Security And Protective Services Vocabulary #1 Question Preview (ID: 46494)
Security And Protective Services Vocabulary #1.
TEACHERS: click here for quick copy question ID numbers.
ICE
a) Department of Homeland Security
b) Trade Secrets
c) Created after the attacks of Sept. 11 to coordinate, oversee, and relay information and conduct investigations for the protec
d) Immigration and Customs Enforcement
The politically motivated use of computers, internet, and information technology to cause severe disruption or widespread fear in society.
a) Exploiting
b) Vulnerability
c) Confidential
d) Cyberterrorism
Use (a situation or person) in an unfair or selfish way.
a) Exploiting
b) ICE
c) Cybercrime
d) Hacker
The quality or state of being exposed to the possibility of being attacked or harmed, either physically or emotionally.
a) Extradition
b) Victim
c) Alleged
d) Vulnerability
Criminal activities carried out by means of computers or the Internet.
a) Hacker
b) Cybercrime
c) Exploiting
d) Cyberterrorism
property owned by a person or company, regarded as having value and available to meet debts, commitments, or legacies. Something of value.
a) Exploiting
b) Hacker
c) Confidential
d) Asset
Created after the attacks of Sept. 11 to coordinate, oversee, and relay information and conduct investigations for the protection of the U.S.
a) Victim
b) Department of Homeland Security
c) Cyber-terrorism
d) ICE
Information intended to be kept secret.
a) Confidential
b) Trade Secrets
c) Vulnerability
d) Cyberterrorism
The action of extraditing a person accused or convicted of a crime. To move them from one legal jurisdiction to another.
a) Department of Homeland Security
b) ICE
c) Extradition
d) Exploiting
A person who carries out a harmful, illegal, or immoral act.
a) Extradition
b) Cybercrime
c) Alleged
d) Perpetrator
a person, business or entity harmed, injured, suffers or killed as a result of a crime, accident, or other event or action of another.
a) Perpetrator
b) Hacker
c) Victim
d) Department of Homeland Security
the person accused, claimed or asserted that has done something illegal or wrong, typically without proof that this is the case.
a) Victim
b) Alleged
c) Victim
d) Exploiting
A person who uses computers to gain unauthorized access to data.
a) Hacker
b) internship
c) Cyberterrorism
d) Cybercrime
A form of intellectual property: information, including a formula, pattern, compilation, program, device, method, technique, or process.
a) Trade Secrets
b) Victim
c) Alleged
d) Asset
Play Games with the Questions above at ReviewGameZone.com
To play games using the questions from above, visit ReviewGameZone.com and enter game ID number: 46494 in the upper right hand corner or click here.
To play games using the questions from above, visit ReviewGameZone.com and enter game ID number: 46494 in the upper right hand corner or click here.
TEACHERS / EDUCATORS
Log In | Sign Up / Register
Log In | Sign Up / Register