This study source was downloaded by 100000802832151 from CourseHero.com on 11-11-2022 04:27:28 GMT -06:00https://www.coursehero.com/file/64536733/Private-Security-CJ450-Exam-8docx/ Private Security (CJ450) Exam 8: 95/100 - 95 %Question 1Downloading music illegally is an example of which crime?Question options:CyberterrorismCybercrimeHackingCyberspaceQuestion 5 / 5 pointsCollections of software tools that enable administrators to access a computer or computer network are called:Question options:rootkits.anti-malware.ransomware.cryptolocker.Question 5 / 5 pointsThe key to any collaboration effort is:Question options:standards and guidelines.protocols and procedures.communication.mutual respect.Question 5 / 5 pointsHackers who have a criminal intent to harm information systems are called:Question options:crackers.hacktivists.This study source was downloaded by 100000802832151 from CourseHero.com on 11-11-2022 04:27:28 GMT -06:00https://www.coursehero.com/file/64536733/Private-Security-CJ450-Exam-8docx/Private Security (CJ450) Exam 8: 95/100 - 95 %phishers.crypto-lockerists.Question 5 / 5 pointsThe set of legal and ethical methods for collecting, developing, analyzing, and disseminating actionable information pertaining to competitors is called:Question options:competitive edge.competitive intelligence.anti-trust competition.information analysis.Question 5 / 5 pointsA kind of malware (malicious software) that criminals install or trick computer users into installing on computers so they can lock it from a remotelocation is called:Question options:rootkits.anti-malware.ransomware.crypto-locker.Question 5 / 5 pointsThe use of the Internet for terrorist activities includes:Question options:hacking networks and stealing credit card information.large-scale acts of deliberate disruption of computer networks.the attack of personal computer systems.the use of malware to