWER true The Cybersecurity Information Sharing Act of 2015 calls for the cooperation of all of the following EXCEPT the ______. - CORRECT ANSWER president

Assessing critical assets that need to be protected, such as trade secrets to determine what receives the highest priority, is a component of ______. - CORRECT ANSWER identifying sensitive information The ______ prohibited the bulk collection of digital information. - CORRECT ANSWER US Freedom Act The main purpose of national cybersecurity policies is to develop a comprehensive strategy to prevent and mitigate cyberattacks. - CORRECT ANSWER true Attribution is a problem that governments across the globe face when such attacks occur. - CORRECT ANSWER true In 2016 a massive denial-of-service attack brought down much of the Internet in Europe and the United States. The attack used a ______. - CORRECT ANSWER botnet The ______ enables the secretary of homeland security to conduct cybersecurity activities that will defend, mitigate, respond to, or recover from cyberincidents to critical infrastructures. - CORRECT ANSWER National Cybersecurity and Critical Infrastructure Protection Act of 2014 This difference in ______ convictions greatly hampers the development of universal enforcement rules. - CORRECT ANSWER all of these holistic approach emphasizes that neither technology nor policies in themselves can effectively address the myriad of cyberthreats. - CORRECT ANSWER true Which of the following critical infrastructures was NOT a focus of the Network and Information Security Directive? - CORRECT ANSWER education The holistic approach emphasizes that technology and policies can effectively address the myriad of cyberthreats. - CORRECT ANSWER false

A fraudulent or malicious practice in which communication is sent from an unknown source disguised as a source known to the receiver is referred to as ______. - CORRECT ANSWER spoofing E-mail spoofing is used for which of the following campaigns? - CORRECT ANSWER spam and phishing A radio frequency transmitter that blocks the communication between cell phones and text messages is referred to as a ______. - CORRECT ANSWER GPS Jammer With increased digitalization of our personal information, the integrity of our data is at low risk. - CORRECT ANSWER false In ______ scams, criminals intercept e-mails between two businesses or a private person and a business and direct the purchasing party to send the payment for the product to a new bank account. - CORRECT ANSWER man-in-the-middle Spoofing cannot be used to manipulate the stock market. - CORRECT ANSWER false E-mail spoofing is the least common type of spoofing. - CORRECT ANSWER false The country with the best known and most discussed censorship is ______. - CORRECT ANSWER China Which of the following was NOT identified as a warning sign of money mule schemes? - CORRECT ANSWER The position has a specific job description. Criminals can use GPS spoofing as a tool by creating false GPS signals. This is possible because the real GPS signals are very weak because satellites are far away. - CORRECT ANSWER true The government of Japan forced Google to reshoot street-level views because the images were enabling viewers to look inside the houses. - CORRECT ANSWER true

In 2010, the Dodd-Frank Act made spoofing a(n) ______, but it has been difficult to prosecute spoofers. - CORRECT ANSWER felony crime Authoritarian governments are not the only ones that manipulate the facts and block websites. - CORRECT ANSWER true Which of the following companies have fallen victim to cybercriminals in recent years? - CORRECT ANSWER all of these One of the latest trends is data mining and data brokerage. - CORRECT ANSWER true According to Moore's law, the growth in the information technology is exponential, such as ______ - CORRECT ANSWER 1, 2, 4, 8, 16, 32 Which of the following was identified as one of the main tools used by criminals? - CORRECT ANSWER gps jammer Google and Twitter are among the biggest data collection agencies. - CORRECT ANSWER true One such tool used to manipulate data and people is censorship. - CORRECT ANSWER true The forgery of an e-mail header pretending to be a legitimate sender like a business or friend scamming the receiver into opening the e-mail and downloading malicious software or responding to a solicitation is an example of ______. - CORRECT ANSWER e-mail spoofing The ________ layer of cyberspace is best described as where the platform nature of the Internet is defined and created. - CORRECT ANSWER logic _________ is a global system of interconnected computer networks that are set up to exchange various types of data. - CORRECT ANSWER The Internet Which of the following is comparable to the address you would put on a letter to tell the postal service to deliver a letter to? - CORRECT ANSWER URL

Internet users generally struggle with identifying when their computer has been attacked. In order to quickly respond to a cyberattack on their system, a user would have to be able to overcome which of the following Internet threats? - CORRECT ANSWER 1s and 0s Whereas in the past criminals had to physically approach their victims to carry out a crime, the Internet allows offenders to be in other states, or even continents, and still carry out the same crime. This best represents which of the following vulnerabilities of the Internet? - CORRECT ANSWER time and space __________ is a service that can be accessed via the Internet. - CORRECT ANSWER World Wide Web The Internet was originally guilt to be a free and open source, with minimal oversight. - CORRECT ANSWER True Development of the _______ resolved issues with hierarchical host names making it easier for the average person to access the Internet. - CORRECT ANSWER DNS All of the following are layers of cyberspace EXCEPT - CORRECT ANSWER social layer The inventors of the Internet likely didn't consider _______ during its development. - CORRECT ANSWER criminal abuse of the Internet Criminal knowledge that their efforts will likely lead to success because there are so many potential victims and so few barriers or oversight online best describes which Internet gateway to vulnerability? - CORRECT ANSWER asymmetries of cyberspace