Exam 1: Introduction and Overview of Computer Forensics and Cybercrime
Exam 1: Introduction and Overview of Computer Forensics and Cybercrime62 Questions
Exam 2: Computer Terminology and History62 Questions
Exam 3: Traditional Computer Crime: Early Hackers and Theft of Components62 Questions
Exam 4: Contemporary Computer Crime63 Questions
Exam 5: Identity Theft and Identity Fraud62 Questions
Exam 6: Terrorism and Organized Crime62 Questions
Exam 7: Avenues for Prosecution and Government Efforts62 Questions
Exam 8: Applying the First Amendment to Computer-Related Crime62 Questions
Exam 9: The Fourth Amendment and Other Legal Issues62 Questions
Exam 10: Computer Forensics: Terminology and Requirements62 Questions
Exam 11: Searching and Seizing Computer-Related Evidence62 Questions
Exam 12: Processing of Evidence and Report Preparation63 Questions
Exam 13: Conclusions and Future Issues61 Questions
Select questions type
Which of the following is an example of computer-initiated criminal activity?
Free
(Multiple Choice)
4.8/5
(39)
Correct Answer:
C
Which of the following, according to a study conducted by the Department of Justice, were perceived as the number one target for computer crime?
Free
(Multiple Choice)
4.9/5
(45)
Correct Answer:
C
One of the earliest examples of computer crime is ________, which consists of an activity in which telecommunications systems are manipulated and ultimately compromised.
Free
(Multiple Choice)
4.7/5
(39)
Correct Answer:
A
The lack of ________ and the removal of traditional jurisdictional demarcations allow perpetrators to commit multinational crime with little fear.
(Short Answer)
4.7/5
(33)
Closed system cards and open system cards are two primary types of ________.
(Multiple Choice)
4.8/5
(35)
The quality of information found on the Internet is often questionable.
(True/False)
4.8/5
(45)
The Supreme Court has refused to determine appropriate levels of ________ protections of individuals and computer equipment.
(Short Answer)
4.9/5
(36)
Unlike magnetic strips, which store only account information, a ________ stores funds on an integrated circuit chip.
(Short Answer)
4.9/5
(45)
Expenditures on a computer laboratory represent a recurring expense for an agency's budget.
(True/False)
4.7/5
(27)
Electronic purses come in two primary types: limited or closed, and multipurpose or open.
(True/False)
4.8/5
(35)
Phreaking is an activity in which telecommunications systems are manipulated and ultimately compromised.
(True/False)
5.0/5
(24)
Stealing home addresses, maps, or family information is classified as ________ criminal activity.
(Short Answer)
4.8/5
(35)
The Electronic Frontier Foundation (EFF) was created by _______.
(Multiple Choice)
4.8/5
(39)
One of the first examples of the international havoc that malware could wreak involved the ________ virus.
(Short Answer)
4.9/5
(37)
The Internet has monumentally increased the ________ of the virtual world, outpaced only by the exponential growth in the number of users.
(Short Answer)
4.8/5
(40)
Corporations and private entities that offer discounts on software or training to law enforcement agencies are called ________.
(Multiple Choice)
4.9/5
(32)
The rationale for ________ involves the avoidance of currency fluctuation and foreign exchange.
(Short Answer)
4.9/5
(42)
Match the following e-payment methods with their descriptions.
Correct Answer:
Premises:
Responses:
(Matching)
4.9/5
(31)
The lack of physical boundaries and the removal of traditional jurisdictional demarcations allow perpetrators to commit multinational crime with little fear of judicial sanctions.
(True/False)
4.9/5
(42)
Which payment method is typically associated with a card payment network such as Visa or MasterCard?
(Multiple Choice)
4.9/5
(38)
Showing 1 - 20 of 62
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)