Answered step by step
Verified Expert Solution
Link Copied!

Question

...
1 Approved Answer

Question 12(2 points) Personal data, including credit histories, for over 160,000 people were stolen from ChoicePoint.What technique did the thieves use? Question 12 options: Hackers

Question 12(2 points)

Personal data, including credit histories, for over 160,000 people were stolen from ChoicePoint.What technique did the thieves use?

Question 12 options:

Hackers exploited a vulnerability in the server's operating system that gave them root access

An employee downloaded a screen saver from the Internet that had a Trojan Horse

A fraud ring posing as legitimate businesses set up dozens of accounts with ChoicePoint and bought the data

All of the above

Question 13(2 points)

The patriot act

Question 13 options:

Suspended the FBI ability to search records like phones, emails and ISP records

Expanded the FBI right to search issue National Security letters

Expanded powers of the Senators of the majority party only

Allows Governors to search any electronic records of the citizens of its state.

Question 14(2 points)

Omar sends Nell an e-mail ad touting software that will cloak its user in "the anonymity of the Internet." Nell pays Omar for the software, which is never delivered to her. This is online

Question 14 options:

auction fraud.

puffery.

retail fraud.

frustration but not fraud.

Question 15(2 points)

In cyberspace, Gene attempts to steal consumers' credit card numbers stored in the networked computers of Prevention Corporation, a financial payments service provider. The quantity of data that can be stolen is limited by

Question 15 options:

the distance between the computers of The parties.

the discrepancy in time between the locations of Parties.

the speed of the connection between the computers of The parties .

the same physical limits that exist in the "real" world.

Question 16(2 points)

Posing as Express credit card, Mary e-mails Sally , asking her to update her personal banking information through a link in the e-mail. She clicks on the link and types in the data, which Mary promptly sells to Brian This is

Question 16 options:

cyber stalking.

employment fraud.

phishing.

vishing.

Question 17(2 points)

Pretending to be Joan, Jill makes provocative comments online that deceive others into threatening Joan, putting her in reasonable fear for her safety. Under federal law, this is

Question 17 options:

a crime only if a person who believes the comments acts on them.

a crime only if The parties are in the same jurisdiction.

not a crime.

a crime.

Question 18(2 points)

Ryan uses his computer to secretly install software on thousands of personal computers without their owners' knowledge. The program can reproduce itself and spread from one computer to another via any USB port. This program is

Question 18 options:

a hacker.

a bot.

a virus.

a worm.

Question 19(2 points)

Problems and side effects of offshoring include which of the following?

Question 19 options:

Increase in immigration applications from foreign citizens

Need for additional skills on the part of some foreign technical employees

Difficulty understanding foreign accents of some customer service representatives

Increased costs such as workers' compensation and social security taxes

Question 20(2 points)

A(n) ________ uniquely identifies an individual's or company's website.

Question 20 options:

eSignature

digital footprint

eMail address

domain name

Question 21(2 points)

An e-contract can be defined as:

Question 21 options:

any contract formed between merchants involved in e-commerce, regardless of whether the contract is formed online or offline.

any contract formed electronically, such as over the Internet.

an electronic contract formed between merchants only.

an electronic contract formed between a merchant and a consumer.

Question 22(2 points)

A shrink-wrap agreement is one whose terms are:

Question 22 options:

disclosed on the outside of a shrink-wrapped product so that the buyer can review them before purchasing the product.

typically favorable to the buyer so that the seller does not have to contend with returned, unwrapped packages.

found inside a box in which the goods are packaged.

an agreement wrapped in a plastic substance.

Question 23(2 points)

"Click-on" agreements, which arise when parties click Web site boxes stating "I agree" or "I accept" with respect to the terms of an online offer, are:

Question 23 options:

never enforceable, regardless of the circumstances.

always enforceable, regardless of the circumstances.

enforceable, depending on the circumstances.

enforceable, but only if the buyers agree to their enforceability.

Question 24(2 points)

eSignature technologies do not include which of the following:

Question 24 options:

Digital signatures

Signature dynamics

Symmetric cryptosystems

Smart cards

Question 25(2 points)

Pretending to be a representative of Prevention Company, Gary e-mails Spencer, a job seeker, asking him to forward personal banking information so that if he is hired, payroll checks can be deposited directly into his account. Gary supplies the data, which Gary promptly sells to Corbin. This is

Question 25 options:

cyber stalking.

employment fraud.

phishing.

vishing.

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access with AI-Powered Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Statistics For Engineers And Scientists

Authors: William Navidi

3rd Edition

9780073376332

Students also viewed these Law questions

Question

L A -r- P[N]

Answered: 1 week ago