Security And Protective Services Vocabulary #1 Question Preview (ID: 46494)


Security And Protective Services Vocabulary #1. TEACHERS: click here for quick copy question ID numbers.

A form of intellectual property: information, including a formula, pattern, compilation, program, device, method, technique, or process.
a) Trade Secrets
b) Victim
c) Alleged
d) Asset

a person, business or entity harmed, injured, suffers or killed as a result of a crime, accident, or other event or action of another.
a) Perpetrator
b) Hacker
c) Victim
d) Department of Homeland Security

the person accused, claimed or asserted that has done something illegal or wrong, typically without proof that this is the case.
a) Victim
b) Alleged
c) Victim
d) Exploiting

A person who carries out a harmful, illegal, or immoral act.
a) Extradition
b) Cybercrime
c) Alleged
d) Perpetrator

Information intended to be kept secret.
a) Confidential
b) Trade Secrets
c) Vulnerability
d) Cyberterrorism

The action of extraditing a person accused or convicted of a crime. To move them from one legal jurisdiction to another.
a) Department of Homeland Security
b) ICE
c) Extradition
d) Exploiting

Created after the attacks of Sept. 11 to coordinate, oversee, and relay information and conduct investigations for the protection of the U.S.
a) Victim
b) Department of Homeland Security
c) Cyber-terrorism
d) ICE

property owned by a person or company, regarded as having value and available to meet debts, commitments, or legacies. Something of value.
a) Exploiting
b) Hacker
c) Confidential
d) Asset

Criminal activities carried out by means of computers or the Internet.
a) Hacker
b) Cybercrime
c) Exploiting
d) Cyberterrorism

The quality or state of being exposed to the possibility of being attacked or harmed, either physically or emotionally.
a) Extradition
b) Victim
c) Alleged
d) Vulnerability

Use (a situation or person) in an unfair or selfish way.
a) Exploiting
b) ICE
c) Cybercrime
d) Hacker

The politically motivated use of computers, internet, and information technology to cause severe disruption or widespread fear in society.
a) Exploiting
b) Vulnerability
c) Confidential
d) Cyberterrorism

ICE
a) Department of Homeland Security
b) Trade Secrets
c) Created after the attacks of Sept. 11 to coordinate, oversee, and relay information and conduct investigations for the protec
d) Immigration and Customs Enforcement

A person who uses computers to gain unauthorized access to data.
a) Hacker
b) internship
c) Cyberterrorism
d) Cybercrime

Play Games with the Questions above at ReviewGameZone.com
To play games using the questions from above, visit ReviewGameZone.com and enter game ID number: 46494 in the upper right hand corner or click here.

TEACHERS / EDUCATORS
Log In
| Sign Up / Register