Exam 18: Cybercrime and Cyberdeviance

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Which of the following best represents a goal of applying routine activity theory to cybercrimes?

Free
(Multiple Choice)
5.0/5
(42)
Correct Answer:
Verified

A

What would be the intent if one were to engage in a distributed denial-of-service attack (DDoS)?

Free
(Multiple Choice)
4.8/5
(29)
Correct Answer:
Verified

B

Which of the following can best be described as ripping?

Free
(Multiple Choice)
4.9/5
(28)
Correct Answer:
Verified

B

Which of the following can best be described as hacking?

(Multiple Choice)
4.8/5
(46)

Hayward (2012)has noted that the Internet has broken down traditional barriers between life stages bringing about online collisions between groups of people with different value systems.Which of the following scenarios best reflects this statement?

(Multiple Choice)
4.8/5
(42)

What is the name applied to a parallel Internet that exists beneath the surface of conventional browsers,features sites not indexed by search engines,is unregulated,and is rife with criminal activity and illegal transactions?

(Multiple Choice)
4.8/5
(38)

Which of the following crosses the lines of cyberterrorism and cybercrime and could be part of either or both?

(Multiple Choice)
4.9/5
(40)

Phishing is when a fraudster sends an email supposedly from a bank requesting information on the target's bank account,including the password,with the intention of stealing money from that account.

(True/False)
4.8/5
(40)

Cyberdeviance rarely encompasses one or more of the traditional offline paraphilias.

(True/False)
4.8/5
(34)

Which of the following does not represent a critical infrastructure site that would be subject to a cyberterrorist attack?

(Multiple Choice)
4.8/5
(40)

"Soft targets" are those that are weak or vulnerable to cybercriminals.

(True/False)
4.9/5
(32)

What is thought to be the best legal response to cybercrimes?

(Multiple Choice)
4.9/5
(50)

What is the relationship between cyberdeviance and paraphilias?

(Multiple Choice)
4.9/5
(43)

Cyberbullying is one of the most well reported crimes.

(True/False)
4.7/5
(35)

Which of the following terms refers to the use of a network-enabled device to repeatedly make unwanted contact with a person (through emails,text messages,etc.)knowing that this behaviour is likely to cause fear or annoyance?

(Multiple Choice)
4.9/5
(33)

Which of the following terms refer to the use of an Internet connection to access social media,chat rooms,or other places of electronic assembly to make contact with a child or person under 16 to meet for sexual purposes?

(Multiple Choice)
4.8/5
(36)

As of 2015,all police services in Canada had established clear approaches to cybercrime.

(True/False)
4.8/5
(39)

What important theoretical school of thought doesChapter 18 state should be applied to determine where the line between crime and deviance is drawn in online communities?

(Multiple Choice)
4.8/5
(42)

The Lori Drew case clearly outlined the fact that cyberbullying is not a cybercrime.

(True/False)
4.9/5
(50)

Unlike corporations and American government agencies,Canadian government agencies have thus far avoided cyberattacks.

(True/False)
4.8/5
(38)
Showing 1 - 20 of 56
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)