Podcast
Questions and Answers
What is the term for registering a domain name that is identical or confusingly similar to a well-known trademark and then demanding a ransom payment from the trademark owner to relinquish the domain?
What is the term for registering a domain name that is identical or confusingly similar to a well-known trademark and then demanding a ransom payment from the trademark owner to relinquish the domain?
- Cracking
- Cybersquatting (correct)
- Eavesdropping
- Doxing
What type of computer crime occurs when a hacker intercepts, deletes, or modifies data that is transmitted between two devices?
What type of computer crime occurs when a hacker intercepts, deletes, or modifies data that is transmitted between two devices?
- Cyberterrorism
- Cryptojacking
- Eavesdropping (correct)
- Denial of services
Which computer crime involves mining for valuable online currencies like Bitcoin?
Which computer crime involves mining for valuable online currencies like Bitcoin?
- Drive-by attacks
- Cyberbullying
- Doxing
- Cryptojacking (correct)
What is the term for getting into computer systems in order to steal, corrupt, or illegitimately view data?
What is the term for getting into computer systems in order to steal, corrupt, or illegitimately view data?
Which type of computer crime occurs when the user navigates to and browses a compromised web page?
Which type of computer crime occurs when the user navigates to and browses a compromised web page?