Security And Protective Services Vocabulary #1 Question Preview (ID: 46494)


Security And Protective Services Vocabulary #1. TEACHERS: click here for quick copy question ID numbers.

ICE
a) Department of Homeland Security
b) Trade Secrets
c) Created after the attacks of Sept. 11 to coordinate, oversee, and relay information and conduct investigations for the protec
d) Immigration and Customs Enforcement

The politically motivated use of computers, internet, and information technology to cause severe disruption or widespread fear in society.
a) Exploiting
b) Vulnerability
c) Confidential
d) Cyberterrorism

Use (a situation or person) in an unfair or selfish way.
a) Exploiting
b) ICE
c) Cybercrime
d) Hacker

The quality or state of being exposed to the possibility of being attacked or harmed, either physically or emotionally.
a) Extradition
b) Victim
c) Alleged
d) Vulnerability

Criminal activities carried out by means of computers or the Internet.
a) Hacker
b) Cybercrime
c) Exploiting
d) Cyberterrorism

property owned by a person or company, regarded as having value and available to meet debts, commitments, or legacies. Something of value.
a) Exploiting
b) Hacker
c) Confidential
d) Asset

Created after the attacks of Sept. 11 to coordinate, oversee, and relay information and conduct investigations for the protection of the U.S.
a) Victim
b) Department of Homeland Security
c) Cyber-terrorism
d) ICE

Information intended to be kept secret.
a) Confidential
b) Trade Secrets
c) Vulnerability
d) Cyberterrorism

The action of extraditing a person accused or convicted of a crime. To move them from one legal jurisdiction to another.
a) Department of Homeland Security
b) ICE
c) Extradition
d) Exploiting

A person who carries out a harmful, illegal, or immoral act.
a) Extradition
b) Cybercrime
c) Alleged
d) Perpetrator

a person, business or entity harmed, injured, suffers or killed as a result of a crime, accident, or other event or action of another.
a) Perpetrator
b) Hacker
c) Victim
d) Department of Homeland Security

the person accused, claimed or asserted that has done something illegal or wrong, typically without proof that this is the case.
a) Victim
b) Alleged
c) Victim
d) Exploiting

A person who uses computers to gain unauthorized access to data.
a) Hacker
b) internship
c) Cyberterrorism
d) Cybercrime

A form of intellectual property: information, including a formula, pattern, compilation, program, device, method, technique, or process.
a) Trade Secrets
b) Victim
c) Alleged
d) Asset

Play Games with the Questions above at ReviewGameZone.com
To play games using the questions from above, visit ReviewGameZone.com and enter game ID number: 46494 in the upper right hand corner or click here.

TEACHERS / EDUCATORS
Log In
| Sign Up / Register