Cyber 2
🇬🇧
In English
In English
Practice Known Questions
Stay up to date with your due questions
Complete 5 questions to enable practice
Exams
Exam: Test your skills
Test your skills in exam mode
Learn New Questions
Popular in this course
Learn with flashcards
Manual Mode [BETA]
The course owner has not enabled manual mode
Other available modes
Cyber 2 - Leaderboard
Cyber 2 - Details
Levels:
Questions:
20 questions
🇬🇧 | 🇬🇧 |
Tricking people handing over sensitive information sometimes described as human hacking | Social engineering |
Mass distribution disguised as institutions | Phishing and spoofing |
Oldest and best-known fraud cons trickster Englishmen to help sister escape from her capterby | Spanish prisoner |
Extraordinary resilience to shut down attempts decentralize fragment internet make it difficult | Peer to peer sharing |
Scope and scale commercial sector reports largest financial loss 52.2 billion dollars | Computer software |
Persons can get paid and turn over coworkers unauthorized software | No piracy program |
Copy right trade secrets and trade marks | Intellectual property encompasses |
Some argue media personal interest generate personal concern Becker | Moral entrepreneurship |
Department of HS bush administration created by Bush in the wake of 911 | Homeland security, Department of HS bush administration created by Bush in the wake of 911 |
Form of hacktivism attempt to ruin online sites form of protest | Website defacement |
Nations critical information infrastructure-telle communications, internet, hardware and software (which is not classified) | Virtual sit-ins and blockades |
Form of hacktivism exposing collection of private info of the person coercing, shame, silence the person | Doxxon & leaking |
Life in prison, cyber terrorist | Computer act of 1986 Patriot act of 2001 |
The exception 10,000$ in damages against government entities threats cyber terrorism | The exception 10,000$ in damages against government entities threats cyber terrorism |
National critical info | 4th answer |